Amjad Ur Rehman - Academia.edu (original) (raw)
Papers by Amjad Ur Rehman
Microscopy research and technique, Jan 21, 2018
Visual inspection for the quantification of malaria parasitaemiain (MP) and classification of lif... more Visual inspection for the quantification of malaria parasitaemiain (MP) and classification of life cycle stage are hard and time taking. Even though, automated techniques for the quantification of MP and their classification are reported in the literature. However, either reported techniques are imperfect or cannot deal with special issues such as anemia and hemoglobinopathies due to clumps of red blood cells (RBCs). The focus of the current work is to examine the thin blood smear microscopic images stained with Giemsa by digital image processing techniques, grading MP on independent factors (RBCs morphology) and classification of its life cycle stage. For the classification of the life cycle of malaria parasite the k-nearest neighbor, Naïve Bayes and multi-class support vector machine are employed for classification based on histograms of oriented gradients and local binary pattern features. The proposed methodology is based on inductive technique, segment malaria parasites through...
PloS one, 2018
For the last three decades, content-based image retrieval (CBIR) has been an active research area... more For the last three decades, content-based image retrieval (CBIR) has been an active research area, representing a viable solution for retrieving similar images from an image repository. In this article, we propose a novel CBIR technique based on the visual words fusion of speeded-up robust features (SURF) and fast retina keypoint (FREAK) feature descriptors. SURF is a sparse descriptor whereas FREAK is a dense descriptor. Moreover, SURF is a scale and rotation-invariant descriptor that performs better in the case of repeatability, distinctiveness, and robustness. It is robust to noise, detection errors, geometric, and photometric deformations. It also performs better at low illumination within an image as compared to the FREAK descriptor. In contrast, FREAK is a retina-inspired speedy descriptor that performs better for classification-based problems as compared to the SURF descriptor. Experimental results show that the proposed technique based on the visual words fusion of SURF-FREA...
Neural regeneration research, Jan 25, 2012
Neuron cell are built from a myriad of axon and dendrite structures. It transmits electrochemical... more Neuron cell are built from a myriad of axon and dendrite structures. It transmits electrochemical signals between the brain and the nervous system. Three-dimensional visualization of neuron structure could help to facilitate deeper understanding of neuron and its models. An accurate neuron model could aid understanding of brain's functionalities, diagnosis and knowledge of entire nervous system. Existing neuron models have been found to be defective in the aspect of realism. Whereas in the actual biological neuron, there is continuous growth as the soma extending to the axon and the dendrite; but, the current neuron visualization models present it as disjointed segments that has greatly mediated effective realism. In this research, a new reconstruction model comprising of the Bounding Cylinder, Curve Interpolation and Gouraud Shading is proposed to visualize neuron model in order to improve realism. The reconstructed model is used to design algorithms for generating neuron branc...
Applied Artificial Intelligence, 2015
The version presented here may differ from the published version or from the version of the recor... more The version presented here may differ from the published version or from the version of the record. Please see the repository URL above for details on accessing the published version and note that access may require a subscription.
3D Research, 2014
ABSTRACT Extreme expressions are really type of emotional expressions that are basically stimulat... more ABSTRACT Extreme expressions are really type of emotional expressions that are basically stimulated through the strong emotion. An example of those extreme expression is satisfied through tears. So to be able to provide these types of features; additional elements like fluid mechanism (particle system) plus some of physics techniques like (SPH) are introduced. The fusion of facile animation with SPH exhibits promising results. Accordingly, proposed fluid technique using facial animation is the real tenor for this research to get the complex expression, like laugh, smile, cry (tears emergence) or the sadness until cry strongly, as an extreme expression classification that’s happens on the human face in some cases. Graphical Abstract Creating tears with 100 particles and set gravity: A −50, B −200
Neural Computing and Applications, 2014
Offline cursive script recognition and their associated issues are still fresh despite of last fe... more Offline cursive script recognition and their associated issues are still fresh despite of last few decades’ research. This paper presents an annotated comparison of proposed and recently published preprocessing techniques with reported work in the offline cursive script recognition. Normally, in the offline script analysis, the input is a paper image or a word or a digit and the desired output is ASCII text. This task involves several preprocessing steps, and some of them are quite hard such as line removal from text, skew removal, reference line detection (lower/upper baselines), slant removal, scaling, noise elimination, contour smoothing and skeleton. Moreover, subsequent stage of segmentation (if any) and recognition is also highly dependent on these preprocessing techniques. This paper presents an analysis and annotated comparison of latest preprocessing techniques proposed by authors with those reported in the literature on IAM/CEDAR benchmark databases. Finally, future work and persist problems are highlighted.
