Search Results - "Khan, Abdul Nasir"
-
1
Metal-organic framework-derived hollow Co3O4/carbon as efficient catalyst for peroxymonosulfate activation
Published in Chemical engineering journal (Lausanne, Switzerland : 1996) (01-05-2019)“…[Display omitted] •Top-down etching strategy was used to get hollow ZIF-67(HZIF-67).•HZIF-67 was used as a precursor for the fabrication of hollow Co3O4/C by…”
Get full text
Journal Article -
2
An efficient and compromise-resilient image encryption scheme for resource-constrained environments
Published in PloS one (18-04-2024)“…The secret keys produced by current image cryptosystems, which rely on chaotic sequences, exhibit a direct correlation with the size of the image. As the image…”
Get full text
Journal Article -
3
Touch or click friendly: Towards adaptive user interfaces for complex applications
Published in PloS one (05-02-2024)“…This study evaluated the usability of a direct manipulation device (touchscreen) vs. indirect manipulation devices (mouse and touchpad) on the selected…”
Get full text
Journal Article -
4
Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques
Published in IEEE access (01-01-2024)“…In the contemporary landscape, where a huge amount of data plays a vital role, the importance of strong and robust cybersecurity measures has become…”
Get full text
Journal Article -
5
Secure‐CamFlow: A device‐oriented security model to assist information flow control systems in cloud environments for IoTs
Published in Concurrency and computation (25-04-2019)“…Summary Recent developments in the cloud technologies have motivated the migration of distributed large systems, specifically the Internet of Things to the…”
Get full text
Journal Article -
6
Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks
Published in Journal of network and computer applications (01-06-2014)“…Due to the distributed nature of Denial-of-Service attacks, it is tremendously challenging to identify such malicious behavior using traditional intrusion…”
Get full text
Journal Article -
7
Singlet oxygen-dominated non-radical oxidation process for efficient degradation of bisphenol A under high salinity condition
Published in Water research (Oxford) (01-01-2019)“…The degradation of organic contaminants under high salinity condition is still a challenge for environmental remediation due to the inhibiting effect resulted…”
Get full text
Journal Article -
8
A fog-based security framework for intelligent traffic light control system
Published in Multimedia tools and applications (01-09-2019)“…The world is facing many problems including that of traffic congestion. To highlight the issue of traffic congestion worldwide specially in urban areas and to…”
Get full text
Journal Article -
9
A survey on privacy and access control schemes in fog computing
Published in International journal of communication systems (25-01-2021)“…Summary To provide reliable data storage and retrieval services to the end users, the cloud service provider implements secure data storage, sharing, and…”
Get full text
Journal Article -
10
Computation Offloading Cost Estimation in Mobile Cloud Application Models
Published in Wireless personal communications (01-12-2017)“…Mobile cloud computing requires specialized application development models that can facilitate development of cloud-enabled applications. This paper presents a…”
Get full text
Journal Article -
11
Energy-efficient routing protocol for reliable low-latency Internet of Things in oil and gas pipeline monitoring
Published in PeerJ. Computer science (29-02-2024)“…The oil and gas industries (OGI) are the primary global energy source, with pipelines as vital components for OGI transportation. However, pipeline leaks pose…”
Get full text
Journal Article -
12
MobiByte: An Application Development Model for Mobile Cloud Computing
Published in Journal of grid computing (01-12-2015)“…Mobile cloud computing presents an effective solution to overcome smartphone constraints, such as limited computational power, storage, and energy. As the…”
Get full text
Journal Article -
13
Core–Shell Prussian Blue Analogs with Compositional Heterogeneity and Open Cages for Oxygen Evolution Reaction
Published in Advanced science (03-04-2019)“…Here, a reduction‐cation exchange (RCE) strategy is proposed for synthesizing Fe–Co based bimetallic Prussian blue analogs (PBAs) with heterogeneous…”
Get full text
Journal Article -
14
Mechanism of peroxymonosulfate activation and the utilization efficiency using hollow (Co, Mn)3O4 nanoreactor as an efficient catalyst for degradation of organic pollutants
Published in Environmental research (01-05-2022)“…Development of efficient catalysts for peroxymonosulfate (PMS) activation and further understanding its mechanism on organic pollutants degradation is of…”
Get full text
Journal Article -
15
A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach
Published in Journal of grid computing (01-12-2015)“…Cloud computing is an emerging computing paradigm that offers on-demand, flexible, and elastic computational and storage services for the end-users. The small…”
Get full text
Journal Article -
16
TiO2/C coated Co3O4 nanocages for peroxymonosulfate activation towards efficient degradation of organic pollutants
Published in Chemosphere (Oxford) (01-12-2022)“…Developing new catalysts for efficient degradation of micropollutants in water is of significant importance in advanced oxidation processes (AOPs). Herein,…”
Get full text
Journal Article -
17
Agent‐based ARP cache poisoning detection in switched LAN environments
Published in IET networks (01-01-2019)“…Address resolution protocol (ARP) cache poisoning is mostly used to perform man‐in‐the‐middle (MITM) and denial of service (DoS) attacks for sniffing and…”
Get full text
Journal Article -
18
Hollow Fe0/graphitized carbon nanocubes derived from the metal-organic framework for enhanced activation of peroxymonosulfate
Published in Separation and purification technology (01-09-2023)“…[Display omitted] •The hollow Fe0/graphitized carbon (HFe0/GC) catalyst was prepared by hollow Fe/ZIF-8.•Tannic acid was used for etching and it could maintain…”
Get full text
Journal Article -
19
Incremental proxy re-encryption scheme for mobile cloud computing environment
Published in The Journal of supercomputing (01-05-2014)Get full text
Journal Article -
20
Understanding the research trends of Safety Citizenship Behavior using bibliometric analysis
Published in Quality & quantity (01-10-2023)“…In recent years, researchers are giving significant efforts to explore the knowledge in the area of ‘safety citizenship behavior’. The study knowing the…”
Get full text
Journal Article