Papers by Prof. (Dr.) Firoj Parwej
HAL (Le Centre pour la Communication Scientifique Directe), Jul 15, 2009
Wireless communication is the transfer of information over a distance, without using cables or co... more Wireless communication is the transfer of information over a distance, without using cables or conductors. The distances involved may be short or long. Wireless communication has such features as freedom of access to the information transmitted via wireless networks that puts out different kinds of unauthorized actions of breakers. Solution of this problem is applying cryptography in wireless networks. We proposed 128-bit block cipher called Camellia. Camellia supports 128-bit block size and 128-, 192-, and 256-bit keys, i.e. the same interface specifications as the Advanced Encryption Standard (AES). Efficiency on both software and hardware platforms is a remarkable characteristic of Camellia in addition to its high level of security. It is confirmed that Camellia provides strong security against differential and linear cryptanalysis. Compared to the AES finalists, i.e. MARS, RC6, Rijndael, Serpent, and Twofish, Camellia offers at least comparable encryption speed in software and hardware. In this paper the author have proposed a block ciphering standard in providing confidentiality, security, integrity in wireless communication presently used in KSA.
Big Data make conversant with novel technology, skills and processes to your information architec... more Big Data make conversant with novel technology, skills and processes to your information architecture and the people that operate, design, and utilization them. The big data delineate a holistic information management contrivance that comprise and integrates numerous new types of data and data management together conventional data. The Hadoop is an unlocked source software framework licensed under the Apache Software Foundation, render for supporting data profound applications running on huge grids and clusters, to proffer scalable, credible, and distributed computing. This is invented to scale up from single servers to thousands of machines, every proposition local computation and storage. In this paper, we have endeavored to converse about on the taxonomy for big data and Hadoop technology. Eventually, the big data technologies are necessary in providing more actual analysis, which may leadership to more concrete decision-making consequence in greater operational capacity, cost de...
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019
Recent years have seen the swift development and deployment of Internet-of-Things (IoT) applicati... more Recent years have seen the swift development and deployment of Internet-of-Things (IoT) applications in a variety of application domains. In this scenario, people worldwide are now ready to delight the benefits of the Internet of Things (IoT). The IoT is emerging as the third wave in the evolution of the Internet. The 1990s’ Internet wave connected 1.2 billion subscribers while the 2000s’ mobile wave connected another 2.4 billion. Actually, IoT is expected to consist of more than 84 billion connected devices generating 186 zettabyte of data by 2025, in the opinion of IDC. It includes major types of networks, such as distributed, ubiquitous, grid, and vehicular, these have conquered the world of information technology over a decade. IoT is growing fast across several industry verticals along with increases in the number of interconnected devices and diversify of IoT applications. In spite of the fact that, IoT technologies are not reaching maturity yet and there are many challenges t...
International Journal of Computer Applications, 2019
There is no suspicion that IoT has added a new dimension to the living being by the link between ... more There is no suspicion that IoT has added a new dimension to the living being by the link between smart objects. Thus making the link among any media and anything at any place and anytime was appreciable. Under the umbrella of the Internet of Things (IoT) the number of interconnected devices is expected to grow exponentially toward more than 34 billion devices until 2021. IoT will propose the unique identification of the objects and their virtual representation as the basis for autonomously development of applications and services. These will be characterized by enormous and self-governing data capture, incident transfer, network connectivity and interoperability. This technology has a lot of applications in heterogeneous fields. The IoT technology and applications are likely to be major drivers of investment and innovation in the communications sector, over the forthcoming years, delivering the valued advantage to citizens, client and industrial end-users. These will lead to the introduction of many new and modern services. It will permit data to be transmitted between many various types of devices, enhance the safety of transportation, and decrease the consumption of energy and Review on Internet of Things (IoT) and its Promising Applications" Communications on Applied Electronics (CAE),
The International journal of Multimedia & Its Applications, 2012
The Internet as a whole does not use secure links, thus information in transit may be vulnerable ... more The Internet as a whole does not use secure links, thus information in transit may be vulnerable to interruption as well. The important of reducing a chance of the information being detected during the transmission is being an issue in the real world now days. The Digital watermarking method provides for the quick and inexpensive distribution of digital information over the Internet. This method provides new ways of ensuring the sufficient protection of copyright holders in the intellectual property dispersion process. The property of digital watermarking images allows insertion of additional data in the image without altering the value of the image. This message is hidden in unused visual space in the image and stays below the human visible threshold for the image. Both seek to embed information inside a cover message with little or no degradation of the cover-object. In this paper investigate the following relevant concepts and terminology, history of watermarks and the properties of a watermarking system as well as a type of watermarking and applications. We are proposing edge detection using Gabor Filters. In this paper we are proposed least significant bit (LSB) substitution method to encrypt the message in the watermark image file. The benefits of the LSB are its simplicity to embed the bits of the message directly into the LSB plane of cover-image and many techniques using these methods. The LSB does not result in a human perceptible difference because the amplitude of the change is little therefore the human eye the resulting stego image will look identical to the cover image and this allows high perceptual transparency of the LSB. The spatial domain technique LSB substitution it would be able to use a pseudo-random number generator to determine the pixels to be used for embedding based on a given key. We are using DCT transform watermark algorithms based on robustness. The watermarking robustness have been calculated by the Peak Signal to Noise Ratio (PSNR) and Normalized cross correlation (NC) is used to quantify by the similarity between the real watermark and after extracting watermark.
International Journal of Mobile Network Communications & Telematics, 2012
Voice over Internet Protocol (VoIP) is a technology that allows you to make voice calls using a b... more Voice over Internet Protocol (VoIP) is a technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line. Voice over Internet Protocol (VoIP) has led human speech to a new level, where conversation across continents can be much cheaper & faster. However, as IP networks are not designed for real-time applications, the network impairments such as packet loss, jitter and delay have a severe impact on speech quality. The playout buffer at the receiver side is used to compensate jitter at a trade-off of delay and loss. We found the characteristics of delay and loss are dependent on IP network and sudden variable delay (spike) often performs both regular and irregular characteristics. Different playout buffer algorithms can have different impacts on the achievement speech quality. It is important to design a playout buffer algorithm which can help achieve an optimum speech quality. In this paper, we investigate to the understanding how network impairments and existing adaptive buffer algorithms affect the speech quality and further to design a modified buffer algorithm to obtain an optimized voice quality. We conduct experiments to existing algorithms and compared their performance under different network conditions with high and low network delay variations. Preliminary results show that the new algorithm can enhance the perceived speech quality in most network conditions and it is more efficient and suitable for real buffer mechanism.
International Journal of Computer Applications Technology and Research, 2014
The breakthrough in wireless networking has prompted a new concept of computing, called mobile co... more The breakthrough in wireless networking has prompted a new concept of computing, called mobile computing in which users tote portable devices have access to a shared infrastructure, independent of their physical location. Mobile computing is becoming increasingly vital due to the increase in the number of portable computers and the aspiration to have continuous network connectivity to the Internet irrespective of the physical location of the node. Mobile computing systems are computing systems that may be readily moved physically and whose computing ability may be used while they are being moved. Mobile computing has rapidly become a vital new example in today's real world of networked computing systems. It includes software, hardware and mobile communication. Ranging from wireless laptops to cellular phones and WiFi/Bluetooth-enabled PDA"s to wireless sensor networks; mobile computing has become ubiquitous in its influence on our quotidian lives. In this paper various types of mobile devices are talking and they are inquiring into in details and existing operation systems that are most famed for mentioned devices are talking. Another aim of this paper is to point out some of the characteristics, applications, limitations, and issues of mobile computing.
International Journal of Computer Applications, 2014
In the today scenario technological intelligence is a higher demand after commodity even in traff... more In the today scenario technological intelligence is a higher demand after commodity even in traffic-based systems. These intelligent systems do not only help in traffic monitoring but also in commuter safety, law enforcement and commercial applications. The proposed Saudi Arabia Vehicle License plate recognition system splits into three major parts, firstly extraction of a license plate region secondly segmentation of the plate characters and lastly recognition of each character. This act is quite challenging due to the multiformity of plate formats and the nonuniform outdoor illumination conditions during image collection. In this paper recognition of the license plates is achieved by the implementation of the Learning Vector Quantization artificial neural network. Their results are based upon their completeness in the Saudi Arabia Vehicle License plate character recognition and theirs have obtained encouraging results from proposed technique.
