Skip to main content

Research Repository

Advanced Search

All Outputs (147)

DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption (2020)
Journal Article
Khan, J. S., Boulila, W., Ahmad, J., Rubaiee, S., Rehman, A. U., Alroobaea, R., & Buchanan, W. J. (2020). DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption. IEEE Access, 8, 159732-159744. https://doi.org/10.1109/access.2020.3020917

Visual selective image encryption can both improve the efficiency of the image encryption algorithm and reduce the frequency and severity of attacks against data. In this article, a new form of encryption is proposed based on keys derived from Deoxyri... Read More about DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption.

Forecasting Flashover Parameters of Polymeric Insulators under Contaminated Conditions Using the Machine Learning Technique (2020)
Journal Article
Arshad, Ahmad, J., Tahir, A., Stewart, B. G., & Nekahi, A. (2020). Forecasting Flashover Parameters of Polymeric Insulators under Contaminated Conditions Using the Machine Learning Technique. Energies, 13(15), Article 3889. https://doi.org/10.3390/en13153

There is a vital need to understand the flashover process of polymeric insulators for safe and reliable power system operation. This paper provides a rigorous investigation of forecasting the flashover parameters of High Temperature Vulcanized (HTV)... Read More about Forecasting Flashover Parameters of Polymeric Insulators under Contaminated Conditions Using the Machine Learning Technique.

Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution (2020)
Journal Article
Qayyum, A., Ahmad, J., Boulila, W., Rubaiee, S., Arshad, Masood, F., Khan, F., & Buchanan, W. J. (2020). Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution. IEEE Access, 8, 140876-140895. https://doi.org/10.1109/access.2020.301

The evolution of wireless and mobile communication from 0G to the upcoming 5G gives riseto data sharing through the Internet. This data transfer via open public networks are susceptible to severaltypes of attacks. Encryption is a method that can prot... Read More about Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution.

5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum (2020)
Presentation / Conference Contribution
Khan, J. S., Tahir, A., Ahmad, J., Shah, S. A., Abbasi, Q. H., Russell, G., & Buchanan, W. (2020, July). 5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum. Presented at 2020 Computing Conference, London

Freezing of gait (FOG) is one of the most incapacitating and disconcerting symptom in Parkinson's disease (PD). FOG is the result of neural control disorder and motor impairments, which severely impedes forward locomotion. This paper presents the exp... Read More about 5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum.

Sensor Fusion for Identification of Freezing of Gait Episodes Using Wi-Fi and Radar Imaging (2020)
Journal Article
Shah, S. A., Tahir, A., Ahmad, J., Zahid, A., Pervaiz, H., Shah, S. Y., …Abbasi, Q. H. (2020). Sensor Fusion for Identification of Freezing of Gait Episodes Using Wi-Fi and Radar Imaging. IEEE Sensors Journal, 20(23), 14410-14422. https://doi.org/10.110

Parkinson’s disease (PD) is a progressive and neurodegenerative condition causing motor impairments. One of the major motor related impairments that present biggest challenge is freezing of gait (FOG) in Parkinson’s patients. In FOG episode, the pati... Read More about Sensor Fusion for Identification of Freezing of Gait Episodes Using Wi-Fi and Radar Imaging.

A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos (2020)
Journal Article
Masood, F., Boulila, W., Ahmad, J., Arshad, A., Sankar, S., Rubaiee, S., & Buchanan, W. J. (2020). A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos. Remote Sensing, 12(11), Article 1893

Aerial photography involves capturing images from aircraft and other flying objects, including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can contain sensitive information that requires secure processing. We proposed an... Read More about A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos.

A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random Neural Network (2020)
Journal Article
Latif, S., Zou, Z., Idrees, Z., & Ahmad, J. (2020). A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random Neural Network. IEEE Access, 8, 89337-89350. https://doi.org/10.1109/access.2020.2994079

The Industrial Internet of Things (IIoT) brings together many sensors, machines, industrial applications, databases, services, and people at work. The IIoT is improving our lives in several ways including smarter cities, agriculture, and e-healthcare... Read More about A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random Neural Network.

Mobility Prediction-Based Optimisation and Encryption of Passenger Traffic-Flows Using Machine Learning (2020)
Journal Article
Asad, S. M., Ahmad, J., Hussain, S., Zoha, A., Abbasi, Q. H., & Imran, M. A. (2020). Mobility Prediction-Based Optimisation and Encryption of Passenger Traffic-Flows Using Machine Learning. Sensors, 20(9), Article 2629. https://doi.org/10.3390/s20092629

Information and Communication Technology (ICT) enabled optimisation of train’s passenger traffic flows is a key consideration of transportation under Smart City planning (SCP). Traditional mobility prediction based optimisation and encryption approac... Read More about Mobility Prediction-Based Optimisation and Encryption of Passenger Traffic-Flows Using Machine Learning.

Energy demand forecasting of buildings using random neural networks (2020)
Journal Article
Ahmad, J., Tahir, A., Larijani, H., Ahmed, F., Aziz Shah, S., Hall, A. J., & Buchanan, W. J. (2020). Energy demand forecasting of buildings using random neural networks. Journal of Intelligent and Fuzzy Systems, 38(4), 4753-4765. https://doi.org/10.3233/j

Energy uncertainty and ecological pressures have contributed to a high volatility in energy demand and consumption. The building sector accounts for 30 to 40% of the total global energy consumption. There is a high demand for novel techniques and via... Read More about Energy demand forecasting of buildings using random neural networks.

Chaos‐based privacy preserving vehicle safety protocol for 5G Connected Autonomous Vehicle networks (2020)
Journal Article
Ansari, S., Ahmad, J., Aziz Shah, S., Kashif Bashir, A., Boutaleb, T., & Sinanovic, S. (2020). Chaos‐based privacy preserving vehicle safety protocol for 5G Connected Autonomous Vehicle networks. Transactions on Emerging Telecommunications Technologies,

There is a high demand for secure and reliable communications for Connected Autonomous Vehicles (CAVs) in the automotive industry. Privacy and security are key issues in CAVs, where network attacks can result in fatal accidents. The computational tim... Read More about Chaos‐based privacy preserving vehicle safety protocol for 5G Connected Autonomous Vehicle networks.

Robust Image Hashing Scheme using Laplacian Pyramids (2020)
Journal Article
Hamid, H., Ahmed, F., & Ahmad, J. (2020). Robust Image Hashing Scheme using Laplacian Pyramids. Computers and Electrical Engineering, 84, Article 106648. https://doi.org/10.1016/j.compeleceng.2020.106648

Due to tremendous growth in multimedia applications and services, people can easily create, distribute, broadcast and store information. The fact that multimedia content can be easily copied and tampered has motivated a large number of researchers to... Read More about Robust Image Hashing Scheme using Laplacian Pyramids.

Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication (2020)
Journal Article
Aziz Shah, S., Ahmad, J., Tahir, A., Ahmed, F., Russell, G., Shah, S. Y., Buchanan, W., & Abbasi, Q. H. (2020). Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication. Micromachi

Nano-scaled structures, wireless sensing, wearable devices, and wireless communications systems are anticipated to support the development of new next-generation technologies in the near future. Exponential rise in future Radio-Frequency (RF) sensing... Read More about Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication.

A Novel Secure Occupancy Monitoring Scheme Based on Multi-Chaos Mapping (2020)
Journal Article
Ahmad, J., Masood, F., Shah, S. A., Jamal, S. S., & Hussain, I. (2020). A Novel Secure Occupancy Monitoring Scheme Based on Multi-Chaos Mapping. Symmetry, 12(3), https://doi.org/10.3390/sym12030350

Smart building control, managing queues for instant points of service, security systems, and customer support can benefit from the number of occupants information known as occupancy. Due to interrupted real-time continuous monitoring capabilities of... Read More about A Novel Secure Occupancy Monitoring Scheme Based on Multi-Chaos Mapping.

