Muhammad Ali Qureshi

Muhammad Ali Qureshi
The Islamia University of Bahawalpur | IUB · Information and Communication Engineering Department

PhD

About

60
Publications
23,128
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
653
Citations
Introduction
I am working as an Associate Professor and Chairman in Dept. of Information and Communication Engg. at The Islamia University of Bahawalpur, Pakistan since 2007. I received the B.Sc. degree (with honor) in electrical engineering from U.E.T Lahore, Pakistan in 2000, M.S. in telecommunication engineering from NWFP U.E.T Peshawar, Pakistan in 2008, and PhD in electrical engineering from KFUPM Saudi Arabia in January, 2017. I am senior member of IEEE and Chair, IEEE Bahawalpur Sub-Section.
Additional affiliations
October 2012 - December 2016
King Fahd University of Petroleum and Minerals
Position
  • Lecturer
November 2007 - present
The Islamia University of Bahawalpur
Position
  • Professor
December 2002 - November 2007
Pakistan Telecommunication Company Limited (PTCL)
Position
  • Engineer
Education
October 2012 - December 2016
King Fahd University of Petroleum and Minerals
Field of study
  • Electrical Engineering
January 2007 - July 2008
University of Engineering and Technology, Peshawar
Field of study
  • Telecommunication Engineering
September 1995 - April 2000
University of Engineering and Technology, Lahore
Field of study
  • Elecrical Engineering

