Abdu Salam

Abdu Salam
Abdul Wali Khan University Mardan · Department of Computer Science

PhD

About

18
Publications
9,218
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
54
Citations
Citations since 2017
10 Research Items
45 Citations
201720182019202020212022202305101520
201720182019202020212022202305101520
201720182019202020212022202305101520
201720182019202020212022202305101520
Introduction
Abdu Salam is working as an Assistant Professor at the Department of Computer Science, Abdul Wali Khan University Mardan (AWKUM).
Additional affiliations
March 2013 - present
Abdul Wali Khan University Mardan
Position
  • Professor (Assistant)

Publications

Publications (18)
Article
Full-text available
Early detection of brain tumors is critical to ensure successful treatment, and medical imaging is essential in this process. However, analyzing the large amount of medical data generated from various sources such as magnetic resonance imaging (MRI) has been a challenging task. In this research, we propose a method for early brain tumor segmentatio...
Article
Full-text available
Deep learning is a rapidly growing research area having state of art achievement in various applications including but not limited to speech recognition, object recognition, machine translation, and image segmentation. In the current modern industrial manufacturing system, Machine Health Surveillance System (MHSS) is achieving increasing popularity...
Article
Full-text available
Ransomware is a destructive type of malware that encrypts the user's valuable data or locks the screen of the user's device, causing massive economic losses to users. Signature-based ransomware detection models struggle to detect zero-day ransomware and questioning their suitability for protecting user's files against such attacks. In this study, w...
Article
Full-text available
Iris recognition become one of the most accurate and reliable steadfast human biometric recognition system of the decad. This paper presents an accurate framework for iris recognition system using hybrid algorithm in preprocess and feature extraction section. The proposed model for iris recognition with significant feature extraction was divided in...
Article
Full-text available
Farming is the major profession in several republics for centuries. However, due to the immigration of individuals from rural to urban, there is prevention in farming. The use of modern technology in the precision agriculture field increases productivity and also improves the exports of a country. The productivity may suffer due to different enviro...
Chapter
Full-text available
Flynig sensor network (FSN) for internet of things (IoT) consist of flying nodes called sensors and ground segments. The flying nodes may be operated manually or it may be automated devices. The flying segment of IoT has different nature compared to ordinary mobile sensor network. The flying speed and diverse directions of nodes make it harder to r...
Article
Full-text available
Flying ad hoc sensor network (FASNET) for Internet of Things (IoT) consists of multiple unmanned aerial vehicles (multi-UAVs) with high mobility, quick changes in topology, and diverse direction. The flying multi-UAVs were operated remotely by human beings or automatically by an onboard system. The applications of multi-UAVs are remote sensing, tra...
Article
Full-text available
Ransomware (RW) is a distinctive variety of malware that encrypts the files or locks the user’s system by keeping and taking their files hostage, which leads to huge financial losses to users. In this article, we propose a new model that extracts the novel features from the RW dataset and performs classification of the RW and benign files. The prop...
Article
Full-text available
In flat mobile ad-hoc MANETs, an extensive amount of information is produced that may saturate the network. Due to network scalability and node heterogeneity, it is highly desirable to organize the nodes into clusters and form a hierarchal structure. Cluster formation in ad-hoc wireless MANETs has been a problem from a long time. Recent work on clu...
Article
Full-text available
One of the major challenges encountered by current face recognition techniques lies in the difficulties of handling varying poses, i.e., recognition of faces in arbitrary in-depth rotations. The face image differences caused by rotations are often larger than the inter-person differences used in distinguishing identities. Face recognition across po...
Article
Full-text available
Due to the increasing incidence of identity theft and terrorism in the last few years, biometric-based security is attractive for researchers. Automatic human face detection is an area of the biometric system which uniquely identifies human face. To extract a face from a given input image, the major component is the detection of skin color. In this...
Article
Full-text available
Weather is the single most events that affect the human life in every dimension, ranging from food to fly while on the other hand it is the most disastrous phenomena. Therefore, prediction of weather phenomena is of major interest for human society to avoid or minimize the destruction of weather hazards. Weather prediction is complex due to noise a...
Article
Full-text available
In a single iteration of Insertion sort, only one element is inserted to its proper position. In this technique the proper position of the item can be found using linear search algorithm starting from first element and proceed in incremental fashion. The linear search can be applied either in incremental fashion or in reversed order to find the pro...
Article
Full-text available
Mobile ad-hoc network (MANET) is a mobile, dynamic, temporary, and non-infrastructure network of nodes. Organization and topology of MANET change frequently due random movement of nodes. MANET may work independently or may be part of the Internet. Major challenges of MANETs are multihop, mobility, scalability, bandwidth, and battery power constrain...
Article
Full-text available
SNOW 2.0, a software-oriented stream cipher proposed by T. Johansson and P. Ekdahl in 2002 as an enhanced version of the NESSIE finalist SNOW 1.0, is usually considered as one of the strongest Stream Ciphers designed so far. This study described Guess and Determine (GD) Attack on SNOW 2.0. In this study, we located the specific bit positions in a k...
Article
Full-text available
Pakistan Education and Research Network (PERN) have provided high speed Internet connectivity to N.W.F.P Agricultural University Peshawar. Internet is available in each and every Department including all computer laboratories without any centralized policies and procedure for restricting access as well as no mechanism is defined to protect universi...
Article
Mobile ad-hoc network (MANET) is a collection of self-configuring wireless mobile routers dynamically forming a temporary infrastructure-less network. Nodes are moving randomly thus changing organization and topology of the wireless network. Major challenges that make the design of adequate routing protocols are multihop, mobility, scalability, ban...
Article
Due to different characteristics and requirements of wireless sensor networks, we do experience differences between standard WLAN applications and WSN applications. Low energy consumption is the most important and focusing issue in WSN. To achieve this task require tuning medium access control protocols so that radio can be utilized efficiently. We...

Network

Cited By