UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 578
1.
  • A novel efficient substitut... A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map
    Ahmed, Hussam A.; Zolkipli, Mohamad Fadli; Ahmad, Musheer Neural computing & applications, 11/2019, Volume: 31, Issue: 11
    Journal Article
    Peer reviewed

    Substitution boxes are essential nonlinear components responsible to impart strong confusion and security in most of modern symmetric ciphers. Constructing efficient S-boxes has been a prominent ...
Full text
2.
  • Detecting distraction of dr... Detecting distraction of drivers using Convolutional Neural Network
    Masood, Sarfaraz; Rai, Abhinav; Aggarwal, Aakash ... Pattern recognition letters, November 2020, 2020-11-00, 20201101, Volume: 139
    Journal Article
    Peer reviewed

    •A model to detect distraction of drivers.•Utilizes Convolutional Neural Networks to detect the activity being performed by the driver.•The model is able to differentiate between the types of ...
Full text
3.
  • Effective photocatalytic de... Effective photocatalytic degradation of rhodamine B dye by ZnO nanoparticles
    Rahman, Qazi Inamur; Ahmad, Musheer; Misra, Sunil Kumar ... Materials letters, 01/2013, Volume: 91, Issue: 15
    Journal Article
    Peer reviewed

    Highly crystalline ZnO nanoparticles (NPs) were synthesized with zinc acetate as precursor and oxalic acid at 80°C through the simple solution phase approach. The synthesized ZnO NPs possessed ...
Full text
4.
  • Ratiometric luminescent sensing of a biomarker for sugar consumption in an aqueous medium using a Cu(II) coordination polymer
    Somnath; Ahmad, Musheer; Siddiqui, Kafeel Ahmad Dalton transactions : an international journal of inorganic chemistry, 03/2023, Volume: 52, Issue: 12
    Journal Article
    Peer reviewed

    An innovative Cu(Hadp) (Bimb) (KA@CP-S3) coordination polymer expands its dimensionality from a 1D chain to a 2D network. The topological analysis reveals that KA@CP-S3 has 2-connected uninodal 2D ...
Full text
5.
  • An Efficient Mutual Authent... An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing
    Kumar, Vinod; Jangirala, Srinivas; Ahmad, Musheer Journal of medical systems, 08/2018, Volume: 42, Issue: 8
    Journal Article
    Peer reviewed

    The increasing role of Telecare Medicine Information Systems (TMIS) makes its accessibility for patients to explore medical treatment, accumulate and approach medical data through internet ...
Full text
6.
  • A Novel Construction of Eff... A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation
    Zahid, Amjad Hussain; Arshad, Muhammad Junaid; Ahmad, Musheer Entropy, 03/2019, Volume: 21, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    A symmetric block cipher employing a substitution-permutation duo is an effective technique for the provision of information security. For substitution, modern block ciphers use one or more ...
Full text

PDF
7.
  • Attention based CNN model f... Attention based CNN model for fire detection and localization in real-world images
    Majid, Saima; Alenezi, Fayadh; Masood, Sarfaraz ... Expert systems with applications, 03/2022, Volume: 189
    Journal Article
    Peer reviewed

    •A custom deep learning framework for detecting fire in real-world images.•Attention mechanism and transfer learning is used with EfficientNetB0 trained.•Framework uses Grad-CAM method for ...
Full text
8.
  • A novel method of S-box des... A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm
    Alhadawi, Hussam S.; Majid, Mazlina Abdul; Lambić, Dragan ... Multimedia tools and applications, 02/2021, Volume: 80, Issue: 5
    Journal Article
    Peer reviewed

    Substitution-boxes (S-boxes) are unique nonlinear elements, which are used to achieve the property of confusion in modern symmetric ciphers and offer resistance to cryptanalysis. The construction of ...
Full text
9.
  • Evolving Dynamic S-Boxes Us... Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme
    Ahmad, Musheer; Al-Solami, Eesa Entropy, 06/2020, Volume: 22, Issue: 7
    Journal Article
    Peer reviewed
    Open access

    Static substitution-boxes in fixed structured block ciphers may make the system vulnerable to cryptanalysis. However, key-dependent dynamic substitution-boxes (S-boxes) assume to improve the security ...
Full text

PDF
10.
  • A Novel Modular Approach Ba... A Novel Modular Approach Based Substitution-Box Design for Image Encryption
    Zahid, Amjad Hussain; Al-Solami, Eesa; Ahmad, Musheer IEEE access, 01/2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    In modern-day block ciphers, the role of substitution-boxes is to transform the plaintext data nonlinearly to generate ciphertext data with sufficient confusion. It has been well-confirmed that the ...
Full text

PDF
1 2 3 4 5
hits: 578

Load filters