default search action
Muhammad Nadeem
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with a similar name
- Muhammad Nadeem Akram
- Muhammad Nadeem Ali
- Muhammad Nadeem Cheema
- Chaudhry Muhammad Nadeem Faisal
- Muhammad Nadeem Iqbal
- Muhammad Faisal Nadeem Khan — University of Engineering and Technology Taxila, Pakistan
- Muhammad Faisal Nadeem
- Muhammad Shahroz Nadeem
- Muhammad Nadeem Rafiq
- Muhammad Nadeem Sial
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Farhan Mateen Khan, Asim Munir, Majed Albaity, Muhammad Nadeem, Tahir Mahmood:
Software Reliability Growth Model Selection by Using VIKOR Method Based on q-Rung Orthopair Fuzzy Entropy and Divergence Measures. IEEE Access 12: 86572-86582 (2024) - [j37]Shujaat Ali, Muhammad Nadeem, Sheeraz Ahmed, Mohammad Asmat Ullah Khan, Muhammad Tahir:
3D Dynamic Topology With Energy-Aware Forwarding in Underwater Acoustic Networks (MAEARS). IEEE Access 12: 129319-129329 (2024) - [j36]Mohammad Mazyad Hazzazi, Muhammad Nadeem, Muhammad Kamran, Ismail Naci Cangül, J. Akhter:
Holomorphism and Edge Labeling: An Inner Study of Latin Squares Associated with Antiautomorphic Inverse Property Moufang Quasigroups with Applications. Complex. 2024 (2024) - [j35]Wael Farag, Muhammad Nadeem:
Enhanced real-time road-vehicles' detection and tracking for driving assistance. Int. J. Knowl. Based Intell. Eng. Syst. 28(2): 335-357 (2024) - [j34]Abid Mahboob, Imran Siddique, Muhammad Asif, Muhammad Nadeem, Aysha Saleem:
Construction of highly non linear component of block cipher based on mclaurin series and mellin transformation with application in image encryption. Multim. Tools Appl. 83(3): 7159-7177 (2024) - [j33]Syeda Wajiha Zahra, Muhammad Nadeem, Ali Arshad, Saman Riaz, Waqas Ahmed, Muhammad Abu Bakr, Amerah A. Alabrah:
Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks. Symmetry 16(5): 605 (2024) - [j32]Muhammad Kamran, Manal Elzain Mohamed Abdalla, Muhammad Nadeem, Anns Uzair, Muhammad Farman, Lakhdar Ragoub, Ismail Naci Cangül:
A Systematic Formulation into Neutrosophic Z Methodologies for Symmetrical and Asymmetrical Transportation Problem Challenges. Symmetry 16(5): 615 (2024) - [j31]Muhammad Kamran, Muhammad Nadeem, Justyna Zywiolek, Manal Elzain Mohamed Abdalla, Anns Uzair, Aiman Ishtiaq:
Enhancing Transportation Efficiency with Interval-Valued Fermatean Neutrosophic Numbers: A Multi-Item Optimization Approach. Symmetry 16(6): 766 (2024) - [j30]Muhammad Nadeem, Muhammad Irfan Malik, Arif Ullah, Novaira Junaid:
Smoking Dynamics: Factors Supplementing Tobacco Smoking in Pakistan. IEEE Trans. Comput. Soc. Syst. 11(4): 5367-5373 (2024) - [i13]Muhammad Nadeem, Ahmad F. Taha:
Structure-Preserving Model Order Reduction for Nonlinear DAE Models of Power Networks. CoRR abs/2405.07587 (2024) - 2023
- [j29]Faizan Ullah, Muhammad Nadeem, Muhammad Abrar, Farhan Amin, Abdu Salam, Amerah A. Alabrah, Hussain AlSalman:
Evolutionary Model for Brain Cancer-Grading and Classification. IEEE Access 11: 126182-126194 (2023) - [j28]Jinxing Liu, Jiahua Fang, Muhammad Nadeem, Yahya Alsayyad:
