Research explorer tool

27 results

Chaos-based Confusion and Diffusion of Image Pixels using Dynamic Substitution

Journal Article
Abdullah, Q., Ahmad, J., Boulila, W., Rubaiee, S., Masood, F., Khan, F., & Buchanan, W. J. (in press)
Chaos-based Confusion and Diffusion of Image Pixels using Dynamic Substitution. IEEE Access, 1-20. https://doi.org/10.1109/ACCESS.2020.3012912
The evolution of wireless and mobile communication from 0G to the upcoming 5G gives riseto data sharing through the Internet. This data transfer via open public networks are s...

A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos

Journal Article
Masood, F., Boulila, W., Ahmad, J., Arshad, A., Sankar, S., Rubaiee, S., & Buchanan, W. J. (2020)
A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos. Remote Sensing, 12(11), https://doi.org/10.3390/rs12111893
Aerial photography involves capturing images from aircraft and other flying objects, including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can co...

A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random Neural Network

Journal Article
Latif, S., Zou, Z., Idrees, Z., & Ahmad, J. (2020)
A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random Neural Network. IEEE Access, 8, 89337-89350. https://doi.org/10.1109/access.2020.2994079
The Industrial Internet of Things (IIoT) brings together many sensors, machines, industrial applications, databases, services, and people at work. The IIoT is improving our li...

Mobility Prediction-Based Optimisation and Encryption of Passenger Traffic-Flows Using Machine Learning

Journal Article
Asad, S. M., Ahmad, J., Hussain, S., Zoha, A., Abbasi, Q. H., & Imran, M. A. (2020)
Mobility Prediction-Based Optimisation and Encryption of Passenger Traffic-Flows Using Machine Learning. Sensors, 20(9), https://doi.org/10.3390/s20092629
Information and Communication Technology (ICT) enabled optimisation of train’s passenger traffic flows is a key consideration of transportation under Smart City planning (SCP)...

Energy demand forecasting of buildings using random neural networks

Journal Article
Ahmad, J., Tahir, A., Larijani, H., Ahmed, F., Aziz Shah, S., Hall, A. J., & Buchanan, W. J. (2020)
Energy demand forecasting of buildings using random neural networks. Journal of Intelligent and Fuzzy Systems, 38(4), 4753-4765. https://doi.org/10.3233/jifs-191458
Energy uncertainty and ecological pressures have contributed to a high volatility in energy demand and consumption. The building sector accounts for 30 to 40% of the total glo...

Chaos‐based privacy preserving vehicle safety protocol for 5G Connected Autonomous Vehicle networks

Journal Article
Ansari, S., Ahmad, J., Aziz Shah, S., Kashif Bashir, A., Boutaleb, T., & Sinanovic, S. (2020)
Chaos‐based privacy preserving vehicle safety protocol for 5G Connected Autonomous Vehicle networks. Transactions on Emerging Telecommunications Technologies, 31(5), https://doi.org/10.1002/ett.3966
There is a high demand for secure and reliable communications for Connected Autonomous Vehicles (CAVs) in the automotive industry. Privacy and security are key issues in CAVs,...

Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication

Journal Article
Aziz Shah, S., Ahmad, J., Tahir, A., Ahmed, F., Russell, G., Shah, S. Y., …Abbasi, Q. H. (2020)
Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication. Micromachines, 11(4), https://doi.org/10.3390/mi11040379
Nano-scaled structures, wireless sensing, wearable devices, and wireless communications systems are anticipated to support the development of new next-generation technologies ...

A Novel Secure Occupancy Monitoring Scheme Based on Multi-Chaos Mapping

Journal Article
Ahmad, J., Masood, F., Shah, S. A., Jamal, S. S., & Hussain, I. (2020)
A Novel Secure Occupancy Monitoring Scheme Based on Multi-Chaos Mapping. Symmetry, 12(3), https://doi.org/10.3390/sym12030350
Smart building control, managing queues for instant points of service, security systems, and customer support can benefit from the number of occupants information known as occ...

A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map

Journal Article
Masood, F., Ahmad, J., Shah, S. A., Jamal, S. S., & Hussain, I. (2020)
A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map. Entropy, 22(3), https://doi.org/10.3390/e22030274
Chaos-based encryption schemes have attracted many researchers around the world in the digital image security domain. Digital images can be secured using existing chaotic maps...

An authentication protocol based on chaos and zero knowledge proof

Journal Article
Major, W., Buchanan, W. J., & Ahmad, J. (2020)
An authentication protocol based on chaos and zero knowledge proof. Nonlinear Dynamics, 99, 3065–3087. https://doi.org/10.1007/s11071-020-05463-3
Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authentica...

Date


Date


Date


Date