Work place: Jeddah International College, Jeddah, Kingdom of Saudi Arabia
E-mail: f.mera@jicollege.edu.sa
Website:
Research Interests: Computer Science & Information Technology, Information Security, Network Architecture, Network Security, Information Systems, Information-Theoretic Security
Biography
Dr.Fahad Mira has completed PhD in computer science, and presently working as faculty member in Jeddah International College, and his area of research Includes Network/Information/Cybersecurity.
By Mahaboob Sharief Shaik Fahad Mira
DOI: https://doi.org/10.5815/ijwmt.2020.01.04, Pub. Date: 8 Feb. 2020
The infrastructure benefits, which are achieved from the MANET architecture is the prime reason for the increase in usage for various purposes. The MANET architecture is made truly seamless with the capabilities of working without the central base stations or without the intervention of the central administration. The architecture for a MANET network is highly diversified and completely depends on the formation as the nodes in the MANET network can roam freely with a subsequent connection to any external device or any external networks. Yet another primary benefit of these devices and the networks are operability of the networks and the nodes without any human interventions. This property of the MANET network nodes makes the MANET devices operable in extreme conditions, where the human interventions are nearly impossible. In spite of these uncountable benefits, the MANET networks and the devices, which are part of the networkare always subjected to attacks from various sources. In this work, the attacks types for each network layer are identified and addressed to be prevented. The measures listed in this work are convertible as a modular component of any automated framework to make the complete attack prevention mechanism automated
[...] Read more.By Anupam Dey Fahad Mira Saleque Ahmed Raiyan Sharif A. F. M. Saifuddin Saif
DOI: https://doi.org/10.5815/ijeme.2019.01.05, Pub. Date: 8 Jan. 2019
With the expansion of worldwide security concerns and a consistently expanding requirement for successful checking of open places, i.e. air terminals, railroad stations, shopping centres, crowded sports fields, army bases or smart healthcare facilities such as daily activity monitoring and fall detection in old people’s homes is increasing very rapidly. The visual occlusions and ambiguities in crowded scenes, usage of suitable method and in addition the perplexing practices and scene semantics make the investigation a challenging task. This research demonstrates comprehensive and critical analysis of crowd scene involves in object detection, tracking, feature extraction and learning from visual surveillance which helps to recognize behavioural pattern. This research refers scene understanding as scene layout, i.e. finding streets, structures, side-walks, vehicles turning, person on foot intersection and scene status such as crowd congestion, split, merge etc. The significance of the proposed comprehensive review to create crowd administration procedures and help the development of the group or people, to maintain a strategic distance from the group calamities and guarantee general society security. Based on the observation of previous research in three aspects, i.e. review based on methods, frameworks and critical existing results analysis, this research propose a framework for anomaly detection in crowded scene using LSTM (long Short-Term Method). Proposed comprehensive review is expected to contribute significantly for the investigation of behavior pattern analysis in computer vision research domains.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals