Skip to main content

Showing 1–26 of 26 results for author: Rehman, S U

.
  1. arXiv:2405.12427  [pdf, other

    cs.LG

    Deep learning approaches to indoor wireless channel estimation for low-power communication

    Authors: Samrah Arif, Muhammad Arif Khan, Sabih Ur Rehman

    Abstract: In the rapidly growing development of the Internet of Things (IoT) infrastructure, achieving reliable wireless communication is a challenge. IoT devices operate in diverse environments with common signal interference and fluctuating channel conditions. Accurate channel estimation helps adapt the transmission strategies to current conditions, ensuring reliable communication. Traditional methods, su… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

  2. arXiv:2405.04735  [pdf, other

    cs.CR cs.DS cs.IR

    Cryptanalysis of the SIMON Cypher Using Neo4j

    Authors: Jonathan Cook, Sabih ur Rehman, M. Arif Khan

    Abstract: The exponential growth in the number of Internet of Things (IoT) devices has seen the introduction of several Lightweight Encryption Algorithms (LEA). While LEAs are designed to enhance the integrity, privacy and security of data collected and transmitted by IoT devices, it is hazardous to assume that all LEAs are secure and exhibit similar levels of protection. To improve encryption strength, cry… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: 10 pages, 10 figures, 2 algorithms, accepted by the 4th International Conference on Electrical, Computer and Energy Technologies (ICECET) to be presented in July 2024

  3. arXiv:2404.15337  [pdf, other

    eess.SP cs.LG cs.NI

    RSSI Estimation for Constrained Indoor Wireless Networks using ANN

    Authors: Samrah Arif, M. Arif Khan, Sabih Ur Rehman

    Abstract: In the expanding field of the Internet of Things (IoT), wireless channel estimation is a significant challenge. This is specifically true for low-power IoT (LP-IoT) communication, where efficiency and accuracy are extremely important. This research establishes two distinct LP-IoT wireless channel estimation models using Artificial Neural Networks (ANN): a Feature-based ANN model and a Sequence-bas… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

  4. arXiv:2404.08165  [pdf, other

    cs.CR

    Lightweight Cryptanalysis of IoT Encryption Algorithms : Is Quota Sampling the Answer?

    Authors: Jonathan Cook, Sabih ur Rehman, M. Arif Khan

    Abstract: Rapid growth in the number of small sensor devices known as the Internet of Things (IoT) has seen the development of lightweight encryption algorithms. Two well-known lightweight algorithms are SIMON and SIMECK which have been specifically designed for use on resource-constrained IoT devices. These lightweight encryption algorithms are based on the efficient Feistel block structure which is known… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

    Comments: 24 pages, 21 figures, 7 tables

  5. arXiv:2308.15868  [pdf

    cs.CV eess.IV

    Feature Attention Network (FA-Net): A Deep-Learning Based Approach for Underwater Single Image Enhancement

    Authors: Muhammad Hamza, Ammar Hawbani, Sami Ul Rehman, Xingfu Wang, Liang Zhao

    Abstract: Underwater image processing and analysis have been a hotspot of study in recent years, as more emphasis has been focused to underwater monitoring and usage of marine resources. Compared with the open environment, underwater image encountered with more complicated conditions such as light abortion, scattering, turbulence, nonuniform illumination and color diffusion. Although considerable advances a… ▽ More

    Submitted 30 August, 2023; originally announced August 2023.

    Comments: Fourteenth International Conference on Digital Image Processing (ICDIP 2022), 2022, Wuhan, China, May 20-23, 2022.8 pages.5 Figures.doi: 10.1117/12.2644516

    Journal ref: Fourteenth International Conference on Digital Image Processing (ICDIP 2022), 2022, Wuhan, China, May 20-23, 2022

  6. arXiv:2304.10511  [pdf, other

    cs.CR cs.AI cs.LG

    OutCenTR: A novel semi-supervised framework for predicting exploits of vulnerabilities in high-dimensional datasets

    Authors: Hadi Eskandari, Michael Bewong, Sabih ur Rehman

    Abstract: An ever-growing number of vulnerabilities are reported every day. Yet these vulnerabilities are not all the same; Some are more targeted than others. Correctly estimating the likelihood of a vulnerability being exploited is a critical task for system administrators. This aids the system administrators in prioritizing and patching the right vulnerabilities. Our work makes use of outlier detection t… ▽ More

    Submitted 2 April, 2023; originally announced April 2023.

