Skip to main content

Showing 1–15 of 15 results for author: Noor, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.14370  [pdf, other

    cs.CV

    Enhanced Bank Check Security: Introducing a Novel Dataset and Transformer-Based Approach for Detection and Verification

    Authors: Muhammad Saif Ullah Khan, Tahira Shehzadi, Rabeya Noor, Didier Stricker, Muhammad Zeshan Afzal

    Abstract: Automated signature verification on bank checks is critical for fraud prevention and ensuring transaction authenticity. This task is challenging due to the coexistence of signatures with other textual and graphical elements on real-world documents. Verification systems must first detect the signature and then validate its authenticity, a dual challenge often overlooked by current datasets and meth… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

    Comments: Accepted for publication in 16th IAPR International Workshop on Document Analysis Systems 2024

  2. arXiv:2310.11651  [pdf, other

    eess.SY cs.CR

    US Microelectronics Packaging Ecosystem: Challenges and Opportunities

    Authors: Rouhan Noor, Himanandhan Reddy Kottur, Patrick J Craig, Liton Kumar Biswas, M Shafkat M Khan, Nitin Varshney, Hamed Dalir, Elif Akçalı, Bahareh Ghane Motlagh, Charles Woychik, Yong-Kyu Yoon, Navid Asadizanjani

    Abstract: The semiconductor industry is experiencing a significant shift from traditional methods of shrinking devices and reducing costs. Chip designers actively seek new technological solutions to enhance cost-effectiveness while incorporating more features into the silicon footprint. One promising approach is Heterogeneous Integration (HI), which involves advanced packaging techniques to integrate indepe… ▽ More

    Submitted 30 October, 2023; v1 submitted 17 October, 2023; originally announced October 2023.

    Comments: 22 pages, 8 figures

  3. arXiv:2308.00215  [pdf, other

    cs.CY

    From Talent Shortage to Workforce Excellence in the CHIPS Act Era: Harnessing Industry 4.0 Paradigms for a Sustainable Future in Domestic Chip Production

    Authors: Aida Damanpak Rizi, Antika Roy, Rouhan Noor, Hyo Kang, Nitin Varshney, Katja Jacob, Sindia Rivera-Jimenez, Nathan Edwards, Volker J. Sorger, Hamed Dalir, Navid Asadizanjani

    Abstract: The CHIPS Act is driving the U.S. towards a self-sustainable future in domestic chip production. Decades of outsourced manufacturing, assembly, testing, and packaging has diminished the workforce ecosystem, imposing major limitations on semiconductor companies racing to build new fabrication sites as part of the CHIPS Act. In response, a systemic alliance between academic institutions, the industr… ▽ More

    Submitted 31 July, 2023; originally announced August 2023.

    Comments: 18 pages, 8 figures

  4. arXiv:2107.14140  [pdf

    cs.CR

    Methodology and Analysis of Smart Contracts in Blockchain-Based International Trade Application

    Authors: Asif Bhat, Rizal Mohd Nor, Md Amiruzzaman, Md. Rajibul Islam

    Abstract: Blokchain is used in a variety of applications where trustworthy computing is re-quired. Trade finance is one of these areas that would benefit immensely from a decentralized way of doing transactions. This paper presents the preliminary as-sessment of Accepire-BT, a software platform developed for the practice of col-laborative Trade Finance. The proposed solution is enforced by smart contracts u… ▽ More

    Submitted 27 April, 2022; v1 submitted 14 July, 2021; originally announced July 2021.

    Comments: 10 pages, 2 figures, and 1 table. Preprint: submitted to Information and Communication Technology Journals

  5. arXiv:2106.04575  [pdf, other

    cs.CR

    DNS attack mitigation Using OpenStack Isolation

    Authors: Hassnain ul hassan, Rizal Mohd Nor, Md Amiruzzaman, Sharyar Wani, Md. Rajibul Islam

    Abstract: The Domain Name System (DNS) is essential for the Internet, giving a mechanism to resolve hostnames into Internet Protocol (IP) addresses. DNS is known as the world's largest distributed database that manages hostnames and Internet Protocol. By having the DNS, only simple names that can be easily memorized will be used and then the domain name system will map it into the numeric Internet Protocol… ▽ More

    Submitted 28 August, 2021; v1 submitted 8 June, 2021; originally announced June 2021.

    Comments: 6 pages, 3 figures, and 2 tables

  6. DistB-Condo: Distributed Blockchain-based IoT-SDN Model for Smart Condominium

    Authors: Anichur Rahman, Md. Jahidul Islam, Ziaur Rahman, Md. Mahfuz Reza, Adnan Anwar, M. A. Parvez Mahmud, Mostofa Kamal Nasir, Rafidah Md Noor

    Abstract: Condominium network refers to intra-organization networks, where smart buildings or apartments are connected and share resources over the network. Secured communication platform or channel has been highlighted as a key requirement for a reliable condominium which can be ensured by the utilization of the advanced techniques and platforms like Software-Defined Network (SDN), Network Function Virtual… ▽ More

    Submitted 17 December, 2020; originally announced December 2020.

