Asad Khan's research while affiliated with Guangzhou University and other places

Publications (32)

Article
Full-text available
Defect recognition is an important task in intelligent manufacturing. Due to the subjectivity of human annotation, the collected defect data usually contains a lot of noise and unpredictable uncertainties, which have a great negative influence on defect recognition. It is a significant challenge to discover an effective defect recognition model wit...
Article
Full-text available
This paper addresses the difficulties with connected vehicle systems (CVSs), particularly with vehicle platooning, are examined in this paper. For leader and follower-connected vehicles, the control protocol (which includes artificial delays, disturbances and proportional gains) is implemented. With tracking error systems, system dynamics are model...
Article
Full-text available
A convex hull of finitely many points in the Euclidean space Rd is known as a convex polytope. Graphically, they are planar graphs i.e. embeddable on R2. Minimum dominating sets possess diverse applications in computer science and engineering. Locating-dominating sets are a natural extension of dominating sets. Studying minimizing locating-dominati...
Article
Full-text available
This article addresses the hostile-based bipartite containment control of nonlinear fractional multi-agent systems (FMASs) with input delays. Several fundamental algebraic criteria have been offered by the use of signed graph theory. To make the controller design more realistic, we assumed that the controller was under some disturbance. For the ana...
Article
Full-text available
The Sombor index, introduced by Gutman in 2021, represents a novel graphical topological descriptor reliant upon graph degree information. It holds promise for elucidating the thermodynamic behavior of compounds. Denoting by Vnk (respectively, Enk) the set encompassing all connected graphs comprising n vertices with a specific vertex-connectivity (...
Article
Full-text available
Facial expressions serve as crucial indicators of an individual's psychological state, playing a pivotal role in face-to-face communication. This research focuses on advancing collaboration between machines and humans by undertaking a thorough investigation into facial expressions. Specifically, we delve into the analysis of emotional variations re...
Article
Full-text available
In this paper, we present a novel image denoising algorithm, specifically designed to effectively restore both the edges and texture of images. This is achieved through the use of an innovative model known as the overlapping group sparse fractional-order total variation regularization model (OGS-FOTVR). The OGS-FOTVR model ingeniously combines the...
Article
Full-text available
This study proposes an adaptive image augmentation scheme using deep reinforcement learning (DRL) to improve the performance of a deep learning-based automated optical inspection system. The study addresses the challenge of inconsistency in the performance of single image augmentation methods. It introduces a DRL algorithm, DQN, to select the most...
Article
Full-text available
The technology of visual servoing, with the digital twin as its driving force, holds great promise and advantages for enhancing the flexibility and efficiency of smart manufacturing assembly and dispensing applications. The effective deployment of visual servoing is contingent upon the robust and accurate estimation of the vision-motion correlation...
Article
Full-text available
In this paper, we deal with a Lévy noise-driven epidemic model reflecting the dynamics of measles infection subject to the effect of vaccination. After model formulation, the feasibility of the system was studied by using the underlying existence and uniqueness theory. Moreover, we discussed the behavior of solution around the infection-free and di...
Article
Full-text available
In this article, we consider the problem of resilient base containment control for fractional-order multi-agent systems (FOMASs) with mixed time delays using a reliable and simple approach, where the communication topology among followers is a weighted digraph. A disturbance term is introduced into the delayed and non-delayed controller part to mak...
Article
Full-text available
Citation: Berwo, M.A.; Khan, A.; Fang, Y.; Fahim, H.; Javaid, S.; Mahmood, J.; Abideen, Z.U.; M.S., S. Deep Learning Techniques for Vehicle Detection and Classification from Images/Videos: A Survey. Sensors 2023, 23, 4832. https://doi. Abstract: Detecting and classifying vehicles as objects from images and videos is challenging in appearance-based...
Article
Full-text available
When an individual with confirmed or suspected COVID-19 is quarantined or isolated, the virus can linger for up to an hour in the air. We developed a mathematical model for COVID-19 by adding the point where a person becomes infectious and begins to show symptoms of COVID-19 after being exposed to an infected environment or the surrounding air. It...
Article
Full-text available
Long-run bifurcation analysis aims to describe the asymptotic behavior of a dynamical system. One of the main objectives of mathematical epidemiology is to determine the acute threshold between an infection's persistence and its elimination. In this study, we use a more comprehensive SVIR epidemic model with large jumps to tackle this and related c...
Article
Full-text available
SARS-CoV-2 and its variants have been investigated using a variety of mathematical models. In contrast to multi-strain models, SARS-CoV-2 models exhibit a memory effect that is often overlooked and more realistic. Atangana-Baleanu’s fractional-order operator is discussed in this manuscript for the analysis of the transmission dynamics of SARS-CoV-2...
Article
Full-text available
The distance d(va,vb) between two vertices of a simple connected graph G is the length of the shortest path between va and vb. Vertices va,vb of G are considered to be resolved by a vertex v if d(va,v)≠d(vb,v). An ordered set W={v1,v2,v3,…,vs}⊆V(G) is said to be a resolving set for G, if for any va,vb∈V(G),∃vi∈W∋d(va,vi)≠d(vb,vi). The representatio...
Article
Full-text available
This paper presents a detailed investigation of a stochastic model that rules the spreading behavior of the measles virus while accounting for the white noises and the influence of immunizations. It is hypothesized that the perturbations of the model are nonlinear, and that a person may lose the resistance after vaccination, implying that vaccinati...
Article
Full-text available
As opportunistic routing (OR) becomes more popular in low-duty wireless sensor networks (WSNs), there is a greater demand for reliable and consistent data transmission. Only efficient and secure network protocols can guarantee reliable data transmission. Existing cryptographic algorithms for WSNs are inadequate due to their excessive energy usage....
Article
Full-text available
Despite its high mortality rate of approximately 90%, the Ebola virus disease (EVD) has not received enough attention in terms of in-depth research. This illness has been responsible for over 40 years of epidemics throughout Central Africa. However, during 2014–2015, the Ebola-driven epidemic in West Africa became, and remains, the deadliest to dat...
Article
Full-text available
Monkeypox 2022, a new re-emerging disease, is caused by the Monkeypox virus. Structurally, this virus is related to the smallpox virus and infects the host in a similar way; however, the symptoms of Monkeypox are more severe. In this research work, a mathematical model for understanding the dynamics of Monkeypox 2022 is suggested that takes into ac...
Article
Full-text available
This research provides an improved theoretical framework of the Kermack-McKendrick system. By considering the general interference function and the polynomial perturbation, we give the sharp threshold between two situations: the disappearance of the illness and the ergodicity of the higher-order perturbed system. Obviously, the ergodic characterist...
Article
Full-text available
Many efforts have been made on developing adversarial attack methods on point clouds. However, without fully considering the geometric property of point clouds, existing methods tend to produce clearly visible outliers. In this paper, we propose a novel NormalAttack framework towards imperceptible adversarial attacks on point clouds. First, we enfo...
Article
Full-text available
Cluster-based routing has been regarded as an appealing technique with limited resources for wireless sensor networks (WSNs) where dynamic clustering is a practical approach to increase scalability and maximize the lifetime of the network. To collect the data efficiently in large-scale networks, this paper presents a probabilistic weight-based ener...
Article
Full-text available
This work seeks to simulate and examine the complex character of marine predation. By taking into account the interaction between phytoplankton and zooplankton, we present a sophisticated mathematical system with a general functional response describing the ecological competition. This system is disturbed by a novel category of perturbations in the...
Article
Full-text available
Although data-driven models, especially deep learning, have achieved astonishing results on many prediction tasks for nonlinear sequences, challenges still remain in finding an appropriate way to embed prior knowledge of physical dynamics in these models. In this work, we introduce a convex relaxation approach for learning robust Koopman operators...
Article
Full-text available
Designing efficient deep learning models for 3D point cloud perception is becoming a major research direction. Point-voxel convolution (PVConv) Liu et al. (2019) is a pioneering research work in this topic. However, since with quite a few layers of simple 3D convolutions and linear point-voxel feature fusion operations, it still has considerable ro...

