Search Results - "Jamal, Sajjad Shaukat"
-
1
Compound usage of L shaped fin and Nano-particles for the acceleration of the solidification process inside a vertical enclosure (A comparison with ordinary double rectangular fin)
Published in Case studies in thermal engineering (01-12-2021)“…Performance enhancement of energy storing unite is a very important issue in renewable energy systems. In the present investigation, L shaped fins with two…”
Get full text
Journal Article -
2
Disease Detection in Grape Cultivation Using Strategically Placed Cameras and Machine Learning Algorithms With a Focus on Powdery Mildew and Blotches
Published in IEEE access (2024)“…Grape cultivation faces various challenges, such as pests, management, fertilizer quality, and diseases caused by bacteria, fungi, and viruses. Notably,…”
Get full text
Journal Article -
3
An Improved Chaotic Cryptosystem for Image Encryption and Digital Watermarking
Published in Wireless personal communications (01-02-2020)“…In this article, enhanced chaotic range map is used for data hiding and multimedia security. By using complex properties of improved chaotic logistic map that…”
Get full text
Journal Article -
4
Deep Learning for the Industrial Internet of Things (IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions
Published in Sensors (Basel, Switzerland) (12-11-2021)“…The Industrial Internet of Things (IIoT) refers to the use of smart sensors, actuators, fast communication protocols, and efficient cybersecurity mechanisms to…”
Get full text
Journal Article -
5
A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map
Published in Entropy (Basel, Switzerland) (28-02-2020)“…Chaos-based encryption schemes have attracted many researchers around the world in the digital image security domain. Digital images can be secured using…”
Get full text
Journal Article -
6
A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT
Published in Sensors (Basel, Switzerland) (22-10-2021)“…A large number of smart devices in Internet of Things (IoT) environments communicate via different messaging protocols. Message Queuing Telemetry Transport…”
Get full text
Journal Article -
7
HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles
Published in Sensors (Basel, Switzerland) (10-02-2022)“…Internet of Vehicles (IoV) is an application of the Internet of Things (IoT) network that connects smart vehicles to the internet, and vehicles with each…”
Get full text
Journal Article -
8
Lightweight Chaos-Based Nonlinear Component of Block Ciphers
Published in Wireless personal communications (01-10-2021)“…Chaos influence different fields of science and technology. The development of sciences is at peak expected to the rapid broadcast of information with the…”
Get full text
Journal Article -
9
A novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformation
Published in Multidimensional systems and signal processing (01-07-2020)“…Algebraic structures and their hardware–software implementation gain considerable attention in the field of information security and coding theory. Research…”
Get full text
Journal Article -
10
AES Based White Box Cryptography in Digital Signature Verification
Published in Sensors (Basel, Switzerland) (02-12-2022)“…According to the standard paradigm, white box cryptographic primitives are used to block black box attacks and protect sensitive information. This is performed…”
Get full text
Journal Article -
11
Classification of Skin Cancer Lesions Using Explainable Deep Learning
Published in Sensors (Basel, Switzerland) (01-09-2022)“…Skin cancer is among the most prevalent and life-threatening forms of cancer that occur worldwide. Traditional methods of skin cancer detection need an…”
Get full text
Journal Article -
12
A Power Associative Loop Structure for the Construction of Non-Linear Components of Block Cipher
Published in IEEE access (2020)“…In the symmetric key cryptography, the purpose of the substitution box is to generate confusion and hence improve the security of the whole cryptosystem. For…”
Get full text
Journal Article -
13
Construction of Cryptographic S-Boxes Based on Mobius Transformation and Chaotic Tent-Sine System
Published in IEEE access (2019)“…Over the last few decades, different mediums of secure communication use chaos which is demonstrated by some nonlinear dynamical systems. Chaos shows…”
Get full text
Journal Article -
14
Internet of Medical Things (IoMT) and Reflective Belief Design-Based Big Data Analytics with Convolution Neural Network-Metaheuristic Optimization Procedure (CNN-MOP)
Published in Computational intelligence and neuroscience (2022)“…In recent times, the Internet of Medical Things (IoMT) is a new loomed technology, which has been deliberated as a promising technology designed for various…”
Get full text
Journal Article -
15
SAWPS: Secure Access Control for Wearable Plant Sensors-Reinforcing Agriculture 4.0
Published in IEEE sensors journal (15-09-2024)“…The deployment of Agriculture 4.0 depends heavily on the adoption of the Internet of Things (IoT) and wireless sensors for increasing productivity and reducing…”
Get full text
Journal Article -
16
Image encryption scheme for multi-focus images for visual sensors network
Published in Multimedia tools and applications (01-05-2022)“…Image fusion is the technique to obtain an image, possessing spatially and spectrally enhanced as compared to the individual high spatial and high spectral…”
Get full text
Journal Article -
17
Parent–Daughter Confusion Component: A New Approach for the Construction of Nonlinear Confusion Component
Published in Wireless personal communications (01-10-2021)“…The nonlinear confusion component is one of an integral part of any modern block cipher. This nonlinear confusion component is used to hides the relationship…”
Get full text
Journal Article -
18
A Novel Hybrid Secure Confidentiality Mechanism for Medical Environment Based on Kramer’s Spin Principle
Published in International journal of theoretical physics (2021)“…Most of the digital contents privacy schemes follow the rigid transformation rules and depend on multiple enciphering rounds. The digital contents in the…”
Get full text
Journal Article -
19
A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments
Published in Sensors (Basel, Switzerland) (30-10-2021)“…The place of public key cryptography (PKC) in guaranteeing the security of wireless networks under human-centered IoT environments cannot be overemphasized…”
Get full text
Journal Article -
20
An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric
Published in The Journal of supercomputing (01-07-2022)“…The study of chaotic constructions and their associated cryptographic frameworks has sparked a lot of research interest in recent years. Latest advances in…”
Get full text
Journal Article