From a network model to a model network: strategies for network development to narrow the LIS research-practice gap
Journal Article
Hall, H., Ryan, B., Salzano, R., & Stephen, K. (in press)
From a network model to a model network: strategies for network development to narrow the LIS research-practice gap. Journal of Documentation, https://doi.org/10.1108/JD-04-2022-0088
PURPOSE: The purpose of the empirical study was to examine whether strategies shown to work well in one model of network development for Library and Information Science (LIS) ...
Circuit Modelling of Broadband Antenna Using Vector Fitting and Foster Form Approaches for IoT Applications
Journal Article
Ez-zaki, F., Belaid, K. A., Ahmad, S., Belahrach, H., Ghammaz, A., Al-Gburi, A. J. A., & Parachin, N. O. (2022)
Circuit Modelling of Broadband Antenna Using Vector Fitting and Foster Form Approaches for IoT Applications. Electronics, 11(22), Article 3724. https://doi.org/10.3390/electronics11223724
Computation of the broadband antenna impedance behavior requires the wideband lumped equivalent circuit. This work aims to provide a comprehensive study of broadband antenna e...
Low-Loss and Dual-Band Filter Inspired by Glide Symmetry Principle Over Millimeter-Wave Spectrum for 5G Cellular Networks
Journal Article
Karamirad, M., Pouyanfar, N., Alibakhshikenari, . M., Ghobadi, . C., Nourinia, . J., See, C. H., & Falcone, F. (in press)
Low-Loss and Dual-Band Filter Inspired by Glide Symmetry Principle Over Millimeter-Wave Spectrum for 5G Cellular Networks. iScience,
This paper focuses on designing a dual-band, bandpass filter configuration inspired by glide-symmetric structures in a single plane. Geometry configuration of Elliptical slots...
Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things
Journal Article
Hasan, A., Khan, M. A., Shabir, B., Munir, A., Malik, A. W., Anwar, Z., & Ahmad, J. (2022)
Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things. Applied Sciences, 12(22), Article 11442. https://doi.org/10.3390/app122211442
The internet of things (IoT) is prone to various types of denial of service (DoS) attacks due to their resource-constrained nature. Extensive research efforts have been dedica...
From Mean Time to Failure to Mean Time to Attack/Compromise: Incorporating Reliability into Cybersecurity
Journal Article
Maglaras, L. (2022)
From Mean Time to Failure to Mean Time to Attack/Compromise: Incorporating Reliability into Cybersecurity. Computers, 11(11), Article 159. https://doi.org/10.3390/computers11110159
Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring
Journal Article
Ghadi, Y. Y., Alsuhibany, S. A., Ahmad, J., Kumar, H., Boulila, W., Alsaedi, M., …Bhatti, S. A. (2022)
Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring. Journal of Healthcare Engineering, 2022, Article 7745132. https://doi.org/10.1155/2022/7745132
With the advancement of camera and wireless technologies, surveillance camera-based occupancy has received ample attention from the research community. However, camera-based o...
A Proposal of a New Chaotic Map for Application in the Image Encryption Domain
Journal Article
Abu-Amara, F., & Ahmad, J. (in press)
A Proposal of a New Chaotic Map for Application in the Image Encryption Domain. Journal of Information and Knowledge Management, https://doi.org/10.1142/s0219649222500885
Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption scheme has pros and cons regarding its speed, complexity, and security. Thi...
TAFFO: The compiler-based precision tuner
Journal Article
Cattaneo, D., Chiari, M., Agosta, G., & Cherubin, S. (2022)
TAFFO: The compiler-based precision tuner. SoftwareX, 20, Article 101238. https://doi.org/10.1016/j.softx.2022.101238
We present taffo, a framework that automatically performs precision tuning to exploit the performance/accuracy trade-off. In order to avoid expensive dynamic analyses, taffo l...
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder
Journal Article
Ahmed, F., Ur Rehman, M., Ahmad, J., Shahbaz Khan, M., Boulila, W., Srivastava, G., …Buchanan, W. J. (in press)
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder. ACM transactions on multimedia computing communications and applications, https://doi.org/10.1145/3570165
With the advancement in technology, digital images can easily be transmitted and stored over the Internet. Encryption is used to avoid illegal interception of digital images. ...
A robust deep learning approach for tomato plant leaf disease localization and classification
Journal Article
Nawaz, M., Nazir, T., Javed, A., Masood, M., Rashid, J., Kim, J., & Hussain, A. (2022)
A robust deep learning approach for tomato plant leaf disease localization and classification. Scientific Reports, 12(1), Article 18568. https://doi.org/10.1038/s41598-022-21498-5
Tomato plants' disease detection and classification at the earliest stage can save the farmers from expensive crop sprays and can assist in increasing the food quantity. Altho...