Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–14 of 14 results for author: Hameed, K

.
  1. arXiv:2401.02106  [pdf

    physics.ins-det cs.LG eess.IV physics.med-ph

    Cadmium Zinc Telluride (CZT) photon counting detector Characterisation for soft tissue imaging

    Authors: K. Hameed, Rafidah Zainon, Mahbubunnabi Tamal

    Abstract: The use of photon counting detection technology has resulted in significant X-ray imaging research interest in recent years. Computed Tomography (CT) scanners can benefit from photon-counting detectors, which are new technology with the potential to overcome key limitations of conventional CT detectors. Researchers are still studying the effectiveness and sensitivity of semiconductor detector mate… ▽ More

    Submitted 5 January, 2024; v1 submitted 4 January, 2024; originally announced January 2024.

    Comments: 29 pages and 11 figures

  2. arXiv:2307.05718  [pdf, ps, other

    math.CO

    Distance Matrices for Conjugate Skew Gain Graphs

    Authors: Shahul Hameed K, Ramakrishnan K O, Biju K

    Abstract: A conjugate skew gain graph is a skew gain graph with the labels (also called, the conjugate skew gains) from the field of complex numbes on the oriented edges such that they get conjugated when we reverse the orientation. In this paper we introduce distance matrices for conjugate skew gain graphs and characterize balanced conjugate skew gain graphs using these matrices. We provide explicit formul… ▽ More

    Submitted 11 July, 2023; originally announced July 2023.

  3. arXiv:2208.07060  [pdf, ps, other

    cs.CR

    A Blockchain-based Decentralised and Dynamic Authorisation Scheme for the Internet of Things

    Authors: Khizar Hameed, Ali Raza, Saurabh Garg, Muhammad Bilal Amin

    Abstract: An authorisation has been recognised as an important security measure for preventing unauthorised access to critical resources, such as devices and data, within the Internet of Things (IoT) networks. Existing authorisation methods for the IoT network are based on traditional access control models, which have several drawbacks, including architecture centralisation, policy tampering, access rights… ▽ More

    Submitted 15 August, 2022; originally announced August 2022.

  4. arXiv:2108.09931  [pdf, other

    cs.CR

    Towards a Formal Modelling, Analysis, and Verification of a Clone Node Attack Detection Scheme in the Internet of Things

    Authors: Khizar Hameed, Saurabh Garg, Muhammad Bilal Amin, Byeong Kang

    Abstract: In a clone node attack, an attacker attempted to physically capture the devices to gather sensitive information to conduct various insider attacks. Several solutions for detecting clone node attacks on IoT networks have been presented in the viewpoints above. These solutions are focused on specific system designs, processes, and feature sets and act as a high-level abstraction of underlying system… ▽ More

    Submitted 23 August, 2021; originally announced August 2021.

  5. arXiv:2106.15890  [pdf, ps, other

    cs.CR

    A Context-Aware Information-Based Clone Node Attack Detection Scheme in Internet of Things

    Authors: Khizar Hameed, Saurabh Garg, Muhammad Bilal Amin, Byeong Kang, Abid Khan

    Abstract: The rapidly expanding nature of the Internet of Things (IoT) networks is beginning to attract interest across a range of applications, including smart homes, smart transportation, smart health, and industrial contexts. This cutting-edge technology enables individuals to track and control their integrated environment in real-time and remotely via a thousand IoT devices comprised of sensors and actu… ▽ More

    Submitted 30 June, 2021; originally announced June 2021.

  6. arXiv:2106.12539  [pdf, ps, other

    math.CO

    On the Metric Dimension of Signed Graphs

    Authors: Shahul Hameed K, Remna K P, Divya T2, Biju K, Rajeevan P, Santhosh G O2, Ramakrishnan K O

    Abstract: A signed graph $Σ$ is a pair $(G,σ)$, where $G=(V,E)$ is the underlying graph in which each edge is assigned $+1$ or $-1$ by the signature function $σ:E\rightarrow\{-1,+1\}$. In this paper, we extend the extensively applied concepts of metric dimension and resolving sets for unsigned graphs to signed graphs. We analyze the metric dimension of some well known classes of signed graphs including a sp… ▽ More

    Submitted 23 June, 2021; originally announced June 2021.

  7. arXiv:2105.11665  [pdf, ps, other

    cs.CR

    A Taxonomy Study on Securing Blockchain-based Industrial Applications: An Overview, Application Perspectives, Requirements, Attacks, Countermeasures, and Open Issues

    Authors: Khizar Hameed, Mutaz Barika, Saurabh Garg, Muhammad Bilal Amin, Byeong Kang

    Abstract: Blockchain technology has taken on a leading role in today's industrial applications by providing salient features and showing significant performance since its beginning. Blockchain began its journey from the concept of cryptocurrency and is now part of a range of core applications to achieve resilience and automation between various tasks. With the integration of Blockchain technology into diffe… ▽ More

    Submitted 25 May, 2021; originally announced May 2021.

  8. arXiv:2103.07985  [pdf

    eess.IV cs.CV

    COVID-19 Infection Localization and Severity Grading from Chest X-ray Images

    Authors: Anas M. Tahir, Muhammad E. H. Chowdhury, Amith Khandakar, Tawsifur Rahman, Yazan Qiblawey, Uzair Khurshid, Serkan Kiranyaz, Nabil Ibtehaz, M Shohel Rahman, Somaya Al-Madeed, Khaled Hameed, Tahir Hamid, Sakib Mahmud, Maymouna Ezeddin

    Abstract: Coronavirus disease 2019 (COVID-19) has been the main agenda of the whole world, since it came into sight in December 2019 as it has significantly affected the world economy and healthcare system. Given the effects of COVID-19 on pulmonary tissues, chest radiographic imaging has become a necessity for screening and monitoring the disease. Numerous studies have proposed Deep Learning approaches for… ▽ More

    Submitted 14 March, 2021; originally announced March 2021.

    Comments: 30 pages, 5 figures, 4 tables

  9. arXiv:2010.04204  [pdf, ps, other

    math.CO

    Signed Distance Laplacian Matrices for Signed Graphs

    Authors: Roshni T Roy, K A Germina, K Shahul Hameed, Thomas Zaslavsky

    Abstract: A signed graph is a graph whose edges are labeled either positive or negative. Corresponding to the two signed distance matrices defined for signed graphs, we define two signed distance laplacian matrices. We characterize balance in signed graphs using these matrices and find signed distance laplacian spectra of some classes of unbalanced signed graphs.

    Submitted 8 October, 2020; originally announced October 2020.

    Comments: 12 pp

    MSC Class: 05C12 (Primary); 05C22; 05C50; 05C75 (Secondary)

  10. arXiv:2009.12698  [pdf, other

    eess.IV cs.CV cs.LG

    COVID-19 Infection Map Generation and Detection from Chest X-Ray Images

    Authors: Aysen Degerli, Mete Ahishali, Mehmet Yamac, Serkan Kiranyaz, Muhammad E. H. Chowdhury, Khalid Hameed, Tahir Hamid, Rashid Mazhar, Moncef Gabbouj

    Abstract: Computer-aided diagnosis has become a necessity for accurate and immediate coronavirus disease 2019 (COVID-19) detection to aid treatment and prevent the spread of the virus. Numerous studies have proposed to use Deep Learning techniques for COVID-19 diagnosis. However, they have used very limited chest X-ray (CXR) image repositories for evaluation with a small number, a few hundreds, of COVID-19… ▽ More

    Submitted 6 January, 2021; v1 submitted 26 September, 2020; originally announced September 2020.

  11. arXiv:2009.08708  [pdf, ps, other

    math.CO

    On the Characteristic Polynomial of Skew Gain Graphs

    Authors: K. Shahul Hameed, Roshni T Roy, P. Soorya, K. A. Germina

    Abstract: Gain graphs are graphs where the edges are given some orientation and labeled with the elements (called gains) from a group so that gains are inverted when we reverse the direction of the edges. Generalizing the notion of gain graphs, skew gain graphs have the property that the gain of a reversed edge is the image of edge gain under an anti-involution. In this paper, we deal with the adjacency mat… ▽ More

    Submitted 18 September, 2020; originally announced September 2020.

    Comments: 13 pages

    MSC Class: 05C22; 05C50; 05C76

  12. arXiv:2009.08707  [pdf, ps, other

    math.CO

    On Signed Distance in Product of Signed Graphs

    Authors: T. V. Shijin, P. Soorya, K. Shahul Hameed, K. A. Germina

    Abstract: A signed graph is a graph in which each edge has a positive or negative sign. In this article, first we characterize the distance compatibility in the case of a connected signed graph and discussed the distance compatibility criterion for the cartesian product, lexicographic product and tensor product of signed graphs. We also deal with the distance matrix of the cartesian product, lexicographic p… ▽ More

    Submitted 18 September, 2020; originally announced September 2020.

    Comments: 21 pages

    MSC Class: 05C12; 05C22; 05C50; 05C76

  13. Advance Warning Methodologies for COVID-19 using Chest X-Ray Images

    Authors: Mete Ahishali, Aysen Degerli, Mehmet Yamac, Serkan Kiranyaz, Muhammad E. H. Chowdhury, Khalid Hameed, Tahir Hamid, Rashid Mazhar, Moncef Gabbouj

    Abstract: Coronavirus disease 2019 (COVID-19) has rapidly become a global health concern after its first known detection in December 2019. As a result, accurate and reliable advance warning system for the early diagnosis of COVID-19 has now become a priority. The detection of COVID-19 in early stages is not a straightforward task from chest X-ray images according to expert medical doctors because the traces… ▽ More

    Submitted 18 March, 2021; v1 submitted 7 June, 2020; originally announced June 2020.

    Comments: 12 pages

    Journal ref: in IEEE Access, vol. 9, pp. 41052-41065, 2021

  14. arXiv:1004.4469  [pdf

    cs.CY

    Mobile Commerce and Applications: An Exploratory Study and Review

    Authors: Khawar Hameed, Kamran Ahsan, Weijun Yang

    Abstract: Mobile commerce is enabling the development of additional revenue streams for organizations through the delivery of chargeable mobile services. According to the European Information Technology Observatory, the total amount of revenue generated by mobile commerce was reported to be less than £9 million in the United Kingdom in 2001. By 2005 this had, at least, doubled and more recent industry forec… ▽ More

    Submitted 26 April, 2010; originally announced April 2010.

    Comments: Journal of Computing online at https://sites.google.com/site/journalofcomputing/

    Journal ref: Journal of Computing, Volume 2, Issue 4, April 2010