Muhammad Usama

ORCID: 0000-0003-0153-1201
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Cryptographic Implementations and Security
  • Algorithms and Data Compression
  • Cellular Automata and Applications
  • Cryptography and Data Security
  • Magnetic Properties and Synthesis of Ferrites
  • Clay minerals and soil interactions
  • Heavy metals in environment
  • Multiferroics and related materials
  • Microplastics and Plastic Pollution
  • Chaos control and synchronization
  • Quantum Computing Algorithms and Architecture
  • Soil and Unsaturated Flow
  • Coal and Its By-products
  • Complexity and Algorithms in Graphs
  • Energy Efficient Wireless Sensor Networks
  • Autonomous Vehicle Technology and Safety
  • Therapeutic Uses of Natural Elements
  • Advanced Mathematical Theories and Applications
  • Cloud Data Security Solutions
  • Security in Wireless Sensor Networks
  • Magnetic Field Sensors Techniques
  • Polymer-Based Agricultural Enhancements
  • Constructed Wetlands for Wastewater Treatment
  • Magneto-Optical Properties and Applications

Minhaj University Lahore
2024

King Saud University
2009-2024

Pakistan Institute of Engineering and Applied Sciences
2024

Bahria University
2008-2020

Sir Syed University of Engineering and Technology
2020

Qatar University
2020

Universiti Teknologi Petronas
2016-2017

Pakistan Space and Upper Atmosphere Research Commission
2008

10.1016/j.camwa.2009.12.033 article EN publisher-specific-oa Computers & Mathematics with Applications 2010-01-19

Data compression and encryption are key components of commonly deployed platforms such as Hadoop. Numerous data tools presently available on the characteristically applied in sequence, i.e., followed by or compression. This paper focuses open-source Hadoop framework proposes a storage method that efficiently couples with encryption. A simultaneous scheme is introduced addresses an important implementation issue source coding based Tent Map Piece-wise Linear Chaotic (PWLM), which infinite...

10.1371/journal.pone.0168207 article EN cc-by PLoS ONE 2017-01-10

A substitution box is a core component of the popular symmetric-key algorithms. However, major problem conventional boxes statistic behavior, which employed as fixed-size lookup table. To solve table problem, various construction methods were proposed with key control, but it hard to enhance all cryptographic properties, for example, linear and differential probabilities. Thus, chaos applied control in designing robust due unpredictable random-like behavior. Moreover, confusion diffusion...

10.1177/1550147719895957 article EN cc-by International Journal of Distributed Sensor Networks 2019-12-01

Abstract Data stored in physical storage or transferred over a communication channel includes substantial redundancy. Compression techniques cut down the data redundancy to reduce space and time. Nevertheless, compression lack proper security measures, e.g., secret key control, leaving susceptible attack. encryption is therefore needed achieve keeping unreadable unaltered through key. This work concentrates on problems of collectively without negatively affecting each other. Towards this...

10.1007/s12083-020-00981-8 article EN cc-by Peer-to-Peer Networking and Applications 2020-10-19

In this paper, we will provide an overview of the mechanisms used in image protection, especially Chaos-based encryption techniques available today. We see how previously proposed methods such as data standard (DES), Triple Data Encryption Standard (Triple- DES), and International Algorithm (IDEA) have been applied protection domain new concepts are superior to traditional methods. The chaotic system is rich significance implication because sensitivity change initial conditions, control...

10.1109/isbast.2008.4547663 article EN International Symposium on Biometrics and Security Technologies 2008-04-01

The current study was conducted to investigate the efficiency of olive mill waste-derived biochar and its silica-embedded nutrient-loaded derivatives in immobilizing lead (Pb) improving nutrients availability contaminated sandy loam soils. Biochar produced at 500 °C latterly modified with silica enriched (P N). An incubation experiment for a period 45 days observe dynamics heavy metals nutrient release. versions were characterized physiochemical structural properties prior soil application....

10.3390/su15032606 article EN Sustainability 2023-02-01

With the rapid and progressive development of medical images data exchange in digital formats, information security image encryption are becoming more important storage transmission. Because widespread use hospitals healthcare communities, it is to protect them from unauthorized access. In this paper, we propose a algorithm based on chaotic technique. A logistic map used scramble pixel values image. order achieve high level security, simplified version Data Encryption Standard (DES) used....

10.12785/amis/081l04 article EN Applied Mathematics & Information Sciences 2013-11-28

NoSQL-based databases are attractive to store and manage big data mainly due high scalability modeling flexibility. However, security in is weak which raises concerns for users. Specifically, of at rest a concern the users deployed their solutions on cloud because unauthorized access servers will expose easily. There have been some efforts enable encryption NoSQL databases. existing do not support secure query processing, communication over Internet performance proposed also good. In this...

10.4018/ijisp.2019040102 article EN International Journal of Information Security and Privacy 2019-04-01

This paper focuses the problem of combining compression with encryption for large data. Towards this end, a data encoding scheme combined and encryption, codenamed CSDC, is introduced. The supports 128-bit key lengths. achieved through Huffman coding chaotic key-based expansion performed Logistic map, function selected by its high sensitivity to initial condition, parameter value, ergodicity, random behavior unstable periodic orbits long periods. Experimental analysis shows that ratio,...

10.1109/iccoins.2016.7783293 article EN 2016-08-01

With large-scale and rapid development in wireless sensor networks (WSNs), there is great demand to adopt security mechanisms for secure communication. WSNs have many fields of applications that are playing an essential role increasing productivity reducing cost. The restricted constrained nature sensors along with potentially dynamic behavior demands the proper implementation framework communication order prevent attacker from illegally accessing or altering transmission. We proposed a...

10.1155/2013/585491 article EN cc-by International Journal of Distributed Sensor Networks 2013-12-01

<title>Abstract</title> Ba0.7Co0.3LaxFe2-xO4 nano spinel ferrites, with lanthanum substitution, were synthesized using the sol-gel auto-combustion technique. Various techniques, including Crystallographic X-ray diffraction (XRD), Fourier transform infrared spectroscopy (FTIR), high-resolution scanning electron microscopy (HRSEM), vibrating sample magnetometer (VSM), and UV-vis spectroscopy, used to study their structural, morphological, magnetic, optical parameters. The XRD patterns...

10.21203/rs.3.rs-4834124/v1 preprint EN cc-by Research Square (Research Square) 2024-08-29

Microplastics (MPs) are emerging environmental pollutants worldwide, posing potential health risks. Moreover, MPs may act as vectors for other contaminants and affect their fate, transport, deposition in the environment. Therefore, efficient economical techniques needed removal of contemporary from The present research study investigated sorption phosphorus (P) ammonium (NH4+) onto date palm waste-derived biochar (BC) an aqueous solution presence polyamide (PA) polyethylene (PE) MPs. BC was...

10.3390/toxics11110881 article EN cc-by Toxics 2023-10-26
Coming Soon ...