M. Sultan Zia

M. Sultan Zia
University of Lahore | UOL · Department of Computer Science and IT

PhD (Computer Vision & Machine Learning)

About

26
Publications
28,429
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
415
Citations
Citations since 2016
19 Research Items
400 Citations
2016201720182019202020212022020406080100120140
2016201720182019202020212022020406080100120140
2016201720182019202020212022020406080100120140
2016201720182019202020212022020406080100120140
Additional affiliations
October 2018 - present
The University of Lahore
Position
  • Head of Department
Education
September 2008 - August 2016

Publications

Publications (26)
Preprint
Deaf people use sign language as the only reliable source of communication with each other as well as with normal people. These communicating signs are made up of the shape of the hand and movement. In Pakistan, deaf people use Pakistan sign language (PSL) as a means of communication with people. In scientific literature, many studies have been don...
Preprint
Face spoofing detection is one of the most well-studied problems in computer vision. Face recognition has become a widely adopted technique in biometric authentication systems. In face recognition based authentication techniques, the system first recognized the person to verify the legitimacy of the user before granting access to the system resourc...
Article
Full-text available
An amendment to this paper has been published and can be accessed via the original article.
Article
Full-text available
A number of resources, every year, being spent to tackle early detection of cardiac abnormalities which is one of the leading causes of deaths all over the Globe. The challenges for healthcare systems includes early detection, portability and mobility of patients. This paper presents a categorical review of smartphone-based systems that can detect...
Preprint
Face spoofing detection is one of the most well-studied problems in computer vision. Face recognition has become a widely adopted technique in biometric authentication systems. In face recognition based authentication techniques, the system first recognized the person to verify the legitimacy of the user before granting access to the system resourc...
Article
Full-text available
Brain tumors have become a leading cause of death around the globe. The main reason for this epidemic is the difficulty conducting a timely diagnosis of the tumor. Fortunately, magnetic resonance images (MRI) are utilized to diagnose tumors in most cases. The performance of a Convolutional Neural Network (CNN) depends on many factors (i.e., weight...
Article
Full-text available
The standardization activities of the fifth generation communications are clearly over and deployment has commenced globally. To sustain the competitive edge of wireless networks, industrial and academia synergy have begun to conceptualize the next generation of wireless communication systems (namely, sixth generation, (6G)) aimed at laying the fou...
Article
Full-text available
Primarily, there are three basic operational constituents of Nodule Detection Systems namely nodule candidate detection, classification of nodule and extraction of features. Thresholding is one of the most important factor for nodule detection. To segment the lungs and nodules, Gaussian approximation based Particle Swarm Optimization (PSO) is used...
Preprint
Face spoofing detection is one of the most well-studied problems in computer vision. Face recognition has become a widely adopted technique in biometric authentication systems. In face recognition based authentication techniques, the system first recognized the person to verify the legitimacy of the user before granting access to the system resourc...
Article
Full-text available
Facial Expression Recognition (FER) is inherently data driven. Spontaneous expressions are substantially different from posed expressions. Spontaneous facial expressions are more challenging and more difficult to recognize. Any facial expression can be represented in many different patterns of muscles movements. Moreover, the facial expressions sho...
Article
Full-text available
In modern epoch of cyber warfare and their countermeasures, wireless sensor networks (WSNs) are highly susceptible to cyber attacks due to their primary reliance over sink. WSNs perform routing and communication to deliver data from sources to sink. In this many-to-one communication paradigm, while some failure might be affordable at the many sourc...
Article
Facial expressions recognition is a crucial task in pattern recognition and it becomes even crucial when cross-cultural emotions are encountered. Various studies in the past have shown that all the facial expressions are not innate and universal, but many of them are learned and culture-dependent. Extreme facial expression recognition methods emplo...
Conference Paper
Distributed routing protocols have been developed extensively in the last couple of decades. But their inflexible and complex behavior have ever been a constraint that makes them inappropriate even for current needs of network. As more and more virtual machines are being added in every network, distributed networks have reached to bottleneck in man...
Article
Full-text available
A number of studies have shown that facial expression representations are cultural dependent and not universal. Most facial expression recognition (FER) systems use one or two datasets for training and same for testing and show good results. While their performance mortify radically when datasets from different cultures were presented. To keep high...
Article
Full-text available
The authors in this study proposed facial expression recognition system in order to improve the expression recognition performance over the recently proposed systems. Feature sets for all training samples are constructed based on speed up robust feature descriptors. An ensemble of feature sets is then created incrementally. To achieve high diversit...
Article
The reduction of rician noise from MR images without degradation of the underlying image features has attracted much attention and has a strong potential in several application domains including medical image processing. Interpretation of MR images is difficult due to their tendency to gain rician noise during acquisition. In this work, we proposed...
Article
Full-text available
Most facial expression recognition (FER) systems used facial expression data created during a short period of time and this data is used for learning/training of FER systems. There are many facial expression patterns (i.e. a particular expression can be represented in many different patterns) which cannot be generated and used as learning/training...
Article
Feature/edge-preserving noise removal techniques have a strong potential in several application domains including medical image processing. Magnetic resonance (MR) images have a tendency to gain Rician noise during acquisition. In this article, we have presented genetic algorithms based adapted selective non-local means (GASNLM) filter-based scheme...
Article
Full-text available
In medical field visualization of the organs is very imperative for accurate diagnosis and treatment of any disease. Brain tumor diagnosis and surgery also required impressive D visualization of the brain to the radiologist. Detection and D reconstruction of brain tumors from MRI is a computationally time consuming and error-prone task. Proposed sy...
Article
Full-text available
Radiologists are interested in finding the stage of cancer, so the patient can be treated and cured accordingly. This is possible by finding the type of abnormality to measure the severity of cancer in mammograms. CAD could provide them the op-tion of better opinion about the type of abnormality. In this paper, we have proposed a novel method which...

Network

Cited By

Projects

Project (1)