Research explorer tool

Date


School

Research Areas

Download Available

18 results

WiFreeze: Multiresolution Scalograms for Freezing of Gait Detection in Parkinson's Leveraging 5G Spectrum with Deep Learning

Journal Article
Tahir, A., Ahmad, J., Shah, S. A., Morison, G., Skelton, D. A., Larijani, H., …Gibson, R. M. (2019)
WiFreeze: Multiresolution Scalograms for Freezing of Gait Detection in Parkinson's Leveraging 5G Spectrum with Deep Learning. Electronics, 8(12), https://doi.org/10.3390/electronics8121433
Freezing of Gait (FOG) is an episodic absence of forward movement in Parkinson's Disease (PD) patients and represents an onset of disabilities. FOG hinders daily activities an...

A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids

Journal Article
Bashir, I., Ahmed, F., Ahmad, J., Boulila, W., & Alharbi, N. (2019)
A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids. Entropy, 21(11), https://doi.org/10.3390/e21111132
Image hash is an alternative to cryptographic hash functions for checking integrity of digital images. Compared to cryptographic hash functions, an image hash or a Perceptual ...

A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids

Journal Article
Adeel, A., Ahmad, J., Larijani, H., & Hussain, A. (2020)
A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids. Cognitive Computation, 12, 589–601. https://doi.org/10.1007/s12559-019-09653-z
Next-generation audio-visual (AV) hearing aids stand as a major enabler to realize more intelligible audio. However, high data rate, low latency, low computational complexity,...

DNA key based visual chaotic image encryption

Journal Article
Khan, J. S., Ahmad, J., Ahmed, S. S., Siddiqa, H. A., Abbasi, S. F., & Kayhan, S. K. (2019)
DNA key based visual chaotic image encryption. Journal of Intelligent and Fuzzy Systems, 37(2), 2549-2561. https://doi.org/10.3233/jifs-182778
With the exponential growth of Internet technologies, digital information exchanged over the Internet is also significantly increased. In order to ensure the security of multi...

HRNN4F: Hybrid deep random neural network for multi-channel fall activity detection

Journal Article
Tahir, A., Ahmad, J., Morison, G., Larijani, H., Gibson, R. M., & Skelton, D. A. (2019)
HRNN4F: Hybrid deep random neural network for multi-channel fall activity detection. Probability in the Engineering and Informational Sciences, 1-14. https://doi.org/10.1017/s0269964819000317
Falls are a major health concern in older adults. Falls lead to mortality, immobility and high costs to social and health care services. Early detection and classification of ...

RNN-ABC: A New Swarm Optimization Based Technique for Anomaly Detection

Journal Article
Qureshi, A., Larijani, H., Mtetwa, N., Javed, A., & Ahmad, J. (2019)
RNN-ABC: A New Swarm Optimization Based Technique for Anomaly Detection. Computers, 8(3), https://doi.org/10.3390/computers8030059
The exponential growth of internet communications and increasing dependency of users upon software-based systems for most essential, everyday applications has raised the impor...

A Heuristic Intrusion Detection System for Internet-of-Things (IoT)

Conference Proceeding
Qureshi, A., Larijani, H., Ahmad, J., & Mtetwa, N. (2019)
A Heuristic Intrusion Detection System for Internet-of-Things (IoT). In Intelligent Computing: Proceedings of the 2019 Computing Conference, Volume 1, (86-98). https://doi.org/10.1007/978-3-030-22871-2_7
Today, digitally connected devices are involved in every aspect of life due to the advancements in Internet-of-Things (IoT) paradigm. Recently, it has been a driving force for...

A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices

Journal Article
Ahmad, J., Khan, M. A., Hwang, S. O., & Khan, J. S. (2016)
A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Computing and Applications, 28(S1), 953-967. https://doi.org/10.1007/s00521-016-2405-6
With the evolution of technologies, the size of an image data has been significantly increased. However, traditional image encryption schemes cannot handle the emerging proble...

Date


Date


Date


Date