Wireless communication is the transfer of information over a distance, without using cables or co... more Wireless communication is the transfer of information over a distance, without using cables or conductors. The distances involved may be short or long. Wireless communication has such features as freedom of access to the information transmitted via wireless networks that puts out different kinds of unauthorized actions of breakers. Solution of this problem is applying cryptography in wireless networks. We proposed 128-bit block cipher called Camellia. Camellia supports 128-bit block size and 128-, 192-, and 256-bit keys, i.e. the same interface specifications as the Advanced Encryption Standard (AES). Efficiency on both software and hardware platforms is a remarkable characteristic of Camellia in addition to its high level of security. It is confirmed that Camellia provides strong security against differential and linear cryptanalysis. Compared to the AES finalists, i.e. MARS, RC6, Rijndael, Serpent, and Twofish, Camellia offers at least comparable encryption speed in software and h...
In the today scenario technological intelligence is a higher demand after commodity even in traff... more In the today scenario technological intelligence is a higher demand after commodity even in traffic-based systems. These intelligent systems do not only help in traffic monitoring but also in commuter safety, law enforcement and commercial applications. The proposed Saudi Arabia Vehicle License plate recognition system splits into three major parts, firstly extraction of a license plate region secondly segmentation of the plate characters and lastly recognition of each character. This act is quite challenging due to the multiformity of plate formats and the nonuniform outdoor illumination conditions during image collection. In this paper recognition of the license plates is achieved by the implementation of the Learning Vector Quantization artificial neural network. Their results are based upon their completeness in the Saudi Arabia Vehicle License plate character recognition and theirs have obtained encouraging results from proposed technique.
Handwriting is one of the most important means of daily communication. Although the problem of ha... more Handwriting is one of the most important means of daily communication. Although the problem of handwriting recognition has been considered for more than 60 years there are still many open issues, especially in the task of unconstrained handwritten sentence recognition. This paper focuses on the automatic system that recognizes continuous English sentence through a mouse-based gestures in real-time based on Artificial Neural Network. The proposed Artificial Neural Network is trained using the traditional backpropagation algorithm for self supervised neural network which provides the system with great learning ability and thus has proven highly successful in training for feed-forward Artificial Neural Network. The designed algorithm is not only capable of translating discrete gesture moves, but also continuous gestures through the mouse. In this paper we are using the efficient neural network approach for recognizing English sentence drawn by mouse. This approach shows an efficient wa...
Big Data make conversant with novel technology, skills and processes to your information architec... more Big Data make conversant with novel technology, skills and processes to your information architecture and the people that operate, design, and utilization them. The big data delineate a holistic information management contrivance that comprise and integrates numerous new types of data and data management together conventional data. The Hadoop is an unlocked source software framework licensed under the Apache Software Foundation, render for supporting data profound applications running on huge grids and clusters, to proffer scalable, credible, and distributed computing. This is invented to scale up from single servers to thousands of machines, every proposition local computation and storage. In this paper, we have endeavored to converse about on the taxonomy for big data and Hadoop technology. Eventually, the big data technologies are necessary in providing more actual analysis, which may leadership to more concrete decision-making consequence in greater operational capacity, cost de...
Handwriting recognition is a challenging task for many real-world applications such as document a... more Handwriting recognition is a challenging task for many real-world applications such as document authentication, form processing, historical documents. This paper focuses on the comparative study on off-line handwriting recognition system and Printed Characters by taking Arabic handwriting. The off-line Handwriting Recognition methods for Arabic words which being often used among then across the Middle East and North Africa people. In this paper we are proposing off-line Arabic handwriting and printed characters and the language used by the majority of the Middle East. We are using discrete Hidden Markov Models (HMM) for Arabic handwriting and printed characters for the final recognition. In this paper after preprocessing step the characters are auto-segmented using a recursive algorithm as sequences of connected neighbors along lines and curves and Arabic words are first pre-classified into one of known character groups, based on the structural properties of the text line. The propo...
— Handwriting recognition refers to the identification of written characters. Handwriting recogni... more — Handwriting recognition refers to the identification of written characters. Handwriting recognition has become an acute research area in recent years for the ease of access of computer science. In this paper primarily discussed On-line and Off-line handwriting recognition methods for Arabic words which are often used among then across the Middle East and North Africa People. Arabic word online handwriting recognition is a very challenging task due to its cursive nature. Because of the characteristic of the whole body of the Arabic script, namely connectivity between the characters, thereby the segmentation of An Arabic script is very difficult. In this paper we introduced an Arabic script multiple classifier system for recognizing notes written on a Starboard. This Arabic script multiple classifier system combines one off-line and on-line handwriting recognition systems. The Arabic script recognizers are all based on Hidden Markov Models but vary in the way of preprocessing and no...
