- Chaos-based Image/Signal Encryption
- Cryptographic Implementations and Security
- Advanced Steganography and Watermarking Techniques
- Coding theory and cryptography
- Cryptography and Residue Arithmetic
- IoT and Edge/Fog Computing
- Fuzzy Logic and Control Systems
- Virtual Reality Applications and Impacts
- Internet of Things and AI
- Computational Drug Discovery Methods
- Multi-Criteria Decision Making
- Cellular Automata and Applications
- Smart Agriculture and AI
- Rough Sets and Fuzzy Logic
- Software Engineering Research
- Cryptography and Data Security
- Software Engineering Techniques and Practices
- COVID-19 diagnosis using AI
- Plant Toxicity and Pharmacological Properties
- AI in cancer detection
- Digital Media Forensic Detection
- Nonlinear Optical Materials Studies
- Internet Traffic Analysis and Secure E-voting
- Phytochemistry and Biological Activities
- Digital Imaging for Blood Diseases
University of Tabuk
2016-2025
Quaid-i-Azam University
2024
King Khalid University
2024
Information Technology University
2023
Internet of Medical Things (IoMT) is an emerging subset (IoT), often called as IoT in healthcare, refers to medical devices and applications with internet connectivity, exponentially gaining researchers' attention due its wide-ranging applicability biomedical systems for Smart Healthcare systems. IoMT facilitates remote health system plays a crucial role within the healthcare industry enhance precision, reliability, consistency productivity electronic used various purposes. It comprises...
Robot navigation in indoor environments has become an essential task for several applications, including situations which a mobile robot needs to travel independently certain location safely and using the shortest path possible. However, faces challenges, such as obstacles dynamic environment. This paper addresses problem of social environments, through developing efficient SLAM-based localization system service robots Pepper platform. In addition, this discusses issue way that allows...
Both the act of keeping information secret and research on how to achieve it are included in broad category cryptography. When people refer “information security,” they referring study use methods that make data transfers harder intercept. we talk about this is what have mind. Using private keys encrypt decode messages a part procedure. Because its vital role modern theory, computer security, engineering, cryptography now considered be branch both mathematics science. mathematical...
Substitution boxes are the key factor in symmetric-key cryptosystems that determines their ability to resist various cryptanalytic attacks. Creating strong substitution have multiple cryptographic properties at same time is a challenging task for cryptographers. A significant amount of research has been conducted on S-boxes past few decades, but resulting found be vulnerable cyberattacks. This paper proposes new method creating robust exhibit superior performance and possess high scores...
The incidence of COVID-19, a virus that is responsible for infections in the upper respiratory tract and lungs, witnessed daily rise fatalities throughout pandemic. timely identification COVID-19 can contribute to formulation strategies control disease selection an appropriate treatment pathway. Given necessity broader diagnosis, researchers have developed more advanced, rapid, efficient detection methods. By conducting initial comparative analysis various widely used convolutional neural...
Wireless body area networks ( <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">WBAN</i> ) are essential components of intelligent healthcare monitoring techniques. Especially, when the number and datatype in increases. In , secure multidimensional data aggregation received a lot attention. However, related schemes consume more computational communication overhead to encrypt/decrypt health reports. this paper, blockchain-assisted scalable...
Researchers concentrate on data security using cryptography, different approaches to protect confidential data, such as digital images holding private information. They use cryptography techniques, frequently elliptic curves and chaotic structures for secure transmission. This paper introduces a novel technique constructing S-boxes their application in color image encryption. The utilization of discrete maps results low computational complexity, which is crucial high-speed communication...
In recent years, numerous image encryption schemes have been developed that demonstrate different levels of effectiveness in terms robust security and real-time applications. While a few them outperform security, others perform well for applications where less processing time is required. Balancing these two aspects poses challenge, aiming to achieve efficient without compromising security. To address this the proposed research presents data approach encrypting grayscale images, comprising...
As the Internet becomes increasingly popular, number of users connected to it grows significantly. Consequently, packet processing speed network systems, such as routers, must be enhanced. IP lookup is a critical task used find next hop address by searching for longest prefix match in forwarding information base (FIB). The binary trie one most popular software-based approaches lookup. Prefix compression techniques can improve both time and space complexity lookups, thereby enhancing overall...
Preference analysis is a significant component in decision-making (DM) when selecting an optimal alternative. By comparing any two alternatives pairwise, preference relations (PRs) effectively depict the degrees of decision-makers (DMrs). The rough set theory (RST) has been applied to cope with by swapping equivalence relation (Er) dominance (DR). In this study, we propose new transfer functions construct alternatives' upward/downward fuzzy degree (FPD) for evaluating upward and downward PRs...
Modern wheelchairs, with advanced and robotic technologies, could not reach the life of millions disabled people due to their high costs, technical limitations, safety issues. This paper proposes a gesture-controlled smart wheelchair system an IoT-enabled fall detection mechanism overcome these problems. It can recognize gestures using Convolutional Neural Network (CNN) model along computer vision algorithms control automatically by utilizing gestures. maintains users performing IoT-based...
Polynomial multiplications based on the number theoretic transform (NTT) are critical in lattice-based post-quantum cryptography algorithms. Therefore, this paper presents a platform-agnostic unified hardware accelerator design (Unif-NTT) to compute forward and inverse operations of NTT for CRYSTALS-Kyber algorithm. Moreover, (Unif-BU) Cooley-Tukey Gentleman-Sande butterflies is presented using two adders, multipliers, subtractors, routing multiplexers barret-based modular reduction units....
The importance of network security has increased with the emergence networked systems in contemporary computing, making it an essential aspect protecting digital assets and safeguarding against cyber threats. current mechanisms, which rely on cryptographic keys, may be susceptible to a number attacks, such as media access control (MAC) spoofing, might provide unauthorized users resources. This study introduces new approach, namely zero-trust framework quantum fingerprinting for devices...
Elliptic curve (EC) based cryptographic systems are more trustworthy than the currently used approaches since they require less computational work while providing good security. This paper shows how to use an EC make a cryptosystem for encrypting digital audio. As preliminary step, system uses of particular type over binary extension field distort audio pixel position. It reduces inter-correlation between pixels in original audio, making resistant statistical attacks. In creating confusion...
Acetaminophen (APAP) is the most commonly used nonprescription antipyretic-analgesic drug. This medication thought to be safe at suggested dosage (4 g/24 h), but its overdose (up 2.5 g/kg) can cause severe injuries human body, including renal injury. APAP has various toxic effects on nephrons, as it leads an excessive free radical generation that, in turn, results a disturbance redox homeostasis of cells, causing oxidative stress. To replenish this stress, there ultimate urge for natural...
<abstract> <p>Elliptic curve (EC) cryptography supplies an efficient, secure, and lightweight method for executing computer cryptographic protocols. Its widespread use in various applications, including secure communications, digital signatures, key agreement protocols, highlights its importance modern computing. Moreover, EC-based image encryption is gaining popularity as it offers strong protection with a relatively smaller size than other famous cryptosystems. Inspired by...
The elliptic curve (EC) offers a well-organized and secure method for implementing cryptographic protocols in computer systems. Its broad utilization various applications, such as ensuring communications, digital signatures, key agreement protocols, underscores its significance contemporary computing. In this article, we employed EC over binary extension field (BEF), choice that not only maintains security but also reduces computational overhead when compared to the use of large prime...
The deployment of Agriculture 4.0 depends heavily on the adoption Internet Things (IoT) and wireless sensors for increasing productivity reducing costs cultivation. Wearable plant (WPS), an IoT variant, can greatly optimize agricultural yields, sense early indications disease, reduce waste minimize environmental concerns. Nonetheless, induction WPS into fields always remains precarious its open nature. We witness many or insecure due to their vulnerability known attacks. Most these protocols...
Grape cultivation faces various challenges, such as pests, management, fertilizer quality, and diseases caused by bacteria, fungi, viruses. Notably, powdery mildew blotches are significant with different features, necessitating an accurate detection system to minimize crop losses. While traditional methods involve capturing images of diseased leaves, this research proposes a smart approach using deep learning machine algorithms analyze taken strategically placed cameras on farms. The aims...
The final year project (FYP) is considered a capstone course in information technology (IT) programmes and involves the development of software product. Currently, students are using traditional life cycle approach to manage their FYPs. However, this can cause many difficulties. This paper proposes an alternative model for managing FYP IT IT-related degree study. First, benchmarking exercise was undertaken compare developed business purposes with that educational purposes, which took into...
<abstract><p>This paper investigates the global asymptotic stability problem for a class of Takagi-Sugeno fuzzy Clifford-valued delayed neural networks with impulsive effects and leakage delays using system decomposition method. By applying theory, we first consider general form networks. Then, decompose considered $ n $-dimensional systems into 2^mn real-valued in order to avoid inconvenience caused by non-commutativity multiplication Clifford numbers. Lyapunov-Krasovskii...
With the massive outbreak of coronavirus (COVID-19) disease, demand for automatic and quick detection COVID-19 has become a crucial challenge scientists around world. Many researchers are working on finding an automated effective system detecting COVID-19. They have found that computed tomography (CT-scan) X-ray images infected patients can provide more accurate faster results. In this paper, is proposed named as COV-CTX which detect from CT-scan images. The consists three different CNN...
In block ciphers, the nonlinear components, also known as substitution boxes (S-boxes), are used with purpose to induce confusion in cryptosystems.For last decade, most of work on designing S-boxes over points elliptic curves, chaotic maps, and Gaussian integers has been published.The main these studies is hide data improve security levels crypto algorithms.In this work, we design pair components a cipher residue class Eisenstein (EI).The fascinating features structure provide at time by...