
Muhammad Nomani Kabir- PhD
- Senior Lecturer at Universiti Malaysia Pahang Al-Sultan Abdullah
Muhammad Nomani Kabir
- PhD
- Senior Lecturer at Universiti Malaysia Pahang Al-Sultan Abdullah
About
108
Publications
87,220
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,428
Citations
Introduction
Current institution
Additional affiliations
June 2014 - present
August 2004 - October 2007
Publications
Publications (108)
A risk generally is a combination of a probability of an event and its consequence [1]. Lindhe defined risk as uncertainty, and the severity of the consequences of an activity [2], and Torstensson stated that risk is the combination of the probability of an event and the degree of an injury or damage that can arise from that hazardous incident [3]....
Background: Diarrhoeagenic verotoxin producing non-O157 Escherichia coli (VTEC) are
associated with endemic infantile diarrhoea-causing morbidity and mortality worldwide. VTEC can also cause severe illness and has an impact on outbreaks, especially in developing countries. This study aims to investigate the prevalence and characterisation of VTEC a...
Watermarking techniques are employed for protecting copyrights, preventing digital thefts and providing proof-of-authentications, document integrity, tamper detection and localization. Therefore, strong imperceptible watermarking techniques provide an interesting research area of the present era. In this paper, we endeavour to improve capacity and...
Handwritten character recognition (HCR) is the detection of characters from images, documents and other sources and changes them in machine-readable shape for further processing. The accurate recognition of intricate-shaped compound handwritten characters is still a great challenge. Recent advances in convolutional neural network (CNN) have made gr...
Designing a protection system for improvement of the availability of connections is an important issue in communication networks under resource constraints. Quantification of availability for networks is a fundamental design element of network-communication services. In this paper, we present a generalized mathematical model for connection availabi...
Plasmid-mediated Non-O157 VTEC is a pathogenic E. coli serotype, are responsible for many life-threatening diseases such as diarrhoea. The thermostable crystal structure has been widely sought after for industry and therapeutic applications through the structural analysis. The National Center for Biotechnology Information (NCBI) Genbank Database ha...
Accidental fall is one of the most prevalent causes of loss of autonomy, deaths and injuries among the elderly people. Fall detection and rescue systems with the advancement of technology help reduce the loss of lives and injuries, as well as the cost of healthcare systems by providing immediate emergency services to the victims of accidental falls...
Background:
Human-Computer Interaction (HCI) is incorporated with a variety of applications for input processing and response actions. Facial recognition systems in workplaces and security systems help to improve the detection and classification of humans based on the vision experienced by the input system.
Objectives:
In this manuscript, the Ro...
Study of human evacuation from industrial buildings under spreading fire is a challenging research area. Modelling evacuation dynamics under spreading fire is crucial to evaluate the crowd risk and safety in emergency evacuation. The paper presents a crowd dynamics model for emergency evacuation from an industrial building under spreading fire. Thi...
In recent years, significant progress has been made in modern micro- and nanotechnologies for micro/nano-electronic devices. These technologies are increasingly utilizing sophisticated fluid media to enhance performance. Among the new trends is the simultaneous adoption of nanofluids and biological micro-organisms. Motivated by bio-nanofluid rotati...
Mechanical ventilators are the instruments that assist breathing of the patients having respiratory diseases e.g., pneumonia and coronavirus disease 2019 (COVID-19). This paper presents a modified lung model under volume-controlled ventilation to describe the lung volume and air flow in terms of air pressure signal from the ventilator. A negative f...
Accidental falls are a major source of loss of autonomy, deaths, and injuries among the elderly. Accidental falls also have a remarkable impact on the costs of national health systems. Thus, extensive research and development of fall detection and rescue systems are a necessity. Technologies related to fall detection should be reliable and effectiv...
Early detection of disease has become a crucial problem due to rapid population growth in medical research in recent times. With the rapid population growth, the risk of death incurred by breast cancer is rising exponentially. Breast cancer is the second most severe cancer among all of the cancers already unveiled. An automatic disease detection sy...
A combination of mobile and cloud computing delivers many advantages such as mobility, resources, and accessibility through seamless data transmission via the Internet anywhere at any time. However, data transmission through vulnerable channels poses security threats such as man-in-the-middle, playback, impersonation, and asynchronization attacks....
Cyber-physical autonomous vehicular system (CAVS) plays an important role in the automotive industries to enable interactions among functioning elements, including sensors and actuators, in order to ensure seamless data exchange and communications. Internet of things (IoT) is one of the key enabling technologies for designing such a system. In this...
Abstract— Mechanical Ventilation is used to support the respiratory system malfunction by assisting recovery breathing process. Mathematical models are used to study and simulate the respiratory system supported by mechanical ventilation using different modes such as volume-controlled ventilation (VCV). In this research, a single compartment lung m...
Quran phrases are found in many Arabic websites. Lamentably, many mistakes and typos appear on most of the websites embedded with Quran texts. Therefore, it becomes very difficult to recognize the legal document of the religious book, whether the online document is tampered or not. Hence, verifying the Quran expression has become a crucial issue fo...
Intrusion detection system (IDS) is one of the important parts in security domains of the present time. Distributed Denial of Service (DDoS) detection involves complex process which reduces the overall performance of the system, and consequently, it may incur inefficiency or failure to the network. In this paper, the attacks database is split into...
With the rapid growth of internet technology, image watermarking method has become a popular copyright protection method for digital images. In this paper, we propose a watermarking method based on \(4\times 4\) image blocks using redundant wavelet transform with singular value decomposition considering human visual system (HVS) characteristics exp...
The traveling salesman problem (TSP) is a famous NP-hard problem in the area of combinatorial optimization. It is utilized to locate the shortest possible route that visits every city precisely once and comes back to the beginning point from a given set of cities and distance. This paper proposes an efficient and effective solution for solving such...
yes and other visionary organs are essential to human physiology, due to their ability to receive and process subtle details to the brain. However, some individuals are unable to visually perceive things in the surroundings. These visually impaired people face various hinderances in the daily life, and cannot navigate themselves without guidance. T...
Watermarking technique is a method to protect ownership of digital multimedia. Most existing watermarking techniques achieve a good level of imperceptibility and robustness. The challenges to achieve higher invisibility and resistance with lower computational time motivate researchers to work on new watermarking schemes. Robustness against noise at...
Fast data search is an important element of big data in the modern era of IoT, Cloud Computing, and Social Networks. Search using traditional
binary-search algorithm can be accelerated by employing an interpolation search technique when the data is regularly distributed. In this work, the interpolation search is investigated in which the search res...
The valorization of agro-modern waste through anaerobic codigestion signifies a remarkable prospect for waste treatment and sustainable energy source generation. This study intended to improve the codigestion of food waste and petrochemical wastewater by an advanced two-phase process. In view of concentric acidogenic and methanogenic stages, intend...
In this paper, a new bio-nano-transport model is presented. The effects of first- and second-order velocity slips, thermal slip, mass slip, and gyro-tactic (torque-responsive) microorganism slip of bioconvective nanofluid flow from a moving plate under blowing phenomenon are numerically examined. The flow model is expressed by partial differential...
Recent years have seen continuous exposure of online social network (OSN) users to the security vulnerability due to socio-technical cyber hazards committed by OSN associates. Unfortunately, the current OSN platforms has lack of functionalities for automatic users protection in initiating online friendship and online users interaction within their...
In the last few decades, the metabolic model of E.coli has attracted the attention of many researchers in the area of biological system modeling. Metabolic models are constructed using mass-balance equations with kinetic-rate computation to simulate the behavior of the metabolic system over time. However, in the development of the metabolic model,...
Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication tec...
Conclusion in the book titled "Authentication Technologies for Cloud Computing, IoT and Big Data"
Data protection laws is a chapter in the book titled: Authentication Technologies for Cloud Computing, IoT and Big Data.
Authentication is central to any security issue, involving the verification process of the identity of a person or a process to access a secured system. Therefore, authentication is extremely important to guarantee the smooth flow of information without troubles. Authentication process is implemented for data in storage and data in-transit with com...
Web extension is a software that can be installed on a web browser. A web-extension link is displayed as an icon on the toolbar of the browser. Based on browsing activity, the extension works automatically or by clicking the extension icon depending on the functionalities made in the extension software. In this work, we developed a web extension on...
