Zobrazeno 1 - 10
of 399
pro vyhledávání: '"Musheer, Ahmad"'
Autor:
Mohamed Amine Tahiri, Hicham Karmouni, Mhamed Sayyouri, Hassan Qjidaa, Musheer Ahmad, Mohamed Hammad, Paweł Pławiak, Osama Alfarraj, Ahmed A. Abd El-Latif
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-29 (2024)
Abstract Digital watermarking of images is an essential method for copyright protection and image security. This paper presents an innovative, robust watermarking system for color images based on moment and wavelet transformations, algebraic decompos
Externí odkaz:
https://doaj.org/article/12d8b2a3d5c84e378e0641938717b583
Publikováno v:
AIMS Mathematics, Vol 9, Iss 3, Pp 6027-6237 (2024)
With the increasing need for secure transmission and storage of medical images, the development of robust encryption algorithms is of paramount importance. Securing sensitive digital medical imagery information during transmission has emerged as a cr
Externí odkaz:
https://doaj.org/article/f9cc77b4c4cc47f587583d51ce505611
Publikováno v:
IEEE Access, Vol 12, Pp 113553-113564 (2024)
Trust and energy efficiency are key requirements in remote sensing devices, which are frequently deployed in electronic commerce supply chain management. This remote sensing is facilitated by wireless sensor networks (WSNs) which have been integrated
Externí odkaz:
https://doaj.org/article/773828643f36419788c987131a59075a
Publikováno v:
IEEE Access, Vol 12, Pp 109673-109689 (2024)
The emergence of edge computing has revolutionized the landscape of modern applications, offering remarkable advantages such as low-latency and high-bandwidth abilities by decentralizing computation closer to data sources. Despite these advantages, p
Externí odkaz:
https://doaj.org/article/4d9c8a96ba3744fb82fdbd8be40e4d6d
Publikováno v:
IEEE Access, Vol 12, Pp 31771-31787 (2024)
The Internet of Things (IoT) has emerged as a revolutionary communication technology, enabling the connection of resource-limited devices to the Internet. These devices are deployed in various industrial control systems to remotely monitor and contro
Externí odkaz:
https://doaj.org/article/16bfceff876b4d1997e5016e47ca7654
Publikováno v:
IEEE Access, Vol 12, Pp 7584-7608 (2024)
Due to privacy and sensitivity of the medical images, the creation of strong medical image encryption schemes has gained the attention of cryptographers. In this study, a robust medical image encryption scheme is developed involving a fuzzy subset of
Externí odkaz:
https://doaj.org/article/9c2e6f7d05804966b443522682123f85
Publikováno v:
Diagnostics, Vol 14, Iss 19, p 2225 (2024)
Background: The reproductive age of women is particularly vulnerable to the effects of polycystic ovarian syndrome (PCOS). High levels of testosterone and other male hormones are frequent contributors to PCOS. It is believed that miscarriages and ovu
Externí odkaz:
https://doaj.org/article/9ffd9f1afaae44fa8c0aeadd45c13135
Autor:
Mohd Mustufa, Ambreen Abbasi, Summaiya Hanif, Zia Ul Haq Bhat, Hina kabeer, Mohammad Jane Alam, Musheer Ahmad, Mohammad Shakir
Publikováno v:
Chemistry of Inorganic Materials, Vol 1, Iss , Pp 100011- (2023)
Schiff-base fluorescent chemosensor (E)-N-(4-(dimethylamino)benzylidene)quinolone-3-amine (DBQA) was synthesized and characterized by FT-IR,1H NMR,13C NMR, ESI-MS spectrometry and Single X-ray crystallographic studies. The synthesized chemosensor (DB
Externí odkaz:
https://doaj.org/article/780277045f784978b2d555d38bf2b2de
Autor:
Abd Ullah Khan, Muhammad Tanveer, Hyundong Shin, Musheer Ahmad, Ammar Muthanna, Abdukodir A. Khakimov, Fahad Alblehai, Ahmed A. Abd El-Latif
Publikováno v:
IEEE Access, Vol 11, Pp 145706-145722 (2023)
Cognitive radio enabled social internet of things (CR-SIoT) can potentially revolutionize the existing networking paradigm by enabling heterogeneous IoT users to communicate socially like friends using the existing limited spectrum. However, satisfyi
Externí odkaz:
https://doaj.org/article/34d5d01b565a4c969a9c4d9c082eb7c2
Autor:
Amjad Hussain Zahid, Hafiz Ali Mansoor Elahi, Musheer Ahmad, Louai A. Maghrabi, Ramy Said Agieb Said
Publikováno v:
IEEE Access, Vol 11, Pp 139745-139758 (2023)
The significance of data security has become more critical due to the ever-changing goals and capabilities of attackers. As a result, many cryptosystems employing diverse approaches are being developed to safeguard sensitive data. A Substitution box
Externí odkaz:
https://doaj.org/article/6721b3e3b11041af878090b95623dcb4