Search Results - "Rehman, Eid"
-
1
A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card
Published in Multimedia tools and applications (01-06-2015)“…The Session Initiation Protocol (SIP) has revolutionized the way of controlling Voice over Internet Protocol (VoIP) based communication sessions over an open…”
Get full text
Journal Article -
2
-
3
Multi Self-Organizing Map (SOM) Pipeline Architecture for Multi-View Clustering
Published in IEEE access (2024)“…Clustering has proved to be a successful classification method when it comes to dealing with multiview data. Each method and technique tries to achieve…”
Get full text
Journal Article -
4
Enhanced Learning Enriched Features Mechanism Using Deep Convolutional Neural Network for Image Denoising and Super-Resolution
Published in Applied sciences (01-07-2024)“…Image denoising and super-resolution play vital roles in imaging systems, greatly reducing the preprocessing cost of many AI techniques for object detection,…”
Get full text
Journal Article -
5
Convolved Feature Vector Based Adaptive Fuzzy Filter for Image De-Noising
Published in Applied sciences (01-04-2023)“…In this paper, a convolved feature vector based adaptive fuzzy filter is proposed for impulse noise removal. The proposed filter follows traditional approach,…”
Get full text
Journal Article -
6
RETRACTED ARTICLE: Intrusion detection based on machine learning in the internet of things, attacks and counter measures
Published in The Journal of supercomputing (2022)“…Globally, data security and privacy over the Internet of Things (IoT) are necessary due to its emergence in daily life. As the IoT will soon invade each part…”
Get full text
Journal Article -
7
Polynomial Based Dynamic Key Management for Secure Cluster Communication in Wireless Mobile Sensor Network
Published in Tehnički vjesnik (01-04-2020)“…For inter and intra cluster communication, member nodes jointly build a mutual session key called cluster key to allow secure communication. Most existing…”
Get full text
Journal Article Paper -
8
Effective Routing Technique: Augmenting Data Center Switch Fabric Performance
Published in IEEE access (2020)“…Today, data center networks (DCNs) are built using multi-tier architecture. These large-scale networks face many challenges, such as security, delay, low…”
Get full text
Journal Article -
9
Energy Efficient Secure Trust Based Clustering Algorithm for Mobile Wireless Sensor Network
Published in Journal of computer networks and communications (01-01-2017)“…The main benefit of selecting a suitable node as cluster head (CH) in clustering for wireless mobile sensor networks (MWSNs) is to prolong the network…”
Get full text
Journal Article -
10
ADAPTIVE TRIMMED MEAN AUTOREGRESSIVE MODEL FOR REDUCTION OF POISSON NOISE IN SCINTIGRAPHIC IMAGES
Published in IIUM engineering journal (01-12-2018)“…A 2-D Adaptive Trimmed Mean Autoregressive (ATMAR) model has been proposed for denoising of medical images corrupted with poisson noise. Unfiltered images are…”
Get full text
Journal Article -
11
Secure Cluster-Head Selection Algorithm Using Pattern for Wireless Mobile Sensor Networks
Published in Tehnički vjesnik (01-04-2019)“…Selecting a cluster head (CH) in wireless mobile sensor network is a crucial task. Numerous algorithms have been presented for this purpose in recent…”
Get full text
Journal Article Paper -
12
A review on multimodal medical image fusion: Compendious analysis of medical modalities, multimodal databases, fusion techniques and quality metrics
Published in Computers in biology and medicine (01-05-2022)“…Over the past two decades, medical imaging has been extensively apply to diagnose diseases. Medical experts continue to have difficulties for diagnosing…”
Get full text
Journal Article -
13
Smoke removal and image enhancement of laparoscopic images by an artificial multi-exposure image fusion method
Published in Soft computing (Berlin, Germany) (01-08-2022)“…In laparoscopic surgery, image quality is often degraded by surgical smoke or by side effects of the illumination system, such as reflections, specularities,…”
Get full text
Journal Article -
14
Lookaside: Augmenting the Performance of Packet Processing Pipeline
Published in IEEE systems journal (01-09-2021)“…The network switches and routers need to forward the network packets at a line-rate. The underlying hardware and software implementations may limit the…”
Get full text
Journal Article -
15
Oral Lipoma in Elderly Saudi Patient: A Case Report
Published in International journal of health sciences (01-01-2012)“…Lipomas are relatively uncommon benign tumor occurring in the oral cavity with a prevalence rate of 1% to 4% of all oral lesions. They present as a slow…”
Get full text
Journal Article -
16
Compound Odontomas in Saudi Child: A Case Report
Published in International journal of health sciences (01-06-2013)“…Odontomas are odontogenic lesions with occurrence rate of 22% in the oral Cavity. They generally appear as small, solitary or multiple radio-opaque lesions on…”
Get full text
Journal Article -
17
Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms
Published 19-06-2022“…Computers, Materials & Continua, 2022 Internet of Things is an ecosystem of interconnected devices that are accessible through the internet. The recent…”
Get full text
Journal Article -
18
Spectral characterization of liquefied products of Pakistani coal
Published in Fuel processing technology (15-01-2004)“…Characterization of liquefied products (oil and asphaltene) of Pakistani coal was performed using 1H and 13C nuclear magnetic resonance (NMR) spectrometry. It…”
Get full text
Journal Article -
19
Oral lipoma in elderly saudi patient: a case report
Published in International journal of health sciences (01-01-2012)“…Lipomas are relatively uncommon benign tumor occurring in the oral cavity with a prevalence rate of 1% to 4% of all oral lesions. They present as a slow…”
Get full text
Report