Jawad Khan

Jawad Khan
Gachon University | kyungwon · Artificial Intelligence

PhD

About

37
Publications
16,808
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
530
Citations
Introduction
Jawad Khan is currently working as an Assistant Professor at Gachon University South Korea. He served as a Postdoctoral Researcher/and Part-time Lecturer in the Department of Applied Artificial Intelligence at Hanyang University, South Korea. His main research interests include natural language processing, information retrieval, and computer vision. He is interested in exploring research collaborations in Computer Science and Engineering.

Publications

Publications (37)
Article
Full-text available
Recurrent Neural Networks (RNNs) and their variants have been demonstrated tremendous successes in modeling sequential data such as audio processing, video processing, time series analysis, and text mining. Inspired by these facts, we propose human activity recognition technique to proceed visual data via utilizing convolution neural network (CNN)...
Article
Full-text available
Human action recognition (HAR), deeply rooted in computer vision, video surveillance, automated observation, and human computer interaction (HCI), enables precise identification of human actions. Numerous research groups have dedicated their efforts to various applications and problem domains in HAR systems. They trained classification models using...
Article
Full-text available
This study is motivated by the apparent shortage of DevOps practices being used in global software development. DevOps is an attractive option for software development companies due to its benefits such as bridging the gap between development and operations teams, efficient software development within budget and time, reduced errors, improved produ...
Article
Full-text available
Existing proposals cannot leverage keypoint heatmaps with segmentation masks, calling for a joint representation of keypoints and semantic segmentation in end-to-end training. This paper proposes Keypoints as Dynamic Centroids (KDC), a new centroid-based representation for human semantic segmentation. KDC follows a bottom-up paradigm to generate Ke...
Article
Full-text available
Stigma refers to the negative attitudes, beliefs, and stereotypes associated with certain individuals or groups based on specific characteristics, behaviors, or conditions. The current study aims to investigate the social stigma attitude, specifically fear and discrimination, among healthcare employees in Pakistan during the COVID-19 pandemic. Data...
Article
Full-text available
Proper team management and coordination between team members have a vital role in the success of any project in distributed software organizations. The ultimate objective of this research work is to extract and prioritize challenges of Team Management Coordination (TMO) for Software Outsourcing Vendor Organizations (SOVO) that would assist the rese...
Article
Full-text available
Monkeypox disease is caused by a virus that causes lesions on the skin and has been observed on the African continent in the past years. The fatal consequences caused by virus infections after the COVID pandemic have caused fear and panic among the public. As a result of COVID reaching the pandemic dimension, the development and implementation of r...
Article
Full-text available
Brain MR images are the most suitable method for detecting chronic nerve diseases such as brain tumors, strokes, dementia, and multiple sclerosis. They are also used as the most sensitive method in evaluating diseases of the pituitary gland, brain vessels, eye, and inner ear organs. Many medical image analysis methods based on deep learning techniq...
Preprint
Full-text available
Small to medium enterprise (SME) organizations are enormous in number and don't have the controls set up to prevent effective attacks of cybersecurity. The majority of the attacks are conducted when the legitimate information check is not valid and because of the absence of arrangement in applying present-day classifications, for example, 'virus',...
Article
Full-text available
Component-based software development (CBSD) is a difficult method for creating complicated products or systems. In CBSD, multiple components are used to construct software or a product. A complex system or program can be created with CBSD quickly and with money while maintaining excellent quality and security. On the other hand, this research will...
Article
Full-text available
As a result of vehicle platooning, advantages including decreased traffic congestion and improved fuel economy are expected. Vehicles in a platoon move in a single line, closely spaced, and at a constant speed. Vehicle-to-vehicle communications and sensor data help keep the platoon formation in place, and the CACC system is responsible for maintain...
Article
Full-text available
Internet of Things (IoT) allows the integration of the physical world with network devices for proper privacy and security in a healthcare system. IoT in a healthcare system is vulnerable to spoofing attacks that can easily represent themselves as a legal entity of the network. It is a passive attack and can access the Medium Access Control address...
Article
Multi-person pose estimation and instance segmentation suffer large performance loss when images are with an increasing number of people and their uncontrolled complex appearance. Yet, existing models cannot efficiently leverage unbalanced training images, i.e., few of them are with multi-person, and most are with single-person, making them ineffec...
Article
Despite the advances in multi-person pose estimation, state-of-the-art techniques only deliver the human pose structure.Yet, they do not leverage the keypoints of human pose to deliver whole-body shape information for human instance segmentation. This paper presents PosePlusSeg, a joint model designed for both human pose estimation and instance seg...