    Comments: 17 Pages, 12 Tables, 17 Figures

    ACM Class: H.1.1

    Journal ref: EEE Access, vol. 8, pp. 209594-209609, 2020

  7. arXiv:2007.10812  [pdf

    eess.IV cs.CV

    Anomaly Detection in Unsupervised Surveillance Setting Using Ensemble of Multimodal Data with Adversarial Defense

    Authors: Sayeed Shafayet Chowdhury, Kaji Mejbaul Islam, Rouhan Noor

    Abstract: Autonomous aerial surveillance using drone feed is an interesting and challenging research domain. To ensure safety from intruders and potential objects posing threats to the zone being protected, it is crucial to be able to distinguish between normal and abnormal states in real-time. Additionally, we also need to consider any device malfunction. However, the inherent uncertainty embedded within t… ▽ More

    Submitted 17 July, 2020; originally announced July 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:2006.03733

  8. arXiv:2006.03733  [pdf

    cs.CV cs.LG eess.IV

    Unsupervised Abnormality Detection Using Heterogeneous Autonomous Systems

    Authors: Sayeed Shafayet Chowdhury, Kazi Mejbaul Islam, Rouhan Noor

    Abstract: Anomaly detection (AD) in a surveillance scenario is an emerging and challenging field of research. For autonomous vehicles like drones or cars, it is immensely important to distinguish between normal and abnormal states in real-time. Additionally, we also need to detect any device malfunction. But the nature and degree of abnormality may vary depending upon the actual environment and adversary. A… ▽ More

    Submitted 14 July, 2020; v1 submitted 5 June, 2020; originally announced June 2020.

  9. Hide Secret Information in Blocks: Minimum Distortion Embedding

    Authors: Md Amiruzzaman, Rizal Mohd Nor

    Abstract: In this paper, a new steganographic method is presented that provides minimum distortion in the stego image. The proposed encoding algorithm focuses on DCT rounding error and optimizes that in a way to reduce distortion in the stego image, and the proposed algorithm produces less distortion than existing methods (e.g., F5 algorithm). The proposed method is based on DCT rounding error which helps t… ▽ More

    Submitted 16 March, 2020; originally announced March 2020.

    Comments: This paper is accepted for publication in IEEE SPIN 2020 conference

    Journal ref: 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN)

  10. Process migration-based computational offloading framework for IoT-supported mobile edge/cloud computing

    Authors: Abdullah Yousafzai, Ibrar Yaqoob, Muhammad Imran, Abdullah Gani, Rafidah Md Noor

    Abstract: Mobile devices have become an indispensable component of Internet of Things (IoT). However, these devices have resource constraints in processing capabilities, battery power, and storage space, thus hindering the execution of computation-intensive applications that often require broad bandwidth, stringent response time, long battery life, and heavy computing power. Mobile cloud computing and mobil… ▽ More

    Submitted 24 September, 2019; originally announced September 2019.

    Comments: IoT, Edge Computing, Computational Offloading Framework, 2 Algorithms one for resource constraint client and another for edge server, and a unique and easy to setup real IoT testbed idea using of the shelf smartphones, 12 pages, 12 figures

    ACM Class: C.2

  11. Adaptive Beaconing Approaches for Vehicular ad hoc Networks: A Survey

    Authors: Syed Adeel Ali Shah, Ejaz Ahmed, Feng Xia, Ahmad Karim, Muhammad Shiraz, Rafidah MD Noor

    Abstract: Vehicular communication requires vehicles to self-organize through the exchange of periodic beacons. Recent analysis on beaconing indicates that the standards for beaconing restrict the desired performance of vehicular applications. This situation can be attributed to the quality of the available transmission medium, persistent change in the traffic situation and the inability of standards to cope… ▽ More

    Submitted 24 May, 2016; originally announced May 2016.

  12. arXiv:1605.04069  [pdf

    cs.DC

    Availability Aware Continuous Replica Placement Problem

    Authors: Abdullah Yousafzai, Abdullah Gani, Rafidah Md Noor

    Abstract: Replica placement (RP) intended at producing a set of duplicated data items across the nodes of a distributed system in order to optimize fault tolerance, availability, system performance load balancing. Typically, RP formulations employ dynamic methods to change the replica placement in the system potentially upon user request profile. Continuous Replica Placement Problem (CRPP) is an extension o… ▽ More

    Submitted 13 May, 2016; originally announced May 2016.

  13. arXiv:1207.3943  [pdf

    cs.NI

    A Taxonomy for Congestion Control Algorithms in Vehicular Ad Hoc Networks

    Authors: Mohammad Reza Jabbarpour Sattari, Rafidah Md Noor, Hassan Keshavarz

    Abstract: One of the main criteria in Vehicular Ad hoc Networks (VANETs) that has attracted the researchers' consideration is congestion control. Accordingly, many algorithms have been proposed to alleviate the congestion problem, although it is hard to find an appropriate algorithm for applications and safety messages among them. Safety messages encompass beacons and event-driven messages. Delay and reliab… ▽ More

    Submitted 17 July, 2012; originally announced July 2012.

  14. arXiv:1205.0480  [pdf

    cs.NI

    Session Initiation Protocol Attacks and Challenges

    Authors: Hassan Keshavarz, Mohammad Reza Jabbarpour Sattari, Rafidah Md Noor

    Abstract: In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are disc… ▽ More

    Submitted 2 May, 2012; originally announced May 2012.

  15. arXiv:1002.4047  [pdf

    cs.CR

    Intrusion Detection System: Overview

    Authors: Hamdan. O. Alanazi, Rafidah Md Noor, B. B Zaidan, A. A Zaidan

    Abstract: Network Intrusion Detection (NID) is the process of identifying network activity that can lead to the compromise of a security policy. In this paper, we will look at four intrusion detection approaches, which include ANN or Artificial Neural Network, SOM, Fuzzy Logic and SVM. ANN is one of the oldest systems that have been used for Intrusion Detection System (IDS), which presents supervised lear… ▽ More

    Submitted 21 February, 2010; originally announced February 2010.

    Journal ref: Journal of Computing, Volume 2, Issue 2, February 2010, https://sites.google.com/site/journalofcomputing/