Skip to main content

Showing 1–8 of 8 results for author: Hafeez, A

Searching in archive cs. Search in all archives.
.
  1. Depth Estimation using Weighted-loss and Transfer Learning

    Authors: Muhammad Adeel Hafeez, Michael G. Madden, Ganesh Sistu, Ihsan Ullah

    Abstract: Depth estimation from 2D images is a common computer vision task that has applications in many fields including autonomous vehicles, scene understanding and robotics. The accuracy of a supervised depth estimation method mainly relies on the chosen loss function, the model architecture, quality of data and performance metrics. In this study, we propose a simplified and adaptable approach to improve… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

  2. arXiv:2208.10651  [pdf, other

    cs.CR cs.LG

    ECU Identification using Neural Network Classification and Hyperparameter Tuning

    Authors: Kunaal Verma, Mansi Girdhar, Azeem Hafeez, Selim S. Awad

    Abstract: Intrusion detection for Controller Area Network (CAN) protocol requires modern methods in order to compete with other electrical architectures. Fingerprint Intrusion Detection Systems (IDS) provide a promising new approach to solve this problem. By characterizing network traffic from known ECUs, hazardous messages can be discriminated. In this article, a modified version of Fingerprint IDS is empl… ▽ More

    Submitted 22 August, 2022; originally announced August 2022.

    Comments: 6 pages, 12 figures

  3. arXiv:2003.14395  [pdf

    eess.IV cs.CV cs.LG

    COVID-ResNet: A Deep Learning Framework for Screening of COVID19 from Radiographs

    Authors: Muhammad Farooq, Abdul Hafeez

    Abstract: In the last few months, the novel COVID19 pandemic has spread all over the world. Due to its easy transmission, develo** techniques to accurately and easily identify the presence of COVID19 and distinguish it from other forms of flu and pneumonia is crucial. Recent research has shown that the chest Xrays of patients suffering from COVID19 depicts certain abnormalities in the radiography. However… ▽ More

    Submitted 31 March, 2020; originally announced March 2020.

    Comments: 6 pages, 3 Figures,

    MSC Class: 68T10 ACM Class: I.2.1; I.4.9

  4. arXiv:1904.03391  [pdf, other

    cs.CV cs.LG stat.ML

    KNN and ANN-based Recognition of Handwritten Pashto Letters using Zoning Features

    Authors: Sulaiman Khan, Hazrat Ali, Zahid Ullah, Nasru Minallah, Shahid Maqsood, Abdul Hafeez

    Abstract: This paper presents a recognition system for handwritten Pashto letters. However, handwritten character recognition is a challenging task. These letters not only differ in shape and style but also vary among individuals. The recognition becomes further daunting due to the lack of standard datasets for inscribed Pashto letters. In this work, we have designed a database of moderate size, which encom… ▽ More

    Submitted 8 June, 2019; v1 submitted 6 April, 2019; originally announced April 2019.

    Comments: (IJACSA) International Journal of Advanced Computer Science and Applications,

    Journal ref: International Journal of Advanced Computer Science and Applications (IJACSA), 9(10), June 2018

  5. arXiv:1801.09011  [pdf

    cs.CR cs.NI

    Linking Received Packet to the Transmitter Through Physical-Fingerprinting of Controller Area Network

    Authors: Omid Avatefipour, Azeem Hafeez, Muhammad Tayyab, Hafiz Malik

    Abstract: The Controller Area Network (CAN) bus serves as a legacy protocol for in-vehicle data communication. Simplicity, robustness, and suitability for real-time systems are the salient features of the CAN bus protocol. However, it lacks the basic security features such as massage authentication, which makes it vulnerable to the spoofing attacks. In a CAN network, linking CAN packet to the sender node is… ▽ More

    Submitted 26 January, 2018; originally announced January 2018.

    Comments: 6 pages, 5 figures, 9th IEEE International Workshop on Information Forensics and Security (WIFS 2017

  6. arXiv:1309.1818  [pdf

    cs.NI

    Error-Rate Performance Analysis of Wireless Sensor Networks over Fading Channels

    Authors: Haider Mehdi, Safeeullah Soomro, W. R. Khan, Abdul Ghafoor Memon, Abdul Hafeez

    Abstract: In this paper, we analyze the bit-error-rate (BER) performance of wireless sensor networks. A wireless sensor node with a single transmitter antenna and multiple receiver antennas is considered here. We consider M (M greater or equal ro 1) receiver antennas to mitigate channel fading effects. BER performance is analyzed in the presence of a co-channel interference source. Wireless channel is assum… ▽ More

    Submitted 7 September, 2013; originally announced September 2013.

    Comments: Four figures

    Journal ref: SURJ (Science Series) Volume 45 Pages 177-182 (2013)

  7. arXiv:1303.5190  [pdf, ps, other

    cs.NI

    Energy Consumption Rate based Stable Election Protocol (ECRSEP) for WSNs

    Authors: O. Rehman, N. Javaid, B. Manzoor, A. Hafeez, A. Iqbal, M. Ishfaq

    Abstract: In recent few yearsWireless Sensor Networks (WSNs) have seen an increased interest in various applications like border field security, disaster management and medical applications. So large number of sensor nodes are deployed for such applications, which can work autonomously. Due to small power batteries in WSNs, efficient utilization of battery power is an important factor. Clustering is an effi… ▽ More

    Submitted 21 March, 2013; originally announced March 2013.

    Journal ref: International Workshop on Body Area Sensor Networks (BASNet-2013) in conjunction with 4th International Conference on Ambient Systems, Networks and Technologies (ANT 2013), 2013, Halifax, Nova Scotia, Canada

  8. arXiv:1211.2502  [pdf

    cs.CV

    New Edge Detection Technique based on the Shannon Entropy in Gray Level Images

    Authors: Mohamed A. El-Sayed, Tarek Abd-El Hafeez

    Abstract: Edge detection is an important field in image processing. Edges characterize object boundaries and are therefore useful for segmentation, registration, feature extraction, and identification of objects in a scene. In this paper, an approach utilizing an improvement of Baljit and Amar method which uses Shannon entropy other than the evaluation of derivatives of the image in detecting edges in gray… ▽ More

    Submitted 11 November, 2012; originally announced November 2012.

    MSC Class: 94A17; 68U10; 94A08

    Journal ref: International Journal on Computer Science and Engineering (IJCSE), Vol. 3 No. 6, 2011, 2224-2232