Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Rafiqul Zaman Khan is active.

Publication


Featured researches published by Rafiqul Zaman Khan.


International Journal of Computer Applications | 2012

Survey on Various Gesture Recognition Technologies and Techniques

Noor Adnan Ibraheem; Rafiqul Zaman Khan

Gestures considered as the most natural expressive way for communications between human and computers in virtual system. Hand gesture is a method of non-verbal communication for human beings for its freer expressions much more other than body parts. Hand gesture recognition has greater importance in designing an efficient human computer interaction system. Using gestures as a natural interface benefits as a motivation for analyzing, modeling, simulation, and recognition of gestures. In this paper a survey on various recent gesture recognition approaches is provided with particular emphasis on hand gestures. A review of static hand posture methods are explained with different tools and algorithms applied on gesture recognition system, including connectionist models, hidden Markov model, and fuzzy clustering. Challenges and future research directions are also highlighted.


Computer and Information Science | 2012

Survey on Gesture Recognition for Hand Image Postures

Rafiqul Zaman Khan; Noor Adnan Ibraheem

One of the attractive methods for providing natural human-computer interaction is the use of the hand as an input device rather than the cumbersome devices such as keyboards and mice, which need the user to be located in a specific location to use these devices. Since human hand is an articulated object, it is an open issue to discuss. The most important thing in hand gesture recognition system is the input features, and the selection of good features representation. This paper presents a review study on the hand postures and gesture recognition methods, which is considered to be a challenging problem in the human-computer interaction context and promising as well. Many applications and techniques were discussed here with the explanation of system recognition framework and its main phases.


international conference on information and communication technology | 2016

Survey on Development of Expert System from 2010 to 2015

Haider Khalaf Jabbar; Rafiqul Zaman Khan

In this paper we survey development of Expert System by methodologies and applications from 2010 to 2015 through a literature review and classification papers as a basis. This paper surveys and classifies Expert System methodologies using four categories: Intelligent agents, modeling, Ontology and System architecture with their applications for different research and problem domains. Additionally discussion was presented, and from this discussion we provided some suggestion that should be taken into consideration in the future regarding to the development of Expert Systems in methodologies and applications: first, Expert Systems methodologies are destined to develop by using expertise of Expert System applications in the domain. Secondly, the different social science methodologies should be including also to give more opportunity for explores the methodologies and applications. Thirdly, the ability to continually change and get new understanding is the driving power of Expert System methodologies, and should be the Expert Systems application of future works.


Archive | 2016

Load Balancing Challenges in Cloud Computing: A Survey

Rafiqul Zaman Khan; Mohammad Oqail Ahmad

Cloud computing has broadly been put into practice by business sector, however, there are several actual issues including load balancing, virtual machine migration, automated service provisioning, algorithm complexity, etc., that have not been completely resolved. Each of these are the main challenges of load balancing, that is likely to distribute the unwanted dynamic local workload smoothly to all the nodes in the entire cloud to gain a remarkable consumer fulfillment and resource utilizing ratio. It also makes sure that every computing resource is distributed proficiently and reasonably. This paper describes a thought of cloud computing along research challenges in load balancing.


Archive | 2018

Load Balancing Tools and Techniques in Cloud Computing: A Systematic Review

Mohammad Oqail Ahmad; Rafiqul Zaman Khan

The cloud computing is an up-and-coming computing standard, which offers large-scale distributed computing environment to share information and other resources as per users demand. Load balancing is a central challenge of the cloud computing, which requires distributing work load fairly across all the nodes for the better use of available resources. This research paper is a systematic review with a comparative study on existing techniques and tools for load balancing. Load balancing metric parameters (reaction time, fault tolerance, scalability, throughput, etc.) were used to evaluate the performance of existing techniques for comparison. Further, we have discussed virtualization of the cloud and its types for optimal resource utilization.


Archive | 2018

IPv6 Security Issues—A Systematic Review

Atena Shiranzaei; Rafiqul Zaman Khan

IPv4 has been used over 30 years. It proved robust, interoperable, and easy implementation. The number of users is raising dramatically, the growth and development of IPv6 are vital. This protocol provides many new features like larger address space, auto-configuration, QoS, IPsec, easier TCP/IP administration, mobility, etc. In addition to these features, IPv6 development brings new security issues; however, many attacks were inherited from IPv4, which harm IPv6 networks. Those attacks affect both IPv4 and IPv6 networks. This paper explains and analysis the common threats in IPv4 and IPv6, security threats which introduced by new features of IPv6, and transition threats.


international conference on computing communication and automation | 2016

IPv6 security tools — A systematic review

Rafiqul Zaman Khan; Atena Shiranzaei

Internet Protocol version 6 (IPv6) is a new routing protocol which has been deploying dramatically over the past years. This is introduced by IETF to overcome some of IPv4 limitations. People believe that IPv6 is secure more than IPv4, which this idea is not correct. IPv6 requires attention because of develop a secure and safe IPv6 deployment. It is important to know that it should be assessed regularly. The best way to defense is to look at security as a hacker by penetration testing. This paper covers and reviews some of the fundamental penetration testing and monitoring tools. Moreover, we provided a collection of tools that is not available in any literature review.


Archive | 2012

Understanding Color Models: A Review

Noor Adnan Ibraheem; Mokhtar M. Hasan; Rafiqul Zaman Khan; Pramod Kumar Mishra


International Journal of Applied Information Systems | 2013

Comparative Study of Skin Color based Segmentation Techniques

Noor Adnan Ibraheem; Rafiqul Zaman Khan; Mokhtar Mohammed Hasan


Archive | 2013

Multiple Histogram Technique for Robust Skin Color Based Segmentation

Noor Adnan Ibraheem; Rafiqul Zaman Khan

Collaboration


Dive into the Rafiqul Zaman Khan's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge