Raheel Ahmed Memon

ORCID: 0000-0003-1206-3837
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Image and Signal Denoising Methods
  • Advanced Image Processing Techniques
  • Distributed systems and fault tolerance
  • Real-Time Systems Scheduling
  • Image Processing Techniques and Applications
  • Advanced Image Fusion Techniques
  • Advanced Steganography and Watermarking Techniques
  • Interconnection Networks and Systems
  • Cloud Computing and Resource Management
  • Chaos-based Image/Signal Encryption
  • Digital Media Forensic Detection
  • Caching and Content Delivery
  • Dye analysis and toxicity
  • Advanced Wireless Communication Technologies
  • Energy and Environmental Systems
  • Mathematical functions and polynomials
  • Big Data and Digital Economy
  • Non-Invasive Vital Sign Monitoring
  • Fractional Differential Equations Solutions
  • Wireless Communication Security Techniques
  • Web Data Mining and Analysis
  • Teaching and Learning Programming
  • Big Data and Business Intelligence

Sukkur IBA University
2016-2023

University of Electronic Science and Technology of China
2016-2020

Central University of Finance and Economics
2017

Myongji University
2011-2012

Supply Chain Management (SCM) consists of handling and optimizing all the facets supply chain process goods services. Modern SCM is reaping benefits from emerging growing Internet Things (IoT) field. IoT technology can automate digitalize processes to get maximum operational efficiencies by reducing operating costs. The mass proliferation devices has revolutionized chains. in track trace shipments using latest real-time monitoring technologies, including GPS. are also used for asset...

10.1016/j.iot.2023.100982 article EN cc-by Internet of Things 2023-11-01

With the continuous development and evolvement of Internet Things (IoT), monolithic application becomes much larger in scale even more complex structure. This leads to poor scalability, extensibility maintainability. In response those challenges, microservice architecture has been introduced field IoT application, due its flexibility, lightweight loose coupling. However, existing framework mainly focus on a specific domain, therefore, this greatly limits application. paper, we propose...

10.1109/cc.2017.7868163 article EN China Communications 2017-02-01

In recent years, blockchains have obtained so much attention from researchers, engineers, and institutions; the implementation of has started to revive a large number applications ranging e-finance, e-healthcare, smart home, Internet Things, social security, logistics forth. literature on blockchains, it is found that most articles focused their engineering implementation, while little been devoted exploration theoretical aspects system; however, existing work limited model mining process...

10.3390/electronics8020234 article EN Electronics 2019-02-19

Integration of blockchain and Internet Things (IoT) to build a secure, trusted robust communication technology is currently great interest for research communities industries. But challenge identify the appropriate position in current settings IoT with minimal consequences. In this article we propose blockchain-based DualFog-IoT architecture three configuration filter incoming requests at access level, namely: Real Time, Non-Real Delay Tolerant Blockchain applications. The segregate Fog...

10.1109/access.2019.2952472 article EN cc-by IEEE Access 2019-01-01

Summary Healthcare is a vitally important field in the industry and evolving day by aspect of technology, services, computing, management. Its potential significance can be increased incorporating Internet Things (IoT) technology to make it smart automating activities, which then further reformed healthcare domain with help blockchain technology. Blockchain provides many features IoT‐based applications such as restructuring securing traditional practices, data management, sharing, patient...

10.1002/dac.5582 article EN International Journal of Communication Systems 2023-07-26

Blockchain is the one of leading technology this time; it has started to revolutionize several fields like, finance, business, industry, smart home, healthcare, social networks, Internet and Things. It many benefits decentralized network, robustness, availability, stability, anonymity, auditability accountability. The applications are emerging, found that most work focused on its engineering implementation. While theoretical part very less considered explored. In paper we implemented...

10.1109/iccwamtip.2018.8632560 article EN 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) 2018-12-01

With the advent of new technologies and ever increasing use Cloud in nearly every sphere our day to life, data owner using cloud is still less confident. This lack trust obvious as entrusts with a third party which stores, manages processes data. Whatever be level security, there always some loop hole for misusers. Various machine learning techniques have been learn from available analysis results accordingly benefits. Homomorphic secure multi-party computation (SMC) or homomorphic...

10.1109/icomet.2019.8673524 article EN 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET) 2019-01-01

We propose a scale-invariant deep neural network model based on wavelets for single image super-resolution (SISR). The wavelet approximation images and their corresponding sub-bands across all predefined scale factors are combined to form big training data set. Then, mappings determined between the sub-band images. Finally, gradient clipping process is used boost speed of algorithm. Furthermore, stationary transform (SWT) instead discrete (DWT), due its up-scaling property. In this way, we...

10.3390/electronics8050553 article EN Electronics 2019-05-17

Reversible data hiding in encrypted image (RDHEI) is advantageous to scenarios where complete recovery of the original cover and additional are required. In some existing RDHEI schemes, pre-processing step involved an overhead for resource-constrained devices on sender’s side. this paper, efficient separable reversible scheme over a homomorphically that assures privacy preservation contents cloud environment proposed. This proposed comprises three stakeholders: content-owner, hider,...

10.3390/electronics8060682 article EN Electronics 2019-06-17

In this paper, a new modified algorithm is designed for combined numerical integration. Using the several definite integrals have been approximated, and results compared with existing rules rule proposed by(Md. Amanat Ullah, 2015).The from closed quadrature family, namely, Trapezoidal rule, Simpson’s 1/3rule Weddle’s used. The obtained by use of these as per show that gives more accuracy when Md. Ullah fixed number intervals.

