Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2023
Energy-efficient virtual machine placement in distributed cloud using NSGA-III algorithm
- Arunkumar Gopu,
- Kalaipriyan Thirugnanasambandam,
- Rajakumar R,
- Ahmed Saeed AlGhamdi,
- Sultan S. Alshamrani,
- K. Maharajan,
- Mamoon Rashid
Journal of Cloud Computing: Advances, Systems and Applications (JOCCASA), Volume 12, Issue 1https://doi.org/10.1186/s13677-023-00501-yAbstractCloud computing is the most widely adapted computing model to process scientific workloads in remote servers accessed through the internet. In the IaaS cloud, the virtual machine (VM) is the execution unit that processes the user workloads. ...
- research-articleMay 2023
FFTPSOGA: Fast Fourier Transform with particle swarm optimization and genetic algorithm approach for pattern identification of brain responses in multi subject fMRI data
Multimedia Tools and Applications (MTAA), Volume 82, Issue 29Pages 45433–45452https://doi.org/10.1007/s11042-023-15471-1AbstractFunctional Magnetic Resonance Imaging (fMRI) is the popular technique where it is possible to capture neural activity in brain regions when subjected to different stimuli. However, due to fMRI datasets' high dimensional and sparse nature, the best ...
- research-articleMay 2023
Hybrid gated recurrent unit and convolutional neural network-based deep learning mechanism for efficient shilling attack detection in social networks
- N. Praveena,
- Kapil Juneja,
- Mamoon Rashid,
- Alaa Omran Almagrabi,
- Kaushik Sekaran,
- Rajakumar Ramalingam,
- Muhammad Usman
Computers and Electrical Engineering (CENG), Volume 108, Issue Chttps://doi.org/10.1016/j.compeleceng.2023.108673Highlights- A Hybrid deep learning mechanism is introduced to detect a Shilling Attack with improved accuracy and reduced data sparsity.
- The proposed mechanism facilitates seeing shilling attacks by constructing a deep learning network with ...
The degree of openness of the socially aware recommendation systems and the possibility of the attackers injecting vast numbers of fake profiles biases the prediction of the system. Most classical shilling attack discovery mechanisms rely on ...
Graphical abstractDisplay Omitted
- research-articleJanuary 2023
An Automatic Image Processing Method Based on Artificial Intelligence for Locating the Key Boundary Points in the Central Serous Chorioretinopathy Lesion Area
Accurately and rapidly measuring the diameter of central serous chorioretinopathy (CSCR) lesion area is the key to judge the severity of CSCR and evaluate the efficacy of the corresponding treatments. Currently, the manual measurement scheme based on a ...
- research-articleJanuary 2023
Automatic Segmentation and Classification for Antinuclear Antibody Images Based on Deep Learning
Antinuclear antibodies (ANAs) testing is the main serological diagnosis screening test for autoimmune diseases. ANAs testing is conducted principally by the indirect immunofluorescence (IIF) on human epithelial cell-substrate (HEp-2) protocol. However, ...
-
- research-articleDecember 2022
Job scheduling problem in fog-cloud-based environment using reinforced social spider optimization
- P. Kuppusamy,
- N. Marline Joys Kumari,
- Wael Y. Alghamdi,
- Hashem Alyami,
- Rajakumar Ramalingam,
- Abdul Rehman Javed,
- Mamoon Rashid
Journal of Cloud Computing: Advances, Systems and Applications (JOCCASA), Volume 11, Issue 1https://doi.org/10.1186/s13677-022-00380-9AbstractFog computing is an emerging research domain to provide computational services such as data transmission, application processing and storage mechanism. Fog computing consists of a set of fog server machines used to communicate with the mobile user ...
- research-articleDecember 2022
Analysis of the change in bugginess and adaptiveness of python software systems
Multimedia Tools and Applications (MTAA), Volume 81, Issue 30Pages 43107–43123https://doi.org/10.1007/s11042-022-13246-8AbstractThe useful constructs in terms of dynamic features of programming languages bring the developers convenience and flexibility, but can also lead to the risks in the software maintenance. Evaluating whether the use of such features affects the ...