A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map (2020)
Journal Article
Masood, F., Ahmad, J., Shah, S. A., Jamal, S. S., & Hussain, I. (2020). A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map. Entropy, 22(3), Article 274. https://doi.org/10.3390/e22030274

Chaos-based encryption schemes have attracted many researchers around the world in the digital image security domain. Digital images can be secured using existing chaotic maps, multiple chaotic maps, and several other hybrid dynamic systems that enha... Read More about A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map.

Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning (2020)
Presentation / Conference Contribution
Ilyas, M., Ahmad, J., Lawson, A., Khan, J. S., Tahir, A., Adeel, A., …Hussain, A. (2020). Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning. In Advances in Brain Inspired Cognitive Systems (76-85). https://doi.org/1

Prospective studies using longitudinal patient data can be used to help to predict responsiveness to Growth Hormone (GH) therapy and assess any suspected risks. In this paper, a novel Clinical Decision Support System (CDSS) is developed to predict gr... Read More about Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning.

An authentication protocol based on chaos and zero knowledge proof (2020)
Journal Article
Major, W., Buchanan, W. J., & Ahmad, J. (2020). An authentication protocol based on chaos and zero knowledge proof. Nonlinear Dynamics, 99, 3065-3087. https://doi.org/10.1007/s11071-020-05463-3

Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authenticated clients, without opening ports on the firewall. Advances in port knocki... Read More about An authentication protocol based on chaos and zero knowledge proof.

WiFreeze: Multiresolution Scalograms for Freezing of Gait Detection in Parkinson's Leveraging 5G Spectrum with Deep Learning (2019)
Journal Article
Tahir, A., Ahmad, J., Shah, S. A., Morison, G., Skelton, D. A., Larijani, H., …Gibson, R. M. (2019). WiFreeze: Multiresolution Scalograms for Freezing of Gait Detection in Parkinson's Leveraging 5G Spectrum with Deep Learning. Electronics, 8(12), https:

Freezing of Gait (FOG) is an episodic absence of forward movement in Parkinson's Disease (PD) patients and represents an onset of disabilities. FOG hinders daily activities and increases fall risk. There is high demand for automating the process of F... Read More about WiFreeze: Multiresolution Scalograms for Freezing of Gait Detection in Parkinson's Leveraging 5G Spectrum with Deep Learning.

A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids (2019)
Journal Article
Bashir, I., Ahmed, F., Ahmad, J., Boulila, W., & Alharbi, N. (2019). A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids. Entropy, 21(11), Article 1132. https://doi.org/10.3390/e21111132

Image hash is an alternative to cryptographic hash functions for checking integrity of digital images. Compared to cryptographic hash functions, an image hash or a Perceptual Hash Function (PHF) is resilient to content preserving distortions and sens... Read More about A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids.

A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids (2019)
Journal Article
Adeel, A., Ahmad, J., Larijani, H., & Hussain, A. (2020). A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids. Cognitive Computation, 12, 589-601. https://doi.org/10.1007/s12559-019-09653-z

Next-generation audio-visual (AV) hearing aids stand as a major enabler to realize more intelligible audio. However, high data rate, low latency, low computational complexity, and privacy are some of the major bottlenecks to the successful deployment... Read More about A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids.

DNA key based visual chaotic image encryption (2019)
Journal Article
Khan, J. S., Ahmad, J., Ahmed, S. S., Siddiqa, H. A., Abbasi, S. F., & Kayhan, S. K. (2019). DNA key based visual chaotic image encryption. Journal of Intelligent and Fuzzy Systems, 37(2), 2549-2561. https://doi.org/10.3233/jifs-182778

With the exponential growth of Internet technologies, digital information exchanged over the Internet is also significantly increased. In order to ensure the security of multimedia contents over the open natured Internet, data should be encrypted. In... Read More about DNA key based visual chaotic image encryption.