Citations

... EC utilizes a search methodology inspired by natural selection, designed to address a variety of optimization problems (such as discrete, dynamic, and multi-objective optimization) through the adoption of mechanisms derived from biological processes, including crossover, mutation, and selection based on environmental pressures [35][36][37][38]. The structure of a standard EC system is outlined as follows: Initialization involves utilizing a predetermined encoding method to depict a population of individuals. ...
... Harry Wiener first suggested topological indices in 1947 [13], and they are useful to explain how molecular graphs are developed [14]. Some other distance-based topological indices are studied in [15][16][17][18][19][20][21]; eigenvalues based in [22][23][24][25] and degree based are characterized in [26][27][28][29][30][31][32]. This work explores the topological indices such as the augmented Zagreb, third Zagreb, ...
... Recently, in [28] the authors have characterized the degree based topological indices for Derived from Graph Invariants for Saztec 4 Diamond. Hayat et al. investigated the molecular descriptors for chemical structures in [1,2,29,30]. On the other hand, the degreebased topological indices are characterized in [31][32][33][34][35][36][37]. ...
... The accurate estimation of human skin tone from colour images is important in diverse applications that rely on precise colour representation in visual data. This research topic is closely intertwined with the pursuit of colour accuracy and colour constancy, affecting technologies such as facial recognition [1][2][3], medical imaging [4][5][6], and the cosmetic and beauty industry [7]. In these domains, the quality and correctness of outcomes are intrinsically tied to the faithful recovery of an individual's skin tone. ...
... Therefore, this method demonstrated a superior image denoising effect compared to other models. Bhutto et al. (2023) proposed an image denoising algorithm that cleverly integrated the advantages of the fractional-order variation domain with an OGS measure, which acted as its regularization component. The fidelity term of these models used the ℓ 2 -norm, which is commonly used to restore images degraded by additive Gaussian noise. ...
... Recently, methods based on convolutional neural networks (CNNs) have significantly enhanced object detection capabilities, greatly improving robust long-term object tracking. Several studies have successfully tracked specific objects such as defects [57] and vehicles [58] using CNN-based methods. Moreover, advancements in parallel computation hardware have effectively accelerated the computation speed of CNNs [59], making deep-learning-based tracking methods feasible for real-time tracking. ...
... The following are a few important findings noted from this study ( , which restricts the performance of the models. Also, it has been observed that data augmentation [93] will also limit performance. • The other crucial observation made in behavioral analysis in predicting ASD is the diversity in the symptoms found in children of different ages. ...
... For instance, ordinary diferential equation (ODE) models are commonly used to study the dynamical aspects of infectious diseases in a homogeneously mixed population [3][4][5], while partial diferential equation (PDE) models are suitable to analyze the spatial heterogeneity in disease spread [6][7][8]. On the other hand, stochastic models can incorporate randomness in disease transmission and help capture the efects of small populations and rare events [9,10]. Recently, compartmental models with fractional-order diferential equations have gained attention in the feld of deadly contagious disease modeling. ...
... In [6], Khan et al. address the issue of resilient base containment control for fractional-order multiagent systems (FOMASs) that have mixed time delays. Niazi and his colleagues [7] prove the existence of a solution for an initial value problem involving a hybrid fractional diferential equation with delay. ...