- research-articleOctober 2022
Chest X ray and cough sample based deep learning framework for accurate diagnosis of COVID-19
- Santosh Kumar,
- Rishab Nagar,
- Saumya Bhatnagar,
- Ramesh Vaddi,
- Sachin Kumar Gupta,
- Mamoon Rashid,
- Ali Kashif Bashir,
- Tamim Alkhalifah
Computers and Electrical Engineering (CENG), Volume 103, Issue Chttps://doi.org/10.1016/j.compeleceng.2022.108391AbstractAll witnessed the terrible effects of the COVID-19 pandemic on the health and work lives of the population across the world. It is hard to diagnose all infected people in real time since the conventional medical diagnosis of COVID-19 patients ...
- research-articleSeptember 2022
A drone-based data management and optimization using metaheuristic algorithms and blockchain smart contracts in a secure fog environment
- Abdullah Ayub Khan,
- Asif Ali Laghari,
- Thippa Reddy Gadekallu,
- Zaffar Ahmed Shaikh,
- Abdul Rehman Javed,
- Mamoon Rashid,
- Vania V. Estrela,
- Alexey Mikhaylov
Computers and Electrical Engineering (CENG), Volume 102, Issue Chttps://doi.org/10.1016/j.compeleceng.2022.108234AbstractThe advent of fog computing as an extension of cloud-enabling technology has moved from the hub of the internet framework to the unmanned aerial vehicle (UAV)-enabled control and management of drone-based data. The key objectives are ...
- research-articleMarch 2022
AI-enabled radiologist in the loop: novel AI-based framework to augment radiologist performance for COVID-19 chest CT medical image annotation and classification from pneumonia
Neural Computing and Applications (NCAA), Volume 35, Issue 20Pages 14591–14609https://doi.org/10.1007/s00521-022-07055-1AbstractA SARS-CoV-2 virus-specific reverse transcriptase-polymerase chain reaction (RT-PCR) test is usually used to diagnose COVID-19. However, this test requires up to 2 days for completion. Moreover, to avoid false-negative outcomes, serial testing may ...
- research-articleJanuary 2022
An Efficient Machine Learning-Based Feature Optimization Model for the Detection of Dyslexia
- Fahmi Khalifa,
- Nazir Ahmad,
- Mohammed Burhanur Rehman,
- Hatim Mohammed El Hassan,
- Iqrar Ahmad,
- Mamoon Rashid
Dyslexia is among the most common neurological disorders in children. Detection of dyslexia therefore remains an important pursuit for the research works across various domains which is illustrated by the plethora of work presented in diverse scientific ...
- research-articleJanuary 2022
The Intergenerational Income Mobility of Chinese Urban and Rural Residents Based on Big Data Technology
In order to analyze the intergenerational income mobility of urban and rural residents, this paper uses big data technology to study the intergenerational income mobility of urban and rural residents in China, constructs a corresponding model, and ...
- research-articleJanuary 2022
U-DAVIS-Deep Learning Based Arm Venous Image Segmentation Technique for Venipuncture
- Mamoon Rashid,
- Avik Kuthiala,
- Naman Tuli,
- Harpreet Singh,
- Omer F. Boyraz,
- Neeru Jindal,
- Ravimohan Mavuduru,
- Smita Pattanaik,
- Prashant Singh Rana
Arm Venous Segmentation plays a crucial role in smart venipuncture. The difficulties faced in locating veins for intravenous procedures can be diminished using computer vision for vein imaging. To facilitate this, a high-resolution dataset consisting of ...
- research-articleJanuary 2022
Prevalence and Early Prediction of Diabetes Using Machine Learning in North Kashmir: A Case Study of District Bandipora
- Mamoon Rashid,
- Salliah Shafi Bhat,
- Venkatesan Selvam,
- Gufran Ahmad Ansari,
- Mohd Dilshad Ansari,
- Md Habibur Rahman
Diabetes is one of the biggest health problems that affect millions of people across the world. Uncontrolled diabetes can increase the risk of heart attack, cancer, kidney damage, blindness, and other illnesses. Researchers are motivated to create a ...
