Search Results - "Jamal, Sajjad Shaukat"

Refine Results
  1. 1

    Compound usage of L shaped fin and Nano-particles for the acceleration of the solidification process inside a vertical enclosure (A comparison with ordinary double rectangular fin) by Chen, Yuning, Feng, Li, Shaukat Jamal, Sajjad, Sharma, Kamal, Mahariq, Ibrahim, Jarad, Fahd, Arsalanloo, Akbar

    Published in Case studies in thermal engineering (01-12-2021)
    “…Performance enhancement of energy storing unite is a very important issue in renewable energy systems. In the present investigation, L shaped fins with two…”
    Get full text
    Journal Article
  2. 2

    Disease Detection in Grape Cultivation Using Strategically Placed Cameras and Machine Learning Algorithms With a Focus on Powdery Mildew and Blotches by Hesham Khan, Kashif, Aljaedi, Amer, Ishtiaq, Muhammad Shakeel, Imam, Hassan, Bassfar, Zaid, Shaukat Jamal, Sajjad

    Published in IEEE access (2024)
    “…Grape cultivation faces various challenges, such as pests, management, fertilizer quality, and diseases caused by bacteria, fungi, and viruses. Notably,…”
    Get full text
    Journal Article
  3. 3

    An Improved Chaotic Cryptosystem for Image Encryption and Digital Watermarking by Attaullah, Shah, Tariq, Jamal, Sajjad Shaukat

    Published in Wireless personal communications (01-02-2020)
    “…In this article, enhanced chaotic range map is used for data hiding and multimedia security. By using complex properties of improved chaotic logistic map that…”
    Get full text
    Journal Article
  4. 4

    Deep Learning for the Industrial Internet of Things (IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions by Latif, Shahid, Driss, Maha, Boulila, Wadii, Huma, Zil E, Jamal, Sajjad Shaukat, Idrees, Zeba, Ahmad, Jawad

    Published in Sensors (Basel, Switzerland) (12-11-2021)
    “…The Industrial Internet of Things (IIoT) refers to the use of smart sensors, actuators, fast communication protocols, and efficient cybersecurity mechanisms to…”
    Get full text
    Journal Article
  5. 5

    A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map by Masood, Fawad, Ahmad, Jawad, Shah, Syed Aziz, Jamal, Sajjad Shaukat, Hussain, Iqtadar

    Published in Entropy (Basel, Switzerland) (28-02-2020)
    “…Chaos-based encryption schemes have attracted many researchers around the world in the digital image security domain. Digital images can be secured using…”
    Get full text
    Journal Article
  6. 6

    A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT by Khan, Muhammad Almas, Khan, Muazzam A., Jan, Sana Ullah, Ahmad, Jawad, Jamal, Sajjad Shaukat, Shah, Awais Aziz, Pitropakis, Nikolaos, Buchanan, William J.

    Published in Sensors (Basel, Switzerland) (22-10-2021)
    “…A large number of smart devices in Internet of Things (IoT) environments communicate via different messaging protocols. Message Queuing Telemetry Transport…”
    Get full text
    Journal Article
  7. 7

    HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles by Ullah, Safi, Khan, Muazzam A, Ahmad, Jawad, Jamal, Sajjad Shaukat, E Huma, Zil, Hassan, Muhammad Tahir, Pitropakis, Nikolaos, Arshad, Buchanan, William J

    Published in Sensors (Basel, Switzerland) (10-02-2022)
    “…Internet of Vehicles (IoV) is an application of the Internet of Things (IoT) network that connects smart vehicles to the internet, and vehicles with each…”
    Get full text
    Journal Article
  8. 8

    Lightweight Chaos-Based Nonlinear Component of Block Ciphers by Khan, Majid, Jamal, Sajjad Shaukat

    Published in Wireless personal communications (01-10-2021)
    “…Chaos influence different fields of science and technology. The development of sciences is at peak expected to the rapid broadcast of information with the…”
    Get full text
    Journal Article
  9. 9

    A novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformation by Shah, Dawood, Shah, Tariq, Jamal, Sajjad Shaukat

    “…Algebraic structures and their hardware–software implementation gain considerable attention in the field of information security and coding theory. Research…”
    Get full text
    Journal Article
  10. 10

    AES Based White Box Cryptography in Digital Signature Verification by Shukla, Piyush Kumar, Aljaedi, Amer, Pareek, Piyush Kumar, Alharbi, Adel R, Jamal, Sajjad Shaukat

    Published in Sensors (Basel, Switzerland) (02-12-2022)
    “…According to the standard paradigm, white box cryptographic primitives are used to block black box attacks and protect sensitive information. This is performed…”
    Get full text
    Journal Article
  11. 11

    Classification of Skin Cancer Lesions Using Explainable Deep Learning by Zia Ur Rehman, Muhammad, Ahmed, Fawad, Alsuhibany, Suliman A, Jamal, Sajjad Shaukat, Zulfiqar Ali, Muhammad, Ahmad, Jawad

    Published in Sensors (Basel, Switzerland) (01-09-2022)
    “…Skin cancer is among the most prevalent and life-threatening forms of cancer that occur worldwide. Traditional methods of skin cancer detection need an…”
    Get full text
    Journal Article
  12. 12

    A Power Associative Loop Structure for the Construction of Non-Linear Components of Block Cipher by Hussain, Sadam, Jamal, Sajjad Shaukat, Shah, Tariq, Hussain, Iqtadar

    Published in IEEE access (2020)
    “…In the symmetric key cryptography, the purpose of the substitution box is to generate confusion and hence improve the security of the whole cryptosystem. For…”
    Get full text
    Journal Article
  13. 13

    Construction of Cryptographic S-Boxes Based on Mobius Transformation and Chaotic Tent-Sine System by Jamal, Sajjad Shaukat, Anees, Amir, Ahmad, Musheer, Khan, Muhammad Fahad, Hussain, Iqtadar

    Published in IEEE access (2019)
    “…Over the last few decades, different mediums of secure communication use chaos which is demonstrated by some nonlinear dynamical systems. Chaos shows…”
    Get full text
    Journal Article
  14. 14
  15. 15

    SAWPS: Secure Access Control for Wearable Plant Sensors-Reinforcing Agriculture 4.0 by Irshad, Azeem, Aljaedi, Amer, Bassfar, Zaid, Shaukat Jamal, Sajjad, Daud, Ali, Ashraf Chaudhry, Shehzad, Kumar Das, Ashok

    Published in IEEE sensors journal (15-09-2024)
    “…The deployment of Agriculture 4.0 depends heavily on the adoption of the Internet of Things (IoT) and wireless sensors for increasing productivity and reducing…”
    Get full text
    Journal Article
  16. 16

    Image encryption scheme for multi-focus images for visual sensors network by Khan, Majid, Khan, Lalsaid, Hazzazi, Mohammad Mazyad, Jamal, Sajjad Shaukat, Hussain, Iqtadar

    Published in Multimedia tools and applications (01-05-2022)
    “…Image fusion is the technique to obtain an image, possessing spatially and spectrally enhanced as compared to the individual high spatial and high spectral…”
    Get full text
    Journal Article
  17. 17

    Parent–Daughter Confusion Component: A New Approach for the Construction of Nonlinear Confusion Component by Firdousi, Faiza, Khan, Majid, Jamal, Sajjad Shaukat, Faraz, Naeem

    Published in Wireless personal communications (01-10-2021)
    “…The nonlinear confusion component is one of an integral part of any modern block cipher. This nonlinear confusion component is used to hides the relationship…”
    Get full text
    Journal Article
  18. 18

    A Novel Hybrid Secure Confidentiality Mechanism for Medical Environment Based on Kramer’s Spin Principle by Waseem, Hafiz Muhammad, Jamal, Sajjad Shaukat, Hussain, Iqtadar, Khan, Majid

    “…Most of the digital contents privacy schemes follow the rigid transformation rules and depend on multiple enciphering rounds. The digital contents in the…”
    Get full text
    Journal Article
  19. 19

    A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments by Meshram, Chandrashekhar, Imoize, Agbotiname Lucky, Aljaedi, Amer, Alharbi, Adel R., Jamal, Sajjad Shaukat, Barve, Sharad Kumar

    Published in Sensors (Basel, Switzerland) (30-10-2021)
    “…The place of public key cryptography (PKC) in guaranteeing the security of wireless networks under human-centered IoT environments cannot be overemphasized…”
    Get full text
    Journal Article
  20. 20

    An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric by Meshram, Chandrashekhar, Ibrahim, Rabha W., Meshram, Sarita Gajbhiye, Imoize, Agbotiname Lucky, Jamal, Sajjad Shaukat, Barve, Sharad Kumar

    Published in The Journal of supercomputing (01-07-2022)
    “…The study of chaotic constructions and their associated cryptographic frameworks has sparked a lot of research interest in recent years. Latest advances in…”
    Get full text
    Journal Article