Farhan Ahmad

Learn More
The massive or large scaled multiple input multiple output (MIMO) systems have gained huge consideration due to high achievable data rates and connection reliability for future wireless networks. Multiple signal paths due to multiple antennas positioned at transmitter or receiver are responsible for large throughput. The eventual objective of using array of(More)
Image retrieval on the basis of similarity is an important task in many image database applications. Majority of the users' requests requires retrieving those images in the database that are spatially similar to the query image. In image databases, images are represented by symbolic images. Spatial relationships in a symbolic image are represented by 2D(More)
Vehicular Ad Hoc Networks (VANET) are the largest real life application of ad-hoc networks where nodes are represented via fast moving vehicles. This paper introduces the future emerging technology, i.e., Vehicular Cloud Networking (VCN) where vehicles and adjacent infrastructure merge with traditional internet clouds to offer different applications ranging(More)
This study discusses the concept of personalization and customization mechanism performed specifically for a cloud based vehicular platform. The proof-of-concept prototype allows the user to create a personalized environment on the Vehicular On-Board Unit (OBU) from hand-held devices of vehicular users. The paper discusses an extensive analysis on different(More)
Vehicular Networks (VANET) are the largest real life application of ad-hoc networks where nodes are represented via fast moving vehicles. As VANET is characterised with several unique features such as the high mobility, random distribution and short connection times, etc. establishing security becomes very challenging, and identifying security threats and(More)
In this paper, a modified digital signcryption model has been proposed keeping in view the requirements of firewall signcryption. Based on this model, the security and efficiency of existing signcryption schemes that are presented over the years have been analyzed. The analysis shows that these schemes lack certain security attributes and violate the basic(More)
  • 1