Skip to main content

Showing 1–3 of 3 results for author: Baba, A I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.16937  [pdf, other

    cs.CV cs.LG

    Segmentation and Characterization of Macerated Fibers and Vessels Using Deep Learning

    Authors: Saqib Qamar, Abu Imran Baba, Stéphane Verger, Magnus Andersson

    Abstract: Wood comprises different cell types, such as fibers, tracheids and vessels, defining its properties. Studying cells' shape, size, and arrangement in microscopy images is crucial for understanding wood characteristics. Typically, this involves macerating (soaking) samples in a solution to separate cells, then spreading them on slides for imaging with a microscope that covers a wide area, capturing… ▽ More

    Submitted 18 June, 2024; v1 submitted 30 January, 2024; originally announced January 2024.

    Comments: 7 figures

    ACM Class: I.5.1

  2. arXiv:2201.05399  [pdf, other

    cs.CR cs.SE

    Model-Based Framework for exploiting sensors of IoT devices using a Botnet: A case study with Android

    Authors: Zubair Khaliq, Dawood Ashraf Khan, Asif Iqbal Baba, Shahbaz Ali, Sheikh Umar Farooq

    Abstract: Botnets have become a serious security threat not only to the Internet but also to the devices connected to it. Factors like the exponential growth of IoT, the COVID-19 pandemic that's swee** the planet, and the ever-larger number of cyber-criminals who now have access to or have developed increasingly more sophisticated tools are incentivizing the growth of botnets in this domain. The recent ou… ▽ More

    Submitted 14 January, 2022; originally announced January 2022.

  3. Application Specific Drone Simulators: Recent Advances and Challenges

    Authors: Aakif Mairaj, Asif I. Baba, Ahmad Y. Javaid

    Abstract: Over the past two decades, Unmanned Aerial Vehicles (UAVs), more commonly known as drones, have gained a lot of attention, and are rapidly becoming ubiquitous because of their diverse applications such as surveillance, disaster management, pollution monitoring, film-making, and military reconnaissance. However, incidents such as fatal system failures, malicious attacks, and disastrous misuses have… ▽ More

    Submitted 1 February, 2019; originally announced February 2019.