Benafsh Husain

Learn More
Integration of audio and video signals for automatic speech recognition has become an important field of study. The AudioVisual Speech Recognition (AVSR) system is known to have accuracy higher than audio-only or visual-only system. The research focused on the visual front end and has been centered around lip segmentation. Experiments performed for lip(More)
Botnets are groups of compromised computers that botmasters (botherders) use to launch attacks over the Internet. To avoid detection, botnets use DNS fast flux to change the mapping between IP addresses and domain names periodically. Domain generation algorithms (DGAs) are employed to generate a large number of domain names. Detection techniques have been(More)
Spyware is somewhat of a silent killer, because its essential task is secretly and quietly monitoring or sending victim's sensitive information to a separate third party. Unfortunately, existing anti-spyware systems lack the ability to cope with the rapid changes in the spyware signatures and programs. The main challenge in recent anti-spyware systems is to(More)
In this paper, we present an analysis of gallium nitride (GaN) quantum-well (QW) laser diode (LD) by numerical simulation. Here we discuss three aspects that are crucial to our analysis. First, the transverse mode pattern is studied, and our current GaN diode laser structure is discussed with optical waveguide mode analysis. Then we compare the QW design of(More)
Parallel distributed systems are widely used for dealing with massive data sets and high performance computing. Securing parallel distributed systems is problematic. Centralized security tools are likely to cause bottlenecks and introduce a single point of failure. Exascale storage systems should have advantages in performance and flexibility over(More)
Understanding performance data, and more specifically memory access pattern is essential in optimizing scientific applications. Among the various factors affecting performance, such as the hardware architecture, the algorithms, or the system software stack, performance is also often related to the applications' physics. While there exists a number of(More)
Spyware is considered as a great threat to confidentiality that it can cause loss of control over private data for computer users. This kind of threat might select some data and send it to another third party without the consent of the user. Spyware detection techniques have been presented traditionally by three approaches; signature, behavior and(More)
  • 1