default search action
Inayat Ullah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j17]Inayat Ullah, Yingxiang Xu:
Computational study of homogeneous-heterogeneous reactions in bioconvective third-grade material flow. J. Comput. Appl. Math. 454: 116181 (2025) - 2024
- [j16]Muhammad Akram, Inayat Ullah:
Solution of Z-number-based multi-objective linear programming models with different membership functions. Inf. Sci. 659: 120100 (2024) - [j15]Kashif Inayat, Inayat Ullah, Jaeyong Chung:
Factored Systolic Arrays Based on Radix-8 Multiplication for Machine Learning Acceleration. IEEE Trans. Very Large Scale Integr. Syst. 32(7): 1205-1215 (2024) - 2021
- [j14]Muhammad Akram, Inayat Ullah, Tofigh Allahviranloo, S. A. Edalatpanah:
Fully Pythagorean fuzzy linear programming problems with equality constraints. Comput. Appl. Math. 40(4) (2021) - [j13]Muhammad Akram, Inayat Ullah, Tofigh Allahviranloo, S. A. Edalatpanah:
LR-type fully Pythagorean fuzzy linear programming problems with equality constraints. J. Intell. Fuzzy Syst. 41(1): 1975-1992 (2021) - 2020
- [j12]Inayat Ullah, Joon-Sung Yang, Jaeyong Chung:
ER-TCAM: A Soft-Error-Resilient SRAM-Based Ternary Content-Addressable Memory for FPGAs. IEEE Trans. Very Large Scale Integr. Syst. 28(4): 1084-1088 (2020) - [c5]Inayat Ullah, Kashif Inayat, Joon-Sung Yang, Jaeyong Chung:
Factored Radix-8 Systolic Array for Tensor Processing. DAC 2020: 1-6 - [c4]Inayat Ullah, Wafa Akhoubzi:
The e-Governance of Land Record and Social Dispute Resolution: An Impact Evaluation of the Punjab Land Record Management Information System (PLRMIS) in the Punjab Province Pakistan. EGOV-CeDEM-ePart-* 2020: 235-248
2010 – 2019
- 2019
- [j11]Shipei Li, Dunbing Tang, Jun Yang, Qi Wang, Inayat Ullah, Haihua Zhu:
A novel approach for capturing and evaluating dynamic consumer requirements in open design. Adv. Eng. Informatics 39: 95-111 (2019) - [j10]Hassan Mahmood, Zahid Ullah, Omer Mujahid, Inayat Ullah, Abdul Hafeez:
Beyond the Limits of Typical Strategies: Resources Efficient FPGA-Based TCAM. IEEE Embed. Syst. Lett. 11(3): 89-92 (2019) - [j9]Inayat Ullah, Zahid Ullah, Umar Afzaal, Jeong-A Lee:
DURE: An Energy- and Resource-Efficient TCAM Architecture for FPGAs With Dynamic Updates. IEEE Trans. Very Large Scale Integr. Syst. 27(6): 1298-1307 (2019) - [c3]Zahoor Jan, Inayat Ullah, Faryal Tahir, Naveed Islam, Babar Shah:
Novel Robust Digital Watermarking in Mid-Rank Co-efficient Based on DWT and RT Transform. WorldCIST (2) 2019: 295-302 - 2018
- [j8]Inayat Ullah, Zahid Ullah, Jeong-A Lee:
Efficient TCAM Design Based on Multipumping-Enabled Multiported SRAM on FPGA. IEEE Access 6: 19940-19947 (2018) - [j7]Inayat Ullah, Dunbing Tang, Qi Wang, Lei-Lei Yin, Ishfaq Hussain:
Managing engineering change requirements during the product development process. Concurr. Eng. Res. Appl. 26(2): 171-186 (2018) - [c2]Inayat Ullah, Umar Afzaal, Zahid Ullah, Jeong-A Lee:
High-Speed Configuration Strategy for Configurable Logic Block-Based TCAM Architecture on FPGA. DSD 2018: 16-21 - 2017
- [j6]Lei-Lei Yin, Dunbing Tang, Inayat Ullah, Qi Wang, Haitao Zhang, Haihua Zhu:
Analyzing engineering change of aircraft assembly tooling considering both duration and resource consumption. Adv. Eng. Informatics 33: 44-59 (2017) - [j5]Dunbing Tang, Qi Wang, Inayat Ullah:
Optimisation of product configuration in consideration of customer satisfaction and low carbon. Int. J. Prod. Res. 55(12): 3349-3373 (2017) - [j4]Leilei Yin, Dunbing Tang, Qi Wang, Inayat Ullah, Haitao Zhang:
Engineering Change Management of Product Design Using Model-Based Definition Technology. J. Comput. Inf. Sci. Eng. 17(4) (2017) - [j3]Inayat Ullah, Dunbing Tang, Qi Wang, Lei-Lei Yin:
Least Risky Change Propagation Path Analysis in Product Design Process. Syst. Eng. 20(4): 379-391 (2017) - 2016
- [j2]Dunbing Tang, Lei-Lei Yin, Qi Wang, Inayat Ullah, Haihua Zhu, Sheng Leng:
Workload-based change propagation analysis in engineering design. Concurr. Eng. Res. Appl. 24(1): 17-34 (2016) - 2014
- [j1]Inayat Ullah, Hamid Khan, M. Tariq Rahim:
Numerical Solutions of Fifth and Sixth Order Nonlinear Boundary Value Problems by Daftardar Jafari Method. J. Comput. Eng. 2014: 286039:1-286039:8 (2014) - 2011
- [c1]Rahat Ullah, Jahangir Khan, Shahid Latif, Inayat Ullah:
Convenient Way for Detecting Check Bits in Hamming Code. FGIT-CA/CES3 2011: 344-356
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 23:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint