Search Results - "Badshah, Gran"

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Microservice Application Scheduling in Multi-Tiered Fog-Computing-Enabled IoT by Ashraf, Maria, Shiraz, Muhammad, Abbasi, Almas, Alqahtani, Omar, Badshah, Gran, Lasisi, Ayodele

    Published in Sensors (Basel, Switzerland) (01-08-2023)
    “…Fog computing extends mobile cloud computing facilities at the network edge, yielding low-latency application execution. To supplement cloud services,…”
    Get full text
    Journal Article
  2. 2

    Feature Extraction of Plant Leaf Using Deep Learning by Ahmad, Muhammad Umair, Ashiq, Sidra, Badshah, Gran, Khan, Ali Haider, Hussain, Muzammil

    Published in Complexity (New York, N.Y.) (2022)
    “…Half a million species of plants could be existing in the world. Classification of plants based on leaf features is a critical job as feature extraction…”
    Get full text
    Journal Article
  3. 3

    Numbering with spiral pattern to prove authenticity and integrity in medical images by Hisham, Syifak Izhar, Muhammad, Afifah Nailah, Badshah, Gran, Johari, Nasrul Hadi, Mohamad Zain, Jasni

    Published in Pattern analysis and applications : PAA (01-11-2017)
    “…With the rapid development of technology in digital multimedia, manipulation and misconduct of digital data are soaring. The watermarking procedure is seen as…”
    Get full text
    Journal Article
  4. 4

    Watermark Compression in Medical Image Watermarking Using Lempel-Ziv-Welch (LZW) Lossless Compression Technique by Badshah, Gran, Liew, Siau-Chuin, Zain, Jasni Mohd, Ali, Mushtaq

    Published in Journal of digital imaging (01-04-2016)
    “…In teleradiology, image contents may be altered due to noisy communication channels and hacker manipulation. Medical image data is very sensitive and can not…”
    Get full text
    Journal Article
  5. 5

    Watermarking of ultrasound medical images in teleradiology using compressed watermark by Badshah, Gran, Liew, Siau-Chuin, Zain, Jasni Mohamad, Ali, Mushtaq

    “…The open accessibility of Internet-based medical images in teleradialogy face security threats due to the nonsecured communication media. This paper discusses…”
    Get full text
    Journal Article
  6. 6

    Intrusion Detection System using Autoencoder based Deep Neural Network for SME Cybersecurity by Ubaidillah, Khaizuran Aqhar, Hisham, Syifak Izhar, Ernawan, Ferda, Badshah, Gran, Suharto, Edy

    “…This paper proposes an intermediate solution using artificial intelligence to monitor any potential threat for SME, specifically in Malaysia. The proposed…”
    Get full text
    Conference Proceeding
  7. 7

    Mobile cloud computing & mobile battery augmentation techniques: A survey by Ali, Mushtaq, Zain, Jasni Mohamed, Zolkipli, Mohammad Fadli, Badshah, Gran

    “…Energy efficiency of mobile devices is paramount after the tremendous advancement in technology while the explosion of smart mobile applications such as,…”
    Get full text
    Conference Proceeding
  8. 8

    Battery efficiency of mobile devices through computational offloading: A review by Ali, Mushtaq, Zain, Jasni Mohamed, Zolkipli, Mohammad Fadli, Badshah, Gran

    “…Smart Internet Devices (SIDs) particularly Smartphones are soon turned to be super computers, while the restricted battery timing is a focused issue which…”
    Get full text
    Conference Proceeding
  9. 9

    Localization Watermarking for Authentication of Text Images in Quran with Spiral Manner Numbering by Hisham, Syifak Izhar, Muhammad, Afifah Nailah, Zain, Jasni Mohamad, Badshah, Gran

    “…The phenomenon of widespread usage of smart phone has encouraged many android applications to be produced, by free or paid. Nowadays, with the trend of…”
    Get full text
    Conference Proceeding
  10. 10

    Digital watermarking for recovering attack areas of medical images using spiral numbering by Hisham, Syifak Izhar, Muhammad, Afifah Nailah, Zain, Jasni Mohamad, Badshah, Gran, Arshad, Nurul Wahidah

    “…Medical image is seen as one of crucial data that demand for authentication method in order to ensure that data has not been tampered. This paper has conducted…”
    Get full text
    Conference Proceeding
  11. 11

    Authentication system for medical images using Hilbert numbering by Izhar Hisham, Syifak, Mohamad Zain, Jasni, Arshad, Nurul Wahidah, Liew, Siau-Chuin, Johari, Nasrul Hadi, Badshah, Gran

    “…Medical image is seen as one of crucial data that demand for authentication method as it is highly confidential and used in insurance claim, evidence of…”
    Get full text
    Conference Proceeding