- research-articleDecember 2021
Amalgamation of blockchain and sixth‐generation‐envisioned responsive edge orchestration in future cellular vehicle‐to‐anything ecosystems: Opportunities and challenges
- Pronaya Bhattacharya,
- Umesh Bodkhe,
- Mohd Zuhair,
- Mamoon Rashid,
- Xuan Liu,
- Ashwin Verma,
- Ram Kishan Dewangan
Transactions on Emerging Telecommunications Technologies (TETT), Volume 35, Issue 4https://doi.org/10.1002/ett.4410AbstractIn modern decentralized cellular‐vehicle‐to‐anything (C‐V2X) infrastructures, connected autonomous smart vehicles (CASVs) exchange vehicular information with peer CASVs. To leverage responsive communication, sensors deployed in CASVs communicate ...
In this paper, we propose the background and analyze the integration of BC and 6G for REC in C‐V2X‐based ecosystems. A solution taxonomy for BC and 6G‐edge is proposed for CASV in C‐V2X. A case‐study 6Edge is proposed and a reference architecture is ...
- research-articleDecember 2021
Electricity load forecasting and feature extraction in smart grid using neural networks
Computers and Electrical Engineering (CENG), Volume 96, Issue PAhttps://doi.org/10.1016/j.compeleceng.2021.107479Highlights- Systematic framework is established that formalizes the scope of the smart grids.
Load forecasting plays an essential role in effective energy planning and distribution in a smart grid. However, due to the unpredictable and non-linear structure of smart grids and large datasets' complex nature, accurate load ...
- research-articleOctober 2021
Distance Based Pattern Driven Mining for Outlier Detection in High Dimensional Big Dataset
ACM Transactions on Management Information Systems (TMIS), Volume 13, Issue 1Article No.: 8, Pages 1–17https://doi.org/10.1145/3469891Detection of outliers or anomalies is one of the vital issues in pattern-driven data mining. Outlier detection detects the inconsistent behavior of individual objects. It is an important sector in the data mining field with several different applications ...
- research-articleJuly 2021
A survey on recent optimal techniques for securing unmanned aerial vehicles applications
Transactions on Emerging Telecommunications Technologies (TETT), Volume 32, Issue 7https://doi.org/10.1002/ett.4133AbstractUnmanned aerial vehicles (UAVs) or Drones technology has a huge potential for supporting different efficient solutions for the smart applications in our world. The applications include smart things, smart transportation, smart cities, smart ...
Unmanned aerial vehicles (UAVs) or Drones technology has a huge potential for supporting different efficient solutions for the smart applications in our world. Due to the sensitive applications of UAVs, the security has become a major concern, and ...
- research-articleJuly 2021
A novel approach for securing data against intrusion attacks in unmanned aerial vehicles integrated heterogeneous network using functional encryption technique
Transactions on Emerging Telecommunications Technologies (TETT), Volume 32, Issue 7https://doi.org/10.1002/ett.4114AbstractAs the number of user equipment (UE) in any heterogeneous network (HetNet) assisted by unmanned aerial vehicles (UAV) continues to grow, so does the number of intruder nodes. The intruder/malicious nodes are able to interfere with the ongoing data ...
Flowchart of FE technique. FE, functional encryption image image
- research-articleJune 2021
Efficient data transfer in edge envisioned environment using artificial intelligence based edge node algorithm
- V. D. Ambeth Kumar,
- Abhishek Kumar,
- Ranbir Singh Batth,
- Mamoon Rashid,
- Sachin Kumar Gupta,
- Manish Raghuraman
Transactions on Emerging Telecommunications Technologies (TETT), Volume 32, Issue 6https://doi.org/10.1002/ett.4110AbstractEdge computing technology has drawn the keystone of future intelligent transportation systems, especially in smart cities, because of processing data that are near to the user location present at the edge of the cloud server. Generally, in smart ...
Steps involved in transmission. image image