Skip to main content

Showing 1–4 of 4 results for author: Aalsalem, M Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:1806.11386  [pdf

    cs.CY

    Ethical Aspects of Internet of Things from Islamic Perspective

    Authors: Wazir Zada Khan, Mohammed Zahid, Mohammed Y Aalsalem, Hussein Mohammed Zangoti, Quratulain Arshad

    Abstract: The Internet of Things (IoTs) is an evolving new face of technology that provides state of the art services using ubiquitously connected smart objects. These smart objects are capable of sensing, processing, collaborating, communicating the events and provide services. The IoT is a collection of heterogeneous technologies like Sensor, RFID, Communication and nanotechnology. These technologies enab… ▽ More

    Submitted 29 June, 2018; originally announced June 2018.

    Comments: 4 pages, 3 figures, 9th IEEE-GCC Conference & Exhibition - 2017

  2. arXiv:1210.0153  [pdf

    cs.CV cs.RO

    A Low Cost Vision Based Hybrid Fiducial Mark Tracking Technique for Mobile Industrial Robots

    Authors: Mohammed Y Aalsalem, Wazir Zada Khan, Quratul Ain Arshad

    Abstract: The field of robotic vision is develo** rapidly. Robots can react intelligently and provide assistance to user activities through sentient computing. Since industrial applications pose complex requirements that cannot be handled by humans, an efficient low cost and robust technique is required for the tracking of mobile industrial robots. The existing sensor based techniques for mobile robot tra… ▽ More

    Submitted 29 September, 2012; originally announced October 2012.

    Comments: 6 pages, 7 figures

    Journal ref: IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 2, July 2012 ISSN (Online): 1694-0814 www.IJCSI.org

  3. arXiv:1110.3844  [pdf

    cs.CR

    A Graphical Password Based System for Small Mobile Devices

    Authors: Wazir Zada Khan, Mohammed Y. Aalsalem, Yang Xiang

    Abstract: Passwords provide security mechanism for authentication and protection services against unwanted access to resources. A graphical based password is one promising alternatives of textual passwords. According to human psychology, humans are able to remember pictures easily. In this paper, we have proposed a new hybrid graphical password based system, which is a combination of recognition and recall… ▽ More

    Submitted 17 October, 2011; originally announced October 2011.

    Comments: 10 Pages, 7 figures, 1 Table

    Journal ref: IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No 2, 2011, 145-154

  4. arXiv:1109.6199  [pdf

    cs.OH

    The Aware Cricket Ground

    Authors: Wazir Zada Khan, Mohammed Y. Aalsalem, Quratul Ain Arshad

    Abstract: The most profound technologies are those that disappear. They weave themselves into fabrics of everyday life until they are indistinguishable from it [1]. This research work is a mere effort for automated decision making during sports of most common interest leveraging ubiquitous computing. Primarily cricket has been selected for the first implementation of the idea. A positioning system is used f… ▽ More

    Submitted 28 September, 2011; originally announced September 2011.

    Comments: 5 pages, 5 figure

    Journal ref: IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 2, July 2011