Skip to main content

Research Repository

Advanced Search

All Outputs (21)

Comparing the Performance of Different Classifiers for Posture Detection (2022)
Presentation / Conference Contribution
Suresh Kumar, S., Dashtipour, K., Gogate, M., Ahmad, J., Assaleh, K., Arshad, K., Imran, M. A., Abbasi, Q., & Ahmad, W. (2021, October). Comparing the Performance of Different Classifiers for Posture Detection. Presented at 16th EAI International Conferen

Human Posture Classification (HPC) is used in many fields such as human computer interfacing, security surveillance, rehabilitation, remote monitoring, and so on. This paper compares the performance of different classifiers in the detection of 3 post... Read More about Comparing the Performance of Different Classifiers for Posture Detection.

Detecting Alzheimer’s Disease Using Machine Learning Methods (2022)
Presentation / Conference Contribution
Dashtipour, K., Taylor, W., Ansari, S., Zahid, A., Gogate, M., Ahmad, J., Assaleh, K., Arshad, K., Ali Imran, M., & Abbasi, Q. (2021, October). Detecting Alzheimer’s Disease Using Machine Learning Methods. Presented at 16th EAI International Conference,

As the world is experiencing population growth, the portion of the older people, aged 65 and above, is also growing at a faster rate. As a result, the dementia with Alzheimer’s disease is expected to increase rapidly in the next few years. Currently,... Read More about Detecting Alzheimer’s Disease Using Machine Learning Methods.

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers (2022)
Presentation / Conference Contribution
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2021, December). Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. Presented at IEEE SINCONF: 14th International Conference on Security of

Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the... Read More about Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers.

Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions (2021)
Presentation / Conference Contribution
Driss, M., Hasan, D., Boulila, W., & Ahmad, J. (2021). Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions. Procedia Computer Science, 192, 2385-2395. https://doi.org/10.1016/j.procs.2021.09.007

In recent years, the Internet of Things (IoT) technology has led to the emergence of multiple smart applications in different vital sectors including healthcare, education, agriculture, energy management, etc. IoT aims to interconnect several intelli... Read More about Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions.

Application of Artificial Neural Network in Predicting Flashover Behaviour of Outdoor Insulators under Polluted Conditions (2021)
Presentation / Conference Contribution
Sajjad, U., Arshad, Ahmad, J., & Shoaib, S. (2021). Application of Artificial Neural Network in Predicting Flashover Behaviour of Outdoor Insulators under Polluted Conditions. In 2021 IEEE Conference of Russian Young Researchers in Electrical and Electro

Safe and reliable delivery of power through transmission lines mainly depends on the quality condition of the high voltage insulators. In the last few decades, demand in polymeric insulator has been dramatically increased due to their advanced perfor... Read More about Application of Artificial Neural Network in Predicting Flashover Behaviour of Outdoor Insulators under Polluted Conditions.

5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum (2020)
Presentation / Conference Contribution
Khan, J. S., Tahir, A., Ahmad, J., Shah, S. A., Abbasi, Q. H., Russell, G., & Buchanan, W. (2020, July). 5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum. Presented at 2020 Computing Conference, London

Freezing of gait (FOG) is one of the most incapacitating and disconcerting symptom in Parkinson's disease (PD). FOG is the result of neural control disorder and motor impairments, which severely impedes forward locomotion. This paper presents the exp... Read More about 5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum.

Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning (2020)
Presentation / Conference Contribution
Ilyas, M., Ahmad, J., Lawson, A., Khan, J. S., Tahir, A., Adeel, A., …Hussain, A. (2020). Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning. In Advances in Brain Inspired Cognitive Systems (76-85). https://doi.org/1

Prospective studies using longitudinal patient data can be used to help to predict responsiveness to Growth Hormone (GH) therapy and assess any suspected risks. In this paper, a novel Clinical Decision Support System (CDSS) is developed to predict gr... Read More about Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning.

A Heuristic Intrusion Detection System for Internet-of-Things (IoT) (2019)
Presentation / Conference Contribution
Qureshi, A., Larijani, H., Ahmad, J., & Mtetwa, N. (2019, July). A Heuristic Intrusion Detection System for Internet-of-Things (IoT). Presented at 2019 Computing Conference, London, UK

Today, digitally connected devices are involved in every aspect of life due to the advancements in Internet-of-Things (IoT) paradigm. Recently, it has been a driving force for a major technological revolution towards the development of advanced moder... Read More about A Heuristic Intrusion Detection System for Internet-of-Things (IoT).

An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera (2018)
Presentation / Conference Contribution
Ahmad, J., Larijani, H., Emmanuel, R., Mannion, M., & Javed, A. (2018, September). An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera. Presented at SAI Intelligent Systems Conference, London

Real-time occupancy monitoring information is an important component in building energy management and security. Advances in technology enables us to develop vision-based systems. These systems have gained popularity among different scientific resear... Read More about An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera.

Visual Meaningful Encryption Scheme Using Intertwinning Logistic Map (2018)
Presentation / Conference Contribution
Abbasi, S. F., Ahmad, J., Khan, J. S., Khan, M. A., & Sheikh, S. A. (2019). Visual Meaningful Encryption Scheme Using Intertwinning Logistic Map. . https://doi.org/10.1007/978-3-030-01177-2_56

Transmission of images over the Internet is exponentially increased in the last decade. However, Internet is considered as an insecure channel and hence may cause serious privacy issues. To overcome such privacy concerns, researchers are trying to se... Read More about Visual Meaningful Encryption Scheme Using Intertwinning Logistic Map.

A Novel Random Neural Network Based Approach for Intrusion Detection Systems (2018)
Presentation / Conference Contribution
Qureshi, A., Larijani, H., Ahmad, J., & Mtetwa, N. (2018). A Novel Random Neural Network Based Approach for Intrusion Detection Systems. . https://doi.org/10.1109/ceec.2018.8674228

Computer security and privacy of user specific data is a prime concern in day to day communication. The mass use of internet connected systems has given rise to many vulnerabilities which includes attacks on smart devices. Regular occurrence of such... Read More about A Novel Random Neural Network Based Approach for Intrusion Detection Systems.

DNA Sequence Based Medical Image Encryption Scheme (2018)
Presentation / Conference Contribution
Khan, J. S., Ahmad, J., Abbasi, S. F., Ali, A., & Kayhan, S. K. (2018). DNA Sequence Based Medical Image Encryption Scheme. In 2018 10th Computer Science and Electronic Engineering (CEEC). https://doi.org/10.1109/ceec.2018.8674221

Medical consultants and doctors store and update patients confidential information on Internet cloud computing platforms. These days, securing medical images from eavesdroppers is one of the most challenging and significant research areas. Due to var... Read More about DNA Sequence Based Medical Image Encryption Scheme.

Intertwining and NCA Maps Based New Image Encryption Scheme (2018)
Presentation / Conference Contribution
Khan, F. A., Ahmed, J., Ahmad, J., Khan, J. S., & Stankovic, V. (2018). Intertwining and NCA Maps Based New Image Encryption Scheme. In 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE). https://doi.org/10.1109

In this digital era, the Internet is a main source of communication. Due to exponential advancement in Internet technologies, transmission of multimedia data is very common now. However, transmitting sensitive information over the Internet is always... Read More about Intertwining and NCA Maps Based New Image Encryption Scheme.

Detection and prevention of Black Hole Attacks in IOT & WSN (2018)
Presentation / Conference Contribution
Ali, S., Khan, M. A., Ahmad, J., Malik, A. W., & ur Rehman, A. (2018). Detection and prevention of Black Hole Attacks in IOT & WSN. In 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC). https://doi.org/10.1109/fmec.2018.8364068

Wireless Sensor Network is the combination of small devices called sensor nodes, gateways and software. These nodes use wireless medium for transmission and are capable to sense and transmit the data to other nodes. Generally, WSN composed of two typ... Read More about Detection and prevention of Black Hole Attacks in IOT & WSN.

A new technique for designing 8 × 8 substitution box for image encryption applications (2017)
Presentation / Conference Contribution
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., Khan, M. A., & Hwang, S. O. (2017). A new technique for designing 8 × 8 substitution box for image encryption applications. In 2017 9th Computer Science and Electronic Engineering (CEEC). https://doi.org/1

To create confusion in ciphertexts, encryption processes depends upon nonlinear mappings. This nonlinear mapping can be achieved by a process known as substitution. In a secure encryption algorithm, substitution plays a key role during confusion stag... Read More about A new technique for designing 8 × 8 substitution box for image encryption applications.

A novel substitution box for encryption based on Lorenz equations (2017)
Presentation / Conference Contribution
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., & Khan, M. A. (2017). A novel substitution box for encryption based on Lorenz equations. In 2017 International Conference on Circuits, System and Simulation (ICCSS). https://doi.org/10.1109/cirsyssim.2017.8

Complexity of an encryption algorithm is highly dependent on nonlinear components that drive actual security. Only nonlinear component in all traditional encryption algorithms is mainly Substitution Box (S-Box). In block ciphers, the relationship bet... Read More about A novel substitution box for encryption based on Lorenz equations.

Secure speech communication algorithm via DCT and TD-ERCS chaotic map (2017)
Presentation / Conference Contribution
Habib, Z., Khan, J. S., Ahmad, J., Khan, M. A., & Khan, F. A. (2017). Secure speech communication algorithm via DCT and TD-ERCS chaotic map. In 2017 4th International Conference on Electrical and Electronic Engineering (ICEEE). https://doi.org/10.1109/ic

Secure communication has always been a demanding area in civil, commercial and particularly in military set up. Robust and time-tested efficient algorithms are needed to have an essential privacy for speech transmission in the telephone networks, rad... Read More about Secure speech communication algorithm via DCT and TD-ERCS chaotic map.

Energy demand prediction through novel random neural network predictor for large non-domestic buildings (2017)
Presentation / Conference Contribution
Ahmad, J., Larijani, H., Emmanuel, R., Mannion, M., Javed, A., & Phillipson, M. (2017). Energy demand prediction through novel random neural network predictor for large non-domestic buildings. In 2017 Annual IEEE International Systems Conference (SysCon)

Buildings are among the largest consumers of energy in the world. In developed countries, buildings currently consumes 40% of the total energy and 51% of total electricity consumption. Energy prediction is a key factor in reducing energy wastage. Thi... Read More about Energy demand prediction through novel random neural network predictor for large non-domestic buildings.

A new chaos-based secure image encryption scheme using multiple substitution boxes (2015)
Presentation / Conference Contribution
Khan, J. S., ur Rehman, A., Ahmad, J., & Habib, Z. (2015). A new chaos-based secure image encryption scheme using multiple substitution boxes. In 2015 Conference on Information Assurance and Cyber Security (CIACS). https://doi.org/10.1109/ciacs.2015.7395

Due to development in Internet and networking technology, multimedia data is broadly transmitted via wired and wireless medium. Thus security is a major concern in modern communication systems. Encryption is one of the pre-eminent ways to guarantee s... Read More about A new chaos-based secure image encryption scheme using multiple substitution boxes.

An efficient image encryption scheme based on: Henon map, skew tent map and S-Box (2015)
Presentation / Conference Contribution
Khan, J., Ahmad, J., & Hwang, S. O. (2015). An efficient image encryption scheme based on: Henon map, skew tent map and S-Box. In 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO). https://doi.org/10.1109/ICMSAO

Due to easy and simple implementation, normally single 1-D chaotic maps like logistic and sine maps are employed in multimedia data encryption. However, data encrypted through a single chaotic map does not provide better security in terms of resistan... Read More about An efficient image encryption scheme based on: Henon map, skew tent map and S-Box.