Match!
Sharifullah Khan
National University of Sciences and Technology
66Publications
6H-index
160Citations
Publications 66
Newest
#1Jamil AhmadH-Index: 11
#2Amnah SiddiqaH-Index: 5
Last.Sharifullah KhanH-Index: 6
view all 4 authors...
Source
#1Iram Fatima (King Faisal University)H-Index: 8
#2Burhan Ud Din Abbasi (National University of Sciences and Technology)
Last.Rafia Mumtaz (National University of Sciences and Technology)H-Index: 5
view all 6 authors...
Source
#1Madiha Liaqat (National University of Sciences and Technology)H-Index: 2
#2Sharifullah Khan (National University of Sciences and Technology)H-Index: 6
Last.Kashif Rajpoot (National University of Sciences and Technology)H-Index: 15
view all 5 authors...
Immense increase in digital images demands an effective image retrieval system. In text based image retrieval systems, textual keywords are used for indexing. The query keywords are matched with the keywords associated with images to perform image retrieval task. Users usually demand higher proportion of the query keywords in the retrieved images than the other undesired keywords. Existing image retrieval systems retrieve images that do not contain the query keywords either in equal or higher pr...
1 CitationsSource
Source
#1Umara Noor (IIUI: International Islamic University, Islamabad)H-Index: 1
#2Zahid Anwar (Fontbonne University)H-Index: 14
Last.Shahzad Saleem (National University of Sciences and Technology)H-Index: 6
view all 5 authors...
Abstract With the ever increasing cases of cyber data breaches, the manual process of sifting through tons of security logs to investigate cyber-attacks is error-prone and time-consuming. Signature-based deep search solutions only give accurate results if the threat artifacts are precisely provided. With the burgeoning variety of sophisticated cyber threats having common attack patterns and utilizing the same attack tools, a timely investigation is nearly impossible. There is a need to automate ...
Source
#1Ghulam Mustafa (Pir Mehr Ali Shah Arid Agriculture University)H-Index: 2
#2Muhammad Azeem Abbas (Pir Mehr Ali Shah Arid Agriculture University)H-Index: 5
Last.Gwo-Jen Hwang (NTUST: National Taiwan University of Science and Technology)H-Index: 54
view all 5 authors...
ABSTRACTDuring early childhood, children start developing their cognitive, social, emotional, and behavioural skills, laying the foundation for life-long learning. Cognitive skills are usually taug...
Source
#1Mehrosh Khalid (National University of Sciences and Technology)H-Index: 1
#2Sharifullah Khan (National University of Sciences and Technology)H-Index: 6
Last.Muhammad Shaheryar (CU: Capital University)H-Index: 1
view all 4 authors...
Gene Regulatory Networks (GRNs) are reconstructed from the microarray gene expression data through diversified computational approaches. This process ensues in symmetric and diagonal interaction of gene pairs that cannot be modelled as direct activation, inhibition, and self-regulatory interactions. The values of gene co-expressions could help in identifying co-regulations among them. The proposed approach aims at computing the differences in variances of co-expressed genes rather than computing...
1 CitationsSource
#2Ali Mustafa Qamar (National University of Science and Technology)H-Index: 5
view all 4 authors...
Source
#1Tayyeba Rehman (National University of Sciences and Technology)H-Index: 1
#2Sharifullah Khan (National University of Sciences and Technology)H-Index: 6
Last.Muhammad Azeem Abbas (Pir Mehr Ali Shah Arid Agriculture University)H-Index: 5
view all 4 authors...
1 CitationsSource
1234567