A new compressed video secure steganography (CVSS) rule is planned. Within the rule, embedding an... more A new compressed video secure steganography (CVSS) rule is planned. Within the rule, embedding and detection operations square measure each dead entirely within the compressed domain, with no would like for the compression method. The new criteria using applied math visibility of contiguous frames is employed to regulate the embedding strategy and capability that will increase the safety of planned rule. Therefore, the collusion resistant properties square measure obtained. Video stegnoanalysis with closedloop system feedback manner is style as a checker to search out obvious bugs. Experimental results showed this theme is applied on compressed video steganography with high security properties. Keywords— Higher LSB, Data Hiding, Extraction, Mean Square Error, PSNR, AVI Video.
ArXiv, 2013
Handwriting recognition refers to the identification of written characters. Handwriting recogniti... more Handwriting recognition refers to the identification of written characters. Handwriting recognition has become an acute research area in recent years for the ease of access of computer science. In this paper primarily discussed On-line and Off-line handwriting recognition methods for Arabic words which are often used among then across the Middle East and North Africa People. Arabic word online handwriting recognition is a very challenging task due to its cursive nature. Because of the characteristic of the whole body of the Arabic script, namely connectivity between the characters, thereby the segmentation of An Arabic script is very difficult. In this paper we introduced an Arabic script multiple classifier system for recognizing notes written on a Starboard. This Arabic script multiple classifier system combines one off-line and on-line handwriting recognition systems. The Arabic script recognizers are all based on Hidden Markov Models but vary in the way of preprocessing and norm...
Forecasting is the process of computation in unknown situations from the historical data. Financi... more Forecasting is the process of computation in unknown situations from the historical data. Financial forecasting and planning is usually an essential part of the business plan, and would be done as part of setting up the organization and receive funds. Financial forecasting and planning is also an essential activity to confirm a good management, keeping the organization financially sound is a key objective. The prediction of stock market has been a long time tempting topic for researchers from different fields. Stock analysts use various forecasting methods to determine how a stock's price will move in the ensuing day. The purpose of this paper is to explore the radial basis function (RBF) and function linked artificial neural network (FLANN) algorithms for forecasting of financial data. We have based our models on data taken and compared those using historical data from the Bombay Stock Exchange (BSE). The RBF and FLANN parameters updated by Particle swarm optimization (PSO). In...
Big Data make conversant with novel technology, skills and processes to your information architec... more Big Data make conversant with novel technology, skills and processes to your information architecture and the people that operate, design, and utilization them. The big data delineate a holistic information management contrivance that comprise and integrates numerous new types of data and data management together conventional data. The Hadoop is an unlocked source software framework licensed under the Apache Software Foundation, render for supporting data profound applications running on huge grids and clusters, to proffer scalable, credible, and distributed computing. This is invented to scale up from single servers to thousands of machines, every proposition local computation and storage. In this paper, we have endeavored to converse about on the taxonomy for big data and Hadoop technology. Eventually, the big data technologies are necessary in providing more actual analysis, which may leadership to more concrete decision-making consequence in greater operational capacity, cost de...
The countenance recognition presents a challenging problem in the field of image analysis and com... more The countenance recognition presents a challenging problem in the field of image analysis and computer vision. Also, it received a good attention over the last few years. The applications of countenance recognition in the areas such as person tracking, surveillance, protection, entertainment, theft prevention, as easily as in the growth of human machine interfaces. It has been shown that precision in countenance is crucial to countenance recognition algorithms. An error of a few pixels in countenance will produce an important reduction in countenance recognition rates. In this paper, two approaches are proposed for use in countenance recognition of human. Firstly, Bacterial Foraging Optimization (BFO) and secondly, Particle Swarm Optimization (PSO). The Bacterial Foraging Optimization in which the features extracted from Linear Discriminant Analysis (LDA) and Independent Component Analysis (ICA) are optimized. The Particle Swarm Optimization (PSO), which optimizes the transform coef...
Uploads
Papers by Prof. (Dr.) Firoj Parwej