Nargis Bibi
YOU?
Author Swipe
View article: Advanced Deep Learning Architecture for the Early and Accurate Detection of Autism Spectrum Disorder Using Neuroimaging
Advanced Deep Learning Architecture for the Early and Accurate Detection of Autism Spectrum Disorder Using Neuroimaging Open
Autism Spectrum Disorder (ASD) is a neurological condition that affects the brain, leading to challenges in speech, communication, social interaction, repetitive behaviors, and motor skills. This research aims to develop a deep learning ba…
View article: Estimation of Household's Meat Consumption Elasticities in Khyber Pakhtunkhwa, Pakistan
Estimation of Household's Meat Consumption Elasticities in Khyber Pakhtunkhwa, Pakistan Open
The study investigated meat consumption elasticities in Peshawar district of Khyber Pakhtunkhwa. Data was collected from 120 households from Hayatabad and City in Peshawar District, randomly selected through a well-structured interview sch…
View article: Enhanced Anomaly Detection in IoT Through Transformer-Based Adversarial Perturbations Model
Enhanced Anomaly Detection in IoT Through Transformer-Based Adversarial Perturbations Model Open
Ensuring data security in IoT systems requires effective anomaly detection, particularly in multivariate time series data generated by sensor networks. This study introduces a transformer-based method to detect anomalies by capturing compl…
View article: Secure Cooperative Routing in Wireless Sensor Networks
Secure Cooperative Routing in Wireless Sensor Networks Open
In wireless sensor networks (WSNs), sensor nodes are randomly distributed to transmit sensed data packets to the base station periodically. These sensor nodes, because of constrained battery power and storage space, cannot utilize conventi…
View article: Detection of Primary User Emulation Attack Using the Differential Evolution Algorithm in Cognitive Radio Networks
Detection of Primary User Emulation Attack Using the Differential Evolution Algorithm in Cognitive Radio Networks Open
Cognitive Radio Network (CRN) is an emerging technology used to solve spectrum shortage problems in wireless communications. In CRN, unlicensed secondary users (SUs) and licensed primary users (PUs) use spectrum resources at the same time …
View article: Efficient Clustering Based Routing for Energy Management in Wireless Sensor Network-Assisted Internet of Things
Efficient Clustering Based Routing for Energy Management in Wireless Sensor Network-Assisted Internet of Things Open
Wireless sensor networks (WSNs) play a huge part in arising innovations like smart applications, the Internet of Things, and numerous self-designed, independent applications. Energy exhaustion and efficient energy consumption are principal…
View article: Does Education and Farming Experience Affect Technical Efficiency of Rice Crop Growers? Evidence from Khyber Pakhtunkhwa, Pakistan
Does Education and Farming Experience Affect Technical Efficiency of Rice Crop Growers? Evidence from Khyber Pakhtunkhwa, Pakistan Open
Education and farming experience of farmers are considered the most important factors in allocation of inputs during production process.This study, therefore, aimed at evaluating effect of education and farming experience on technical effi…
View article: Alts: An Adaptive Load Balanced Task Scheduling Approach for Cloud Computing
Alts: An Adaptive Load Balanced Task Scheduling Approach for Cloud Computing Open
According to the research, many task scheduling approaches have been proposed like GA, ACO, etc., which have improved the performance of the cloud data centers concerning various scheduling parameters. The task scheduling problem is NP-har…
View article: Severity Recognition of Aloe Vera Diseases Using AI in Tensor Flow Domain
Severity Recognition of Aloe Vera Diseases Using AI in Tensor Flow Domain Open
Agriculture plays an important role in the economy of all countries. However, plant diseases may badly affect the quality of food, production, and ultimately the economy. For plant disease detection and management, agriculturalists spend a…
View article: Correction: A novel encryption scheme for high-contrast image data in the Fresnelet domain
Correction: A novel encryption scheme for high-contrast image data in the Fresnelet domain Open
[This corrects the article DOI: 10.1371/journal.pone.0194343.].