A Numerical Approach for the Analytical Solution of Multidimensional Wave Problems. Complex. 2023: 6626189:1-6626189:11 (2023) - [j27]Muhammad Nadeem, Melinda Oroszlányová, Wael Farag:
Effect of Digital Game-Based Learning on Student Engagement and Motivation. Comput. 12(9): 177 (2023) - [j26]Asghar Ali, Sara Javed, Muhammad Nadeem, Loredana Florentina Iambor, Sorin Muresan:
A Soliton Solution for the Kadomtsev-Petviashvili Model Using Two Novel Schemes. Symmetry 15(7): 1364 (2023) - [j25]Muhammad Nadeem, Asad Islam, Shazia Karim, Sorin Muresan, Loredana Florentina Iambor:
Numerical Analysis of Time-Fractional Porous Media and Heat Transfer Equations Using a Semi-Analytical Approach. Symmetry 15(7): 1374 (2023) - [j24]Jinxing Liu, Muhammad Nadeem, Asad Islam, Sorin Muresan, Loredana Florentina Iambor:
A Modified Residual Power Series Method for the Approximate Solution of Two-Dimensional Fractional Helmholtz Equations. Symmetry 15(12): 2152 (2023) - [c27]Muhammad Nadeem, MirSaleh Bahavarnia, Ahmad F. Taha:
On Wide-Area Control of Solar-Integrated DAE Models of Power Grids. ACC 2023: 4495-4500 - [c26]Muhammad Nadeem, Aqib Khan, Ji-Won Kim, L. Minh Dang, Hyeonjoon Moon:
Wheat Diseases Recognition Using Optimal Features Assisted Modified Soft Attention Network. ICTC 2023: 1487-1492 - [i12]Muhammad Nadeem, Faisal Bukhari, Ali Hussain:
Predicting the Students Involvements and its Impacts on Learning Outcomes Through Online Education During Covid-19. CoRR abs/2301.00031 (2023) - [i11]Muhammad Nadeem, Ahmad F. Taha:
Sorta Solving the OPF by Not Solving the OPF: DAE Control Theory and the Price of Realtime Regulation. CoRR abs/2304.03699 (2023) - [i10]Muhammad Nadeem, Humaira Afzal, Muhammad Idrees, Sajid Iqbal, Muhammad Rafiq Asim:
A Review Of Progress for Component Based Software Cost Estimation From 1965 to 2023. CoRR abs/2306.03971 (2023) - [i9]Muhammad Nadeem, MirSaleh Bahavarnia, Ahmad F. Taha:
Robust Feedback Control of Power Systems with Solar Plants and Composite Loads. CoRR abs/2310.00744 (2023) - [i8]MirSaleh Bahavarnia, Muhammad Nadeem, Ahmad F. Taha:
On Scaling Robust Feedback Control and State Estimation Problems in Power Networks. CoRR abs/2311.17836 (2023) - [i7]Wenjie Mei, Muhammad Nadeem, MirSaleh Bahavarnia, Ahmad F. Taha:
Learning for System Identification of NDAE-modeled Power Systems. CoRR abs/2312.07707 (2023) - 2022
- [j23]Abid Mahboob, Muhammad Asif, Imran Siddique, Aysha Saleem, Muhammad Nadeem, Dariusz Grzelczyk, Jan Awrejcewicz:
A Novel Construction of Substitution Box Based on Polynomial Mapped and Finite Field With Image Encryption Application. IEEE Access 10: 119244-119258 (2022) - [j22]Abid Mahboob, Muhammad Asif, Muhammad Nadeem, Aysha Saleem, Sayed M. Eldin, Imran Siddique:
A Cryptographic Scheme for Construction of Substitution Boxes Using Quantic Fractional Transformation. IEEE Access 10: 132908-132916 (2022) - [j21]Muhammad Nadeem, Ali Akgül, Liliana Guran, Monica-Felicia Bota:
A Novel Approach for the Approximate Solution of Wave Problems in Multi-Dimensional Orders with Computational Applications. Axioms 11(12): 665 (2022) - [j20]Jinxing Liu, Muhammad Nadeem, Mustafa Habib, Shazia Karim, Harun-Or Roshid:
Numerical Investigation of the Nonlinear Coupled Fractional Massive Thirring Equation Using Two-Scale Approach. Complex. 2022: 4141988:1-4141988:8 (2022) - [j19]Qura Tul Ain, T. Sathiyaraj, Shazia Karim, Muhammad Nadeem, Patrick Kandege Mwanakatwe:
ABC Fractional Derivative for the Alcohol Drinking Model using Two-Scale Fractal Dimension. Complex. 2022: 8531858:1-8531858:11 (2022) - [j18]Waseem Razzaq, Mustafa Habib, Muhammad Nadeem, Asim Zafar, Ilyas Khan, Patrick Kandege Mwanakatwe:
Solitary Wave Solutions of Conformable Time Fractional Equations Using Modified Simplest Equation Method. Complex. 2022: 8705388:1-8705388:9 (2022) - [j17]Jinxing Liu, Muhammad Nadeem, Mustafa Habib, Ali Akgül:
Approximate Solution of Nonlinear Time-Fractional Klein-Gordon Equations Using Yang Transform. Symmetry 14(5): 907 (2022) - [j16]Jiahua Fang, Muhammad Nadeem, Mustafa Habib, Ali Akgül:
Numerical Investigation of Nonlinear Shock Wave Equations with Fractional Order in Propagating Disturbance. Symmetry 14(6): 1179 (2022) - [j15]Muhammad Nadeem, Seyyed Ahmad Edalatpanah, Ibrahim Mahariq, Wael Hosny Fouad Aly:
Analytical View of Nonlinear Delay Differential Equations Using Sawi Iterative Scheme. Symmetry 14(11): 2430 (2022) - [j14]Muhammad Nadeem, Hossein Jafari, Ali Akgül, Manuel de la Sen:
A Computational Scheme for the Numerical Results of Time-Fractional Degasperis-Procesi and Camassa-Holm Models. Symmetry 14(12): 2532 (2022) - [j13]Qura Tul Ain, Muhammad Nadeem, Ali Akgül, Manuel de la Sen:
Controllability of Impulsive Neutral Fractional Stochastic Systems. Symmetry 14(12): 2612 (2022) - [c25]Muhammad Nadeem, Ahmad F. Taha:
Robust Dynamic State Estimation of Multi-Machine Power Networks with Solar Farms and Dynamics Loads. CDC 2022: 7174-7179 - [c24]Ardit Lushi, Dani Daas, Muhammad Nadeem:
IoT-Based Public Transport Management System. GCAIoT 2022: 69-75 - [i6]Muhammad Nadeem, Sebastian A. Nugroho, Ahmad F. Taha:
Dynamic State Estimation of Nonlinear Differential Algebraic Equation Models of Power Networks. CoRR abs/2206.07623 (2022) - [i5]Muhammad Nadeem, Ahmad F. Taha:
Robust Dynamic State Estimation of Multi-Machine Power Networks with Solar Farms and Dynamics Loads. CoRR abs/2209.10032 (2022) - 2021
- [j12]Muhammad Nadeem, Ali Arshad, Saman Riaz, Shahab S. Band, Amir Mosavi:
Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System. IEEE Access 9: 152300-152309 (2021) - [j11]Muhammad Nadeem, Ahmed Elmoasry, Imran Siddique, Fahd Jarad, Rana Muhammad Zulqarnain, Jawdat Alebraheem, Naseer S. Elazab:
Study of Triangular Fuzzy Hybrid Nanofluids on the Natural Convection Flow and Heat Transfer between Two Vertical Plates. Comput. Intell. Neurosci. 2021: 3678335:1-3678335:15 (2021) - [j10]Imran Siddique, Rana Muhammad Zulqarnain, Muhammad Nadeem, Fahd Jarad:
Numerical Simulation of MHD Couette Flow of a Fuzzy Nanofluid through an Inclined Channel with Thermal Radiation Effect. Comput. Intell. Neurosci. 2021: 6608684:1-6608684:16 (2021) - [j9]Muhammad Nadeem, Muhammad Altaf, Ayaz Ahmad:
Short-Term Load Forecasting Using Hybrid Neural Network. Int. J. Appl. Metaheuristic Comput. 12(1): 142-156 (2021) - [c23]Muhammad Nadeem, Khurram Shahzad, Nadeem Majeed:
Extracting Software Change Requests from Mobile App Reviews. ASE Workshops 2021: 198-203 - 2020
- [j8]Muhammad Zulqarnain Zeb, Kashif Imran, Abraiz Khattak, Abdul Kashif Janjua, Anamitra Pal, Muhammad Nadeem, Jiangfeng Zhang, Sohail Khan:
Optimal Placement of Electric Vehicle Charging Stations in the Active Distribution Network. IEEE Access 8: 68124-68134 (2020) - [j7]Muhammad Nadeem, Ayyaz Hussain, Asim Munir, Muhammad Habib, Muhammad Tahir Naseem:
Removal of random valued impulse noise from grayscale images using quadrant based spatially adaptive fuzzy filter. Signal Process. 169: 107403 (2020) - [c22]Siraj Un Muneer, Muhammad Nadeem, Bakhtiar Kasi, Mir Hamayoun Yousaf:
Evaluating the Effectiveness of Notations for Designing Security Aspects. ICACT 2020: 465-471 - [c21]Muhammad Nadeem, Morteza Biglari-Abhari:
Analyzing Engineers Writing for Non-engineers. TALE 2020: 281-286
2010 – 2019
- 2019
- [j6]Muhammad Nadeem, Fengquan Li, Hijaz Ahmad:
Modified Laplace variational iteration method for solving fourth-order parabolic partial differential equation with variable coefficients. Comput. Math. Appl. 78(6): 2052-2062 (2019) - [j5]Muhammad Nadeem, Zhenmin Li, Avinash Malik, Morteza Biglari-Abhari, Zoran Salcic:
Allocation and scheduling of SystemJ programs on chip multiprocessors with weighted TDMA scheduling. J. Syst. Archit. 98: 63-78 (2019) - [j4]Avinash Malik, HeeJong Park, Muhammad Nadeem, Zoran Salcic:
Memory management of safety-critical hard real-time systems designed in SystemJ. Microprocess. Microsystems 64: 101-119 (2019) - [j3]Muhammad Tahir Naseem, Muhammad Nadeem, Ijaz Mansoor Qureshi, Ayyaz Hussain:
Optimal Secure Information using Digital Watermarking and Fuzzy Rule base. Multim. Tools Appl. 78(6): 7691-7712 (2019) - [j2]Muhammad Nadeem, Ayyaz Hussain, Asim Munir:
Fuzzy logic based computational model for speckle noise removal in ultrasound images. Multim. Tools Appl. 78(13): 18531-18548 (2019) - [c20]Muhammad Nadeem, Aimee Tagle, Sakayan Sitsabesan:
Let's Make Some Music. ICEIC 2019: 1-4 - [c19]Bushra Haq, Muhammad Nadeem, Imran Ali, Kamran Ali, Mohsin Raza, Masood Ur Rehman:
Use of Expert System in Requirements Engineering Process A Systematic Literature Review. UCET 2019: 1-5 - 2018
- [c18]Muhammad Nadeem, Marion Blumenstein, Morteza Biglari-Abhari:
Exploring the Impact of in Class Writing Exercises in an Engineering Course. TALE 2018: 342-349 - [c17]Muhammad Nadeem, HeeJong Park, Avinash Malik:
Bandwidth Stealing TDMA Arbitration for Real-Time Multiprocessor Applications. TENCON 2018: 1504-1509 - 2017
- [j1]Zoran Salcic, HeeJong Park, Jürgen Teich, Avinash Malik, Muhammad Nadeem:
Noc-HMP: A Heterogeneous Multicore Processor for Embedded Systems Designed in SystemJ. ACM Trans. Design Autom. Electr. Syst. 22(4): 73:1-73:25 (2017) - 2016
- [c16]Muhammad Nadeem, Byron J. Williams, Gary L. Bradshaw, Edward B. Allen:
Human Subject Evaluation of Computer-Security Training Recommender. COMPSAC 2016: 251-256 - [c15]Zoran A. Salcic, Muhammad Nadeem, HeeJong Park, Jürgen Teich:
A heterogeneous multi-core SoC for mixed criticality industrial automation systems. ETFA 2016: 1-4 - [c14]Zoran A. Salcic, Muhammad Nadeem, HeeJong Park, Jürgen Teich:
Optimizing Latencies and Customizing NoC of Time-Predictable Heterogeneous Multi-core Processor. MCSoC 2016: 233-240 - [i4]Muhammad Nadeem:
Standard quantum bit commitment - an indefinite commitment time. IACR Cryptol. ePrint Arch. 2016: 39 (2016) - [i3]Muhammad Nadeem:
Secure positioning and quantum non-local correlations. IACR Cryptol. ePrint Arch. 2016: 59 (2016) - 2015
- [c13]W. Noor-ul-Ain, Muhammad Atta-ur-Rahman, Muhammad Nadeem, Abdul Ghafoor Abbasi:
Quantum Cryptography Trends: A Milestone in Information Security. HIS 2015: 25-39 - [c12]Muhammad Nadeem, Edward B. Allen, Byron J. Williams:
A Method for Recommending Computer-Security Training for Software Developers: Leveraging the Power of Static Analysis Techniques and Vulnerability Repositories. ITNG 2015: 534-539 - 2014
- [c11]HeeJong Park, Avinash Malik, Muhammad Nadeem, Zoran A. Salcic:
The Cardiac Pacemaker: SystemJ versus Safety Critical Java. JTRES 2014: 37 - [c10]Muhammad Nadeem, Edward B. Allen, Byron J. Williams:
Computer Security Training Recommender for Developers. RecSys Posters 2014 - 2013
- [c9]Muhammad Nadeem, HeeJong Park, Zhenmin Li, Morteza Biglari-Abhari, Zoran Salcic:
GALS-CMP: Chip-Multiprocessor for GALS Embedded Systems. ARCS 2013: 147-158 - 2012
- [c8]Muhammad Nadeem, Byron J. Williams, Edward B. Allen:
High false positive detection of security vulnerabilities: a case study. ACM Southeast Regional Conference 2012: 359-360 - [c7]Muhammad Nadeem, Morteza Biglari-Abhari, Zoran Salcic:
JOP-plus - A processor for efficient execution of java programs extended with GALS concurrency. ASP-DAC 2012: 17-22 - [i2]M. Rizwan Jameel Qureshi, Muhammad Rafiq Asim, Muhammad Nadeem, Asif Mehmood:
A New Teaching Model For The Subject Of Software Project Management. CoRR abs/1202.2510 (2012) - 2011
- [c6]Muhammad Nadeem, Morteza Biglari-Abhari, Zoran Salcic:
RJOP: a customized Java processor for reactive embedded systems. DAC 2011: 1038-1043 - [c5]Muhammad Nadeem, Morteza Biglari-Abhari, Zoran Salcic:
GALS-JOP: A Java Embedded Processor for GALS Reactive Programs. DASC 2011: 292-299 - 2010
- [c4]Muhammad Nadeem, Stephan Wong, Georgi Kuzmanov, Ahsan Shabbir, Muhammad Faisal Nadeem, Fakhar Anjam:
Low-power, high-throughput deblocking filter for H.264/AVC. SoC 2010: 93-98
2000 – 2009
- 2009
- [c3]Syed Shams-ul-Haq, Muhammad Nadeem:
Supervised DAG Based Data Mining Model for DNA Sequence Analysis and Pattern Discovery. DMIN 2009: 171-177 - 2008
- [c2]Muhammad Nadeem, Syed Shams-ul-Haq:
Guided Web Content Mining Approach for Automated Meta-Rule Extraction and Information Retrieval. DMIN 2008: 619-625 - 2006
- [c1]Muhammad Anwar Usman, Muhammad Nadeem, M. Zeeshan Ali Ansari, Sajjad Raza:
Multi-agent Based Semantic E-government Web Service Architecture Using Extended WSDL. IAT Workshops 2006: 599-604 - 2004
- [i1]Muhammad Nadeem, Syed Ata Hussain Jaffri:
Application of Business Intelligence In Banks (Pakistan). CoRR cs.DB/0406004 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint