Skip to main content

Showing 1–20 of 20 results for author: Muhammad, K

  1. arXiv:2407.11020  [pdf, ps, other

    cs.NI cs.GR

    Enhancing Vehicular Networks with Generative AI: Opportunities and Challenges

    Authors: Teef David, Kassi Muhammad, Kevin Nassisid, Bronny Farus

    Abstract: In the burgeoning field of intelligent transportation systems, the integration of Generative Artificial Intelligence (AI) into vehicular networks presents a transformative potential for the automotive industry. This paper explores the innovative applications of generative AI in enhancing communication protocols, optimizing traffic management, and bolstering security frameworks within vehicular net… ▽ More

    Submitted 30 June, 2024; originally announced July 2024.

  2. arXiv:2407.09766  [pdf, ps, other

    cs.MM cs.NI

    User Digital Twin-Driven Video Streaming for Customized Preferences and Adaptive Transcoding

    Authors: Stephen Jimmy, Kalkidan Berhane, Kevin Muhammad

    Abstract: In the rapidly evolving field of multimedia services, video streaming has become increasingly prevalent, demanding innovative solutions to enhance user experience and system efficiency. This paper introduces a novel approach that integrates user digital twins-a dynamic digital representation of a user's preferences and behaviors-with traditional video streaming systems. We explore the potential of… ▽ More

    Submitted 13 July, 2024; originally announced July 2024.

  3. arXiv:2407.05436  [pdf, ps, other

    cs.NI cs.GR

    Adaptive Video Streaming over 6G Networks: Buffer Control and User Behavior Analysis

    Authors: Kevin Nassisid, Teef David, Kassi Muhammad

    Abstract: This paper delves into the synergistic potential of adaptive video streaming over emerging 6G wireless networks, emphasizing innovative buffer control techniques and detailed analysis of user viewing behaviors. As 6G technology heralds a new era with significantly enhanced capabilities including higher bandwidths, lower latencies, and increased connection densities, it is poised to fundamentally t… ▽ More

    Submitted 7 July, 2024; originally announced July 2024.

  4. arXiv:2407.00552  [pdf, ps, other

    cs.NI cs.GR

    Efficient Resource Management in Multicast Short Video Streaming Systems

    Authors: Betty Searcy, Zurh Farus, Bronny Bush, Kevin Muhammad, Zubair Clinton

    Abstract: The surge in popularity of short-form video content, particularly through platforms like TikTok and Instagram, has led to an exponential increase in data traffic, presenting significant challenges in network resource management. Traditional unicast streaming methods, while straightforward, are inefficient in scenarios where videos need to be delivered to a large number of users simultaneously. Mul… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

  5. arXiv:2407.00513  [pdf, ps, other

    cs.NI cs.GR

    Dynamic Optimization of Video Streaming Quality Using Network Digital Twin Technology

    Authors: Zurh Farus, Betty Searcy, Tina Nassisid, Kevin Muhammad

    Abstract: This paper introduces a novel dynamic optimization framework for video streaming that leverages Network Digital Twin (NDT) technology to address the challenges posed by fluctuating wireless network conditions. Traditional adaptive streaming methods often struggle with rapid changes in network bandwidth, latency, and packet loss, leading to suboptimal user experiences characterized by frequent buff… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

  6. arXiv:2406.17112  [pdf, ps, other

    cs.LG cs.GR cs.NI

    Integrating Generative AI with Network Digital Twins for Enhanced Network Operations

    Authors: Kassi Muhammad, Teef David, Giulia Nassisid, Tina Farus

    Abstract: As telecommunications networks become increasingly complex, the integration of advanced technologies such as network digital twins and generative artificial intelligence (AI) emerges as a pivotal solution to enhance network operations and resilience. This paper explores the synergy between network digital twins, which provide a dynamic virtual representation of physical networks, and generative AI… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

  7. Item Graph Convolution Collaborative Filtering for Inductive Recommendations

    Authors: Edoardo D'Amico, Khalil Muhammad, Elias Tragos, Barry Smyth, Neil Hurley, Aonghus Lawlor

    Abstract: Graph Convolutional Networks (GCN) have been recently employed as core component in the construction of recommender system algorithms, interpreting user-item interactions as the edges of a bipartite graph. However, in the absence of side information, the majority of existing models adopt an approach of randomly initialising the user embeddings and optimising them throughout the training process. T… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

    Journal ref: LNCS,volume 13980, pp 249-263, 2023

  8. arXiv:2204.10282  [pdf

    cs.NI cs.CY

    AI-Empowered Data Offloading in MEC-Enabled IoV Networks

    Authors: Afonso Fontes, Igor de L. Ribeiro, Khan Muhammad, Amir H. Gandomi, Gregory Gay, Victor Hugo C. de Albuquerque

    Abstract: Advancements in smart vehicle design have enabled the creation of Internet of Vehicle (IoV) technologies that can utilize the information provided by various sensors and wireless communication to perform complex functionality. Many of these functionalities rely on high computational power and low latency. Mobile Edge Computing (MEC) technologies have been proposed as a way to meet these requiremen… ▽ More

    Submitted 31 March, 2022; originally announced April 2022.

  9. arXiv:2110.07045  [pdf, other

    cs.HC cs.AI cs.IR cs.LG

    Investigating Health-Aware Smart-Nudging with Machine Learning to Help People Pursue Healthier Eating-Habits

    Authors: Mansura A Khan, Khalil Muhammad, Barry Smyth, David Coyle

    Abstract: Food-choices and eating-habits directly contribute to our long-term health. This makes the food recommender system a potential tool to address the global crisis of obesity and malnutrition. Over the past decade, artificial-intelligence and medical researchers became more invested in researching tools that can guide and help people make healthy and thoughtful decisions around food and diet. In many… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

    MSC Class: 68U35 (Primary); 68T35 (Secondary); 68T50(Secondary) ACM Class: I.2.1

  10. arXiv:2106.15049  [pdf

    cs.LG cs.HC

    FallDeF5: A Fall Detection Framework Using 5G-based Deep Gated Recurrent Unit Networks

    Authors: Mabrook S. Al-Rakhami, Abdu Gumaei1, Meteb Altaf, Mohammad Mehedi Hassan, Bader Fahad Alkhamees, Khan Muhammad, Giancarlo Fortino

    Abstract: Fall prevalence is high among elderly people, which is challenging due to the severe consequences of falling. This is why rapid assistance is a critical task. Ambient assisted living (AAL) uses recent technologies such as 5G networks and the internet of medical things (IoMT) to address this research area. Edge computing can reduce the cost of cloud communication, including high latency and bandwid… ▽ More

    Submitted 28 June, 2021; originally announced June 2021.

  11. arXiv:2102.06407  [pdf, other

    cs.CV

    Densely Deformable Efficient Salient Object Detection Network

    Authors: Tanveer Hussain, Saeed Anwar, Amin Ullah, Khan Muhammad, Sung Wook Baik

    Abstract: Salient Object Detection (SOD) domain using RGB-D data has lately emerged with some current models' adequately precise results. However, they have restrained generalization abilities and intensive computational complexity. In this paper, inspired by the best background/foreground separation abilities of deformable convolutions, we employ them in our Densely Deformable Network (DDNet) to achieve ef… ▽ More

    Submitted 12 February, 2021; originally announced February 2021.

  12. arXiv:1906.09358  [pdf

    cs.LG eess.SP stat.ML

    Detection of Myocardial Infarction Based on Novel Deep Transfer Learning Methods for Urban Healthcare in Smart Cities

    Authors: Ahmed Alghamdi, Mohamed Hammad, Hassan Ugail, Asmaa Abdel-Raheem, Khan Muhammad, Hany S. Khalifa, Ahmed A. Abd El-Latif

    Abstract: . In this paper, an effective computer-aided diagnosis (CAD) system is presented to detect MI signals using the convolution neural network (CNN) for urban healthcare in smart cities. Two types of transfer learning techniques are employed to retrain the pre-trained VGG-Net (Fine-tuning and VGG-Net as fixed feature extractor) and obtained two new networks VGG-MI1 and VGG-MI2. In the VGG-MI1 model, t… ▽ More

    Submitted 6 December, 2019; v1 submitted 21 June, 2019; originally announced June 2019.

  13. arXiv:1601.01386  [pdf

    cs.MM

    A New Image Steganographic Technique using Pattern based Bits Shuffling and Magic LSB for Grayscale Images

    Authors: Khan Muhammad, Jamil Ahmad, Haleem Farman, Zahoor Jan

    Abstract: Image Steganography is a growing research area of information security where secret information is embedded in innocent-looking public communication. This paper proposes a novel crystographic technique for grayscale images in spatial domain. The secret data is encrypted and shuffled using pattern based bits shuffling algorithm (PBSA) and a secret key. The encrypted data is then embedded in the cov… ▽ More

    Submitted 6 January, 2016; originally announced January 2016.

    Comments: A short paper of 6 pages

    Journal ref: Sindh University Research Journal-SURJ (Science Series) 47.4 (2015)

  14. arXiv:1511.08865  [pdf

    cs.MM

    Steganography: A Secure way for Transmission in Wireless Sensor Networks

    Authors: Khan Muhammad

    Abstract: Addressing the security concerns in wireless sensor networks (WSN) is a challenging task, which has attracted the attention of many researchers from the last few decades. Researchers have presented various schemes in WSN, addressing the problems of processing, bandwidth, load balancing, and efficient routing. However, little work has been done on security aspects of WSN. In a typical WSN network,… ▽ More

    Submitted 27 November, 2015; originally announced November 2015.

  15. arXiv:1510.04413  [pdf

    cs.MM cs.CR

    Secure Image Steganography using Cryptography and Image Transposition

    Authors: Khan Muhammad, Jamil Ahmad, Muhammad Sajjad, Muhammad Zubair

    Abstract: Information security is one of the most challenging problems in today's technological world. In order to secure the transmission of secret data over the public network (Internet), various schemes have been presented over the last decade. Steganography combined with cryptography, can be one of the best choices for solving this problem. This paper proposes a new steganographic method based on gray-l… ▽ More

    Submitted 15 October, 2015; originally announced October 2015.

    Comments: A simple but effective image steganographic method, providing secure transmission of secret data over Internet. The final published version of the paper can be downloaded from the link: (http://www.neduet.edu.pk/NED-Journal/2015/15vol4paper3.html). Please contact me at khan.muhammad.icp@gmail.com if you need the final formatted published version of the paper

    Journal ref: NED University Journal of Research 12.4 (2015): 81-91

  16. arXiv:1510.02177  [pdf

    cs.MM cs.IR

    Ontology-based Secure Retrieval of Semantically Significant Visual Contents

    Authors: Khan Muhammad, Irfan Mehmood, Mi Young Lee, Su Mi Ji, Sung Wook Baik

    Abstract: Image classification is an enthusiastic research field where large amount of image data is classified into various classes based on their visual contents. Researchers have presented various low-level features-based techniques for classifying images into different categories. However, efficient and effective classification and retrieval is still a challenging problem due to complex nature of visual… ▽ More

    Submitted 7 October, 2015; originally announced October 2015.

