Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Khurram Gulzar"'
Autor:
Allah Ditta, Muhammad Azeem, Shahid Naseem, Khurram Gulzar Rana, Muhammad Adnan Khan, Zafar Iqbal
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 5, Pp 2180-2191 (2022)
With the advancement of technology, the maximum data hiding capacity and security of cover objects have become a very challenging task for researchers, particularly in text carrier. Text carrier depicts low hiding capacity but more secure for the det
Externí odkaz:
https://doaj.org/article/b468f4adcad1486da6e535ab03d3c040
Experimental Study on the Behaviour of Short Columns Confined by Waste Plastic Bags-Epoxy Composites
Autor:
Shaban Shahzad, Rashid Hameed, Syed Asad Ali Gillani, Muhammad Rizwan Riaz, Umair Hameed, Khurram Gulzar
Publikováno v:
International Journal of Engineering Research in Africa
International Journal of Engineering Research in Africa, 2022, 62, pp.57-69. ⟨10.4028/p-kx14u4⟩
International Journal of Engineering Research in Africa, 2022, 62, pp.57-69. ⟨10.4028/p-kx14u4⟩
An experimental study was carried out to investigate the behaviour of short column confined by waste plastic bags and nylon strips and findings of this study are presented in this paper. Eight reinforced concrete (RC) short columns were casted. Among
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Transactions on Robotics
IEEE Transactions on Robotics, IEEE, 2018, pp.1-15. ⟨10.1109/TRO.2018.2875388⟩
IEEE Transactions on Robotics, 2018, pp.1-15. ⟨10.1109/TRO.2018.2875388⟩
IEEE Transactions on Robotics, IEEE, 2018, pp.1-15. ⟨10.1109/TRO.2018.2875388⟩
IEEE Transactions on Robotics, 2018, pp.1-15. ⟨10.1109/TRO.2018.2875388⟩
openaire: EC/FP7/600825/EU//RECONFIG In a multirobot system, using shared symbols for objects in the environment is a prerequisite for collaboration. Sharing symbols requires that each agent has anchored a symbol with an internal, sensor level repres
Publikováno v:
2019 11th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA).
Steganography is a fundamental and foremost approach that is used to ensure confidentiality of secret data. It is an art, which ensures invisible communication by concealing secret information in cover media through scientific techniques. The text st
In database management system (DBMS) retrieving data through structure query language is an essential aspect to find better execution plan for performance. In this paper, we incorporated database objects to optimize query execution time and its cost
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::913104b2604523da25e3bc8ea953dc97
https://zenodo.org/record/4271264
https://zenodo.org/record/4271264
Publikováno v:
ICCNS
Providing secure communication in different environments is very vital in an adhoc network. One of the important security threats in wireless adhoc networks are routing attacks. These attacks are used to disconnect a sensor network from its central b
Publikováno v:
International Journal of Electronic Security and Digital Forensics. 11:1
Cryptography and steganography are foremost techniques used to ensure security and confidentiality of secret information. In steganography, data hiding capacity with security is a great challenge for the researchers. In present scheme, a novel approa
Publikováno v:
Humanoids
ResearcherID
ResearcherID
This paper discusses advancements on alternative communication methods between robots utilizing deictic gestures and body language. The provided approach boosts the performance of the formerly developed ROS-oriented system and grants increased accura
Autor:
Haiyang Yu, Allah Ditta, Cai Yongquan, Muhammad Qasim Memon, Khurram Gulzar Rana, Muhammad Azeem
Publikováno v:
International Journal of Electronic Security and Digital Forensics. 10:61
In recent years, information security has become a very important topic for researchers as well as military and government officials. For secure communication, it is necessary to develop novel ways to hide information. For this purpose, steganography