
Shabana MehfuzNational Islamic University · Department of Electrical Engineering
Shabana Mehfuz
PhD
About
122
Publications
34,732
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,304
Citations
Introduction
Cloud Computing, IOT, Wireless Sensor Networks, Computational Intelligence
Skills and Expertise
Publications
Publications (122)
Guava is a highly nutritious fruit with abundance of health benefits and is medically recommended for daily consumption. Therefore, quality assessment of guava is of significance. Manual quality grading of fruits is being performed for a long time which suffers from subjective biases. Consequently, development of a computer vision-based automated s...
The exponential growth of data poses a critical challenge for cloud storage systems. Redundant data consumes valuable storage space and increases infrastructure costs. Data deduplication, a technique for eliminating duplicate data copies, offers a promising solution. However, existing deduplication techniques often compromise data security, especia...
Image steganography plays a pivotal role in secure data communication and confidentiality protection, particularly in cloud-based environments. In this study, we propose a novel hybrid approach, CNN-DCT Steganography, which combines the power of convolutional neural networks (CNNs) and discrete cosine transform (DCT) for efficient and secure data h...
Autonomous vehicles of the contemporary era constitute a sophisticated blend of artificial intelligence and electronic components. These vehicles operate autonomously by employing neural networks trained to interpret visual input from multiple onboard cameras and subsequently produce corresponding steering angles. However, the existing neural netwo...
Ensuring the confidentiality, integrity, and availability of sensitive data in cloud environments relies heavily on the robust management of cryptographic keys. With the expansion of cloud usage and the increase in data volumes, ensuring the security and reliability of key management services is becoming an essential aspect of overall cloud securit...
The Internet of Things (IoT) is a network of smart sensory objects. These objects collect environmental data and communicate to exchange this gathered data without human intervention. IoT has evolved as a revolutionary technology for over a decade. It is currently, widely applied in a variety of applications like Internet of Vehicles (IoV), Interne...
The significance of the cloud environment is because of its infinite provision of services like servers, storage
systems, and sharing. Data security is an important concern in collective data sharing. As the data is stored and handled
through semi-trusted third-party cloud providers, the necessity of safety for the outsourced information has sign...
This paper presents an innovative approach to strengthening Key Management Systems (KMS) against the escalating landscape of cyber threats by integrating advanced cryptographic technologies, machine learning, deep learning, and the Internet of Things (IoT). As digital reliance and cyber-attacks surge, strengthening KMS security becomes paramount. O...
To ensure data security in the cloud, there exist several techniques proposed by various researchers. The most common method is the usage of data encryption techniques like profile, rule, and attribute-based encryption techniques. However, they struggle in achieving higher data security performance due to insufficient resistance to tampering. Also,...
IoT refers to a network of interconnected devices which are able to share data with each other. Each device in a network has a unique address. The placement of devices called nodes in any network has always been a matter of concern associated with its routing, shortest path, power dissipation by nodes and topology etc. The integration of a wireless...
Due to reduced key size, Elliptic Curve
Cryptography (ECC) was utilized in this study for tenant
authentication, data encryption, and decryption. The proposed
ECC-based authentication technique efficiently defends against
many related threats while allowing authorized users access to
confidential data. The authors choose the exact and ideal values...
In recent times, the machine learning (ML) community has recognized the deep learning (DL) computing model as the Gold Standard. DL has gradually become the most widely used computational approach in the field of machine learning, achieving remarkable results in various complex cognitive tasks that are comparable to, or even surpassing human perfor...
Cloud computing aids users for storing and recovering their information everywhere in the world. Security and efficiency are the two main issues in cloud service. Numerous intrusion detection techniques for the cloud computing environment were proposed, but those techniques do not effectively and accurately detect the attacks. Hence, an efficient a...
Video data analytics is rapidly evolving and transforming the way we live in urban environments. In Video Data Analytics for Smart City Applications: Methods and Trends, data science experts present a comprehensive review of the latest advances and trends in video analytics technologies and their extensive applications in smart city planning and en...
Video data analytics is rapidly evolving and transforming the way we live in urban environments. In Video Data Analytics for Smart City Applications: Methods and Trends, data science experts present a comprehensive review of the latest advances and trends in video analytics technologies and their extensive applications in smart city planning and en...
Wireless Sensor Networks (WSNs) are widely utilized in a variety of applications. Attackers might interfere with equipment, and eavesdrop on conversations. Attackers can also modify the data which has been communicated or connect unauthorized devices to the network if such devices are deployed in the physical environment. To ensure WSN security, me...
Goal oriented software requirements analysis method is used for the analysis of elicited functional goals (FGs) and non-functional goals (NFGs) of a system in which goals are decomposed and refined into sub-goals until requirements from the sub-goals are identified. Based on the critical analysis, we found that most of the attention of goal-oriente...
Reinforced composite is a preferred choice of material for the design of industrial lightweight structures. As of late, composite materials analysis and development utilizing machine learning algorithms have been getting expanding consideration and have accomplished extraordinary upgrades in both time productivity and expectation exactness. This re...
The exponential growth of data management nowadays is quite a tedious and critical issue. It is also evident that methods employed for collecting data for cloud storage exert additional load on different cloud servers operated by many enterprises. Various approaches are used these days to reduce the burden on computer servers. One such approach is...
Cloud computing has gained great attention among the individual user and the organization. Transitioning to the cloud platform is not simple as it involves various cybersecurity and operational issues. Due to a large amount of data storage in the cloud, ensuring the security of the data outsourced in the cloud is highly important. A Key Management...
Although quantum cloud computing (CC) is based on theoretical notions, it still requires experimentation. CC has emerged as an on-demand accessible tool in different practical applications such as digital industry, academics, manufacturing, health sector, and others. Backup, security, processing, and localization are all issues that the cloud is de...
A Cloud Access Security Broker (CASB) is a security enforcement point or cloud-based software that is placed between cloud service users and cloud applications of cloud computing (CC) which is used to run the dimensionality, heterogeneity, and ambiguity correlated with cloud services. They permit the organization to amplify the reach of their secur...
A free and open-source framework management solution can help organizations as well as end-users. An agentless, completely controlled, centrally administered, and freely distributed source, cloud-based data leak control includes enhanced data loss protection management for both corporations and end-users. An Open-Source Framework in the cloud zone...
Requirements elicitation techniques are used to understand and identify the software requirements. Several methods have been developed to elicit the software requirements according to the stakeholders’ needs. However, it has been observed that a single requirements elicitation technique cannot identify software requirements. So, different technique...
Wireless Sensor Network (WSN) is an innovative technology with a broad range of applications and highly attractive benefits, such as low cost of implementation and data transmission, unmonitored access to the network, autonomous and long-term operation. With extensive demand for the advancement of related technologies (cloud computing, near-field c...
Goal-oriented requirements analysis (GORA) is a sub-process of goal-oriented requirements engineering, which is used for the identification and analysis of the high-level objective of an organization. There are different types of GORA methods like AGORA, PRFGOREP, FAGOSRA, Tropos, etc., which have been developed to deal with different issues relate...
More companies are moving sensitive data to the cloud, thereby increasing the need for enhanced security of that data. With cloud technology becoming a larger and more important part of running a digital business, cloud computing (CC) platforms are rapidly limiting the effectiveness of the traditional security model. Since data and applications in...
Its size and complexity, cloud externalization is considered for enhancing security in API. Nonetheless, cloud storage API has two key problems that allows user usability to be effectively functioning and that securely update cipher text in cloud through a new access policy for data owner. This paper recommends an effective secure access update alg...
The cellular mobile communication network has been widely deployed in large regions to provide connectivity between billions of people. The population of cellular mobile users has been growing since the past decade. Therefore, we need a high capacity cellular system with extraordinary performance to meet the demand of the cellular users. To minimiz...
The COVID-19, Coronavirus Disease 2019, emerged as a hazardous disease that led to many causalities across the world. Early detection of COVID-19 in patients and proper treatment along with awareness can help to contain COVID-19. Proposed Fuzzy Cloud-Based (FCB) COVID-19 Diagnosis Assistant aims to identify the patients as confirmed, suspects, or s...
The COVID-19 pandemic has had a significant impact on spread of the coronavirus disease. Currently, valuation and analysis of COVID-19 is a trending topic in the research industry that has been explored deeply. Many researches have been done in the selected time frame so far that evaluated the damages within the given conditions through different a...
Introduction: The COVID-19, Coronavirus Disease 2019, emerged as a hazardous disease that led manycausalities across the world. Maintaining physical distancing, a critical task with minimum trips has become ahot trend nowadays. To keep up with patient care amidst an international crisis that is exhausting online healthcare resources, physical dista...
More enterprises are moving sensitive data to the cloud, increasing the need to secure that data. With cloud technology becoming a larger and more important part of running a
digital business, cloud computing (CC) platforms are rapidly limiting the effectiveness of the traditional security model. Since data and applications in the cloud reside with...
Wireless sensor networks (WSNs) are becoming very common in numerous manufacturing industries; especially where it is difficult to connect a sensor to a sink. This is an evolving issue for researchers attempting to contribute to the proliferation of WSNs. Monitoring a WSN depends on the type of collective data the sensor nodes have acquired. It is...
To prolong the function of wireless sensor networks (WSNs), the lifetime of the system has to be increased. WSNs lifetime can be calculated by using a few generic parameters, such as the time until the death of the first node and other parameters according to the application. Literature indicates that choosing the most appropriate cluster head by c...
A Cloud Access Security Broker (CASB) may be a safekeeping necessity point or cloud-based program that's set between cloud benefit clients and cloud applications of
cloud computing which is utilized to run the dimensionality, heterogeneity, and equivocalness associated with cloud administrations. They permit the organization to amplify the reach of...
Handwriting recognition has always been an active and challenging research area with various applications in daily life and also in area of pattern recognition. Some of the applications are reading tool for blind people, reading handwritten bank cheques, by converting it into properly structured text which can be easily detected by the designed alg...
Design of feasible WSN is a very challenging issue. Ensuring reliable delivery of data/information in to the desired destination in wireless sensor networks (WSN) with best data aggregation using relevant routing is one of the major challenges to attain a high degree of adequacy in WSN. Issues regarding the reliability of WSN are studied in this pa...
Distance protection is the most widely used protection technique for transmission line protection due to its
enhanced selectivity towards fault, fast response and availability of various relay programming algorithms. However, when
faults are detected in Zone 2 of a relay, instantaneous tripping is not possible and are cleared after an inherent time...
In recent years, Wireless Sensor Networks (WSN’s) deployments have rapidly increased for real time applications in various areas. In WSN, power consumption is of utmost importance as they are battery operated with limited capacity,and therefore power consumption is one of the key constraint in the design of wireless sensor networks. Communication u...
In long transmission lines, the charging current caused by the shunt capacitance decreases the accuracy in impedance based fault location. To improve the accuracy of fault location, this paper presents a novel scheme, where two Digital Fault Recorders (DFRs) are installed in a line. They can send the transient data of the faults to the both ends of...
The virtual machine (VM) provisioning in cloud computing offers a good possibility for energy and cost saving, given the dynamic nature of the cloud environment. However, the commitment of giving the best possible quality of service to end users often leads to the requirement in dealing with the energy and performance tradeoff. In this work, we hav...
Computer based pattern recognition is a process that involves several sub-processes, including pre-processing, feature extraction, feature selection, and classification. Feature extraction is the estimation of certain attributes of the target patterns. Selection of the right set of features is the most crucial and complex part of building a pattern...
Distribution system is the means of revenue for electric utility. It needs to be restored at the earliest if any feeder or complete system is tripped out due to fault or any other cause. Further, uncertainty of the loads, result in variations in the distribution network’s parameters. Thus, an intelligent algorithm incorporating hybrid fuzzy-grey re...
In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadc...
In Mobile Ad hoc networks broadcasting is the one of the most important and crucial phenomenon. Broadcasting can be taken up in many ways and the simplest method of broadcasting is simple flooding which can significantly increase the overheads and can result in redundant messages which can further cause the Broadcasting Strom problem. In this paper...
MANETs are collection of independent nodes, which communicate with each other to perform a task. Broadcasting methods are widely used in this infrastructureless networks. Although broadcasting is easy to implement and a method to perform routing and safety functions, in a wide and high mobility MANET it is a difficult and expensive task to achieve....
With advancements in cloud services offering suppler and cost efficient solutions to support the IT infrastructure and business applications, a large number of legacy systems are steadily making a move. However, these migrations are often performed in ad hoc manner leading to underutilisation of the technology. As a result of which lot of research...
Today, most of the organizations trust on their age old legacy applications, to support their business-critical systems. However, there are several critical concerns, as maintainability and scalability issues, associated with the legacy system. In this background, cloud services offer a more agile and cost effective platform, to support business ap...
The long term returns of adopting cloud computing, has led many organizations to think of migrating to the cloud. However on the other side due to rapidly emergent market and the security concerns floating over the cloud computing, organizations are not too sure about how to proceed with the migration into the cloud. After a brief introduction abou...
Dissolved gas analysis is a most prevailing and effective condition monitoring tool now a days, used for the detection of incipient faults in the oil-immersed transformer in service, as it is highly sensitive to small amount of thermal and electrical faults. In this work, a system based on condition diagnosis is developed to combine two classical t...
The aim of the present paper was to compare the 2C molecular level, 3C water molecular level and 3C mineral molecular level of Indian subjects. %BF were calculated using different equations. For 2C molecular level Siri 2C body equation developed in year 1956 was used. For 3C water molecular level Siri developed 3C equation in 1961 which was more ac...
Statistical techniques for off-line character recognition are not flexible and adaptive enough for new handwriting constraints. Offline handwritten character recognition of English alphabets using a three layered feed forward neural network is presented in this paper. The proposed recognition system describes the evaluation of feed forward neural n...