Gran Badshah

ORCID: 0000-0002-1060-580X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Chaos-based Image/Signal Encryption
  • Context-Aware Activity Recognition Systems
  • Advanced Data Compression Techniques
  • IoT and Edge/Fog Computing
  • Digital Media Forensic Detection
  • Green IT and Sustainability
  • Advanced Malware Detection Techniques
  • Cloud Computing and Resource Management
  • Smart Agriculture and AI
  • Health and Medical Research Impacts
  • Advances in Oncology and Radiotherapy
  • Computer Graphics and Visualization Techniques
  • Metaheuristic Optimization Algorithms Research
  • Artificial Intelligence in Healthcare
  • Brain Tumor Detection and Classification
  • Date Palm Research Studies
  • Diabetes, Cardiovascular Risks, and Lipoproteins
  • Software Engineering Research
  • Anomaly Detection Techniques and Applications
  • Digital Media and Visual Art
  • Leaf Properties and Growth Measurement
  • Digital and Cyber Forensics
  • Remote Sensing in Agriculture
  • Data Mining Algorithms and Applications

King Khalid University
2021-2023

Federal Urdu University
2023

Abdul Wali Khan University Mardan
2017

Universiti Malaysia Pahang Al-Sultan Abdullah
2013-2016

Royal College of Physicians
1976

King's Fund
1976

There is always a desire for defect-free software in order to maintain quality customer satisfaction and save testing expenses. As result, we examined various known ML techniques optimized on freely available data set. The purpose of the research was improve model performance terms accuracy precision dataset compared previous research. investigations show, can be further improved. For this purpose, employed K-means clustering categorization class labels. Further, applied classification...

10.3390/su15065517 article EN Sustainability 2023-03-21

Half a million species of plants could be existing in the world. Classification based on leaf features is critical job as feature extraction (includes shape, margin, and texture) from binary images leaves may result duplicate identification. However, are an effective means differentiating plant because their unique characteristics like area, diameter, perimeter, circularity, aspect ratio, solidity, eccentricity, narrow factor. This paper presents gas alongside other camera or dataset by...

10.1155/2022/6976112 article EN cc-by Complexity 2022-01-01

Energy efficiency of mobile devices is paramount after the tremendous advancement in technology while explosion smart applications such as, YouTube, Facebook, Twitters and Google maps makes Smart Internet Devices (SIDs) first choice communication. On other hand, multiple sensors wireless interfaces drain battery swiftly, thus reducing operational time SIDs. Therefore, extending life problem has become crucial research importance, at hardware software levels, both alike. This paper firstly,...

10.1109/scored.2014.7072944 article EN 2014-12-01

The open accessibility of Internet-based medical images in teleradialogy face security threats due to the nonsecured communication media. This paper discusses spatial domain watermarking ultrasound for content authentication, tamper detection, and lossless recovery. For this purpose, image is divided into two main parts, region interest (ROI) noninterest (RONI). defined ROI its hash value are combined as watermark, compressed, embedded RONI part at pixel’s least significant bits (LSBs)....

10.1117/1.jmi.3.1.017001 article EN Journal of Medical Imaging 2016-01-25

Abstract This study presents a comparative analysis of classical and deep learning approaches for the classification apple fruit quality, within broader context machine vision applications. Emphasizing importance fruit's physical appearance in meeting market standards, research explores performance methods such as Support Vector Machine (SVM), K-nearest neighbour (KNN), Decision Tree (DT), comparison to like Mobile-Net Convolutional Neural Network (CNN) with self-design. A self-created...

10.21203/rs.3.rs-3025343/v1 preprint EN cc-by Research Square (Research Square) 2023-06-08

Medical image is seen as one of crucial data that demand for authentication method in order to ensure has not been tampered. This paper conducted a research proposing recovery feature an watermark with spiral manner numbering, which shows good numbering system embedding. The schema fragile, blind watermarking. operating time taken short and the result very promising high Peak-Signal-to-Noise-Ratio (PSNR) value low Mean-Squared Error (MSE).

10.1109/icecco.2013.6718284 article EN 2013-11-01

Fog computing extends mobile cloud facilities at the network edge, yielding low-latency application execution. To supplement services, computationally intensive applications can be distributed on resource-constrained devices by leveraging underutilized nearby resources to meet latency and bandwidth requirements of Building upon this premise, it is necessary investigate idle or that are present edge network. The utilization a microservice architecture in IoT development, with its increased...

10.3390/s23167142 article EN cc-by Sensors 2023-08-12

The phenomenon of widespread usage smart phone has encouraged many android applications to be produced, by free or paid. Nowadays, with the trend communicating through social networking and sites, Muslims tend share image verse from Quran sites. Several concerns regarding security copy control text have aroused, among solution this issue is watermarking. This paper conducted a research proposing an authentication fragile watermark spiral manner which shows good numbering system embedding....

10.1109/nooric.2013.17 article EN 2013-12-01

Medical image is seen as one of crucial data that demand for authentication method it highly confidential and used in insurance claim, evidence jurisdiction personal identification. Nowadays, Hospital Information System (HIS) widely at hospitals clinical departments handles thousands electronic medical. We have introduced a fragile watermarking using spiral manner numbering which showed good system excellent embedding, but due to the technique, only embedded square shape. enhanced scheme...

10.1109/i4ct.2014.6914174 article EN 2014-09-01

Region of interest (ROI) is the most informative part a medical image and mostly has been used as major watermark. Various shapes ROIs selection have reported in region-based watermarking techniques. In schemes an region non-interest (RONI) second important for watermark encapsulation. online healthcare systems ROI wrong by missing some portions to be can create problem at destination. This paper discusses complete availability original destination using whole authentication, tamper...

10.3745/jips.03.0044 article EN Journal of Information Processing Systems 2015-01-01

This paper proposes an intermediate solution using artificial intelligence to monitor any potential threat for SME, specifically in Malaysia. The proposed method uses Autoencoder based Deep Neural Network (AEDNN) trained with NSL-KDD dataset efficiently detect possible cyber threats. AEDNN automated threats cybersecurity and it does not intend replace existing security solutions. is designed accurately consistently the real-time network. experimental results show that accurate range between...

10.1109/icicos53627.2021.9651851 article EN 2021-11-24
Coming Soon ...