Skip to main content

Research Repository

Advanced Search

All Outputs (111)

An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant (2022)
Journal Article
Jemmali, M., Bashir, A. K., Boulila, W., Melhim, L. K. B., Jhaveri, R. H., & Ahmad, J. (2023). An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant. IEEE Transactions on Intelligent Transportation System

Nowadays, developing environmental solutions to ensure the preservation and sustainability of natural resources is one of the core research topics for providing a better life quality. Using renewable energy sources, such as solar energy, is one of th... Read More about An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant.

Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things (2022)
Journal Article
Hasan, A., Khan, M. A., Shabir, B., Munir, A., Malik, A. W., Anwar, Z., & Ahmad, J. (2022). Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things. Applied Sciences, 12(22), Article 11442. https://doi.org/10.3390/app122211442

The internet of things (IoT) is prone to various types of denial of service (DoS) attacks due to their resource-constrained nature. Extensive research efforts have been dedicated to securing these systems, but various vulnerabilities remain. Notably,... Read More about Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things.

Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring (2022)
Journal Article
Ghadi, Y. Y., Alsuhibany, S. A., Ahmad, J., Kumar, H., Boulila, W., Alsaedi, M., …Bhatti, S. A. (2022). Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring. Journal of Healthcare Engineering, 2022, Article 7745132.

With the advancement of camera and wireless technologies, surveillance camera-based occupancy has received ample attention from the research community. However, camera-based occupancy monitoring and wireless channels, especially Wi-Fi hotspot, pose s... Read More about Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring.

A Proposal of a New Chaotic Map for Application in the Image Encryption Domain (2022)
Journal Article
Abu-Amara, F., & Ahmad, J. (2023). A Proposal of a New Chaotic Map for Application in the Image Encryption Domain. Journal of Information and Knowledge Management, 22(2), Article 2250088. https://doi.org/10.1142/s0219649222500885

Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption scheme has pros and cons regarding its speed, complexity, and security. This paper proposes a new chaotic map called Power-Chaotic Map (PCM). Characte... Read More about A Proposal of a New Chaotic Map for Application in the Image Encryption Domain.

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform (2022)
Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., …Buchanan, W. J. (2022). Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. ht

Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively, private blockchains are now widely used to address these issues and impro... Read More about Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform.

Classification of Skin Cancer Lesions Using Explainable Deep Learning (2022)
Journal Article
Zia Ur Rehman, M., Ahmed, F., Alsuhibany, S. A., Jamal, S. S., Zulfiqar Ali, M., & Ahmad, J. (2022). Classification of Skin Cancer Lesions Using Explainable Deep Learning. Sensors, 22(18), Article 6915. https://doi.org/10.3390/s22186915

Skin cancer is among the most prevalent and life-threatening forms of cancer that occur worldwide. Traditional methods of skin cancer detection need an in-depth physical examination by a medical professional, which is time-consuming in some cases. Re... Read More about Classification of Skin Cancer Lesions Using Explainable Deep Learning.

A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis (2022)
Journal Article
Rehman, M. U., Shafique, A., Ghadi, Y. Y., Boulila, W., Jan, S. U., Gadekallu, T. R., …Ahmad, J. (2022). A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis. IEEE Transactions on Network Science and Engineering, 9(6), 4322-43

Early cancer identification is regarded as a challenging problem in cancer prevention for the healthcare community. In addition, ensuring privacy-preserving healthcare data becomes more difficult with the growing demand for sharing these data. This s... Read More about A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis.

Predicting Breast Cancer Leveraging Supervised Machine Learning Techniques (2022)
Journal Article
Aamir, S., Rahim, A., Aamir, Z., Abbasi, S. F., Khan, M. S., Alhaisoni, M., …Ahmad, J. (2022). Predicting Breast Cancer Leveraging Supervised Machine Learning Techniques. Computational and Mathematical Methods in Medicine, 2022, Article 5869529. https:/

Breast cancer is one of the leading causes of increasing deaths in women worldwide. The complex nature (microcalcification and masses) of breast cancer cells makes it quite difficult for radiologists to diagnose it properly. Subsequently, various com... Read More about Predicting Breast Cancer Leveraging Supervised Machine Learning Techniques.

Machine Learning-Based Prediction of Node Localization Accuracy in IIoT-Based MI-UWSNs and Design of a TD Coil for Omnidirectional Communication (2022)
Journal Article
Gang, Q., Muhammad, A., Khan, Z. U., Khan, M. S., Ahmed, F., & Ahmad, J. (2022). Machine Learning-Based Prediction of Node Localization Accuracy in IIoT-Based MI-UWSNs and Design of a TD Coil for Omnidirectional Communication. Sustainability, 14(15), Arti

This study aims to realize Sustainable Development Goals (SDGs), i.e., SDG 9: Industry Innovation and Infrastructure and SDG 14: Life below Water, through the improvement of localization estimation accuracy in magneto-inductive underwater wireless se... Read More about Machine Learning-Based Prediction of Node Localization Accuracy in IIoT-Based MI-UWSNs and Design of a TD Coil for Omnidirectional Communication.

DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things (2022)
Journal Article
Ahmad, J., Shah, S. A., Latif, S., Ahmed, F., Zou, Z., & Pitropakis, N. (2022). DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things. Journal of King Saud University (Compute

The Industrial Internet of Things (IIoT) is a rapidly emerging technology that increases the efficiency and productivity of industrial environments by integrating smart sensors and devices with the internet. The advancements in communication technolo... Read More about DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things.

A novel security and authentication method for infrared medical image with discrete time chaotic systems (2022)
Journal Article
Boyraz, O. F., Guleryuz, E., Akgul, A., Yildiz, M. Z., Kiran, H. E., & Ahmad, J. (2022). A novel security and authentication method for infrared medical image with discrete time chaotic systems. Optik, 267, Article 169717. https://doi.org/10.1016/j.ijleo.

Objective: Hand vein images have become important biometric signs used for identification systems. Also, dorsal hand vein images have noteworthy advantages in terms of reliability and contactless procedure. Surgically changing the vascular pattern u... Read More about A novel security and authentication method for infrared medical image with discrete time chaotic systems.

Ensemble learning-based IDS for sensors telemetry data in IoT networks (2022)
Journal Article
Naz, N., Khan, M. A., Alsuhibany, S. A., Diyan, M., Tan, Z., Khan, M. A., & Ahmad, J. (2022). Ensemble learning-based IDS for sensors telemetry data in IoT networks. Mathematical Biosciences and Engineering, 19(10), 10550-10580. https://doi.org/10.3934/mb

The Internet of Things (IoT) is a paradigm that connects a range of physical smart devices to provide ubiquitous services to individuals and automate their daily tasks. IoT devices collect data from the surrounding environment and communicate with ot... Read More about Ensemble learning-based IDS for sensors telemetry data in IoT networks.

A Deep Learning-Based Semantic Segmentation Architecture for Autonomous Driving Applications (2022)
Journal Article
Masood, S., Ahmed, F., Alsuhibany, S. A., Ghadi, Y. Y., Siyal, M. Y., Kumar, H., …Ahmad, J. (2022). A Deep Learning-Based Semantic Segmentation Architecture for Autonomous Driving Applications. Wireless Communications and Mobile Computing, 2022, Article

In recent years, the development of smart transportation has accelerated research on semantic segmentation as it is one of the most important problems in this area. A large receptive field has always been the center of focus when designing convolutio... Read More about A Deep Learning-Based Semantic Segmentation Architecture for Autonomous Driving Applications.

Modified SHARK Cipher and Duffing Map-Based Cryptosystem (2022)
Journal Article
Rabie, O., Ahmad, J., & Alghazzawi, D. (2022). Modified SHARK Cipher and Duffing Map-Based Cryptosystem. Mathematics, 10(12), Article 2034. https://doi.org/10.3390/math10122034

Recent years have seen a lot of interest in the study of chaotic structures and their accompanying cryptography frameworks. In this research, we came up with a new way to encrypt images that used the chaos and a modified block cipher named the SHARK... Read More about Modified SHARK Cipher and Duffing Map-Based Cryptosystem.

A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos (2022)
Journal Article
Kamran, M. I., Khan, M. A., Alsuhibany, S. A., Ghadi, Y. Y., Arshad, Arif, J., & Ahmad, J. (2022). A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos. Computers, Materials & Continua, 73(1), 657-672. https://doi.org/10.32604/cmc.2022.02

The use of multimedia data sharing has drastically increased in the past few decades due to the revolutionary improvements in communication technologies such as the 4th generation (4G) and 5th generation (5G) etc. Researchers have proposed many image... Read More about A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos.

A Secure and Lightweight Chaos Based Image Encryption Scheme (2022)
Journal Article
Ali Khan, F., Ahmed, J., Alqahtani, F., Alsuhibany, S. A., Ahmed, F., & Ahmad, J. (2022). A Secure and Lightweight Chaos Based Image Encryption Scheme. Computers, Materials & Continua, 73(1), 279-294. https://doi.org/10.32604/cmc.2022.028789

In this paper, we present an image encryption scheme based on the multi-stage chaos-based image encryption algorithm. The method works on the principle of confusion and diffusion. The proposed scheme containing both confusion and diffusion modules ar... Read More about A Secure and Lightweight Chaos Based Image Encryption Scheme.

A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering (2022)
Journal Article
Ullah, S., Ahmad, J., Khan, M. A., Alkhammash, E. H., Hadjouni, M., Ghadi, Y. Y., …Pitropakis, N. (2022). A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering. Sensors, 22(10), Article

The Internet of Things (IoT) is a widely used technology in automated network systems across the world. The impact of the IoT on different industries has occurred in recent years. Many IoT nodes collect, store, and process personal data, which is an... Read More about A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering.

Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning (2022)
Journal Article
Ghaleb, F. A., Alsaedi, M., Saeed, F., Ahmad, J., & Alasli, M. (2022). Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning. Sensors, 22(9), Article 3373. https://doi.org/10.3390/s22093373

Web applications have become ubiquitous for many business sectors due to their platform independence and low operation cost. Billions of users are visiting these applications to accomplish their daily tasks. However, many of these applications are ei... Read More about Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning.

Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform (2022)
Journal Article
Abd, M. H., Al-Suhail, G. A., Tahir, F. R., Ali Ali, A. M., Abbood, H. A., Dashtipour, K., …Ahmad, J. (2022). Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform. Remote Sensing, 14(9), Article 1984. https://doi.org/10.3390/

There is no doubt that chaotic systems are still attractive issues in various radar applications and communication systems. In this paper, we present a new 0.3 GHz mono-static microwave chaotic radar. It includes a chaotic system based on a time-dela... Read More about Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform.

Optimal Pitch Angle Controller for DFIG-Based Wind Turbine System Using Computational Optimization Techniques (2022)
Journal Article
Khurshid, A., Mughal, M. A., Othman, A., Al-Hadhrami, T., Kumar, H., Khurshid, I., …Ahmad, J. (2022). Optimal Pitch Angle Controller for DFIG-Based Wind Turbine System Using Computational Optimization Techniques. Electronics, 11(8), Article 1290. https:

With the advent of high-speed and parallel computing, the applicability of computational optimization in engineering problems has increased, with greater validation than conventional methods. Pitch angle is an effective variable in extracting maximum... Read More about Optimal Pitch Angle Controller for DFIG-Based Wind Turbine System Using Computational Optimization Techniques.