Wadood Abdul

According to our database1, Wadood Abdul authored at least 35 papers between 2009 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Cloud-oriented emotion feedback-based Exergames framework.
Multimedia Tools Appl., 2018

A Fully RNS based ECC Processor.
Integration, 2018

Cloud-assisted secure video transmission and sharing framework for smart cities.
Future Generation Comp. Syst., 2018

Pathogens constancy, harbinger of nosocomial infection cum identification of resistant genes and drug designing.
Computational Biology and Chemistry, 2018

Taxonomy of Factors Causing Integration Failure during Global Software Development.
IEEE Access, 2018

A Systematic Review on Test Suite Reduction: Approaches, Experiment's Quality Evaluation, and Guidelines.
IEEE Access, 2018

Trust and Reputation Management in Healthcare Systems: Taxonomy, Requirements and Open Issues.
IEEE Access, 2018

Cooperative Opportunistic Pressure Based Routing for Underwater Wireless Sensor Networks.
Sensors, 2017

Cooperative Position Aware Mobility Pattern of AUVs for Avoiding Void Zones in Underwater WSNs.
Sensors, 2017

A Localization Based Cooperative Routing Protocol for Underwater Wireless Sensor Networks.
Mobile Information Systems, 2017

Balanced Transmissions Based Trajectories of Mobile Sink in Homogeneous Wireless Sensor Networks.
J. Sensors, 2017

Monitoring square and circular fields with sensors using energy-efficient cluster-based routing for underwater wireless sensor networks.
IJDSN, 2017

The in silico identification of small molecules for protein-protein interaction inhibition in AKAP-Lbc-RhoA signaling complex.
Computational Biology and Chemistry, 2017

Epitopes based drug design for dengue virus envelope protein: A computational approach.
Computational Biology and Chemistry, 2017

Enhanced Architecture for Privacy Preserving Data Integration in a Medical Research Environment.
IEEE Access, 2017

Balanced Load Distribution With Energy Hole Avoidance in Underwater WSNs.
IEEE Access, 2017

Biometric Security Through Visual Encryption for Fog Edge Computing.
IEEE Access, 2017

Toward end-to-end biomet rics-based security for IoT infrastructure.
IEEE Wireless Commun., 2016

An Improved Forwarding of Diverse Events with Mobile Sinks in Underwater Wireless Sensor Networks.
Sensors, 2016

From Mobile to Wearable System: A Wearable RFID System to Enhance Teaching and Learning Conditions.
Mobile Information Systems, 2016

Trace Attack against Biometric Mobile Applications.
Mobile Information Systems, 2016

Automatic Gender Detection Based on Characteristics of Vocal Folds for Mobile Healthcare System.
Mobile Information Systems, 2016

Hybrid Multi-Biometric Template Protection Using Watermarking.
Comput. J., 2016

Steerable pyramid transform and local binary pattern based robust face recognition for e-health secured login.
Computers & Electrical Engineering, 2016

An Intelligent System to Classify Epileptic and Non-Epileptic EEG Signals.
Proceedings of the 12th International Conference on Signal-Image Technology & Internet-Based Systems, 2016

Watermarking for protected fingerprint authentication.
Proceedings of the 2016 12th International Conference on Innovations in Information Technology (IIT), 2016

Challenges and Solutions for Internet of Things Driven by IPv6.
TIIS, 2015

Chaos based Zero-steganography algorithm.
Multimedia Tools Appl., 2014

Inter-communication classification for multi-view face recognition.
Int. Arab J. Inf. Technol., 2014

Error correcting codes for robust color wavelet watermarking.
EURASIP J. Information Security, 2013

Zero-steganography using DCT and spatial domain.
Proceedings of the ACS International Conference on Computer Systems and Applications, 2013

Power efficient scalable hybrid processor architecture.
Proceedings of the 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP), 2012

Human visual system-based color image steganography using the contourlet transform.
Proceedings of the Media Forensics and Security II, 2010

Watermarking using multiple visual channels for perceptual color spaces.
Proceedings of the International Conference on Image Processing, 2010

List decoding of Reed Solomon codes for wavelet based colour image watermarking scheme.
Proceedings of the International Conference on Image Processing, 2009