Muhammad Salman Khan

Learn More
The WWW is currently experiencing a revolutionary growth due to numerous emerging tools, techniques and concepts. Digital journals thus need to transform themselves to cope with this evolution of the web. With their growing information size and access, conventional techniques for managing a journal and supporting authors and readers are becoming(More)
Today's evolving cyber security threats demand new, modern, and cognitive computing approaches to network security systems. In the early years of the Internet, a simple packet inspection firewall was adequate to stop the then-contemporary attacks, such as Denial of Service (DoS), ports scans, and phishing. Since then, DoS has evolved to include Distributed(More)
Keywords: Health care Fall detection Unsupervised classification Source separation Mel-frequency cepstral coefficient One class support vector machine a b s t r a c t We present a novel unsupervised fall detection system that employs the collected acoustic signals (footstep sound signals) from an elderly person's normal activities to construct a data(More)
(ICASSP 2013). Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works, must be obtained from the IEEE. ABSTRACT In this(More)
[Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.] Abstract— Source(More)
In this study, we investigate the downloads behavior of readers for two well-known IEEE journals in the field of education, i.e., IEEE Transactions on Learning Technologies (TLT) and IEEE Transactions on Education (ToE). In our analysis, we found that articles in both journals are not downloaded rapidly in earlier months. The majority of articles reach to(More)
Please cite the published version. that the original work is my own except as specified in acknowledgements or in footnotes, and that neither the thesis nor the original work contained therein has been submitted to this or any other institution for a degree. Abstract While humans can separate a sound of interest amidst a cacophony of contending sounds in an(More)
Advanced Persistent Threats (APTs) are a new breed of internet based smart threats, which can go undetected with the existing state of-the-art internet traffic monitoring and protection systems. With the evolution of internet and cloud computing, a new generation of smart APT attacks has also evolved and signature based threat detection systems are proving(More)