10.26692/surj/2019.12.118 article EN SINDH UNIVERSITY RESEARCH JOURNAL -SCIENCE SERIES 2019-12-10

In this paper a new strategy of multiple dictionary learning is proposed for the problem super-resolution. A two way clustering mechanism classification. Dictionaries are obtained each cluster by coupled with mapping functions. Clustering training data carried out using approximate scale invariant features. This followed and which further helps in making sparse representation to resolution blur. provides selective coding over dictionaries. At reconstruction phase patch recovered learning....

10.1109/icomet.2018.8346357 article EN 2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET) 2018-03-01

Variational based problems are an important class of and have a space improvement in image processing. Boosting techniques been shown capable improving many restoration algorithms. This paper considers four fast adaptive boosting for variational restoration. The frameworks can compute the existing algorithm iteratively. primary idea is to get enhanced result by using output current step as part input next step. Our boost regularization models like total variation (TV) generalized (TGV). For...

10.1109/access.2019.2959003 article EN cc-by IEEE Access 2019-01-01

Medical Big Data (MBD) is all concerned with the medical related bio-informatics data. The importance of investigations for disease identification and complications highly depend upon quality This scientific era age digital imaging information processing. For every individual record collection important Due to smart telecommunication technology initiatives, MBD very crucial research area. data in form images video files, which are generated after technical examinations like CT scan, MRI,...

10.1109/iccwamtip.2016.8079850 article EN 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) 2016-12-01

In this paper, we propose the convolutional sparse coding based model in wavelet domain for task of single image super-resolution (SISR). The conventional approaches work on overlapping patches and use dictionary atoms to code an patch. Further, at final stage, overlap-add mechanism is used get high-resolution estimate. However, these algorithms fail take into account consistency present which limits their performance. We integrated approach where instead utilize convolution summations...

10.1109/access.2019.2936455 article EN cc-by IEEE Access 2019-01-01

In networks like Combat ship data network, the Ethernet is required to provide fault tolerance all of its constituents for smooth operations. The analysis in this paper done on basis our already proposed scheme Recursive Scalable Autonomous Fault tolerant Ethernet. Where, large-scale network divided into small subnets by limiting number nodes each. RSAFE contain two Network Interface Cards dual connectivity network. results show that failure can be detected missing 2 consecutive Heartbeat...

10.1109/iccwamtip.2016.8079857 article EN 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) 2016-12-01

From start till last breath there are many problems of human health. Treatments recommended to cure medical by health care professional; collection all this record makes Medical Big Data (MBD). It includes history and prescription reports, test X-Ray, CT Scan, some other types diagnosis. E-Health Telemedicine systems being developed reduce data availability patient, is updated at the consultant end maintained in cloud based infrastructures. compressed maintain more record. This has extended...

10.1109/iccwamtip.2017.8301507 article EN 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) 2017-12-01

Sentiment analysis is widely used today to make data-driven decisions in different industries, starting from marketing and including brand management, reputation monitoring, customer satisfaction analysis. Its growing importance closely linked with so-called ‘word-of-mouth’ communication, reading online reviews writing comments on social networks. Effective separation of sentiments ensures that companies' responses are timely critical patterns seen big data sets. Statistical measures,...

10.21015/vtse.v12i3.1907 article EN VFAST Transactions on Software Engineering 2024-09-30

In this paper, we propose a fault tolerant network architecture called Hierarchical Scalable Fault-tolerant Ethernet (H-SAFE) for mission critical systems. The proposed is tree based structure which provides multiple paths to route packet. If any failure occurs in current path, then the alternative path recovers and reroute packet destination without information loss. state of route, detection rerouting can be done within 750ms, reasonable time tolerance.

10.1109/ictc.2011.6082591 article EN 2011-09-01

Network Coding is a potential technology for the future wireless communications and Internet of Things (IoT) as it reduces number transmissions offers energy efficiency. It vulnerable to threat attack that can harm intermediate nodes. Indeed, exhibits an ability incorporate security transmitted data, yet lot work needs be done provide safeguard from threats. The purpose this study strengthen existing scheme with set generic requirements Protocols by adopting system models Genetic Algorithm...

10.32604/iasc.2021.017771 article EN cc-by Intelligent Automation & Soft Computing 2021-01-01

New era is the age of 5G. The network has moved from simple internet connection towards advanced LTE connections and transmission. information communication technology reshaped telecommunication. For this, among many types big data, Medical Big Data one most sensitive forms data. Wavelet a technical tool to reduce size this data make it available for user more time. It also responsible low latency high speed transmission over network. key concern should be accurate reliable enough so that...

10.30537/sjcms.v1i1.4 article EN cc-by-nc Sukkur IBA Journal of Computing and Mathematical Sciences 2017-06-30

In real-time systems, a fault on any node can lead to big financial and life losses. To overcome that issue several approaches have been proposed but the of robust, reliable cost-efficient network still persists. our previous work, we Recursive Scalable Autonomous Fault Tolerant Ethernet (RSAFE) Scheme for such systems limitations. this paper, present implementation RSAFE Rerouting Protocol in NS2. The simulation results shows detection recovery is possible specified time using its rerouting...

10.1109/iccwamtip.2017.8301494 article EN 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) 2017-12-01
Coming Soon ...