Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Fadia Ali Khan"'
Publikováno v:
Frontiers in Neuroinformatics, Vol 18 (2024)
In order to improve the energy efficiency of wearable devices, it is necessary to compress and reconstruct the collected electrocardiogram data. The compressed data may be mixed with noise during the transmission process. The denoising-based approxim
Externí odkaz:
https://doaj.org/article/e4313f73ed564934a11f497e954a0d50
Autor:
Junaid Masood, Jawad Ahmad, Sajjad Shaukat Jamal, Wadii Boulila, Fawad Masood, Sadaqat Ur Rehman, Lejun Zhang, Fadia Ali Khan
In many cases, images contain sensitive information and patterns that require secure processing to avoid risk. It can be accessed by unauthorized users who can illegally exploit them to threaten the safety of people’s life and property. Protecting
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9d4959915fe2ef85edd2c533c95089a2
Autor:
Afaq Ahmad, Arshid Ali, Fadia Ali Khan, Zeeshan Habib, Zia Ud Din, Muhammad Zulfiqar Ali, Muhammad Faizan
Publikováno v:
2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH).
Publikováno v:
Journal of Intelligent & Fuzzy Systems. 33:3753-3765
Autor:
Arshad, Fadia Ali Khan, Jawad Ahmad, Zeeshan Habib, Ahsen Tahir, Muazzam A. Khan, Jan Sher Khan
Publikováno v:
UCET
Due to greater network capacity and faster data speed, fifth generation (5G) technology is expected to provide a huge improvement in Internet of Things (IoTs) applications, Augmented & Virtual Reality (AR/VR) technologies, and Machine Type Communicat
Autor:
Fadia Ali Khan, Jameel Ahmed, Jawad Ahmad, Jan Sher Khan, Fawad Ahmad, Vladimir Stankovic, Hadi Larijani
Publikováno v:
The First International Nonlinear Dynamics Conference
University of Strathclyde
University of Strathclyde
Depending on applications and specific security requirements, digital images can either be fully or partially encrypted. Partial encryption is one of the methods that reduces computational and processing cost. To achieve partial encryption, chaotic m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::ce21b53910a68329be439be5346da07f
https://strathprints.strath.ac.uk/66250/1/Khan_etal_NODYCON2018_A_novel_chaos_based_partial_image_encryption_scheme_using_Lifting.pdf
https://strathprints.strath.ac.uk/66250/1/Khan_etal_NODYCON2018_A_novel_chaos_based_partial_image_encryption_scheme_using_Lifting.pdf
Publikováno v:
IEEE International Conference on Computing, Electronics & Communications Engineering
In this digital era, the Internet is a main source of communication. Due to exponential advancement in Internet technologies, transmission of multimedia data is very common now. However, transmitting sensitive information over the Internet is always
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::550fe701f11b01127847bb4415e09009
https://strathprints.strath.ac.uk/66354/1/Khan_etal_ICCECE2018_Intertwining_and_NCA_maps_based_new_image_encryption_scheme.pdf
https://strathprints.strath.ac.uk/66354/1/Khan_etal_ICCECE2018_Intertwining_and_NCA_maps_based_new_image_encryption_scheme.pdf
Publikováno v:
CEEC
To create confusion in ciphertexts, encryption processes depends upon nonlinear mappings. This nonlinear mapping can be achieved by a process known as substitution. In a secure encryption algorithm, substitution plays a key role during confusion stag
Publikováno v:
2017 International Conference on Circuits, System and Simulation (ICCSS).
Complexity of an encryption algorithm is highly dependent on nonlinear components that drive actual security. Only nonlinear component in all traditional encryption algorithms is mainly Substitution Box (S-Box). In block ciphers, the relationship bet
Publikováno v:
2017 4th International Conference on Electrical and Electronic Engineering (ICEEE).
Secure communication has always been a demanding area in civil, commercial and particularly in military set up. Robust and time-tested efficient algorithms are needed to have an essential privacy for speech transmission in the telephone networks, rad