Entity

Time filter

Source Type

Topi, Pakistan

Hussain S.F.,GIK Institute | Bashir S.,Bahria University | Bashir S.,Abu Dhabi University
Knowledge and Information Systems | Year: 2015

In many clustering problems, we have access to multiple sources of data representing different aspects of the problem. Each of these data separately represents an association between entities. Multi-view clustering involves integrating clustering information from these heterogeneous sources of data and has been shown to improve results over a single-view clustering. On the other hand, co-clustering has been widely used as a technique to improve clustering results on a single view by exploiting the duality between objects and their attributes. In this paper, we propose a multi-view clustering setting in the context of a co-clustering framework. Our underlying assumption is that similarity values generated from the individual data can be transferred from one view to the other(s) resulting in a better clustering of the data. We provide empirical evidence to show that this framework results in a better clustering accuracy than those obtained from any of the single views, tested on different datasets. © 2015 Springer-Verlag London


Hussain I.,Quaid-i-Azam University | Azam N.A.,Quaid-i-Azam University | Azam N.A.,GIK Institute | Shah T.,Quaid-i-Azam University
Optics and Laser Technology | Year: 2014

In this article, an optical image encryption algorithm with an information hiding technique is presented. In this algorithm, a secret image is implanted into the cover image. After that the stego-image is encrypted with the help of double random phase encoding algorithm and chaotic substitution box transformation. Also, we present a comparative analysis between images "without substitution box transformation", "with substitution box transformation" and "with chaotic substitution box transformation". Security test shows that image transform with chaotic substitution box transformation is better than others. Furthermore we analyze proposed encryption scheme with other existing techniques and come to close that our algorithm is better than others. © 2014 Elsevier Ltd.


Ahmad S.M.,GIK Institute | Ahmed O.A.,Control Systems Consultant | Mohamed Z.,University of Technology Malaysia
Transactions of the Canadian Society for Mechanical Engineering | Year: 2015

Active Magnetic Bearings (AMBs) are increasingly used in various industries and a quick re-levitation of AMBs supported high speed flexible rotor is necessary in case of vibration induced failure. A robust fault diagnosis algorithm is presented to detect suspected saturation type of nonlinearity associated with a power amplifier. A five degree-of-freedom AMB system consisting of four opposing pair of radial magnets and a pair of axial magnets is considered. In this paper failure of an industrial grade AMB system is investigated using Sinusoidal Input Describing Function (SIDF) method. SIDF predicts the gain and frequency at which failure occurs. It is demonstrated that the predicted frequency is in agreement with the frequency at which failure occurs.


Khan M.,Quaid-i-Azam University | Azam N.A.,GIK Institute
Security and Communication Networks | Year: 2015

This article deals with an algorithm for the generation of impregnable substitution boxes (S-box). The proposed scheme involves the application of right translation and Gray codes over the original Advanced Encryption Standard (AES) S-box. Regular representation of Galois field GF(28) is used to produce the translational effect in the AES S-box. The translated AES S-box is then subjected to Gray codes for the enhancement in their algebraic complexity. The proposed scheme results 256 different cryptographically strong S-boxes. Several tests such as non-linearity, bit independence, strict avalanche, linear approximation and differential approximation, algebraic complexity, correlation and histogram are implemented on every newly generated S-box to analyze their resistance against computational attacks. Furthermore, the newly generated S-boxes are compared with the existing well-known S-boxes. The simulation results indicate that the resistance of proposed S-boxes against computational attacks including linear, interpolation, differential and algebraic attacks approaches to the optimal values. © 2014 John Wiley & Sons, Ltd.


Haq S.,GIK Institute | Ishaq M.,GIK Institute
International Journal of Heat and Mass Transfer | Year: 2012

An analytic approximate procedure, called optimal homotopy asymptotic method (OHAM) is considered for the solution of strongly nonlinear differential equations arising in heat transfer. Two particular applications are chosen: convecting-radiating cooling of a lumped system with variable specific heat and fins with temperature dependent surface heat flux. The effectiveness of the method, which is independent of the small parameter, is investigated by comparing the results obtained with the exact and the results already present in the literature. © 2012 Elsevier Ltd. All rights reserved.

Discover hidden collaborations