Journal of Intelligent Systems, 2014
The rapid growth of covert activities via communications network brought about an increasing need... more The rapid growth of covert activities via communications network brought about an increasing need to provide an efficient method for data hiding to protect secret information from malicious attacks. One of the options is to combine two approaches, namely steganography and compression. However, its performance heavily relies on three major factors, payload, imperceptibility, and robustness, which are always in trade-offs. Thus, this study aims to hide a large amount of secret message inside a grayscale host image without sacrificing its quality and robustness. To realize the goal, a new two-tier data hiding technique is proposed that integrates an improved exploiting modification direction (EMD) method and Huffman coding. First, a secret message of an arbitrary plain text of characters is compressed and transformed into streams of bits; each character is compressed into a maximum of 5 bits per stream. The stream is then divided into two parts of different sizes of 3 and 2 bits. Subse...
IETE Technical Review, 2014
The accuracy of the Content should not be relied upon and should be independently verified with p... more The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content. This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden.
2009 IEEE International Conference on Signal and Image Processing Applications, 2009
Abstract-This paper presents two new preprocessing techniques for cursive script recognition. Enh... more Abstract-This paper presents two new preprocessing techniques for cursive script recognition. Enhanced algorithms for core-region detection and effective uniform slant angle estimation are proposed. Reference lines composed of core-region are usually obtained ...
International Journal of Machine Learning and Cybernetics, 2013
Currently Virtual Machines (VMs) have many applications and their use is growing constantly as th... more Currently Virtual Machines (VMs) have many applications and their use is growing constantly as the hardware gets more powerful and usage more regulated allowing for scaling, monitoring, portability, security applications and many other uses. There are many types of virtualization techniques that can be employed on many levels from simple sandbox to full fledged streamlined managed access. While scaling, software lifecycles and diversity are just some of security challenges faced by VM developers the failure to properly implement those mechanisms may lead to VM escape, host access, denial of service and more. There are many exploits found in the last couple of years which were fixed on latest versions but some systems are still running them and vulnerable as presented, mostly to host based attacks and some have dramatic consequences.
International Journal of Machine Learning and Cybernetics, 2013
Pattern recognition is classification process that attempts to assign each input value to one of ... more Pattern recognition is classification process that attempts to assign each input value to one of a given set of classes. The process of pattern recognition in the state of art has been achieved either by training of artificially intelligent tools or using heuristic rule based approaches. The objective of this paper is to provide a comparative study between artificially trained and heuristics rule based techniques employed for pattern recognition in the state of the art focused on script pattern recognition. It is observed that mainly there are two categories of script pattern recognition techniques. First category involves assistance of artificial intelligent learning and next, is based on heuristicrules for cursive script pattern segmentation/recognition. Accordingly, a detailed critical study is performed that focuses on size of training/testing data and implication of artificial learning on script pattern recognition accuracy. Moreover, the techniques are described in details that are employed to identify character patterns. Finally, performances of different techniques on benchmark database are compared regarding pattern recognition accuracy, error rate, single or multiple classifiers being employed. Problems that still persist are also highlighted and possible directions are set.
The Imaging Science Journal, 2014
Images are full of information and most often, little information is desired for subsequent proce... more Images are full of information and most often, little information is desired for subsequent processing. Hence, region of interest has key importance in image processing. Quadtree image segmentation has been widely used in many image processing applications to locate the region of interest for further processing. There are also variable block-size image coding techniques to effectively reduce the number of transmitted parts. This paper presents quadtree partition technique as a pre-processing step in image processing to determine what part should be more heterogeneous than the others. It also introduces an idea to solve the problem of squared images. Finally, proposed approach is implemented and analysed. The simulation of the Matlab code of the quadtree is represented by all algorithms and the figures. Thus, achieved results are promising in the state of the art.
Artificial Intelligence Review, 2012
Page 1. Artif Intell Rev DOI 10.1007/s10462-011-9229-7 Off-line cursive script recognition: curre... more Page 1. Artif Intell Rev DOI 10.1007/s10462-011-9229-7 Off-line cursive script recognition: current advances, comparisons and remaining problems Amjad Rehman ·Tanzila Saba © Springer Science+Business Media BV 2011 ...
Artificial Intelligence Review, 2014
This paper presents a state of the art review of features extraction for soccer video summarizati... more This paper presents a state of the art review of features extraction for soccer video summarization research. The all existing approaches with regard to event detection, video summarization based on video stream and application of text sources in event detection have been surveyed. As regard the current challenges for automatic and real time provision of summary videos, different computer vision approaches are discussed and compared. Audio, video feature extraction methods and their combination with textual methods have been investigated. Available commercial products are presented to better clarify the boundaries in this domain and future directions for improvement of existing systems have been suggested.
Abstract This article presents the development of a Close Spanning Tree (CST) approach for error... more Abstract This article presents the development of a Close Spanning Tree (CST) approach for error detection and correction in CAD drawing which is stored in the data exchange files (DXF) format. The motivation for this research is to develop error detection and correction ...
Data centers now play an important role in modern IT infrastructures. Although much research effo... more Data centers now play an important role in modern IT infrastructures. Although much research effort has been made in the field of green data center computing, performance metrics for green data centers have been left ignored. This paper is devoted to identify and implement energy efficiency and green computing performance metrics in data centers. The metrics helps data center managers to measure and implement cost and power savings in data centers. A metrics based energy efficiency model for categorizing data center into measureable units is proposed which divides data center into four measureable areas and maps metrics to measure their efficiency and performance. The results generated after applying Power Usage Effectiveness metrics clearly demonstrate poor performance of data center with PUE value of 3.5, which indicates very inefficient data center.
Data centers now play an important role in modern IT infrastructures. Although much research effo... more Data centers now play an important role in modern IT infrastructures. Although much research effort has been made in the field of green data center computing, performance metrics for green data centers have been left ignored. This paper is devoted to identify and implement energy efficiency and green computing performance metrics in data centers. The metrics helps data center managers to measure and implement cost and power savings in data centers. A metrics based energy efficiency model for categorizing data center into measureable units is proposed which divides data center into four measureable areas and maps metrics to measure their efficiency and performance. The results generated after applying Power Usage Effectiveness metrics clearly demonstrate poor performance of data center with PUE value of 3.5, which indicates very inefficient data center.
Microscopy research and technique, Jan 21, 2018
Visual inspection for the quantification of malaria parasitaemiain (MP) and classification of lif... more Visual inspection for the quantification of malaria parasitaemiain (MP) and classification of life cycle stage are hard and time taking. Even though, automated techniques for the quantification of MP and their classification are reported in the literature. However, either reported techniques are imperfect or cannot deal with special issues such as anemia and hemoglobinopathies due to clumps of red blood cells (RBCs). The focus of the current work is to examine the thin blood smear microscopic images stained with Giemsa by digital image processing techniques, grading MP on independent factors (RBCs morphology) and classification of its life cycle stage. For the classification of the life cycle of malaria parasite the k-nearest neighbor, Naïve Bayes and multi-class support vector machine are employed for classification based on histograms of oriented gradients and local binary pattern features. The proposed methodology is based on inductive technique, segment malaria parasites through...
PloS one, 2018
For the last three decades, content-based image retrieval (CBIR) has been an active research area... more For the last three decades, content-based image retrieval (CBIR) has been an active research area, representing a viable solution for retrieving similar images from an image repository. In this article, we propose a novel CBIR technique based on the visual words fusion of speeded-up robust features (SURF) and fast retina keypoint (FREAK) feature descriptors. SURF is a sparse descriptor whereas FREAK is a dense descriptor. Moreover, SURF is a scale and rotation-invariant descriptor that performs better in the case of repeatability, distinctiveness, and robustness. It is robust to noise, detection errors, geometric, and photometric deformations. It also performs better at low illumination within an image as compared to the FREAK descriptor. In contrast, FREAK is a retina-inspired speedy descriptor that performs better for classification-based problems as compared to the SURF descriptor. Experimental results show that the proposed technique based on the visual words fusion of SURF-FREA...
