Rafiqul Zaman Khan
Aligarh Muslim University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Rafiqul Zaman Khan.
International Journal of Computer Applications | 2012
Noor Adnan Ibraheem; Rafiqul Zaman Khan
Gestures considered as the most natural expressive way for communications between human and computers in virtual system. Hand gesture is a method of non-verbal communication for human beings for its freer expressions much more other than body parts. Hand gesture recognition has greater importance in designing an efficient human computer interaction system. Using gestures as a natural interface benefits as a motivation for analyzing, modeling, simulation, and recognition of gestures. In this paper a survey on various recent gesture recognition approaches is provided with particular emphasis on hand gestures. A review of static hand posture methods are explained with different tools and algorithms applied on gesture recognition system, including connectionist models, hidden Markov model, and fuzzy clustering. Challenges and future research directions are also highlighted.
Computer and Information Science | 2012
Rafiqul Zaman Khan; Noor Adnan Ibraheem
One of the attractive methods for providing natural human-computer interaction is the use of the hand as an input device rather than the cumbersome devices such as keyboards and mice, which need the user to be located in a specific location to use these devices. Since human hand is an articulated object, it is an open issue to discuss. The most important thing in hand gesture recognition system is the input features, and the selection of good features representation. This paper presents a review study on the hand postures and gesture recognition methods, which is considered to be a challenging problem in the human-computer interaction context and promising as well. Many applications and techniques were discussed here with the explanation of system recognition framework and its main phases.
international conference on information and communication technology | 2016
Haider Khalaf Jabbar; Rafiqul Zaman Khan
In this paper we survey development of Expert System by methodologies and applications from 2010 to 2015 through a literature review and classification papers as a basis. This paper surveys and classifies Expert System methodologies using four categories: Intelligent agents, modeling, Ontology and System architecture with their applications for different research and problem domains. Additionally discussion was presented, and from this discussion we provided some suggestion that should be taken into consideration in the future regarding to the development of Expert Systems in methodologies and applications: first, Expert Systems methodologies are destined to develop by using expertise of Expert System applications in the domain. Secondly, the different social science methodologies should be including also to give more opportunity for explores the methodologies and applications. Thirdly, the ability to continually change and get new understanding is the driving power of Expert System methodologies, and should be the Expert Systems application of future works.
Archive | 2016
Rafiqul Zaman Khan; Mohammad Oqail Ahmad
Cloud computing has broadly been put into practice by business sector, however, there are several actual issues including load balancing, virtual machine migration, automated service provisioning, algorithm complexity, etc., that have not been completely resolved. Each of these are the main challenges of load balancing, that is likely to distribute the unwanted dynamic local workload smoothly to all the nodes in the entire cloud to gain a remarkable consumer fulfillment and resource utilizing ratio. It also makes sure that every computing resource is distributed proficiently and reasonably. This paper describes a thought of cloud computing along research challenges in load balancing.
Archive | 2018
Mohammad Oqail Ahmad; Rafiqul Zaman Khan
The cloud computing is an up-and-coming computing standard, which offers large-scale distributed computing environment to share information and other resources as per users demand. Load balancing is a central challenge of the cloud computing, which requires distributing work load fairly across all the nodes for the better use of available resources. This research paper is a systematic review with a comparative study on existing techniques and tools for load balancing. Load balancing metric parameters (reaction time, fault tolerance, scalability, throughput, etc.) were used to evaluate the performance of existing techniques for comparison. Further, we have discussed virtualization of the cloud and its types for optimal resource utilization.
Archive | 2018
Atena Shiranzaei; Rafiqul Zaman Khan
IPv4 has been used over 30 years. It proved robust, interoperable, and easy implementation. The number of users is raising dramatically, the growth and development of IPv6 are vital. This protocol provides many new features like larger address space, auto-configuration, QoS, IPsec, easier TCP/IP administration, mobility, etc. In addition to these features, IPv6 development brings new security issues; however, many attacks were inherited from IPv4, which harm IPv6 networks. Those attacks affect both IPv4 and IPv6 networks. This paper explains and analysis the common threats in IPv4 and IPv6, security threats which introduced by new features of IPv6, and transition threats.
international conference on computing communication and automation | 2016
Rafiqul Zaman Khan; Atena Shiranzaei
Internet Protocol version 6 (IPv6) is a new routing protocol which has been deploying dramatically over the past years. This is introduced by IETF to overcome some of IPv4 limitations. People believe that IPv6 is secure more than IPv4, which this idea is not correct. IPv6 requires attention because of develop a secure and safe IPv6 deployment. It is important to know that it should be assessed regularly. The best way to defense is to look at security as a hacker by penetration testing. This paper covers and reviews some of the fundamental penetration testing and monitoring tools. Moreover, we provided a collection of tools that is not available in any literature review.
Archive | 2012
Noor Adnan Ibraheem; Mokhtar M. Hasan; Rafiqul Zaman Khan; Pramod Kumar Mishra
International Journal of Applied Information Systems | 2013
Noor Adnan Ibraheem; Rafiqul Zaman Khan; Mokhtar Mohammed Hasan
Archive | 2013
Noor Adnan Ibraheem; Rafiqul Zaman Khan