default search action
Muhammad Hussain 0001
Person information
- affiliation: King Saud University, Department of Computer Science, College of Computer and Information Sciences, Riyadh, Saudi Arabia
- affiliation (2003-2005): Japan Science and Technology Agency, JST, PRESTO, Fukuoka, Japan
- affiliation (PhD 2003): Kyushu University, Graduate School of Information Science and Electrical Engineering, Fukuoka, Japan
Other persons with the same name
- Muhammad Hussain (aka: Mohammad Hussain) — disambiguation page
- Muhammad Hussain 0002 — University of Huddersfield, School of Computing and Engineering, Department of Computer Science, UK
- Muhammad Hussain 0003 — Northeast Normal University, Institute of Natural Disaster Research, School of Environment, Changchun, China
- Muhammad Hussain 0004 — COMSATS University Islamabad, Department of Mathematics, Lahore Campus, Pakistan (and 1 more)
- Muhammad Hussain 0005 — Bahria University, Department of Electrical Engineering, Karachi, Pakistan
Other persons with a similar name
- Dil Muhammad Akbar Hussain (aka: D. M. Akbar Hussain) — Aalborg University, Department of Energy Technology, Esbjerg, Denmark
- Muhammad Awais Hussain
- Muhammad Ishfaq Hussain
- Muhammad Jawad Hussain
- Muhammad Majid Hussain
- Muhammad Mustafa Hussain
- Muhammad Nihal Hussain
- Muhammad Tanveer Hussain
- Muhammad Wajahat Hussain (aka: Wajahat Hussain)
- Muhammad Hussain Tahir
- show all similar names
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j53]Ashwaq Alotaibi, Muhammad Hussain, Hatim A. Aboalsamh:
Cross-Sensor Fingerprint Recognition Using Convolutional Neural Network and Canonical Correlation Analysis. IEEE Access 12: 84738-84751 (2024) - 2023
- [j52]Muhammad Hussain, Qazi Emad-ul-Haq, Hatim A. Aboalsamh, Ihsan Ullah:
Emotion Recognition System Based on Two-Level Ensemble of Deep-Convolutional Neural Network Models. IEEE Access 11: 16875-16895 (2023) - [j51]Rawan Alsughayer, Muhammad Hussain, Fahman Saeed, Hatim A. Aboalsamh:
Detection and localization of splicing on remote sensing images using image-to-image transformation. Appl. Intell. 53(11): 13275-13292 (2023) - [j50]Rawan Alsughayer, Muhammad Hussain, Fahman Saeed, Hatim A. Aboalsamh:
Correction to: Detection and localization of splicing on remote sensing images using image-to-image transformation. Appl. Intell. 53(16): 19807 (2023) - [j49]Walaa Alsumari, Muhammad Hussain, Laila AlShehri, Hatim A. Aboalsamh:
EEG-Based Person Identification and Authentication Using Deep Convolutional Neural Network. Axioms 12(1): 74 (2023) - 2022
- [j48]Muhammad Hussain, Fouziah Alotaibi, Emad-ul-Haq Qazi, Hatim A. Aboalsamh:
Illumination invariant face recognition using contourlet transform and convolutional neural network. J. Intell. Fuzzy Syst. 43(1): 383-396 (2022) - [j47]Ashwaq Alotaibi, Muhammad Hussain, Hatim A. Aboalsamh, Wadood Abdul, George Bebis:
Cross-Sensor Fingerprint Enhancement Using Adversarial Learning and Edge Loss. Sensors 22(18): 6973 (2022) - [c45]Fazal-e-Amin, Muhammad Hussain, Zulfiqar Ali, Mariam Busaleh, Sarah A. Al Sultan:
Development of a Secure Cloud-based Breast Cancer Diagnosis System. ICCBDC 2022: 42-48 - [c44]Muhammad Hussain, Fahman Saeed, Hatim A. Aboalsamh, Abdul Wadood:
DeepFingerPCANet: Automatic Fingerprint Classification Using Deep Learning. IV 2022: 457-462 - [c43]Muhammad Hussain, Fahman Saeed, Mariam Busaleh, Hatim Aboalsamh, Fazal-e-Amin:
Mammogram Screening for Breast Density Classification using a soft voting ensemble of Swin Transformers and ConvNext models. SITIS 2022: 372-379 - 2021
- [j46]Fahman Saeed, Muhammad Hussain, Hatim A. Aboalsamh:
Automatic Diabetic Retinopathy Diagnosis Using Adaptive Fine-Tuned Convolutional Neural Network. IEEE Access 9: 41344-41359 (2021) - [j45]Amjad F. Alsuhaim, Aqil M. Azmi, Muhammad Hussain:
Improving the Retrieval of Arabic Web Search Results Using Enhanced k-Means Clustering Algorithm. Entropy 23(4): 449 (2021) - [j44]Adhwa Alrashidi, Ashwaq Alotaibi, Muhammad Hussain, Helala AlShehri, Hatim A. Aboalsamh, George Bebis:
Cross-Sensor Fingerprint Matching Using Siamese Network and Adversarial Learning. Sensors 21(11): 3657 (2021) - [i9]Norah M. Asiri, Muhammad Hussain, Fadwa Al Adel, Hatim Aboalsamh:
A Deep Learning-Based Unified Framework for Red Lesions Detection on Retinal Fundus Images. CoRR abs/2109.05021 (2021) - [i8]Fahman Saeed, Muhammad Hussain, Hatim A. Aboalsamh, Fadwa Al Adel, Adi Mohammed Al Owaifeer:
Diabetic Retinopathy Screening Using Custom-Designed Convolutional Neural Network. CoRR abs/2110.03877 (2021) - 2020
- [j43]Mubbashar Saddique, Khurshid Asghar, Usama Ijaz Bajwa, Muhammad Hussain, Hatim A. Aboalsamh, Zulfiqar Habib:
Classification of Authentic and Tampered Video Using Motion Residual and Parasitic Layers. IEEE Access 8: 56782-56797 (2020) - [j42]Amani A. Alahmadi, Muhammad Hussain, Hatim Aboalsamh, Aqil M. Azmi:
ConvSRC: SmartPhone-based periocular recognition using deep convolutional neural network and sparsity augmented collaborative representation. J. Intell. Fuzzy Syst. 38(3): 3041-3057 (2020) - [j41]Laila AlShehri, Muhammad Hussain, Hatim Aboalsamh, Abdul Wadood:
Fragile watermarking for image authentication using BRINT and ELM. Multim. Tools Appl. 79(39-40): 29199-29223 (2020) - [j40]Amani A. Alahmadi, Muhammad Hussain, Hatim A. Aboalsamh, Mansour Zuair:
PCAPooL: unsupervised feature learning for face recognition using PCA, LBP, and pyramid pooling. Pattern Anal. Appl. 23(2): 673-682 (2020)
2010 – 2019
- 2019
- [j39]Helala AlShehri, Muhammad Hussain, Hatim A. Aboalsamh, Qazi Emad-ul-Haq, Mansour Alzuair, Aqil M. Azmi:
Alignment-Free Cross-Sensor Fingerprint Matching Based on the Co-Occurrence of Ridge Orientations and Gabor-HoG Descriptor. IEEE Access 7: 86436-86452 (2019) - [j38]Norah M. Asiri, Muhammad Hussain, Fadwa Al Adel, Nazih Alzaidi:
Deep learning based computer-aided diagnosis systems for diabetic retinopathy: A survey. Artif. Intell. Medicine 99 (2019) - [j37]Aqil M. Azmi, Maram F. Al-Jouie, Muhammad Hussain:
AAEE - Automated evaluation of students' essays in Arabic language. Inf. Process. Manag. 56(5): 1736-1752 (2019) - [j36]Emad-ul-Haq Qazi, Muhammad Hussain, Hatim Aboalsamh:
An efficient intelligent system for the classification of electroencephalography (EEG) brain signals using nuclear features for human cognitive tasks. J. Intell. Fuzzy Syst. 37(1): 913-928 (2019) - [j35]Khurshid Asghar, Xianfang Sun, Paul L. Rosin, Mubbashar Saddique, Muhammad Hussain, Zulfiqar Habib:
Edge-texture feature-based image forgery detection with cross-dataset evaluation. Mach. Vis. Appl. 30(7-8): 1243-1262 (2019) - [i7]Saeed M. Bamatraf, Muhammad Hussain, Emad-ul-Haq Qazi, Hatim Aboalsamh:
Eigen Values Features for the Classification of Brain Signals corresponding to 2D and 3D Educational Contents. CoRR abs/1904.13221 (2019) - [i6]Emad-ul-Haq Qazi, Muhammad Hussain, Hatim Aboalsamh:
An Efficient Intelligent System for the Classification of Electroencephalography (EEG) Brain Signals using Nuclear Features for Human Cognitive Tasks. CoRR abs/1904.13228 (2019) - [i5]Emad-ul-Haq Qazi, Muhammad Hussain, Hatim A. Aboalsamh, Ihsan Ullah:
Automatic Emotion Recognition (AER) System based on Two-Level Ensemble of Lightweight Deep CNN Models. CoRR abs/1904.13234 (2019) - [i4]Helala AlShehri, Muhammad Hussain, Hatim A. Aboalsamh, Qazi Emad-ul-Haq, Aqil M. Azmi:
Alignment-Free Cross-Sensor Fingerprint Matching based on the Co-Occurrence of Ridge Orientations and Gabor-HoG Descriptor. CoRR abs/1905.03699 (2019) - 2018
- [j34]Helala AlShehri, Muhammad Hussain, Hatim A. Aboalsamh, Mansour Abdulaziz Al Zuair:
Cross-Sensor Fingerprint Matching Method Based on Orientation, Gradient, and Gabor-HoG Descriptors With Score Level Fusion. IEEE Access 6: 28951-28968 (2018) - [j33]Ihsan Ullah, Muhammad Hussain, Emad-ul-Haq Qazi, Hatim Aboalsamh:
An automated system for epilepsy detection using EEG brain signals based on deep learning approach. Expert Syst. Appl. 107: 61-71 (2018) - [j32]Syed Jamal Safdar Gardezi, Ibrahima Faye, Jose Miguel Sanchez Bornot, Nidal S. Kamel, Mohammad Hussain:
Mammogram classification using dynamic time warping. Multim. Tools Appl. 77(3): 3941-3962 (2018) - [j31]Helala AlShehri, Muhammad Hussain, Hatim Aboalsamh, Mansour Alzuair:
A Large-Scale Study of Fingerprint Matching Systems for Sensor Interoperability Problem. Sensors 18(4): 1008 (2018) - [i3]Ihsan Ullah, Muhammad Hussain, Emad-ul-Haq Qazi, Hatim Aboalsamh:
An Automated System for Epilepsy Detection using EEG Brain Signals based on Deep Learning Approach. CoRR abs/1801.05412 (2018) - [i2]Amani A. Alahmadi, Muhammad Hussain, Hatim Aboalsamh, Mansour Zuair:
ConvSRC: SmartPhone based Periocular Recognition using Deep Convolutional Neural Network and Sparsity Augmented Collaborative Representation. CoRR abs/1801.05449 (2018) - [i1]Norah M. Asiri, Muhammad Hussain, Hatim A. Aboalsamh:
Deep Learning based Computer-Aided Diagnosis Systems for Diabetic Retinopathy: A Survey. CoRR abs/1811.01238 (2018) - 2017
- [j30]Wajid Mumtaz, Likun Xia, Syed Saad Azhar Ali, Mohd Azhar Mohd Yasin, Muhammad Hussain, Aamir Saeed Malik:
Electroencephalogram (EEG)-based computer-aided technique to diagnose major depressive disorder (MDD). Biomed. Signal Process. Control. 31: 108-115 (2017) - [j29]Salabat Khan, Muhammad Hussain, Hatim Aboalsamh, George Bebis:
A comparison of different Gabor feature extraction approaches for mass classification in mammography. Multim. Tools Appl. 76(1): 33-57 (2017) - [j28]Amani A. Alahmadi, Muhammad Hussain, Hatim Aboalsamh, Ghulam Muhammad, George Bebis, Hassan Mathkour:
Passive detection of image forgery using DCT and local binary pattern. Signal Image Video Process. 11(1): 81-88 (2017) - 2016
- [j27]Salabat Khan, Muhammad Hussain, Hatim Aboalsamh, Hassan Mathkour, George Bebis, Mohammed Zakariah:
Optimized Gabor features for mass classification in mammography. Appl. Soft Comput. 44: 267-280 (2016) - [j26]Ghulam Muhammad, Muhammad Hussain, Muneer H. Al-Hammadi, Hatim Aboalsamh, Hassan Mathkour, Amir Malik Saeed:
Short-term and long-term memory analysis of learning using 2D and 3D educational contents. Behav. Inf. Technol. 35(11): 958-967 (2016) - [j25]Saeed M. Bamatraf, Muhammad Hussain, Hatim A. Aboalsamh, Qazi Emad-ul-Haq, Aamir Saeed Malik, Hafeez Ullah Amin, Hassan Mathkour, Ghulam Muhammad, Hafiz Muhammad Imran:
A System for True and False Memory Prediction Based on 2D and 3D Educational Contents and EEG Brain Signals. Comput. Intell. Neurosci. 2016: 8491046:1-8491046:11 (2016) - [c42]Mariam Busaleh, Muhammad Hussain, Hatim A. Aboalsamh, Mansour Zuair, George Bebis:
False Positive Reduction in Breast Mass Detection Using the Fusion of Texture and Gradient Orientation Features. ISVC (1) 2016: 669-678 - [c41]Raqinah Alrabiah, Muhammad Hussain, Hatim A. Aboalsamh, Mansour Zuair, George Bebis:
PH-BRINT: Pooled Homomorphic Binary Rotation Invariant and Noise Tolerant Representation for Face Recognition Under Illumination Variations. ISVC (1) 2016: 779-789 - [c40]Emad-ul-Haq Qazi, Muhammad Hussain, Hatim A. Aboalsamh, Wadood Abdul, Saeed M. Bamatraf, Ihsan Ullah:
An Intelligent System to Classify Epileptic and Non-Epileptic EEG Signals. SITIS 2016: 230-235 - 2015
- [j24]Muhammad Hussain, Sahar Qasem, George Bebis, Ghulam Muhammad, Hatim Aboalsamh, Hassan Mathkour:
Evaluation of Image Forgery Detection Using Multi-Scale Weber Local Descriptors. Int. J. Artif. Intell. Tools 24(4): 1540016:1-1540016:28 (2015) - [j23]Qingchuan Tao, Zhiming Liu, George Bebis, Muhammad Hussain:
Face recognition using a novel image representation scheme and multi-scale local features. Int. J. Biom. 7(3): 191-212 (2015) - [j22]Qazi Emad-ul-Haq, Hatim Aboalsamh, Abdelfettah Belghith, Muhammad Hussain, Wadood Abdul, Mostafa H. Dahshan, Sanaa Ghouzali:
Challenges and Solutions for Internet of Things Driven by IPv6. KSII Trans. Internet Inf. Syst. 9(12): 4739-4758 (2015) - [j21]Faezeh Tafazzoli, George Bebis, Sushil J. Louis, Muhammad Hussain:
Genetic feature selection for gait recognition. J. Electronic Imaging 24(1): 013036 (2015) - [c39]Muhammad Hussain, Awabed Jibreen, Hatim A. Aboalsamh, Hassan Madkour, George Bebis, Gholamreza Amayeh:
Feature Selection for Hand-Shape Based Identification. CISIS-ICEUTE 2015: 237-246 - [c38]Hafeez Ullah Amin, Aamir Saeed Malik, Nasreen Badruddin, Nidal S. Kamel, Muhammad Hussain:
Effects of stereoscopic 3D display technology on event-related potentials (ERPs). NER 2015: 1084-1087 - [c37]Saeed M. Bamatraf, Muhammad Hussain, Hatim Aboalsamh, Hassan Mathkour, Aamir Saeed Malik, Hafeez Ullah Amin, Ghulam Muhammad, Emad-ul-Haq Qazi:
A system based on 3D and 2D educational contents for true and false memory prediction using EEG signals. NER 2015: 1096-1099 - 2014
- [j20]Muhammad Hussain:
Mammogram Enhancement Using Lifting Dyadic Wavelet Transform and Normalized Tsallis Entropy. J. Comput. Sci. Technol. 29(6): 1048-1057 (2014) - [j19]Yasser A. Reyad, Mohamed A. Berbar, Muhammad Hussain:
Comparison of Statistical, LBP, and Multi-Resolution Analysis Features for Breast Mass Classification. J. Medical Syst. 38(9): 100 (2014) - [j18]Maryam Jaberi, George Bebis, Muhammad Hussain, Ghulam Muhammad:
Accurate and robust localization of duplicated region in copy-move image forgery. Mach. Vis. Appl. 25(2): 451-475 (2014) - [j17]Ghulam Muhammad, Muneer H. Al-Hammadi, Muhammad Hussain, George Bebis:
Image forgery detection using steerable pyramid transform and local binary pattern. Mach. Vis. Appl. 25(4): 985-995 (2014) - [j16]Iftikhar Ahmad, Muhammad Hussain, Abdullah S. Alghamdi, Abdulhameed Alelaiwi:
Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components. Neural Comput. Appl. 24(7-8): 1671-1682 (2014) - [j15]Muhammad Hussain:
False-positive reduction in mammography using multiscale spatial Weber law descriptor and support vector machines. Neural Comput. Appl. 25(1): 83-93 (2014) - [c36]Muhammad Hussain, Sahar Q. Saleh, Hatim A. Aboalsamh, Muhammad Ghulam, George Bebis:
Comparison between WLD and LBP descriptors for non-intrusive image forgery detection. INISTA 2014: 197-204 - [c35]Faezeh Tafazzoli, George Bebis, Sushil J. Louis, Muhammad Hussain:
Improving Human Gait Recognition Using Feature Selection. ISVC (2) 2014: 830-840 - 2013
- [j14]Mohammad Hussain:
Efficient Decimation of Polygonal Models Using Normal Field Deviation. Comput. Informatics 32(3): 527-547 (2013) - [j13]Shicai Yang, George Bebis, Muhammad Hussain, Ghulam Muhammad, Anwar M. Mirza:
Unsupervised Discovery of Visual Face Categories. Int. J. Artif. Intell. Tools 22(1) (2013) - [j12]Muhammad Hussain, Ihsan Ullah, Hatim A. Aboalsamh, Ghulam Muhammad, George Bebis, Anwar Majid Mirza:
Gender Recognition from Face Images with Dyadic Wavelet Transform and Local Binary Pattern. Int. J. Artif. Intell. Tools 22(6) (2013) - [j11]Muhammad Hussain:
Ensemble Classifier for Benign-Malignant Mass Classification. Int. J. Comput. Vis. Image Process. 3(1): 66-77 (2013) - [j10]Muhammad Hussain:
Volume and Normal Field Based Simplification of Polygonal Models. J. Inf. Sci. Eng. 29(2): 267-279 (2013) - [j9]Iftikhar Ahmad, Azween B. Abdullah, Abdullah Sharaf Alghamdi, Muhammad Hussain:
Optimized intrusion detection mechanism using soft computing techniques. Telecommun. Syst. 52(4): 2187-2195 (2013) - [c34]Motasem AlSawadi, Ghulam Muhammad, Muhammad Hussain, George Bebis:
Copy-Move Image Forgery Detection Using Local Binary Pattern and Neighborhood Clustering. EMS 2013: 249-254 - [c33]Muhammad Hussain, Ghulam Muhammad, Sahar Q. Saleh, Anwar M. Mirza, George Bebis:
Image forgery detection using multi-resolution Weber local descriptors. EUROCON 2013: 1570-1577 - [c32]Ghulam Muhammad, Muneer H. Al-Hammadi, Muhammad Hussain, Anwar M. Mirza, George Bebis:
Copy move image forgery detection method using steerable pyramid transform and texture descriptor. EUROCON 2013: 1586-1592 - [c31]Amani A. Alahmadi, Muhammad Hussain, Hatim A. Aboalsamh, Muhammad Ghulam, George Bebis:
Splicing image forgery detection based on DCT and Local Binary Pattern. GlobalSIP 2013: 253-256 - [c30]Maryam Jaberi, George Bebis, Muhammad Hussain, Ghulam Muhammad:
Improving the detection and localization of duplicated regions in copy-move image forgery. DSP 2013: 1-6 - [c29]Taghreed Alamri, Muhammad Hussain, Hatim Aboalsamh, Ghulam Muhammad, George Bebis, Anwar M. Mirza:
Category Specific Face Recognition Based on Gender. ICISA 2013: 1-4 - [c28]Muhammad Hussain:
False Positive Reduction Using Gabor Feature Subset Selection. ICISA 2013: 1-5 - [c27]Sahar Q. Saleh, Muhammad Hussain, Ghulam Muhammad, George Bebis:
Evaluation of Image Forgery Detection Using Multi-scale Weber Local Descriptors. ISVC (2) 2013: 416-424 - [c26]Anwar M. Mirza, Muhammad Hussain, Huda Abdulrahman Almuzaini, Ghulam Muhammad, Hatim Aboalsamh, George Bebis:
Gender Recognition Using Fusion of Local and Global Facial Features. ISVC (2) 2013: 493-502 - [c25]Muneer H. Al-Hammadi, Ghulam Muhammad, Muhammad Hussain, George Bebis:
Curvelet Transform and Local Texture Based Image Forgery Detection. ISVC (2) 2013: 503-512 - [c24]Muhammad Hussain, Sarah Al-Otaibi, Ghulam Muhammad, Hatim Aboalsamh, George Bebis, Anwar M. Mirza:
Gender Recognition Using Nonsubsampled Contourlet Transform and WLD Descriptor. SCIA 2013: 373-383 - 2012
- [j8]Ghulam Muhammad, Muhammad Hussain, George Bebis:
Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit. Investig. 9(1): 49-57 (2012) - [j7]Ghulam Muhammad, Muhammad Hussain, Fatmah Alenezy, George Bebis, Anwar M. Mirza, Hatim Aboalsamh:
Race Classification from Face Images using Local Descriptors. Int. J. Artif. Intell. Tools 21(5) (2012) - [c23]Muhammad Ghulam, Muhammad Hussain, Fatmah Alenezy, Anwar M. Mirza, George Bebis, Hatim Aboalsamh:
Race recognition using local descriptors. ICASSP 2012: 1525-1528 - [c22]Muhammad Hussain, Salabat Khan, Muhammad Ghulam, George Bebis:
Mass Detection in Digital Mammograms Using Optimized Gabor Filter Bank. ISVC (2) 2012: 82-91 - [c21]Ihsan Ullah, Muhammad Hussain, Hatim Aboalsamh, Muhammad Ghulam, Anwar M. Mirza, George Bebis:
Gender Recognition from Face Images with Dyadic Wavelet Transform and Local Binary Pattern. ISVC (2) 2012: 409-419 - [c20]Muhammad Hussain, Ghulam Muhammad, George Bebis:
Face Recognition Using Multiscale and Spatially Enhanced Weber Law Descriptor. SITIS 2012: 85-89 - [c19]Muhammad Hussain, Salabat Khan, Ghulam Muhammad, George Bebis:
A Comparison of Different Gabor Features for Mass Classification in Mammography. SITIS 2012: 142-148 - [c18]Muhammad Hussain, Ghulam Muhammad, Sahar Q. Saleh, Anwar M. Mirza, George Bebis:
Copy-Move Image Forgery Detection Using Multi-Resolution Weber Descriptors. SITIS 2012: 395-401 - 2011
- [j6]Tom Patten, Wenjing Li, George Bebis, Muhammad Hussain:
Assessing Insect Growth Using Image Analysis. Int. J. Artif. Intell. Tools 20(3): 511-530 (2011) - [c17]Najah Muhammad, Muhammad Hussain, Ghulam Muhammad, George Bebis:
Copy-Move Forgery Detection Using Dyadic Wavelet Transform. CGIV 2011: 103-108 - [c16]Muhammad Hussain, Summrina Kanwal Wajid, Ali El-Zaart, Mohamed A. Berbar:
A Comparison of SVM Kernel Functions for Breast Cancer Detection. CGIV 2011: 145-150 - [c15]Ghulam Muhammad, Muhammad Hussain, Khalid Khawaji, George Bebis:
Blind copy move image forgery detection using dyadic undecimated wavelet transform. DSP 2011: 1-6 - [c14]Najah Muhammad, Muhammad Hussain, Muhammad Ghulam, George Bebis:
A Non-intrusive Method for Copy-Move Forgery Detection. ISVC (2) 2011: 516-525 - 2010
- [c13]Muhammad Hussain:
Fast and Reliable Decimation of Polygonal Models Based on Volume and Normal Field. ISVC (1) 2010: 64-73 - [e3]George Bebis, Richard D. Boyle, Bahram Parvin, Darko Koracin, Ronald Chung, Riad I. Hammoud, Muhammad Hussain, Kar-Han Tan, Roger Crawfis, Daniel Thalmann, David L. Kao, Lisa Avila:
Advances in Visual Computing - 6th International Symposium, ISVC 2010, Las Vegas, NV, USA, November 29-December 1, 2010. Proceedings, Part I. Lecture Notes in Computer Science 6453, Springer 2010, ISBN 978-3-642-17288-5 [contents] - [e2]George Bebis, Richard D. Boyle, Bahram Parvin, Darko Koracin, Ronald Chung, Riad I. Hammoud, Muhammad Hussain, Kar-Han Tan, Roger Crawfis, Daniel Thalmann, David L. Kao, Lisa Avila:
Advances in Visual Computing - 6th International Symposium, ISVC 2010, Las Vegas, NV, USA, November 29 - December 1, 2010, Proceedings, Part II. Lecture Notes in Computer Science 6454, Springer 2010, ISBN 978-3-642-17273-1 [contents] - [e1]George Bebis, Richard D. Boyle, Bahram Parvin, Darko Koracin, Ronald Chung, Riad I. Hammoud, Muhammad Hussain, Kar-Han Tan, Roger Crawfis, Daniel Thalmann, David L. Kao, Lisa Avila:
Advances in Visual Computing - 6th International Symposium, ISVC 2010, Las Vegas, NV, USA, November 29 - December 1, 2010, Proceedings, Part III. Lecture Notes in Computer Science 6455, Springer 2010, ISBN 978-3-642-17276-2 [contents]
2000 – 2009
- 2009
- [j5]Muhammad Hussain:
Efficient Simplification Methods for Generating High Quality LODs of 3D Meshes. J. Comput. Sci. Technol. 24(3): 604 (2009) - 2008
- [j4]Muhammad Hussain, Turghunjan Abdukirim, Yoshihiro Okada:
Wavelet-Based Edge Detection in Digital Images. Int. J. Image Graph. 8(4): 513-533 (2008) - [j3]Turghunjan Abdukirim Türüki, Muhammad Hussain, Koichi Niijima, Shigeru Takano:
The Dyadic Lifting Schemes and the Denoising of Digital Images. Int. J. Wavelets Multiresolution Inf. Process. 6(3): 331-351 (2008) - [c12]Muhammad Hussain:
Fast Decimation of Polygonal Models. ISVC (1) 2008: 119-128 - 2006
- [j2]Muhammad Hussain, Yoshihiro Okada, Koichi Niijima:
An Efficient Method for Converting Polygonal Models into Displaced Subdivision Representation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(3): 807-816 (2006) - 2005
- [c11]Muhammad Hussain, Yoshihiro Okada, Turghunjan Abdukirim, Koichi Niijima:
Multilevel edge detection. ISSPA 2005: 819-822 - 2004
- [c10]Muhammad Hussain, Yoshihiro Okada, Koichi Niijima:
User-Controlled Simplification of Polygonal Models. 3DPVT 2004: 918-925 - [c9]Muhammad Hussain, Yoshihiro Okada, Koichi Niijima:
A Unified Framework for User-Controlled Simplification. CGIV 2004: 221-226 - [c8]Muhammad Hussain, Yoshihiro Okada, Koichi Niijima:
User-Controlled Multiresolution Modeling of Polygonal Models. ICCVG 2004: 125-130 - [c7]Muhammad Hussain, Yoshihiro Okada, Koichi Niijima:
LOD Modelling of Polygonal Models Based on Multiple Choice Optimization. MMM 2004: 203-210 - [c6]Muhammad Hussain, Yoshihiro Okada, Koichi Niijima:
Efficient and Feature-Preserving Triangular Mesh Decimation. WSCG 2004: 167-174 - 2003
- [j1]Muhammad Hussain, Yoshihiro Okada, Koichi Niijima:
Fast, Simple, Feature Preserving and Memory Efficient Simplification of Triangle Meshes. Int. J. Image Graph. 3(4): 653- (2003) - [c5]Muhammad Hussain, Yoshihiro Okada, Koichi Niijima:
A Fast and Memory-Efficient Method for LOD Modeling of Polygonal Models. GMAG 2003: 137-142 - [c4]Muhammad Hussain, Yoshihiro Okada, Koichi Niijima:
Displaced Subdivision Meshes. Modelling, Simulation, and Optimization 2003: 214-219 - 2001
- [c3]Muhammad Hussain, Yoshihiro Okada, Koichi Niijima:
Efficient Simplification of Polygonal Surface Models. IV 2001: 464-469
1990 – 1999
- 1998
- [c2]Muhammad Sarfraz, Zulfiqar Habib, Muhammad Hussain:
Piecewise Interpolation for Designing of Parametric Curves. IV 1998: 307-315 - 1997
- [c1]Muhammad Sarfraz, Muhammad Hussain, Zulfiqar Habib:
Local convexity preserving rational cubic spline curves. IV 1997: 211-218
Coauthor Index
aka: Hatim Aboalsamh
aka: Emad-ul-Haq Qazi
aka: Ghulam Muhammad
aka: Anwar Majid Mirza
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint