Skip to main content

Research Repository

Advanced Search

Outputs (8)

Occupancy detection in non-residential buildings – A survey and novel privacy preserved occupancy monitoring solution (2018)
Journal Article
Ahmad, J., Larijani, H., Emmanuel, R., Mannion, M., & Javed, A. (2018). Occupancy detection in non-residential buildings – A survey and novel privacy preserved occupancy monitoring solution. Applied Computing and Informatics, https://doi.org/10.1016/j.aci.2018.12.001

Buildings use approximately 40% of global energy and are responsible for almost a third of the worldwide greenhouse gas emissions. They also utilise about 60% of the world’s electricity. In the last decade, stringent building regulations have led to... Read More about Occupancy detection in non-residential buildings – A survey and novel privacy preserved occupancy monitoring solution.

An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera (2018)
Conference Proceeding
Ahmad, J., Larijani, H., Emmanuel, R., Mannion, M., & Javed, A. (2019). An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera. In Proceedings of SAI Intelligent Systems Conference (957-969). https://doi.org/10.1007/978-3-030-01057-7_71

Real-time occupancy monitoring information is an important component in building energy management and security. Advances in technology enables us to develop vision-based systems. These systems have gained popularity among different scientific resear... Read More about An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera.

Visual Meaningful Encryption Scheme Using Intertwinning Logistic Map (2018)
Conference Proceeding
Abbasi, S. F., Ahmad, J., Khan, J. S., Khan, M. A., & Sheikh, S. A. (2019). Visual Meaningful Encryption Scheme Using Intertwinning Logistic Map. . https://doi.org/10.1007/978-3-030-01177-2_56

Transmission of images over the Internet is exponentially increased in the last decade. However, Internet is considered as an insecure channel and hence may cause serious privacy issues. To overcome such privacy concerns, researchers are trying to se... Read More about Visual Meaningful Encryption Scheme Using Intertwinning Logistic Map.

A Novel Random Neural Network Based Approach for Intrusion Detection Systems (2018)
Conference Proceeding
Qureshi, A., Larijani, H., Ahmad, J., & Mtetwa, N. (2018). A Novel Random Neural Network Based Approach for Intrusion Detection Systems. . https://doi.org/10.1109/ceec.2018.8674228

Computer security and privacy of user specific data is a prime concern in day to day communication. The mass use of internet connected systems has given rise to many vulnerabilities which includes attacks on smart devices. Regular occurrence of such... Read More about A Novel Random Neural Network Based Approach for Intrusion Detection Systems.

DNA Sequence Based Medical Image Encryption Scheme (2018)
Conference Proceeding
Khan, J. S., Ahmad, J., Abbasi, S. F., Ali, A., & Kayhan, S. K. (2018). DNA Sequence Based Medical Image Encryption Scheme. In 2018 10th Computer Science and Electronic Engineering (CEEC). https://doi.org/10.1109/ceec.2018.8674221

Medical consultants and doctors store and update patients confidential information on Internet cloud computing platforms. These days, securing medical images from eavesdroppers is one of the most challenging and significant research areas. Due to var... Read More about DNA Sequence Based Medical Image Encryption Scheme.

Intertwining and NCA Maps Based New Image Encryption Scheme (2018)
Conference Proceeding
Khan, F. A., Ahmed, J., Ahmad, J., Khan, J. S., & Stankovic, V. (2018). Intertwining and NCA Maps Based New Image Encryption Scheme. In 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE). https://doi.org/10.1109/iccecome.2018.8658919

In this digital era, the Internet is a main source of communication. Due to exponential advancement in Internet technologies, transmission of multimedia data is very common now. However, transmitting sensitive information over the Internet is always... Read More about Intertwining and NCA Maps Based New Image Encryption Scheme.

Chaos based efficient selective image encryption (2018)
Journal Article
Khan, J. S., & Ahmad, J. (2019). Chaos based efficient selective image encryption. Multidimensional Systems and Signal Processing, 30(2), 943-961. https://doi.org/10.1007/s11045-018-0589-x

Due to social networks, demand for sharing multimedia data is significantly increased in last decade. However, lower complexity and frequent security breaches on public network such as Internet make it easy for eavesdroppers to approach the actual co... Read More about Chaos based efficient selective image encryption.

Detection and prevention of Black Hole Attacks in IOT & WSN (2018)
Conference Proceeding
Ali, S., Khan, M. A., Ahmad, J., Malik, A. W., & ur Rehman, A. (2018). Detection and prevention of Black Hole Attacks in IOT & WSN. In 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC). https://doi.org/10.1109/fmec.2018.8364068

Wireless Sensor Network is the combination of small devices called sensor nodes, gateways and software. These nodes use wireless medium for transmission and are capable to sense and transmit the data to other nodes. Generally, WSN composed of two typ... Read More about Detection and prevention of Black Hole Attacks in IOT & WSN.