6 results

Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records

Conference Proceeding
Noyon, M. S. I., Moradpoor, N., Maglaras, L., & Ahmad, J. (in press)
Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records.

SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data

Conference Proceeding
Shahbaz Khan, M., Ahmad, J., Ali, H., Pitropakis, N., Al-Dubai, A., Ghaleb, B., & Buchanan, W. J. (in press)
SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.
With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods oft...

Detecting Alzheimer’s Disease Using Machine Learning Methods

Conference Proceeding
Dashtipour, K., Taylor, W., Ansari, S., Zahid, A., Gogate, M., Ahmad, J., …Abbasi, Q. (2022)
Detecting Alzheimer’s Disease Using Machine Learning Methods. In Body Area Networks. Smart IoT and Big Data for Intelligent Health Management 16th EAI International Conference, BODYNETS 2021, Virtual Event, October 25-26, 2021, Proceedings. https://doi.org/10.1007/978-3-030-95593-9_8
As the world is experiencing population growth, the portion of the older people, aged 65 and above, is also growing at a faster rate. As a result, the dementia with Alzheimer’...

Comparing the Performance of Different Classifiers for Posture Detection

Conference Proceeding
Suresh Kumar, S., Dashtipour, K., Gogate, M., Ahmad, J., Assaleh, K., Arshad, K., …Ahmad, W. (2022)
Comparing the Performance of Different Classifiers for Posture Detection. In Body Area Networks. Smart IoT and Big Data for Intelligent Health Management. BODYNETS 2021 (210-218). https://doi.org/10.1007/978-3-030-95593-9_17
Human Posture Classification (HPC) is used in many fields such as human computer interfacing, security surveillance, rehabilitation, remote monitoring, and so on. This paper c...

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

Conference Proceeding
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2022)
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. In IEEE SINCONF: 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699366
Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can...

Application of Artificial Neural Network in Predicting Flashover Behaviour of Outdoor Insulators under Polluted Conditions

Conference Proceeding
Sajjad, U., Arshad, Ahmad, J., & Shoaib, S. (2021)
Application of Artificial Neural Network in Predicting Flashover Behaviour of Outdoor Insulators under Polluted Conditions. In 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus). https://doi.org/10.1109/elconrus51938.2021.9396388
Safe and reliable delivery of power through transmission lines mainly depends on the quality condition of the high voltage insulators. In the last few decades, demand in polym...