Publications

Publications (60)
Article
Full-text available
Contrast Enhancement Evaluation (CEE) is a very challenging problem. In this work, we provide a detailed performance analysis of CEE measures. The study was conducted on our newly developed database dedicated to psychophysical Contrast Enhancement (CE) quality evaluation. The database contains 30 original images and 180 enhanced images obtained usi...
Article
Image inpainting is the process of restoring missing pixels in digital images in a plausible way. Research in image inpainting has received considerable attention in different areas, including restoration of old and damaged documents, removal of undesirable objects, computational photography, retouching applications, etc. The challenge is that the...
Article
Full-text available
We propose a new algorithm for image compression based on compressive sensing (CS). The algorithm starts with a traditional multilevel 2-D Wavelet decomposition, which provides a compact representation of image pixels. We then introduce a new approach for rearranging the wavelet coefficients into a structured manner to formulate sparse vectors. We...
Article
With the advent of powerful image editing tools, manipulating images and changing their content is becoming a trivial task. Now, you can add, change or delete significant information from an image, without leaving any visible signs of such tampering. With more than several millions pictures uploaded daily to the net, the move towards paperless work...
Article
Full-text available
This work presents a battery-ultracapacitor hybrid energy storage system (HESS) for pulsed loads (PL) in which ultracapacitors (UCs) run the pulse portion of the load while the battery powers the constant part of the load. Energy stored in UC depends upon the square of its voltage that's why an active parallel hybrid topology with two bidirectional...
Article
Purpose This paper aims to improve the computational efficiency of higher-order accurate Noye–Hayman [NH (9,9)] implicit finite difference scheme for the solution of electromagnetic scattering problems in tunnel environments. Design/methodology/approach The proposed method consists of two major steps: First, the higher-order NH (9,9) scheme is num...
Article
Full-text available
Phasor measurement unit (PMU) technology is a need of the power system due to its better resolution than conventional estimation devices used for wide-area monitoring. PMUs can provide synchronized phasor and magnitude of voltage and current measurements for state estimation of the power system to prevent blackouts. The drawbacks of a PMU are the h...
Article
Purpose The purpose of this paper is to provide a brief introduction of the finite difference based parabolic equation (PE) modeling to the advanced engineering students and academic researchers. Design/methodology/approach A three-dimensional parabolic equation (3DPE) model is developed from the ground up for modeling wave propagation in the tunn...
Article
In this paper, the first-ever Urdu language singing voices corpus is developed using linguistic (phonetic) and vocoder (F0 contours) features. Singer identity feature vector along with the Urdu singing voices corpus is used in the synthesis of multi speakers Urdu singing voices using Wasserstein Generative Adversarial Network (WGAN) framework based...
Cover Page
Full-text available
The article received 40 citations.
Article
Full-text available
Visual Cryptography (VC) is gaining attraction during the past few years to secure the visual information in the transmission network. It enables the visual data i.e. handwritten notes, photos, printed text, etc. to encrypt in such a way that their decryption can be done through the human visual framework. Hence, no computational assistance is requ...
Article
Cotton is an important commodity because of its use in various industries across the globe. It is grown in many countries and is imported/exported as a cash crop due to its large utility. However, cotton yield is adversely affected by the existence of pests, viruses and pathogenic bacteria, etc. For the last one decade or so, several image processi...
Article
The continuous growth in mobile network traffic driven by the extensive range of new user applications, for instance, interactive e-learning, social networking sites, remote medical service and machine-to-machine communication has pushed the mobile network operators to enhance their network capacity. The main solution to deal with this problem is t...
Article
Full-text available
In this paper, a single-layer compound unit element is proposed for reflectarray antenna design operating in Ka-band (26.5-29.5GHz) at the center frequency of 28GHz. A systematic study on the performance of a compound unit element is examined first. The structure of the proposed unit element is a unique combination of two different shape simple pat...
Poster
Full-text available
IEEE Lahore Section, IEEE Bahawalpur Subsection and The Islamia University of Bahawalpur welcomes you to the 23rd IEEE 2020 International Conference on Multi Topic (INMIC'2020). IEEE International Multi Topic Conference, INMIC (International Multi Topic Conference) is the flag ship annual conference of IEEE in Pakistan. The conference is a prestig...
Conference Paper
Internet of Things (IoT) is the major technology of the 4 th industrial revolution in which various types of devices are connected together to work smartly without the intervention of humans. IoT seems to impart a great impact on our social, economic, and commercial lives. IoT applications are converting from smart home and smart me to the smart ci...
Article
Nowadays Non-Intrusive Load Monitoring (NILM) is considered a hot topic among researchers. The energy disaggregation datasets are used as the benchmark to validate the performance of energy disaggregation algorithms. It is indeed rather difficult to record the load monitoring of devices and appliances; therefore various benchmarking datasets have b...
Article
In this paper, a new single layer subwavelength unit cell is designed for reflective metasurface at 28 GHz suitable for 5G communication with linear phase response and wide bandwidth characteristics. The proposed unit cell is analyzed through Floquet mode analysis for two different sizes. The unit cell with conventional half-wavelength size (HWS) h...
Article
The use of deep networks in agriculture has increased enormously in the last decade including their use to classify different plant leaf stresses. More recently, a large number of deep learning-based approaches for plant leaf stress identification have been proposed in literature but there are only a few partial efforts to summarize different contr...
Article
Full-text available
Contrast in visible images is one of the most relevant characteristics of visual signals. Since the pioneering works performed in vision psychology and optics, different definitions have been proposed in the literature. However, for the time being there exist no definition of contrast on which the vision research and visual processing scientific co...
Cover Page
Full-text available
Underwater Image/Video Processing and analysis Over the last few years the research community has seen an increase in studies performed on underwater image and video processing. This interest is mainly focused on processing images and videos recorded underwater keeping in mind different applications such as mining, biological and geological issues,...
Conference Paper
Full-text available
Millimeter-wave technology is getting very popular nowadays for fifth-generation (5G) communications due to increased data rate and bandwidth. The world radio conference 2015 by International Telecommunication Union (ITU) has allocated the band 81 GHz to 86 GHz for mobile applications on a primary basis. This work presents a very compact tapered pl...
Article
Full-text available
Centralized radio access network (CRAN) is getting considerable attention in 5G radio access network infrastructure because of supporting deployments of small cells at a massive scale. In particular, CRAN enables network operators to enhance network coverage and capacity without interference with one cell solution and centralized radio processing....
Article
Full-text available
In this paper, we present a new region-based image retrieval technique based on robust image segmentation. Traditional content-based image retrieval deals with the global description of a query image. We combine the state-of-the-art segmentation algorithms with the traditional approach to narrow the area of interest to a specific region within a qu...
Article
Full-text available
With the massive increase of online content, widespread of social media, the popularity of smartphones, and rise of security breaches, image forensics has attracted a lot of attention in the past two decades alongside the advancements in digital imaging and processing software. The goal is to be able to verify authenticity, ownership, and copyright...
