Papers by Muhammad Alyas Shahid
Muhammad Alyas Shahid Department of Computer Science, COMSATS Institute of Information Technology... more Muhammad Alyas Shahid Department of Computer Science, COMSATS Institute of Information Technology, Wah Cantt Email : [email protected] Aisha Azeem Department of Computer Science, COMSATS Institute of Information Technology, Wah Cantt Email : [email protected] --------------------------------------------------------------------ABSTRACT------------------------------------------------------------In this paper Wifi based system is described for disseminating traffic information in vehicular networks. Basic aim of this approach is to distribute information regarding the traffic conditions such as traffic congestions or safety warnings to vehicles in an effective way.
International Journal of Computer Network and Information Security, 2017
As the mobile devices are widely used in this world. With the increasing number of users, the num... more As the mobile devices are widely used in this world. With the increasing number of users, the numbers of customized applications are also introduced for these users according to their own requirements but on the other hand, there is a dire need of a system which must be energy conserved, estimated and maintained. A survey of energy consumption in mobile phones is presented in this paper with the factors at which the consumption of the energy depends on i.e. Energy consumed by OS, by hardware, by applications, by the user to interact with the applications, by wireless, by the sensor network. The energy management models and frameworks are also discussed in this paper.

International Journal of Advanced Networking Applications, 2018
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images ... more Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.

Journal of Engineering Science and Technology Review, 2017
Face recognition has gained a significant position among most commonly used applications of image... more Face recognition has gained a significant position among most commonly used applications of image processing furthermore availability of viable technologies in this field have contributed a great deal to it. In spite of rapid progress in this field it still has to overcome various challenges like Aging, Partial Occlusion, and Facial Expressions etc affecting the performance of the system, are covered in first part of the survey. This part also highlights the most commonly used databases, available as a standard for face recognition tests. AT & T, AR Database, FERET, ORL and Yale Database have been outlined here. While in the second part of this survey a detailed overview of some important existing methods which are used to dealing the issues of face recognition have been presented. Said methods include Eigenface, Neural Network (NN), Support Vector Machine (SVM), Gabor Wavelet and Hidden Markov Model (HMM). While in last part of the survey several applications of a face recognition system such as video surveillance, Access Control, and Pervasive Computing has been discussed.

The Smart Computing Review, 2015
Cloud computing a new recently emerged environment for the hosting and delivery of IT services ov... more Cloud computing a new recently emerged environment for the hosting and delivery of IT services over a network typically includes on-demand, reliable, customized, self service computing environment guarantees dynamic access and quality of service for end users. This computing paradigm introduces many changes with flexible and dynamically scalable pools of often virtualized resources. With these multitudinous benefits and characteristics, a cloud system can prospectively perk up information technology and encourage business to work on, and invest in new alternate computing system. It offers a quick start, flexibility, scalability and cost-effectiveness for hosting and expanding resources but new threats and opportunities for exploitation are introduced requiring essential values and control policies to guide the protection and safety of systems and data. The cloud computing environment also provides opportunities to share resources, information and services among the peoples of the world. With all the advantages of cloud computing, there are a few limitations with respect to data security and quality of service, because this environment brings new security issues, challenges and threats. Management must understand and analyze the risks of this new and emerging paradigm of cloud in order to protect and secure the system, resources and data from exploitation. This paper focuses on cloud computing Security Models, Security Architecture, risks, issues, threats and challenges of security to any cloud computing environment.

Journal of Engineering Science and Technology Review, 2017
Image fusion is an approach which is used to amalgamate the corresponding features in a sequence ... more Image fusion is an approach which is used to amalgamate the corresponding features in a sequence of input images to a single composite image that preserves all the significant features of the input images. Image fusion is also known as pansharpening. It is a method which is used to integrate and add the geometric detail of a high-resolution panchromatic (Pan) image and the information of color of a low-resolution multispectral (MS) image for the production of a high-resolution MS image. This methodology is mainly most important and significant for any large-scale applications. Image fusion classification based on its systems (models and algorithms) are considered and overviewed in this survey. The basic two algorithms categories are analyzed and compared to each other, in the analysis and discussion section the major points to be considered while performing image fusion are highlighted.
Uploads
Papers by Muhammad Alyas Shahid