Zobrazeno 1 - 10
of 104
pro vyhledávání: '"Muhammad A. S. Khan"'
Autor:
Ihsan Ullah Khan, Muhammad U. S. Khan
Publikováno v:
Human-Centric Intelligent Systems, Vol 4, Iss 3, Pp 437-446 (2024)
Abstract The notion of discerning political affiliations from users’ social media behavior instills a sense of unease in many. Democracy necessitates that individuals’ political affiliations remain private, and social media challenges this founda
Externí odkaz:
https://doaj.org/article/27dcbb0d130c4cfcb60a72b0613b81f6
Publikováno v:
IEEE Access, Vol 11, Pp 131221-131236 (2023)
Open-world object detection is a challenging set of tasks in the realm of computer vision. In these tasks, the object detection model processes the input image or video and undergoes inference to identify objects or features present in the image or v
Externí odkaz:
https://doaj.org/article/0a88e3b9a2a249beafc9b120c9439138
Autor:
Waleed Afandi, Syed Muhammad Ammar Hassan Bukhari, Muhammad U. S. Khan, Tahir Maqsood, Muhammad A. B. Fayyaz, Ali R. Ansari, Raheel Nawaz
Publikováno v:
IEEE Access, Vol 11, Pp 33178-33188 (2023)
Neural network models are black boxes in nature. The mechanics behind these black boxes are practically unexplainable. Having the insight into patterns identified by these algorithms can help unravel important properties of the subject in query. Thes
Externí odkaz:
https://doaj.org/article/d3ac9e7fb0314e61a743305b6675f960
Autor:
Waleed Afandi, Syed Muhammad Ammar Hassan Bukhari, Muhammad U. S. Khan, Tahir Maqsood, Samee U. Khan
Publikováno v:
IEEE Access, Vol 10, Pp 76731-76741 (2022)
Recently, many video streaming services, such as YouTube, Twitch, and Facebook, have contributed to video streaming traffic, leading to the possibility of streaming unwanted and inappropriate content to minors or individuals at workplaces. Therefore,
Externí odkaz:
https://doaj.org/article/777031217670418184ee190c42a20410
Publikováno v:
IEEE Access, Vol 9, Pp 99581-99588 (2021)
Gradient descent is the workhorse of deep neural networks. Gradient descent has the disadvantage of slow convergence. The famous way to overcome slow convergence is to use momentum. Momentum effectively increases the learning factor of gradient desce
Externí odkaz:
https://doaj.org/article/7ea3da4778a94070a98ffdfcba8bf38e
Publikováno v:
Complexity, Vol 2021 (2021)
Using a pump in reverse mode as a hydraulic turbine remains an alternative for hydropower generation in meeting energy needs, especially for the provision of electricity to remote and rural settlements. The primary challenge with small hydroelectric
Externí odkaz:
https://doaj.org/article/e1f4c5116c9e4c6db3af961982d1d4d3
Publikováno v:
IEEE Access, Vol 6, Pp 62296-62313 (2018)
Carpooling services allow drivers to share rides with other passengers. This helps in reducing the passengers' fares and time, as well as traffic congestion and increases the income for drivers. In recent years, several carpooling-based recommendatio
Externí odkaz:
https://doaj.org/article/e449ef020a6b4614864652e38c35f985
Autor:
Ali S. Kamal, Syed M. A. H. Bukhari, Muhammad U. S. Khan, Tahir Maqsood, Muhammad A. B. Fayyaz
Publikováno v:
Intelligent Sustainable Systems ISBN: 9789811976629
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3edfe0231ab737cabd57a534bf4dce38
https://doi.org/10.1007/978-981-19-7663-6_8
https://doi.org/10.1007/978-981-19-7663-6_8
Autor:
Muhammad U. S. Khan, Syed M. A. H. Bukhari, Tahir Maqsood, Muhammad A. B. Fayyaz, Darren Dancey, Raheel Nawaz
Publikováno v:
Electronics; Volume 11; Issue 3; Pages: 350
Electronics, Vol 11, Iss 350, p 350 (2022)
Electronics, Vol 11, Iss 350, p 350 (2022)
Encryption Protocols e.g., HTTPS is utilized to secure the traffic between servers and clients for YouTube and other video streaming services, and to further secure the communication, VPNs are used. However, these protocols are not sufficient to hide
Autor:
Syed M. A. H. Bukhari, Waleed Afandi, Muhammad U. S. Khan, Tahir Maqsood, Muhammad B. Qureshi, Muhammad A. B. Fayyaz, Raheel Nawaz
Publikováno v:
Electronics; Volume 11; Issue 24; Pages: 4076
In recent years, video identification within encrypted network traffic has gained popularity for many reasons. For example, a government may want to track what content is being watched by its citizens, or businesses may want to block certain content