    Comments: 11 pages, 6 figures

  7. arXiv:2304.00713  [pdf, other

    cs.CR

    Security and Privacy for Low Power IoT Devices on 5G and Beyond Networks: Challenges and Future Directions

    Authors: Jonathan Cook, Sabih ur Rehman, M. Arif Khan

    Abstract: The growth in the use of small sensor devices, commonly known as the Internet of Things (IoT), has resulted in unprecedented amounts of data being generated and captured. With the rapidly growing popularity of personal IoT devices, the collection of personal data through such devices has also increased exponentially. To accommodate the anticipated growth in connected devices, researchers are now i… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

    Comments: 28 pages, 5 figures

  8. arXiv:2111.14634  [pdf

    cs.NE

    Optimal Load Scheduling Using Genetic Algorithm to Improve the Load Profile

    Authors: Farhat Iqbal, Shafiq ur Rehman, Khawar Iqbal

    Abstract: Stability and protection of the electrical power systems are always of primary concern. Stability can be affected mostly by increase in the load demand. Power grids are overloaded in peak hours so more power generation units are required to cope the demand. Increase in power generation is not an optimal solution. With the enlargement in Smart grid (SG), it becomes easier to correlate the consumer… ▽ More

    Submitted 14 October, 2021; originally announced November 2021.

  9. arXiv:2111.14157  [pdf, other

    cs.CV

    Implicit Equivariance in Convolutional Networks

    Authors: Naman Khetan, Tushar Arora, Samee Ur Rehman, Deepak K. Gupta

    Abstract: Convolutional Neural Networks(CNN) are inherently equivariant under translations, however, they do not have an equivalent embedded mechanism to handle other transformations such as rotations and change in scale. Several approaches exist that make CNNs equivariant under other transformation groups by design. Among these, steerable CNNs have been especially effective. However, these approaches requi… ▽ More

    Submitted 28 November, 2021; originally announced November 2021.

  10. arXiv:2110.09615  [pdf, other

    cs.CR cs.SE

    A Generalised Logical Layered Architecture for Blockchain Technology

    Authors: Jared Newell, Quazi Mamun, Sabih ur Rehman, Md Zahidul Islam

    Abstract: Precision, validity, reliability, timeliness, availability, and granularity are the desired characteristics for data and information systems. However due to the desired trait of data mutability, information systems have inherently lacked the ability to enforce data integrity without governance. A resolution to this challenge has emerged in the shape of blockchain architecture, which ensures immuta… ▽ More

    Submitted 18 October, 2021; originally announced October 2021.

    Comments: 24 pages, 7 figures

  11. arXiv:2105.13906  [pdf, other

    cs.CV cs.AI cs.DC eess.IV

    Training of SSD(Single Shot Detector) for Facial Detection using Nvidia Jetson Nano

    Authors: Saif Ur Rehman, Muhammad Rashid Razzaq, Muhammad Hadi Hussian

    Abstract: In this project, we have used the computer vision algorithm SSD (Single Shot detector) computer vision algorithm and trained this algorithm from the dataset which consists of 139 Pictures. Images were labeled using Intel CVAT (Computer Vision Annotation Tool) We trained this model for facial detection. We have deployed our trained model and software in the Nvidia Jetson Nano Developer kit. Model… ▽ More

    Submitted 28 May, 2021; originally announced May 2021.

    Comments: 7 Pages, 7 figures

  12. arXiv:2104.08743  [pdf, ps, other

    math.CO cs.IT

    Rough Sets in Graphs Using Similarity Relations

    Authors: Imran Javaid, Shahroz Ali, Shahid Ur Rehman, Aqsa Shah

    Abstract: In this paper, we use theory of rough set to study graphs using the concept of orbits. We investigate the indiscernibility partitions and approximations of graphs induced by orbits of graphs. We also study rough membership functions, essential sets, discernibility matrix and their relationships for graphs.

    Submitted 18 April, 2021; originally announced April 2021.

    Comments: 15 pages, 2 figures, 1 table

  13. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks

    Authors: Andrew Churcher, Rehmat Ullah, Jawad Ahmad, Sadaqat ur Rehman, Fawad Masood, Mandar Gogate, Fehaid Alqahtani, Boubakr Nour, William J. Buchanan

    Abstract: In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices in IoT networks can be problematic due to their resource-constrained nature, and integrating security on these devices is often overlooked. This has resulted in attackers having an increased incentive to target IoT devices. As… ▽ More

    Submitted 10 January, 2021; originally announced January 2021.

    Journal ref: Sensors. 2021; 21(2):446

  14. arXiv:2008.01191  [pdf, other

    cs.IR cs.CV cs.LG

    Deep Learning Techniques for Future Intelligent Cross-Media Retrieval

    Authors: Sadaqat ur Rehman, Muhammad Waqas, Shanshan Tu, Anis Koubaa, Obaid ur Rehman, Jawad Ahmad, Muhammad Hanif, Zhu Han

    Abstract: With the advancement in technology and the expansion of broadcasting, cross-media retrieval has gained much attention. It plays a significant role in big data applications and consists in searching and finding data from different types of media. In this paper, we provide a novel taxonomy according to the challenges faced by multi-modal deep learning approaches in solving cross-media retrieval, nam… ▽ More

    Submitted 21 July, 2020; originally announced August 2020.