Article
Full-text available
Fires generally occur due to human carelessness and the change in environmental conditions. The uncontrolled fire results in death incidents of humans and animals as well as severe threats to the ecosystem. The preservation of the natural environment is important. The wireless sensor networks, widely used in different monitoring applications, is us...
Article
Full-text available
In this paper, we present a robust and computationally efficient image segmentation technique based on a hybrid convex active contour and the Chan–Vese (CV) model. The proposed algorithm overcomes the drawbacks of existing image segmentation techniques which are heavily dependent upon the initial user input. Here, we propose to combine region-based...
Article
In this paper, we propose new attributes for seismic interpretation in 3D volumes using Higher Order Singular Value Decomposition (HOSVD). HOSVD has the advantage of taking into account multidimensional data and therefore can effectively be used for 3D seismic data. Contrary to many existing attributes that are extracted from 2D windows, the propos...
Preprint
Full-text available
In this paper, we examine several typical texture attributes developed in the image processing community in recent years with respect to their capability of characterizing a migrated seismic volume. These attributes are generated in either frequency or space domain, including steerable pyramid, curvelet, local binary pattern, and local radius index...
Preprint
Full-text available
In this paper, we explore how to computationally characterize subsurface geological structures presented in seismic volumes using texture attributes. For this purpose, we conduct a comparative study of typical texture attributes presented in the image processing literature. We focus on spatial attributes in this study and examine them in a new appl...
Article
During the last decade, the CR (Cognitive Radio) came into view as a major wireless technology to resolve the issue of spectrum secrecy and efficient spectrum utilization. However, due to unlicensed (secondary) users, there are various security threats to the CRN (Cognitive Radio Networks). Some malicious users may access the CRN and mislead the se...
Article
The kernel weighted fuzzy c-means clustering with local information (KWFLICM) algorithm performs robustly to noise in research related to image segmentation using fuzzy c-means (FCM) clustering algorithms, which incorporate image local neighborhood information. However, KWFLICM performs poorly on images contaminated with a high degree of noise. Thi...
Conference Paper
For the first time, a database dedicated to contrast enhancement performance evaluation is proposed. This database has recently been developed by our group. In this paper, a detailed description of this database and the methodology we used to build it are discussed. We show that the perceptual quality of contrasted images is related to some specifi...
Article
We have explored how to computationally characterize subsurface geologic structures presented in seismic volumes using texture attributes. For this purpose, we conduct a comparative study of typical texture attributes presented in the image processing literature. We focus on spatial attributes in this study and examine them in a new application for...
Conference Paper
Security and monitoring systems are increasingly demanding in terms of quality, reliability and flexibility especially those dedicated to video surveillance. The aim of this study is to identify some limiting factors in the existing video-surveillance systems and to propose a set of best practices for developing a smart platform for a security moni...
Conference Paper
Security and monitoring systems are increasingly demanding in terms of quality, reliability and flexibility especially those dedicated to video surveillance. The aim of this study is to identify some limiting factors in the existing video-surveillance systems and to propose a set of best practices for developing a smart platform for a security moni...
Article
Full-text available
Security in the wireless ad hoc network is being considered as a great issue due to the absence of central authority and a priori trustworthy relationship. Moreover, the wireless links are also prone to eavesdropping, replay, and spoofing attacks. The existing security features developed for the wired networks are not well suited for the wireless a...
Article
Full-text available
This paper presents a robust method for passive content authentication of gray and color images. The idea is to capture local and global artifacts resulting from the image manipulation through combining intra-block Markov features in both LBP and DCT domains. An optimized support-vector machine with radial-basis kernel is then trained to classify i...
Article
The fields of applied sciences and engineering require Pseudorandom Number Generators which exhibit useful statistical properties. In this paper, a novel algorithm for generating pseudorandom numbers has been proposed. This new algorithm is based on Duffing map. The aim of this paper is to generate pseudorandom bit streams based on chaotic map. The...
Conference Paper
Full-text available
In this paper, we present a comprehensive analysis and comparison of state-of-the-art Contrast Enhancement (CE) evaluation metrics. In this work, we developed a new database consisting of 182 images. The subjective experiments were performed to obtain a preference rating from different observers for the enhanced images using six CE methods selected...
Article
Full-text available
This letter introduces a novel framework for blind blur assessment in color images using higher order singular values. The RGB color image is seen as a 3rd-order tensor to exploit the spatial and interchannel correlation, so that blurring effects are captured more robustly. The tensor is decomposed into different two-dimensional matrices, also call...
Conference Paper
Full-text available
In this paper, we propose a new approach for image compression based on compressive sensing (CS). The algorithm starts with a traditional multilevel 2-D Wavelet decomposition, which provides a compact representation of image pixels. We introduce a new formulation of sparse vectors for rearranging the wavelet coefficients into a structured manner us...
Conference Paper
Full-text available
In this paper, we examine several typical texture attributes developed in the image processing community in recent years with respect to their capability of characterizing a migrated seismic volume. These attributes are generated in either frequency or space domain, including steerable pyramid, curvelet, local binary pattern, and local radius index...
Conference Paper
Full-text available
Contrast enhancement is one of the most studied problems in image processing. A plethora of approaches has been proposed in the literature for image enhancement since the pioneer work of Kovasznay and Joseph in 1955 [1] and the famous contribution of Gabor in 1965 on image deblurring [2]. However, very few works have been dedicated to contrast enha...
Conference Paper
Full-text available
The development of robust No-Reference Image Quality Assessment (NR-IQA) techniques continues to be a challenging problem. NR-IQA techniques are critical in numerous multimedia applications. Most existing techniques are distortion-specific, as they are only efficient when the type of distortion is known. In this work, we introduce a computationally...
Article
Nowadays, it is extremely simple to manipulate the content of digital images without leaving perceptual clues due to the availability of powerful image editing tools. Image tampering can easily devastate the credibility of images as a medium for personal authentication and a record of events. With the daily upload of millions of pictures to the Int...
Conference Paper
Full-text available
With the advent of powerful image editing tools, manipulating images and changing their content is becoming a trivial task. It is now possible to add, modify, or remove important features from an image without leaving any perceptual traces of tampering. With more than several million pictures uploaded daily to the net, and the introduction of e-Gov...

Network

Cited By

Projects

Projects (7)
Project
Optimally placing micro PMUs in the power system for complete network observability. To figure out and solve practical challenges in the installation of PMUs. Solve problems of existing State estimation.
Project
We will design the antennas (massive MIMO arrays) for future generation communication with the following features, a. minimum ECC b. better isolation c. de-coupling structured d. high gain greater than 15 dBi e. Partial ground plan, EBG f. novel and compact as well