
Faisal Mehmood- Doctor of Engineering
- Researcher at Shenzhen University
Faisal Mehmood
- Doctor of Engineering
- Researcher at Shenzhen University
About
18
Publications
3,195
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
93
Citations
Introduction
Currently, I'm a post doctoral researcher from Shenzhen University, China.
I'm working on wind speed prediction for wind energy production. Wind energy is a clean, renewable, and cost-effective solution for environmental, economic, and social challenges, crucial for combating climate change and building a sustainable energy future.
I have done PhD from Zhengzhou University, Zhengzhou, China. My research interests are machine learning, deep learning, computer vision, human action recognition.
Current institution
Publications
Publications (18)
Accurate detection and segmentation of esophageal lesions are crucial for diagnosing and treating gastrointestinal diseases. However, early detection of esophageal cancer remains challenging, contributing to a reduced five-year survival rate among patients. This paper introduces a novel multitask deep learning model for automatic diagnosis that int...
Artificial intelligence (AI) has potential to revolutionize the field of oncology by enhancing the precision of cancer diagnosis, optimizing treatment strategies, and personalizing therapies for a variety of cancers. This review examines the limitations of conventional diagnostic techniques and explores the transformative role of AI in diagnosing a...
Graph convolutional networks (GCNs) are an effective skeleton-based human action recognition (HAR) technique. GCNs enable the specification of CNNs to a non-Euclidean frame that is more flexible. The previous GCN-based models still have a lot of issues: (I) The graph structure is the same for all model layers and input data.
Quantum Human Action Recognition (HAR) is an interesting research area in human-computer interaction used to monitor the activities of elderly and disabled individuals affected by physical and mental health. In the recent era, skeleton-based HAR has received much attention because skeleton data has shown that it can handle changes in striking, body...
5-G/6G technology improves skeleton-based human action recognition (HAR) by delivering ultra-low latency and high data throughput for real-time and accurate security analysis of human actions. Despite its growing popularity, current HAR methods frequently fail to capture the skeleton sequence’s complexities. This study proposes a novel multimodal m...
A healthcare supply chain is made when an organization and businesses work together to increase and manage supply related to healthcare products, equipment, and drugs for the patients' lives. The complexity of these networks can make it challenging to circulate healthcare supplies. This is because their structure is not transparent, and they are in...
Modern technological advancements have made social media an essential component of daily life. Social media allow individuals to share thoughts, emotions, and ideas. Sentiment analysis plays the function of evaluating whether the sentiment of the text is positive, negative, neutral, or any other personal emotion to understand the sentiment context...
Sentiment analysis is one of the most well-known applications of natural language processing (NLP) techniques used to determine a text's sentiment or emotional tone, such as a sentence, a paragraph, or an entire document. The goal of sentiment analysis is to identify and extract the underlying sentiment expressed by the author, whether positive or...
Human Action Recognition (HAR) using skeletons has become increasingly appealing to a growing number of researchers in recent years. It is particularly challenging to recognize actions when they are captured from different angles because there are so many variations in their representations. This paper proposes an automatic strategy for determining...
Skeleton-based action recognition using graph convolutional networks (GCNs), which specify CNNs to a more flexible non-Euclidean frame, has shown outstanding results. However, many problems remain the same in the earlier GCN-based models. (I) All model layers and input data have the same graph structure. Given the GCN model’s hierarchy and the vari...
Software development organizations are globalizing their development activities increasingly due to strategic and economic gains. Global software development (GSD) is an intricate concept, and various challenges are associated with it, specifically related to the software requirement change management Process (RCM). This research aims to identify h...
Human action recognition (HAR) by skeleton data is considered a potential research aspect in computer vision. Three-dimensional HAR with skeleton data has been used commonly because of its effective and efficient results. Several models have been developed for learning spatiotemporal parameters from skeleton sequences. However, two critical problem...
In the current era, the auto and reliable recommendation system plays a significant role in human life. The code recommender systems are being used in various source code databases to recommend the most suitable source code to the user. While code recommendation, the code analysis concerning 'code quality' and 'code implementation' is important to...
Majority of the software development organizations are motivated to transform their development activities from collocated development to offshore software development outsourcing (OSDO) environment. The adoption of OSDO is complicated due to geographical distance between development teams. The requirements engineering (RE) in the context of OSDO n...
It is very crucial for an organization to encapsulate the requirements in its early stage when they are intending to build a novel system such as the internet of things (IoT), particularly when it comes to capturing privacy and security requirements to gain the public confidence. The proposed research is focused to develop a secure IoT-requirement...
Nowadays, the unmanned aerial vehicles (UAVs) drones are mostly used in civil and military fields for security and monitoring purposes. They are also involved in the development of electronics communications and navigation systems. The UAVs are the aerial vehicles with a built-in power system having capability of controlling by a remote control sys...