Danish Ali Khan

ORCID: 0000-0002-6669-0900
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Supply Chain and Inventory Management
  • Chaos-based Image/Signal Encryption
  • Network Security and Intrusion Detection
  • Software Reliability and Analysis Research
  • Sustainable Supply Chain Management
  • Software Testing and Debugging Techniques
  • Software Engineering Research
  • Advanced Malware Detection Techniques
  • Software System Performance and Reliability
  • Blockchain Technology Applications and Security
  • Internet Traffic Analysis and Secure E-voting
  • Software Engineering Techniques and Practices
  • Cloud Data Security Solutions
  • Optimization and Mathematical Programming
  • Big Data and Business Intelligence
  • Imbalanced Data Classification Techniques
  • Health and Medical Research Impacts
  • Digital Media Forensic Detection
  • Innovations in Medical Education
  • Health Sciences Research and Education
  • Telecommunications and Broadcasting Technologies
  • ERP Systems Implementation and Impact
  • Leaf Properties and Growth Measurement
  • Advanced Queuing Theory Analysis

National Institute of Technology Jamshedpur
2014-2024

University of Southern Queensland
2022-2024

Khyber Medical College
2024

COMSATS University Islamabad
2022-2023

Indus Hospital
2023

Health Net
2023

Arab Open University
2022

Kaloji Narayana Rao University of Health Sciences
2022

Northwest General Hospital and Research Center
2019-2022

Division of Computer and Network Systems
2022

The Internet has become a vital source of knowledge and communication in recent times. Continuous technological advancements have changed the way businesses operate, everyone today lives digital world engineering. Because Things (IoT) its applications, people's impressions information revolution improved. Malware detection categorization are becoming more problem cybersecurity world. As result, strong security on could protect billions internet users from harmful behavior. In malware...

10.1016/j.heliyon.2023.e23574 article EN cc-by-nc-nd Heliyon 2023-12-12

Informal availability of Internet and easy accessibility network resources to a general public has created new era security design challenge for multimedia contents which is available in the form image, text, video audio etc. This paper presents novel technique employ mechanism transmission digital over network. The proposed method uses multilevel image encryption/decryption algorithm based on quantum chaos map sparse sampling. In initial phase an original divided into blocks equal size each...

10.1016/j.jksuci.2018.05.012 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2018-06-01

Recently, the life in Earth becomes turbulent with worldwide spread of novel coronavirus (COVID-19). This outbreak has been declared as a public health emergency level international concern by world organization (WHO). To reduce COVID19 entire adopted social distancing, where working and learning from home is new normal for this world. sustain economical revenue business growth companies that radically move into cloud infrastructure to support employees, who work remotely. With unprecedented...

10.1109/icosec49089.2020.9215374 article EN 2020 International Conference on Smart Electronics and Communication (ICOSEC) 2020-09-01

Steganography is a hidden way of communication, where one person communicates with the other by using some medium under garb cover, without any suspicion created on part unauthorized intermediary about existence secret message. Linguistic steganography hiding information in natural language text. Synonym substitution an important transformation used linguistic steganography. In this paper, we are going to show method redesigning change tracking technique for message Microsoft Word document...

10.1016/j.jksuci.2017.08.004 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2017-08-31

Background: Type 2 Diabetes develops in adulthood, and is caused due to failure of pancreatic B-cells secrete insulin, gradually causing desensitization glucose, leading insulin resistance1-5. According American Association, the chronicity this disease, long-term complications arise which mostly occur hyperglycemia microvascular macrovascular damage6. This brings about significant damage heart, eyes(retinopathy), kidneys (chronic kidney disease) nerves(neuropathy).5 Metabolic...

10.70749/ijbr.v3i2.663 article EN Indus journal of bioscience research. 2025-02-18

10.1016/j.jisa.2016.11.005 article EN Journal of Information Security and Applications 2017-01-06

The most important and crucial activity to develop good quality software is testing. in testing find optimal test suite input domain satisfy a certain adequacy criteria. So an efficient approach generate data prime issue This paper proposes novel automatically for flow based on hybrid adaptive PSO-GA algorithm. APSO-GA developed conquer the weakness of GA PSO algorithms, especially A new fitness function also designed basis concept dominance relations, branch weight distance guide search...

10.1504/ijaip.2017.082997 article EN International Journal of Advanced Intelligence Paradigms 2017-01-01

Rijndael's Advanced Encryption Standard (AES) is the block cipher based symmetric-key cryptography to protect sensitive information.The key sizes of AES are 128, 192, 256 bits.AES on substitution-permutation strategy.It accepted by NIST in 2001 after five year security evaluation.It highly secured and efficient than Data (DES) other cryptographic algorithms.This paper depicts all valuable work done since it National Institute Standards Technology (NIST).

10.21275/art20164149 article EN International Journal of Science and Research (IJSR) 2017-01-05

Steganography is the tactics of silent communication, where one person communicates with others through cover medium so that intermediary does not has suspicion about hidden information. In this paper we propose a modified approach for text steganography based on HTML tags and attributes. As rich in its attributes, easily communicated internet, source code checked rarely by anybody it can be used intelligently to perform steganography. By hiding secret data inside HTML, achieved. relation...

10.1109/acct.2013.19 article EN 2013-04-01

Developing organizations are spends lots of money to finding the Errors and bugs. In this article, an application defects removal effectiveness improve software quality fault prone analysis, methods solution parameters in linear regression models with cost estimating method. It describes approach quantitative management through defect statistical process control analysis historical project data. Software is going continuously monetary benefit perform well planning, achieve a new height....

10.1016/j.procs.2015.06.039 article EN Procedia Computer Science 2015-01-01

Objectives: It is a challenging task to generate and identify an optimal test set that satisfies robust adequacy criterion, like data flow testing. A number of heuristic meta-heuristics algorithms GA, PSO have been applied optimize the Test Data Generation (TDG) problem. The aim this research work handle automatic Methods/Statistical Analysis: This focuses on application Artificial Bee Colony (ABC) algorithm guided by novel Fitness Function (FF) for TDG construction FF based concept...

10.17485/ijst/2016/v9i39/100733 article EN Indian Journal of Science and Technology 2016-10-24

The advancement of computer technology has raised significant issues with digital content piracy and copyright law. A popular method protecting related uses is watermarking. Various algorithms have been developed to address the need for invisible performance robustness in watermarking schemes. Here, we proposed a novel evolutionary algorithm, hybrid Grass Hopper Optimization Genetic algorithm (HGOAGA) optimizing multiple scaling factors scheme frequency domain Discrete Wavelet Transformation...

10.52756/ijerr.2024.v42.024 article EN cc-by-nc-nd International Journal of experimental research and review 2024-08-30

10.1007/s13198-017-0626-4 article EN International Journal of Systems Assurance Engineering and Management 2017-05-08

Background: Images are widely stored and transformed over public channel for communication, medical purpose or organizational uses. Mostly the images collected from remote location, therefore confidentiality of data becomes most important matter concern. The convenient way to protect (image) is encrypt it right after capturing sensors at locations. There a large number patents registered till date. We have covered all benchmark on encryption. Objective: This paper furnished an enhanced...

10.2174/1872212111666170223165916 article EN Recent Patents on Engineering 2018-03-08
Coming Soon ...