Neural regeneration research, Jan 25, 2012
Neuron cell are built from a myriad of axon and dendrite structures. It transmits electrochemical... more Neuron cell are built from a myriad of axon and dendrite structures. It transmits electrochemical signals between the brain and the nervous system. Three-dimensional visualization of neuron structure could help to facilitate deeper understanding of neuron and its models. An accurate neuron model could aid understanding of brain's functionalities, diagnosis and knowledge of entire nervous system. Existing neuron models have been found to be defective in the aspect of realism. Whereas in the actual biological neuron, there is continuous growth as the soma extending to the axon and the dendrite; but, the current neuron visualization models present it as disjointed segments that has greatly mediated effective realism. In this research, a new reconstruction model comprising of the Bounding Cylinder, Curve Interpolation and Gouraud Shading is proposed to visualize neuron model in order to improve realism. The reconstructed model is used to design algorithms for generating neuron branc...
Applied Artificial Intelligence, 2015
The version presented here may differ from the published version or from the version of the recor... more The version presented here may differ from the published version or from the version of the record. Please see the repository URL above for details on accessing the published version and note that access may require a subscription.
3D Research, 2014
ABSTRACT Extreme expressions are really type of emotional expressions that are basically stimulat... more ABSTRACT Extreme expressions are really type of emotional expressions that are basically stimulated through the strong emotion. An example of those extreme expression is satisfied through tears. So to be able to provide these types of features; additional elements like fluid mechanism (particle system) plus some of physics techniques like (SPH) are introduced. The fusion of facile animation with SPH exhibits promising results. Accordingly, proposed fluid technique using facial animation is the real tenor for this research to get the complex expression, like laugh, smile, cry (tears emergence) or the sadness until cry strongly, as an extreme expression classification that’s happens on the human face in some cases. Graphical Abstract Creating tears with 100 particles and set gravity: A −50, B −200
Neural Computing and Applications, 2014
Offline cursive script recognition and their associated issues are still fresh despite of last fe... more Offline cursive script recognition and their associated issues are still fresh despite of last few decades’ research. This paper presents an annotated comparison of proposed and recently published preprocessing techniques with reported work in the offline cursive script recognition. Normally, in the offline script analysis, the input is a paper image or a word or a digit and the desired output is ASCII text. This task involves several preprocessing steps, and some of them are quite hard such as line removal from text, skew removal, reference line detection (lower/upper baselines), slant removal, scaling, noise elimination, contour smoothing and skeleton. Moreover, subsequent stage of segmentation (if any) and recognition is also highly dependent on these preprocessing techniques. This paper presents an analysis and annotated comparison of latest preprocessing techniques proposed by authors with those reported in the literature on IAM/CEDAR benchmark databases. Finally, future work and persist problems are highlighted.
Journal of Intelligent Systems, 2014
The rapid growth of covert activities via communications network brought about an increasing need... more The rapid growth of covert activities via communications network brought about an increasing need to provide an efficient method for data hiding to protect secret information from malicious attacks. One of the options is to combine two approaches, namely steganography and compression. However, its performance heavily relies on three major factors, payload, imperceptibility, and robustness, which are always in trade-offs. Thus, this study aims to hide a large amount of secret message inside a grayscale host image without sacrificing its quality and robustness. To realize the goal, a new two-tier data hiding technique is proposed that integrates an improved exploiting modification direction (EMD) method and Huffman coding. First, a secret message of an arbitrary plain text of characters is compressed and transformed into streams of bits; each character is compressed into a maximum of 5 bits per stream. The stream is then divided into two parts of different sizes of 3 and 2 bits. Subse...
IETE Technical Review, 2014
The accuracy of the Content should not be relied upon and should be independently verified with p... more The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content. This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden.
2009 IEEE International Conference on Signal and Image Processing Applications, 2009
Abstract-This paper presents two new preprocessing techniques for cursive script recognition. Enh... more Abstract-This paper presents two new preprocessing techniques for cursive script recognition. Enhanced algorithms for core-region detection and effective uniform slant angle estimation are proposed. Reference lines composed of core-region are usually obtained ...
International Journal of Machine Learning and Cybernetics, 2013
Currently Virtual Machines (VMs) have many applications and their use is growing constantly as th... more Currently Virtual Machines (VMs) have many applications and their use is growing constantly as the hardware gets more powerful and usage more regulated allowing for scaling, monitoring, portability, security applications and many other uses. There are many types of virtualization techniques that can be employed on many levels from simple sandbox to full fledged streamlined managed access. While scaling, software lifecycles and diversity are just some of security challenges faced by VM developers the failure to properly implement those mechanisms may lead to VM escape, host access, denial of service and more. There are many exploits found in the last couple of years which were fixed on latest versions but some systems are still running them and vulnerable as presented, mostly to host based attacks and some have dramatic consequences.