Conference Paper
Multi-person pose estimation and instance segmen-tation suffer large performance loss when images are with an increasing number of people and their uncontrolled complex appearance. Yet, existing models cannot efficiently leverage unbalanced training images, i.e., few of them are with multi-person, and most are with single-person, making them ineffe...
Conference Paper
Despite the advances in multi-person pose estimation, stateof-the-art techniques only deliver the human pose structure. Yet, they do not leverage the keypoints of human pose to deliver whole-body shape information for human instance segmentation. This paper presents PosePlusSeg, a joint model designed for both human pose estimation and instance seg...
Article
Full-text available
Sentiment Analysis (SA) aims to extract useful information from online Unstructured User-Generated Contents (UUGC) and classify them into positive and negative classes. State-of-the-art techniques for SA suffer a high dimensional feature space because of noisy and irrelevant features from the UUGC. Researchers have also proposed feature extraction...
Chapter
Full-text available
Memes are graphics and text overlapped so that together they present concepts that become dubious if one of them is absent. It is spread mostly on social media platforms, in the form of jokes, sarcasm, motivating, etc. After the success of BERT in Natural Language Processing (NLP), researchers inclined to Visual-Linguistic (VL) multimodal problems...
Preprint
Full-text available
Memes are graphics and text overlapped so that together they present concepts that become dubious if one of them is absent. It is spread mostly on social media platforms, in the form of jokes, sarcasm, motivating, etc. After the success of BERT in Natural Language Processing (NLP), researchers inclined to Visual-Linguistic (VL) multimodal problems...
Conference Paper
The convolutional neural network ( CNN deep features pose a significant hurdle for direct use in inverted index based systems because of their high dimensionality and dense nature. To address such issue s , we propose a n in memory scale out inverted index based framework called DISIVR with t hree fold objectives . First, we employ a n adaptation o...
Article
Full-text available
Sentiment Analysis (SA) is an active research area. SA aims to classify the online unstructured user-generated contents (UUGC) into positive and negative classes. A reliable training data is vital to learn a sentiment classifier for textual sentiment classification, but due to domain heterogeneity, manually construction of reliable labeled sentimen...
Article
Full-text available
With the rise of web 2.0, a huge amount of unstructured data has been generated on regular basis in the form of comments, opinions, etc. This unstructured data contains useful information and can play a significant role in business decision making. In this context, sentiment analysis (SA) is an active research area and has recently attracted the at...
Article
Full-text available
Mobile Augmented Reality merges the virtual objects with real world on mobile devices, while video retrieval brings out the similar looking videos from the large-scale video dataset. Since mobile augmented reality application demands the real-time interaction and operation, we need to process and interact in real-time. Furthermore, augmented realit...
Article
Full-text available
Case-Based Learning (CBL) has become an effective pedagogy for student-centered learning in medical education, which builds its foundation on persisted patient cases. Flip learning and Internet of Things (IoTs) concepts have gained much attention in the recent years. These concepts with CBL can improve learning capabilities by providing real and ev...
Conference Paper
Full-text available
Sentiment analysis is a process used to automatically extract useful information from a collection of unstructured documents, in the form of customer reviews, blog comments or online social network sites data respectively. This useful information plays a significant role for decision making to know people's sentiments regarding online product revie...
Conference Paper
Full-text available
Opinion or sentiment analysis has risen to extract useful information from a lot of unstructured text data, in the form of customer reviews on different products and their features or online SNS data respectively. Customer reviews are not only helpful for potential customers, but it is also helpful for the manufacturers of the products to raise the...

Questions

Questions (2)
Question
Hello everyone,
I am reaching out to express my interest in potential research collaboration opportunities in the field of Computer Science and Engineering. I am willing to cover any Article Processing Charges (APCs) associated with collaborative research work, as I understand the importance of facilitating such partnerships. I would be grateful for the opportunity to discuss potential collaboration ideas further. Please let me know if you would be interested in exploring this possibility or if you have any ongoing projects where my involvement could be beneficial.
Best regards,
Jawad Khan Ph.D | Assistant Professor
School of Computing, Gachon University, Republic of Korea
https://www.linkedin.com/in/ jawad-khan-56808762/
Question
I am reaching out to express my interest in potential research collaboration opportunities in the field of Computer Science and Engineering. I am willing to cover any Article Processing Charges (APCs) associated with collaborative research work, as I understand the importance of facilitating such partnerships. I would be grateful for the opportunity to discuss potential collaboration ideas further. Please let me know if you would be interested in exploring this possibility or if you have any ongoing projects where my involvement could be beneficial.

Network

Cited By