    Comments: arXiv admin note: text overlap with arXiv:1804.09539 by other authors

  15. arXiv:2004.02758  [pdf, other

    cs.CV cs.LG eess.IV stat.ML

    Towards Detection of Sheep Onboard a UAV

    Authors: Farah Sarwar, Anthony Griffin, Saeed Ur Rehman, Timotius Pasang

    Abstract: In this work we consider the task of detecting sheep onboard an unmanned aerial vehicle (UAV) flying at an altitude of 80 m. At this height, the sheep are relatively small, only about 15 pixels across. Although deep learning strategies have gained enormous popularity in the last decade and are now extensively used for object detection in many fields, state-of-the-art detectors perform poorly in th… ▽ More

    Submitted 18 March, 2020; originally announced April 2020.

    Comments: This was accepted for publication and presentation at the Embedded AI for Real-time Machine Vision 2019 in conjunction with the British Machine Vision Conference (BMVC) 2019. It was presented on 12 September 2019 in Cardiff, Wales. 10 pages, 3 figures, and 1 table, note that this is a web-friendly format as used at BMVC, so the pages are about A5 size (but not exactly!)

  16. arXiv:1906.10852  [pdf, other

    cs.NE

    Water Preservation in Soan River Basin using Deep Learning Techniques

    Authors: Sadaqat ur Rehman, Zhongliang Yang, Muhammad Shahid, Nan Wei, Yongfeng Huang, Muhammad Waqas, Shanshan Tu, Obaid ur Rehman

    Abstract: Water supplies are crucial for the development of living beings. However, change in the hydrological process i.e. climate and land usage are the key issues. Sustaining water level and accurate estimating for dynamic conditions is a critical job for hydrologists, but predicting hydrological extremes is an open issue. In this paper, we proposed two deep learning techniques and three machine learning… ▽ More

    Submitted 26 June, 2019; originally announced June 2019.

    Comments: 14 pages

  17. arXiv:1905.13447  [pdf, other

    cs.CR

    Comparative Analysis of State-of-the-Art EDoS Mitigation Techniques in Cloud Computing Environment

    Authors: Parminder Singh, Shafiq Ul Rehman, Selvakumar Manickam

    Abstract: A new variant of the DDoS attack, called Economic Denial of Sustainability attack has emerged. Since the cloud service is based on the pay-per-use model, the EDoS attack endeavors to scale up the resource usage over time to the point the purveyor of the server is financially incapable of sustaining the service due to the incurred unaffordable usage charges. The implication of the EDoS attack is a… ▽ More

    Submitted 11 June, 2019; v1 submitted 31 May, 2019; originally announced May 2019.

    Comments: Anomaly Detection Techniques, Cloud Computing, DDoS Attack, EDoS Attack, Mitigation Techniques, Security Threats

  18. A finiteness condition on quasi-local overrings of a class of pinched domains

    Authors: Shafiq ur Rehman, Sehrish Bibi, Rubab Gull

    Abstract: An integral domain is called {\em Globalized multiplicatively pinched-Dedekind domain $($GMPD domain$)$} if every nonzero non-invertible ideal can be written as $JP_1\cdots P_k$ with $J$ invertible ideal and $P_1,...,P_k$ distinct ideals which are maximal among the nonzero non-invertible ideals, cf. \cite{DumII}. The GMPD domains with only finitely many overrings have been recently studied in \cit… ▽ More

    Submitted 15 June, 2019; v1 submitted 24 November, 2018; originally announced November 2018.

    MSC Class: Primary 13A15; Secondary 13F05

    Journal ref: JP Journal of Algebra, Number Theory and Applications,Volume 45, Issue 1, Pages 55 - 66 (January 2020)

  19. arXiv:1706.02430  [pdf

    cs.CV

    Image Captioning with Object Detection and Localization

    Authors: Zhongliang Yang, Yu-** Zhang, Sadaqat ur Rehman, Yongfeng Huang

    Abstract: Automatically generating a natural language description of an image is a task close to the heart of image understanding. In this paper, we present a multi-model neural network method closely related to the human visual system that automatically learns to describe the content of images. Our model consists of two sub-models: an object detection and localization model, which extract the information o… ▽ More

    Submitted 7 June, 2017; originally announced June 2017.