    Comments: A short paper of 11 pages for secure visual contents retrieval.The original version can be accessed at this link: http://www.kingpc.or.kr/inc_html/index.html

    Journal ref: Khan Muhammad, Irfan Mehmood, Mi Young Lee, Su Mi Ji, Sung Wook Baik, "Ontology-based Secure Retrieval of Semantically Significant Visual Contents," JOURNAL OF KOREAN INSTITUTE OF NEXT GENERATION COMPUTING, vol. 11, pp. 87-96, 2015

  17. arXiv:1510.00226  [pdf

    cs.CR

    An Adaptive Secret Key-directed Cryptographic Scheme for Secure Transmission in Wireless Sensor Networks

    Authors: Khan Muhammad, Zahoor Jan, Jamil Ahmad, Zahid Khan

    Abstract: Wireless Sensor Networks (WSNs) are memory and bandwidth limited networks whose main goals are to maximize the network lifetime and minimize the energy consumption and transmission cost. To achieve these goals, dif ferent techniques of compression and clustering have been used. However, security is an open and major issue in WSNs for which different approaches are used, both in centralized and dis… ▽ More

    Submitted 1 October, 2015; originally announced October 2015.

    Comments: A short paper of 6 pages, proposing an adaptive cryptographic technique for secure transmission in WSN. The original paper can be found on this link at page 48. http://web.uettaxila.edu.pk/techJournal/2015/No3/TECHNICAL_JOURNAL_VOL_20_NO_3.pdf

    Journal ref: Technical Journal, University of Engineering and Technology Taxila, Pakistan, vol.20, pp.48-53, 2015

  18. A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image

    Authors: Khan Muhammad, Muhammad Sajjad, Irfan Mehmood, Seungmin Rho, Sung Wook Baik

    Abstract: Image Steganography is a thriving research area of information security where secret data is embedded in images to hide its existence while getting the minimum possible statistical detectability. This paper proposes a novel magic least significant bit substitution method (M-LSB-SM) for RGB images. The proposed method is based on the achromatic component (I-plane) of the hue-saturation-intensity (H… ▽ More

    Submitted 5 June, 2015; originally announced June 2015.

    Comments: This paper has been published in Multimedia Tools and Applications Journal with impact factor=1.058. The readers can study the formatted paper using the following link: http://link.springer.com/article/10.1007/s11042-015-2671-9. Please use sci-hub.org for downloading this paper if you are unable to access it freely or email us at khan.muhammad.icp@gmail.com

    Journal ref: Multimedia Tools and Applications, pp. 1-27, 2015

  19. A Novel Image Steganographic Approach for Hiding Text in Color Images using HSI Color Model

    Authors: Khan Muhammad, Jamil Ahmad, Haleem Farman, Muhammad Zubair

    Abstract: Image Steganography is the process of embedding text in images such that its existence cannot be detected by Human Visual System (HVS) and is known only to sender and receiver. This paper presents a novel approach for image steganography using Hue-Saturation-Intensity (HSI) color space based on Least Significant Bit (LSB). The proposed method transforms the image from RGB color space to Hue-Satura… ▽ More

    Submitted 1 March, 2015; originally announced March 2015.

    Comments: An easy to follow paper of 11 pages. arXiv admin note: text overlap with arXiv:1502.07808

    Journal ref: Middle-East Journal of Scientific Research 22.5 (2014): 647-654

  20. arXiv:1502.07808  [pdf

    cs.MM cs.CR

    A Secure Cyclic Steganographic Technique for Color Images using Randomization

    Authors: Khan Muhammad, Jamil Ahmad, Naeem Ur Rehman, Zahoor Jan, Rashid Jalal Qureshi

    Abstract: Information Security is a major concern in today's modern era. Almost all the communicating bodies want the security, confidentiality and integrity of their personal data. But this security goal cannot be achieved easily when we are using an open network like Internet. Steganography provides one of the best solutions to this problem. This paper represents a new Cyclic Steganographic T echnique (CS… ▽ More

    Submitted 26 February, 2015; originally announced February 2015.

    Comments: 8

    Journal ref: Technical Journal, University of Engineering and Technology Taxila, Pakistan, vol. 19, pp. 57-64, 2014