In the field of medical science, one of the major recent researches is the diagnosis of the abnormalities in brain. Electroencephalogram (EEG) is a record of neuro signals that occur due the different electrical activities in the brain. These signals can be captured and processed to get the useful information that can be used in early detection of...
Construction industry involves complex and
challenging process associated with the risk of injury, death and
property loss. Experts from different departments work together
to develop a good management system in order to successfully
complete a construction project. This paper presents a model of
risk analysis using fuzzy logic to assess the risk i...
In this article, the steady two-dimensional stagnation point flow of a viscous incompressible electrically conducting bio-nanofluid over a stretching/shrinking wedge in the presence of passively control boundary condition, Stefan blowing and multiple slips is numerically investigated. Magnetic induction is also taken into account. The governing con...
The construction industry involves one of the most hazardous occupation for workers due to complex management processes, environmental issues, work pressure and heavy and complicated equipment involved in modern construction projects. Despite the advancement of technology in the construction industry, an escalating number of fatal accidents occur b...
Understanding crowd evacuation behavior is of utmost importance for large buildings in order to achieve efficient crowd monitoring and management. This paper presents the simulation and analysis of crowd evacuation pattern for a large building called Al Masjid An Nabawi, widely known as ‘the Haram,’ in Madinah, Saudi Arabia. Legion Evac software is...
Image compression leads to minimize the storage-requirement of an image by reducing the size of the image. This paper presents a bit allocation strategy based on psychovisual threshold in image compression considering a similar idea of audio coding. In the audio coding, a dynamic bit allocation to each signal is related to the concept of variable b...
Blockchain technology is widely known because it is the underlying technology used by the bitcoin. It became more popular because it also can be used as backbone for various applications in finance, media, security and others. One of the main concerns for this technology is how secure the information that the users distributed over the network. Thi...
This paper presents a reliable digital watermarking technique which provides high imperceptibility and robustness for copyright protection using an optimal DCT psychovisual threshold. Embedding process in this watermarking technique utilizes certain frequency regions of DCT such that insertion of watermark bits causes the least image distortion. Th...
Background and objective: With the widespread internet availability, now-a-days Hadith texts which are essential sources of Islamic knowledge appear on many websites. In this paper, a client-based web-extension program that can authenticate online Hadith texts from Sahih Bukhari and Sahih Muslim is presented. Materials and Methods: First, the progr...
Communications networks are often disrupted by human-initiated and natural disasters such as terrorist bombings, aerial bombardment, earthquakes, floods and volcanic eruptions. Estimating the connection probability of a communications network under a regional failure caused by such an event is essential to evaluating network performance. This paper...
The objective of this study is to investigate the effect of engine speed, intake air temperature, intake air pressure, and compression ratio on combustion and performance characteristics in a homogeneous-charge compression-ignition (HCCI) engine fueled with gasoline surrogate using numerical simulations. The operating range of HCCI combustion with...
Computer software is in high demand everywhere in the world. The high dependence on software makes software requirements more complicated. As a result, software testing tasks get costlier and challenging due to a large number of test cases, coupled with the vast number of the system requirements. This challenge presents the need for reduction of th...
The psychovisual technique has brought about significant improvement in pursuing image analysis and image reconstruction. The psychovisual threshold can be utilized to find the optimal bits-budget for image signals. The psychovisual system is developed based on noticeable distortion of the compressed image from an original image in frequency order....
Intelligent Transportation Systems (ITS) providing efficient road-transportation strategies have recently become a very active research area. Efficient transportation of visitors to/from highly congested sites is one of the most important challenges addressed by ITS. A transportation-system analysis is presented here and is applied on an urban city...
The concept of Internet of Things (IoT) can be utilised in vehicles, since the number of sensor nodes in vehicles is rising tremendously because of the uplifting demand of applications for security, safety and convenience. In order to establish the communication among these nodes inside a vehicle, a controller area network with wired architecture p...
Use of Internet of Things (IoT) with modern wireless network is a trend of the emerging technologies for
different systems which can be deployed in various kinds of environment to monitor, communicate withor control
the associated elements in the system. The activities e.g., monitoring and communication by IoT can play an
important role to design a...