View article: Correction: A novel encryption scheme for high-contrast image data in the Fresnelet domain
Correction: A novel encryption scheme for high-contrast image data in the Fresnelet domain Open
[This corrects the article DOI: 10.1371/journal.pone.0194343.].
View article: Message Admission Control along with Buffer Space Advertisement to Control Congestion in Delay Tolerant Networks (DTNs)
Message Admission Control along with Buffer Space Advertisement to Control Congestion in Delay Tolerant Networks (DTNs) Open
Delay and Disruption Tolerant networks (DTN) are subject to intermittent connection and long delay, thus the internet congestion control mechanisms are not suitable for DTNs. Data Delivery Rate and Delivery Delay are the parameters affecte…
View article: A novel encryption scheme for high-contrast image data in the Fresnelet domain
A novel encryption scheme for high-contrast image data in the Fresnelet domain Open
In this paper, a unique and more distinctive encryption algorithm is proposed. This is based on the complexity of highly nonlinear S box in Flesnelet domain. The nonlinear pattern is transformed further to enhance the confusion in the dumm…
View article: Neurochemical Alterations in Sudden Unexplained Perinatal Deaths—A Review
Neurochemical Alterations in Sudden Unexplained Perinatal Deaths—A Review Open
Sudden unexpected perinatal collapse is a major trauma for the parents of victims. Sudden infant death syndrome (SIDS) is unexpected and mysterious death of an apparently healthy neonate from birth till 1 year of age without any known caus…
View article: Human visual enhancement using Multi Scale Retinex
Human visual enhancement using Multi Scale Retinex Open
The Human Vision System (HVS) is responsible for color constancy and dynamic range. It is reasonably tolerant to variation under strong lighting conditions; however, this is not the case for camera images. We present a new six-step techniq…
View article: EAR: Enhanced Augmented Reality System for Sports Entertainment Applications
EAR: Enhanced Augmented Reality System for Sports Entertainment Applications Open
Augmented Reality (AR) overlays virtual information on real world data, such as displaying useful information on videos/images of a scene.This paper presents an Enhanced AR (EAR) system that displays useful statistical players' information…
View article: On Forgotten Topological Indices of Some Dendrimers Structure
On Forgotten Topological Indices of Some Dendrimers Structure Open
A series of previously conducted experiments pertaining to various chemicals and drugs uncover a natural linkage between the molecular structures and the bio-medical and pharmacological characteristics. The forgotten topological index comp…
View article: Reversible integer wavelet transform for blind image hiding method
Reversible integer wavelet transform for blind image hiding method Open
In this article, a blind data hiding reversible methodology to embed the secret data for hiding purpose into cover image is proposed. The key advantage of this research work is to resolve the privacy and secrecy issues raised during the da…
View article: An Image Encryption Technique based on Chaotic S-Box and Arnold Transform
An Image Encryption Technique based on Chaotic S-Box and Arnold Transform Open
In recent years, chaos has been extensively used in cryptographic systems. In this regard, one dimensional chaotic maps gained increased attention because of their intrinsic simplicity and ease in application. Many image encryption algorit…
View article: Equation-Method for correcting clipping errors in OFDM signals
Equation-Method for correcting clipping errors in OFDM signals Open
View article: Blind data hiding technique using the Fresnelet transform
Blind data hiding technique using the Fresnelet transform Open
A new blind data hiding scheme is proposed in which data is decomposed using the Fresnelet transform. The inverse Fresnelet transform is performed on decomposed subbands by choosing different key parameters, and the coded pattern of the in…
View article: Digital image watermarking using partial pivoting lower and upper triangular decomposition into the wavelet domain
Digital image watermarking using partial pivoting lower and upper triangular decomposition into the wavelet domain Open
A digital image watermarking algorithm using partial pivoting lower and upper triangular (PPLU) decomposition is proposed. In this method, a digital watermark image is factorised into lower triangular, upper triangular and permutation matr…