International Journal of Machine Learning and Cybernetics, 2013
Pattern recognition is classification process that attempts to assign each input value to one of ... more Pattern recognition is classification process that attempts to assign each input value to one of a given set of classes. The process of pattern recognition in the state of art has been achieved either by training of artificially intelligent tools or using heuristic rule based approaches. The objective of this paper is to provide a comparative study between artificially trained and heuristics rule based techniques employed for pattern recognition in the state of the art focused on script pattern recognition. It is observed that mainly there are two categories of script pattern recognition techniques. First category involves assistance of artificial intelligent learning and next, is based on heuristicrules for cursive script pattern segmentation/recognition. Accordingly, a detailed critical study is performed that focuses on size of training/testing data and implication of artificial learning on script pattern recognition accuracy. Moreover, the techniques are described in details that are employed to identify character patterns. Finally, performances of different techniques on benchmark database are compared regarding pattern recognition accuracy, error rate, single or multiple classifiers being employed. Problems that still persist are also highlighted and possible directions are set.
The Imaging Science Journal, 2014
Images are full of information and most often, little information is desired for subsequent proce... more Images are full of information and most often, little information is desired for subsequent processing. Hence, region of interest has key importance in image processing. Quadtree image segmentation has been widely used in many image processing applications to locate the region of interest for further processing. There are also variable block-size image coding techniques to effectively reduce the number of transmitted parts. This paper presents quadtree partition technique as a pre-processing step in image processing to determine what part should be more heterogeneous than the others. It also introduces an idea to solve the problem of squared images. Finally, proposed approach is implemented and analysed. The simulation of the Matlab code of the quadtree is represented by all algorithms and the figures. Thus, achieved results are promising in the state of the art.
Artificial Intelligence Review, 2012
Page 1. Artif Intell Rev DOI 10.1007/s10462-011-9229-7 Off-line cursive script recognition: curre... more Page 1. Artif Intell Rev DOI 10.1007/s10462-011-9229-7 Off-line cursive script recognition: current advances, comparisons and remaining problems Amjad Rehman ·Tanzila Saba © Springer Science+Business Media BV 2011 ...
Artificial Intelligence Review, 2014
This paper presents a state of the art review of features extraction for soccer video summarizati... more This paper presents a state of the art review of features extraction for soccer video summarization research. The all existing approaches with regard to event detection, video summarization based on video stream and application of text sources in event detection have been surveyed. As regard the current challenges for automatic and real time provision of summary videos, different computer vision approaches are discussed and compared. Audio, video feature extraction methods and their combination with textual methods have been investigated. Available commercial products are presented to better clarify the boundaries in this domain and future directions for improvement of existing systems have been suggested.
Abstract This article presents the development of a Close Spanning Tree (CST) approach for error... more Abstract This article presents the development of a Close Spanning Tree (CST) approach for error detection and correction in CAD drawing which is stored in the data exchange files (DXF) format. The motivation for this research is to develop error detection and correction ...
Data centers now play an important role in modern IT infrastructures. Although much research effo... more Data centers now play an important role in modern IT infrastructures. Although much research effort has been made in the field of green data center computing, performance metrics for green data centers have been left ignored. This paper is devoted to identify and implement energy efficiency and green computing performance metrics in data centers. The metrics helps data center managers to measure and implement cost and power savings in data centers. A metrics based energy efficiency model for categorizing data center into measureable units is proposed which divides data center into four measureable areas and maps metrics to measure their efficiency and performance. The results generated after applying Power Usage Effectiveness metrics clearly demonstrate poor performance of data center with PUE value of 3.5, which indicates very inefficient data center.
Data centers now play an important role in modern IT infrastructures. Although much research effo... more Data centers now play an important role in modern IT infrastructures. Although much research effort has been made in the field of green data center computing, performance metrics for green data centers have been left ignored. This paper is devoted to identify and implement energy efficiency and green computing performance metrics in data centers. The metrics helps data center managers to measure and implement cost and power savings in data centers. A metrics based energy efficiency model for categorizing data center into measureable units is proposed which divides data center into four measureable areas and maps metrics to measure their efficiency and performance. The results generated after applying Power Usage Effectiveness metrics clearly demonstrate poor performance of data center with PUE value of 3.5, which indicates very inefficient data center.