A mathematical model is developed to examine the effects of the Stefan blowing, second order velocity slip, thermal slip and microorganism species slip on nonlinear bioconvection boundary layer flow of a nanofluid over a horizontal plate embedded in a porous medium with the presence of passively controlled boundary condition. Scaling group transfor...
Digital multimedia has drastically increased the production and distribution of digital data in the recent years. Unauthorized manipulation and ownership of digital image have become a serious issue. In this paper, we propose a watermarking scheme which uses block-based Tchebichef moments considering psychovisual threshold. The psychovisual thresho...
A graft copolymerization was performed using free radical initiating process to prepare the poly(methyl acrylate) grafted copolymer from the tapioca cellulose. The desired material is poly(hydroxamic acid) ligand, which is synthesized from poly(methyl acrylate) grafted cellulose using hydroximation reaction. The tapioca cellulose, grafted cellulose...
Crowd evacuation from industrial buildings, factories, theatres, protest areas, festivals, exhibitions and religious/sports gatherings is very crucial in many dangerous scenarios, such as fire, earthquakes, threat and attacks. Simulation of crowd evacuation is an integral part of planning for emergency situations and training staff for crow managem...
The effects of Stefan blowing and the velocity, thermal and solutal slips on bioconvection nanofluid flow over a horizontal moving plate in the presence of passively controlled boundary conditions are numerically investigated. The Lie group transformation is introduced to seek similarity solutions of such nano-bioconvection flows for the first time...
Safety instrumented system (SIS) is an essential device to protect the industries from dangerous situations.
Reliability of SIS is measured by the analysis of probability of failure on demand (PFD) which is
an integral part in quantitative risk and safety assessment to determine the risk and safety integrity level.
PFD varies from location to locat...
Traffic assessment is extremely important for the performance evaluation of vehicle-flow on a road network. This paper presents an assessment of traffic flow on the busiest road i.e., First Ring Road located at the central area of Madinah in Saudi Arabia. In this paper, the assessment of traffic-flow is performed by evaluating and analyzing the tra...
A system for the recognition of machine printed Arabic script is proposed. The Arabic script is shared by three languages i.e., Arabic, Urdu and Farsi. The three languages have a descent amount of vocabulary in common, thus compounding the problems for identification. Therefore, in an ideal scenario not only the script has to be differentiated from...
Safety analysis in the companies is an important issue besides the quality, productivity and profitability. Safety integrity function in many industries is based on safety instrumented systems. Uncertainty is the main problem of safety analysis. In this paper, a new mathematical model is developed to compute the probability of failure on demand (PF...
Internet of Things enabled Intra-Vehicular Network (IVN) refers to the network where large number of sensors are connected with each other for sharing the vehicle's status information in order to develop a smart vehicular system. The number of sensor nodes in the vehicle has increased significantly due to the increasing vehicular applications. The...
In this paper, we investigate magnetohydrodynamic free convective flow of micropolar fluid over a moving flat plate using the Lie group transformations and numerical methods. Instead of using conventional no-slip boundary conditions, we used both the velocity and thermal slip boundary conditions to achieve physically realistic and practically usefu...
The eight-chain model (Arruda EM, Boyce MC, 1993. A three-dimensional constitutive model 7 for the large stretch behaviour of rubber elastic materials. J. Mech. Phy. Solids 41, 389-412), also known 8 as Arruda-Boyce model, is widely used to capture the rate-independent hyperelastic response of rubberlike 9 materials. The parameters of this model ar...
In the diesel engine after-treatment system of motor vehicles, Diesel Oxidation Catalytic (DOC) converter is used to purify hydrocarbons (HCs) consisting of oil and fuel residue, and Carbon Monoxide (CO) from the exhaust gas. The exhaust gas flowing through DOC converter experiences chemical reactions that oxidize CO and HCs which are formed by inc...
In this paper, hydromagnetic thermo-solutal nanofluid flow past a flat plate embedded in a Darcy porous medium has been investigated considering zero mass flux with velocity and thermal slips boundary conditions. The nanofluid flow is considered as 2D, steady state, incompressible, and laminar. We used a generalized stretching group of transformati...
