- Chaos-based Image/Signal Encryption
- Cryptographic Implementations and Security
- Algorithms and Data Compression
- Cellular Automata and Applications
- Cryptography and Data Security
- Magnetic Properties and Synthesis of Ferrites
- Clay minerals and soil interactions
- Heavy metals in environment
- Multiferroics and related materials
- Microplastics and Plastic Pollution
- Chaos control and synchronization
- Quantum Computing Algorithms and Architecture
- Soil and Unsaturated Flow
- Coal and Its By-products
- Complexity and Algorithms in Graphs
- Energy Efficient Wireless Sensor Networks
- Autonomous Vehicle Technology and Safety
- Therapeutic Uses of Natural Elements
- Advanced Mathematical Theories and Applications
- Cloud Data Security Solutions
- Security in Wireless Sensor Networks
- Magnetic Field Sensors Techniques
- Polymer-Based Agricultural Enhancements
- Constructed Wetlands for Wastewater Treatment
- Magneto-Optical Properties and Applications
Minhaj University Lahore
2024
King Saud University
2009-2024
Pakistan Institute of Engineering and Applied Sciences
2024
Bahria University
2008-2020
Sir Syed University of Engineering and Technology
2020
Qatar University
2020
Universiti Teknologi Petronas
2016-2017
Pakistan Space and Upper Atmosphere Research Commission
2008
Data compression and encryption are key components of commonly deployed platforms such as Hadoop. Numerous data tools presently available on the characteristically applied in sequence, i.e., followed by or compression. This paper focuses open-source Hadoop framework proposes a storage method that efficiently couples with encryption. A simultaneous scheme is introduced addresses an important implementation issue source coding based Tent Map Piece-wise Linear Chaotic (PWLM), which infinite...
A substitution box is a core component of the popular symmetric-key algorithms. However, major problem conventional boxes statistic behavior, which employed as fixed-size lookup table. To solve table problem, various construction methods were proposed with key control, but it hard to enhance all cryptographic properties, for example, linear and differential probabilities. Thus, chaos applied control in designing robust due unpredictable random-like behavior. Moreover, confusion diffusion...
Abstract Data stored in physical storage or transferred over a communication channel includes substantial redundancy. Compression techniques cut down the data redundancy to reduce space and time. Nevertheless, compression lack proper security measures, e.g., secret key control, leaving susceptible attack. encryption is therefore needed achieve keeping unreadable unaltered through key. This work concentrates on problems of collectively without negatively affecting each other. Towards this...
In this paper, we will provide an overview of the mechanisms used in image protection, especially Chaos-based encryption techniques available today. We see how previously proposed methods such as data standard (DES), Triple Data Encryption Standard (Triple- DES), and International Algorithm (IDEA) have been applied protection domain new concepts are superior to traditional methods. The chaotic system is rich significance implication because sensitivity change initial conditions, control...
The current study was conducted to investigate the efficiency of olive mill waste-derived biochar and its silica-embedded nutrient-loaded derivatives in immobilizing lead (Pb) improving nutrients availability contaminated sandy loam soils. Biochar produced at 500 °C latterly modified with silica enriched (P N). An incubation experiment for a period 45 days observe dynamics heavy metals nutrient release. versions were characterized physiochemical structural properties prior soil application....
With the rapid and progressive development of medical images data exchange in digital formats, information security image encryption are becoming more important storage transmission. Because widespread use hospitals healthcare communities, it is to protect them from unauthorized access. In this paper, we propose a algorithm based on chaotic technique. A logistic map used scramble pixel values image. order achieve high level security, simplified version Data Encryption Standard (DES) used....
NoSQL-based databases are attractive to store and manage big data mainly due high scalability modeling flexibility. However, security in is weak which raises concerns for users. Specifically, of at rest a concern the users deployed their solutions on cloud because unauthorized access servers will expose easily. There have been some efforts enable encryption NoSQL databases. existing do not support secure query processing, communication over Internet performance proposed also good. In this...
This paper focuses the problem of combining compression with encryption for large data. Towards this end, a data encoding scheme combined and encryption, codenamed CSDC, is introduced. The supports 128-bit key lengths. achieved through Huffman coding chaotic key-based expansion performed Logistic map, function selected by its high sensitivity to initial condition, parameter value, ergodicity, random behavior unstable periodic orbits long periods. Experimental analysis shows that ratio,...
With large-scale and rapid development in wireless sensor networks (WSNs), there is great demand to adopt security mechanisms for secure communication. WSNs have many fields of applications that are playing an essential role increasing productivity reducing cost. The restricted constrained nature sensors along with potentially dynamic behavior demands the proper implementation framework communication order prevent attacker from illegally accessing or altering transmission. We proposed a...
<title>Abstract</title> Ba0.7Co0.3LaxFe2-xO4 nano spinel ferrites, with lanthanum substitution, were synthesized using the sol-gel auto-combustion technique. Various techniques, including Crystallographic X-ray diffraction (XRD), Fourier transform infrared spectroscopy (FTIR), high-resolution scanning electron microscopy (HRSEM), vibrating sample magnetometer (VSM), and UV-vis spectroscopy, used to study their structural, morphological, magnetic, optical parameters. The XRD patterns...
Microplastics (MPs) are emerging environmental pollutants worldwide, posing potential health risks. Moreover, MPs may act as vectors for other contaminants and affect their fate, transport, deposition in the environment. Therefore, efficient economical techniques needed removal of contemporary from The present research study investigated sorption phosphorus (P) ammonium (NH4+) onto date palm waste-derived biochar (BC) an aqueous solution presence polyamide (PA) polyethylene (PE) MPs. BC was...