  20. arXiv:1703.00709  [pdf, ps, other

    math.CO

    On automorphisms and fixing number of co-normal product of graphs

    Authors: Shahid ur Rehman, Muhammad Imran, Imran Javaid

    Abstract: An automorphism of a graph describes its structural symmetry and the concept of fixing number of a graph is used for breaking its symmetries (except the trivial one). In this paper, we evaluate automorphisms of the co-normal product graph $G_1\ast G_2$ of two simple graphs $G_1$ and $G_2$ and give sharp bounds on the order of its automorphism group. We study the fixing number of $G_1\ast G_2$ and… ▽ More

    Submitted 10 February, 2023; v1 submitted 2 March, 2017; originally announced March 2017.

    Comments: 15 pages

    MSC Class: 05C25; 05C76

  21. Order divisor graphs of finite groups

    Authors: Shafiq Ur Rehman, Abdul Qudair Baig, Muhammad Imran, Zia Ullah Khan

    Abstract: The interplay between groups and graphs have been the most famous and productive area of algebraic graph theory. In this paper, we introduce and study the graphs whose vertex set is group G such that two distinct vertices a and b having different orders are adjacent provided that o(a) divides o(b) or o(b) divides o(a).

    Submitted 22 July, 2017; v1 submitted 14 November, 2016; originally announced November 2016.

    Comments: 10 pages, 5 figures

    MSC Class: 05C25

    Journal ref: Analele Stiintifice ale Universitatii Ovidius Constanta, Seria Matematica 26(3):29-40, 2018

  22. A note on a characterization theorem for a certain class of domains

    Authors: Shafiq ur Rehman

    Abstract: We have introduced and studied in [3] the class of Globalized multiplicatively pinched-Dedekind domains (GMPD domains). This class of domains could be characterized by a certain factorization property of the non-invertible ideals, (see [3, Theorem 4]). In this note a simplification of the characterization theorem [3, Theorem 4] is provided in more general form.

    Submitted 2 October, 2016; originally announced October 2016.

    MSC Class: Primary 13A15; Secondary 13F05

    Journal ref: Miskolc Mathematical Notes, 18 (2017)

  23. arXiv:1506.08966  [pdf

    cs.IR cs.DL

    Classification of Research Citations (CRC)

    Authors: Bilal Hayat Butt, Muhammad Rafi, Arsal Jamal, Raja Sami Ur Rehman, Syed Muhammad Zubair Alam, Muhammad Bilal Alam

    Abstract: Research is a continuous phenomenon. It is recursive in nature. Every research is based on some earlier research outcome. A general approach in reviewing the literature for a problem is to categorize earlier work for the same problem as positive and negative citations. In this paper, we propose a novel automated technique, which classifies whether an earlier work is cited as sentiment positive or… ▽ More

    Submitted 30 June, 2015; originally announced June 2015.

  24. arXiv:1504.06359  [pdf

    cs.HC

    Preprint Touch-less Interactive Augmented Reality Game on Vision Based Wearable Device

    Authors: Zhihan Lv, Alaa Halawani, Shengzhong Feng, Shafiq ur Rehman, Haibo Li

    Abstract: This is the preprint version of our paper on Personal and Ubiquitous Computing. There is an increasing interest in creating pervasive games based on emerging interaction technologies. In order to develop touch-less, interactive and augmented reality games on vision-based wearable device, a touch-less motion interaction technology is designed and evaluated in this work. Users interact with the augm… ▽ More

    Submitted 7 September, 2015; v1 submitted 23 April, 2015; originally announced April 2015.

    Comments: This is the preprint version of our paper on Personal and Ubiquitous Computing

    ACM Class: H.5.1

  25. arXiv:1409.2486  [pdf

    cs.NI

    Performance Evaluation of HEVC over Broadband Networks

    Authors: Saeed ur Rehman, Gulistan Raja

    Abstract: High efficiency video coding is the current trend setting standard for coding and transmission of video content. This standard has brought in many improvements over its predecessor H264 standard. In this paper, performance evaluation of transmitting HEVC content over the simulated network environment for disaster and calamity stricken area has been under taken. In the simulation the transmitted vi… ▽ More

    Submitted 8 September, 2014; originally announced September 2014.

    Comments: IJCSI International Journal of Computer Science Issues, Vol. 11, Issue 4, No 1, July 2014 ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784

  26. arXiv:1203.3103  [pdf

    cs.CR cs.NI

    Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)

    Authors: Sadaqat Ur Rehman, Muhammad Bilal, Basharat Ahmad, Khawaja Muhammad Yahya, Anees Ullah, Obaid Ur Rehman

    Abstract: Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) kee** in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetr… ▽ More

    Submitted 14 March, 2012; originally announced March 2012.

    Comments: 6 Pages, International Journal of Computer Science issues 2012