The rate of advancements in the fields of integrated electronic sensor technology, wireless communications, and efficient software algorithms has enabled us to witness a wide outreach of such technologies in an expanding variety of consumer and industrial applications. Essentially, the integration of such advanced communication systems and efficien...
With text being the predominant communication medium on the internet, more attention is required to secure and protect text information. In this work, an invisible watermarking technique based on Kashida-marks is proposed. The watermarking key is predefined whereby a Kashida is placed for a bit 1 and omitted for a bit 0. Kashidas are inserted in th...
This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under kn...
Dedicated protection and shared protection are the main protection schemes in optical wavelength division multiplexing (WDM) networks. Shared protection techniques surpass the dedicated protection techniques by providing the same level of availability as dedicated protection with reduced spare capacity. Satisfying the service availability levels de...
Searching a specific word or sequence of words, or quotations in a large text document is generally performed by string matching algorithms. Specific word can be more efficiently searched by using suitable hash functions on a hash table where the words of the large text file are organized in order. In this paper, we present a new technique of effic...
This paper describes a work in-progress on a software framework and process for verifying the integrity and accuracy of online digital Quran-text which is activated using a web-browser toolbar and can be downloaded and installed by online users as a software plug-in browser-component. Digital certificates are then issued only for authentic web-page...
With the advancements in technology and the increase use of the Internet, information dissemination of digital text documents have seen an exponential growth with Arabic language being one of the top ten languages in the Internet. The Islamic content has also seen an increase in the last two decades. Thus, portions of Qur’anic text, i.e. verse/s, h...
The design of micro-electronic programmable processor technology capable of hosting Quran multimedia data for wide-scale product dissemination presents a key challenge in embedded systems research and development. Such embedded designs could be used to serve Quranic disseminations using one of two approaches. First, an embedded web-server could be...
Rapid advancements in communication technologies have enabled the digital community to benefit from the advantages of fast and simple digital information exchange over the internet. Such benefits, however, come in-hand with the problems and threats associated with ensuring digital copyright protection preventing digital counterfeiting, proof-of-aut...
With the Internet penetration in the Middle East exceeding the world's average penetration and the growth of Internet users exceeding the 2000%, the number of Arabic documents online has seen an exponential growth. Therefore, with the increase of Arabic online publications, the presence of Qur'anic quotations online articles is becoming more notabl...
This paper presents a new approach to addresses the problems associated with text documents protection, such as copyright protection and content verification. This problem has not been investigated much for text media and most of the work available in literature is based on multimedia forms. Therefore, due to the large amount of text documents avai...
The embedding of digital watermark data in a cover text media, as in digital text watermarking, is used
in numerous applications such as copyright protection, tamper detection, content-authenticity, steganography and other applications. Such issues have been largely studied for the security and protection of digital English-texts with relatively f...
Crowd modelling and simulation has been utilized over the last few decades to study crowd behaviour, estimate evacuation time, and assess safety requirements. In this study, the flow of people in and out of public utilities (washrooms) of a highly populated mosque is simulated. A typical washroom consists of four underground levels located outside...
The advantages of fast and simple digital information exchange over the Internet has attracted problems and threats in the form of digital attacks that could compromise information integrity, protection and authentication. Such issues are more prominent for text-content due to the dominance of textual-data sent online. Any compromise on integrity a...
In optical Wavelength Division Multiplexing (WDM) networks, different protection schemes have been proposed in the literature, namely, dedicated protection and shared protection. Shared protection techniques significantly reduce the required spare capacity by providing the same level of availability as dedicated protection. However, current mission...
Disaster preparation and management, such as emergency
evacuation, is very essential for public places. This is especially
true for Al-Masjid An-Nabawi which accommodates millions of
Muslims around the world during Umrah and Hajj seasons. This
paper describes the evaluation process carried out to determine
the most suitable software for the purpose...
Automatic surveillance systems especially at crowd- prone areas are important for prompt detection of dangerous situations. Such systems employing machine vision and image analysis techniques are highly beneficial for crowd surveillance at Masjid Al-Haram, a holy site that accommodates more than three million visitors during the peak time of Haj se...
Questions
Questions (2)
image processing/ Graphics projects with computational methods