Search Results - "Badshah, Gran"
-
1
Microservice Application Scheduling in Multi-Tiered Fog-Computing-Enabled IoT
Published in Sensors (Basel, Switzerland) (01-08-2023)“…Fog computing extends mobile cloud computing facilities at the network edge, yielding low-latency application execution. To supplement cloud services,…”
Get full text
Journal Article -
2
Feature Extraction of Plant Leaf Using Deep Learning
Published in Complexity (New York, N.Y.) (2022)“…Half a million species of plants could be existing in the world. Classification of plants based on leaf features is a critical job as feature extraction…”
Get full text
Journal Article -
3
Numbering with spiral pattern to prove authenticity and integrity in medical images
Published in Pattern analysis and applications : PAA (01-11-2017)“…With the rapid development of technology in digital multimedia, manipulation and misconduct of digital data are soaring. The watermarking procedure is seen as…”
Get full text
Journal Article -
4
Watermark Compression in Medical Image Watermarking Using Lempel-Ziv-Welch (LZW) Lossless Compression Technique
Published in Journal of digital imaging (01-04-2016)“…In teleradiology, image contents may be altered due to noisy communication channels and hacker manipulation. Medical image data is very sensitive and can not…”
Get full text
Journal Article -
5
Watermarking of ultrasound medical images in teleradiology using compressed watermark
Published in Journal of medical imaging (Bellingham, Wash.) (01-01-2016)“…The open accessibility of Internet-based medical images in teleradialogy face security threats due to the nonsecured communication media. This paper discusses…”
Get full text
Journal Article -
6
Intrusion Detection System using Autoencoder based Deep Neural Network for SME Cybersecurity
Published in 2021 5th International Conference on Informatics and Computational Sciences (ICICoS) (24-11-2021)“…This paper proposes an intermediate solution using artificial intelligence to monitor any potential threat for SME, specifically in Malaysia. The proposed…”
Get full text
Conference Proceeding -
7
Mobile cloud computing & mobile battery augmentation techniques: A survey
Published in 2014 IEEE Student Conference on Research and Development (01-12-2014)“…Energy efficiency of mobile devices is paramount after the tremendous advancement in technology while the explosion of smart mobile applications such as,…”
Get full text
Conference Proceeding -
8
Battery efficiency of mobile devices through computational offloading: A review
Published in 2015 IEEE Student Conference on Research and Development (SCOReD) (01-12-2015)“…Smart Internet Devices (SIDs) particularly Smartphones are soon turned to be super computers, while the restricted battery timing is a focused issue which…”
Get full text
Conference Proceeding -
9
Localization Watermarking for Authentication of Text Images in Quran with Spiral Manner Numbering
Published in 2013 Taibah University International Conference on Advances in Information Technology for the Holy Quran and Its Sciences (25-09-2015)“…The phenomenon of widespread usage of smart phone has encouraged many android applications to be produced, by free or paid. Nowadays, with the trend of…”
Get full text
Conference Proceeding -
10
Digital watermarking for recovering attack areas of medical images using spiral numbering
Published in 2013 International Conference on Electronics, Computer and Computation (ICECCO) (01-11-2013)“…Medical image is seen as one of crucial data that demand for authentication method in order to ensure that data has not been tampered. This paper has conducted…”
Get full text
Conference Proceeding -
11
Authentication system for medical images using Hilbert numbering
Published in 2014 International Conference on Computer, Communications, and Control Technology (I4CT) (01-09-2014)“…Medical image is seen as one of crucial data that demand for authentication method as it is highly confidential and used in insurance claim, evidence of…”
Get full text
Conference Proceeding