default search action
Naveed Khan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Naveed Khan, Ayaz Ahmad, Abdul Wakeel, Zeeshan Kaleem, Bushra Rashid, Waqas Khalid:
Efficient UAVs Deployment and Resource Allocation in UAV-Relay Assisted Public Safety Networks for Video Transmission. IEEE Access 12: 4561-4574 (2024) - [j20]Yongyu Dai, Zhengwei Huang, Weijun He, Naveed Khan, Yang Yang:
Emotional dialogue generation model of electronic commerce intelligent customer service based on topic expansion. Eng. Appl. Artif. Intell. 138: 109429 (2024) - [j19]Kamil Shah, Liu Wenqi, Aeshah A. Raezah, Naveed Khan, Sami Ullah Khan, Muhammad Ozair, Zubair Ahmad:
Unraveling pine wilt disease: Comparative study of stochastic and deterministic model using spectral method. Expert Syst. Appl. 240: 122407 (2024) - [j18]Mustafa A. Al Sibahee, Zaid Ameen Abduljabbar, Alladoumbaye Ngueilbaye, Chengwen Luo, Jianqiang Li, Yijing Huang, Jin Zhang, Naveed Khan, Vincent Omollo Nyangaresi, Ali Hasan Ali:
Blockchain-Based Authentication Schemes in Smart Environments: A Systematic Literature Review. IEEE Internet Things J. 11(21): 34774-34796 (2024) - [j17]Babar Zaman, Hafiz Zafar Nazir, Naveed Khan, Muhammad Riaz, Tahir Abbas:
Corrections to an adaptive EWMA control chart based on Hampel function to monitor the process location parameter by Zaman et al. (2023). Qual. Reliab. Eng. Int. 40(1): 752-757 (2024) - [j16]Naveed Khan, Ayaz Ahmad, Sher Ali, Tariqullah Jan, Ihsan Ullah:
IRS and UAV-relay assisted public safety networks for video transmission: optimizing UAVs deployment and resource allocation. Telecommun. Syst. 86(3): 433-449 (2024) - [i1]Naveed Khan, Ayaz Ahmad, Abdul Wakeel, Zeeshan Kaleem, Bushra Rashid, Waqas Khalid:
Efficient UAVs Deployment and Resource Allocation in UAV-Relay Assisted Public Safety Networks for Video Transmission. CoRR abs/2401.01636 (2024) - 2023
- [j15]Sajjad Alam, Jianhua Zhang, Muhammad Usman Shehzad, Naveed Khan, Ahmad Ali:
Mediation approach of knowledge management process towards supply chain performance under green technology: an empirical analysis. Bus. Process. Manag. J. 29(5): 1466-1490 (2023) - [j14]Rashid Mehmood, Kassimu Mpungu, Iftikhar Ali, Babar Zaman, Fawwad Hussain Qureshi, Naveed Khan:
A new approach for designing the Shewhart-type control charts with generalized sensitizing rules. Comput. Ind. Eng. 182: 109379 (2023) - [j13]Babar Zaman, Syed Zeeshan Mahfooz, Naveed Khan, Muhammad Riaz, Rashid Mehmood:
Integration of hybrid score functions to design new adaptive EWMA control chart to monitor the process mean shift. Comput. Ind. Eng. 183: 109543 (2023) - [j12]Naveed Khan, Sally I. McClean, Shuai Zhang, Chris D. Nugent:
Performance evaluation of multivariate statistical techniques using edge-enabled optimisation for change detection in activity monitoring. J. Cloud Comput. 12(1): 91 (2023) - [j11]Naveed Khan, Jianbiao Zhang, Huhnkuk Lim, Jehad Ali, Intikhab Ullah, Muhammad Salman Pathan, Shehzad Ashraf Chaudhry:
An ECC-based mutual data access control protocol for next-generation public cloud. J. Cloud Comput. 12(1): 101 (2023) - [j10]Babar Zaman, Syed Zeeshan Mahfooz, Rashid Mehmood, Naveed Khan, Tajammal Imran:
An adaptive EWMA control chart based on Hampel function to monitor the process location parameter. Qual. Reliab. Eng. Int. 39(4): 1277-1298 (2023) - 2021
- [j9]Aftab Ali, Naveed Khan, Mamun I. Abu-Tair, Joost Noppen, Sally I. McClean, Ian R. McChesney:
Discriminating features-based cost-sensitive approach for software defect prediction. Autom. Softw. Eng. 28(2): 11 (2021) - [j8]Irfan Ahmed, Aftab Khan, Asfandyar Khan, Kamran Mujahid, Naveed Khan:
Efficient measurement matrix for speech compressive sampling. Multim. Tools Appl. 80(13): 20327-20343 (2021) - [c15]Naveed Khan, Zeeshan Tariq, Aftab Ali, Sally I. McClean, Paul N. Taylor, Detlef D. Nauck:
Early Prediction of Complex Business Processes Using Association Rule Based Mining. RTIP2R 2021: 183-194 - 2020
- [j7]Zeeshan Tariq, Naveed Khan, Darryl Charles, Sally I. McClean, Ian R. McChesney, Paul N. Taylor:
Understanding Contrail Business Processes through Hierarchical Clustering: A Multi-Stage Framework. Algorithms 13(10): 244 (2020)
2010 – 2019
- 2019
- [j6]Zulfiqar Ali, Muhammad Imran, Sally I. McClean, Naveed Khan, Muhammad Shoaib:
Protection of records and data authentication based on secret shares and watermarking. Future Gener. Comput. Syst. 98: 331-341 (2019) - [c14]Naveed Khan, Raju Shrestha:
Optimizing Power and Energy Efficiency in Cloud Computing. CLOSER 2019: 380-387 - [c13]Sally I. McClean, David A. Stanford, Lalit Garg, Naveed Khan:
Using Phase-type Models to Monitor and Predict Process Target Compliance. ICORES 2019: 82-90 - [c12]Naveed Khan, Hårek Haugerud, Raju Shrestha, Anis Yazidi:
Optimizing Power and Energy Efficiency in Cloud Computing. MEDES 2019: 256-261 - [c11]Naveed Khan, Zulfiqar Ali, Aftab Ali, Sally I. McClean, Darryl Charles, Paul N. Taylor, Detlef D. Nauck:
A Generic Model for End State Prediction of Business Processes Towards Target Compliance. SGAI Conf. 2019: 325-335 - 2018
- [b1]Naveed Khan:
Change detection in human physical activities. Ulster University, Coleraine, UK, 2018 - [j5]Saleh M. Al-Saleem, Aftab Ali, Naveed Khan:
Energy efficient key agreement scheme for ubiquitous and continuous remote healthcare systems using data mining technique. Clust. Comput. 21(1): 469-480 (2018) - [j4]Moneeb Gohar, Naveed Khan, Awais Ahmad, Muhammad Najam-ul-Islam, Shahzad Sarwar, Seok Joo Koh:
Cluster-Based Device Mobility Management in Named Data Networking for Vehicular Networks. Mob. Inf. Syst. 2018: 1710591:1-1710591:7 (2018) - [c10]Sally I. McClean, Naveed Khan, Adam R. Currie, Kashaf Khan:
Abnormality Detection in the Cloud Using Correlated Performance Metrics. SGAI Conf. 2018: 159-164 - 2017
- [j3]Timothy Patterson, Naveed Khan, Sally I. McClean, Chris D. Nugent, Shuai Zhang, Ian Cleland, Qin Ni:
Sensor-Based Change Detection for Timely Solicitation of User Engagement. IEEE Trans. Mob. Comput. 16(10): 2889-2900 (2017) - 2016
- [j2]Udsanee Pakdeetrakulwong, Pornpit Wongthongtham, Waralak V. Siricharoen, Naveed Khan:
An Ontology-Based Multi-Agent System for Active Software Engineering Ontology. Mob. Networks Appl. 21(1): 65-88 (2016) - [j1]Naveed Khan, Sally I. McClean, Shuai Zhang, Chris D. Nugent:
Optimal Parameter Exploration for Online Change-Point Detection in Activity Monitoring Using Genetic Algorithms. Sensors 16(11): 1784 (2016) - [c9]Naveed Khan, Sally I. McClean, Shuai Zhang, Chris D. Nugent:
Using Genetic Algorithms for Optimal Change Point Detection in Activity Monitoring. CBMS 2016: 318-323 - [c8]Naveed Khan, Sally I. McClean, Shuai Zhang, Chris D. Nugent:
Change Point Detection Using Multivariate Exponentially Weighted Moving Average (MEWMA) for Optimal Parameter in Online Activity Monitoring. UCAmI (1) 2016: 156-165 - 2015
- [c7]Udsanee Pakdeetrakulwong, Pornpit Wongthongtham, Naveed Khan:
An Ontology-Based Multi-Agent System to Support Requirements Traceability in Multi-Site Software Development Environment. ASWEC (2) 2015: 96-100 - [c6]Naveed Khan, Hesham Omran, Yingbang Yao, Khaled N. Salama:
Flexible PVDF ferroelectric capacitive temperature sensor. MWSCAS 2015: 1-4 - [c5]Naveed Khan, Sally I. McClean, Shuai Zhang, Chris D. Nugent:
Parameter Optimization for Online Change Detection in Activity Monitoring Using Multivariate Exponentially Weighted Moving Average (MEWMA). UCAmI 2015: 50-59 - 2013
- [c4]Ihsan Ullah, Naveed Khan, Hatim A. Aboalsamh:
Survey on botnet: Its architecture, detection, prevention and mitigation. ICNSC 2013: 660-665 - [c3]Abdulaziz Alsadhan, Naveed Khan:
An LBP Based Key Management for Secure Wireless Body Area Network (WBAN). SNPD 2013: 85-88 - 2010
- [c2]Maqsood Mahmud, Abdulrahman Abdulkarim Mirza, Ihsan Ullah, Naveed Khan, Abdul Hanan Bin Abdullah, Mohammad Yazid Bin Idris:
Enhanced Technique for Secure Wireless Sensor Routing with Respect to Energy Conservation. FGIT 2010: 376-382
2000 – 2009
- 2009
- [c1]Amir Bashir, Jing Li, Kiran Ivatury, Naveed Khan, Nirav Gala, Noam Familia, Zulfiqar Mohammed:
Fast lock scheme for phase-locked loops. CICC 2009: 319-322
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint