Hamdard Insititute of Engineering & Technology

Research Profile

2019

  1. Asghar Khan; Qureshi, I.M. Low-cost, Rapid and Energy-efficient Hybrid Wireless Technology for Future Deployment of Flying-Ad-hoc Networks. Drones 2019,3(1),16
  2. Insaf Ullah, Noor-Ul-Amin, Muhammad Naem, and Hizbullah Khattak. 2019. A Novel Provable Secured Signcryption Scheme(𝒫𝒮𝒮𝒮): An Hyper Elliptic Curve Based Approach. Mathematics 2019, 7, 686
  3. Insafullah et al. A Lightweight and Provable Secure Proxy Signcryption Scheme Based on Hyper Elliptic Curve. information technology and control, 2019
  4. Insaf Ullah, Noor-Ul-Amin. A Light Weight and Provable Secured Certificate-Less Signcryption Approach for Crowdsourced IIOT Applications. Symetry. 2019
  5. Hasan Raza and Noor M. Khan. Tracking Performance of Robust RLS algorithm for MIMO Channel Estimation, Wireless Personal Communications, Springer, pp. 1-15,  2019.
  6. Musharif ahmed, ijaz mansoor qureshi, muhammad aamer saleem, muhammad zubair, saad zafar, “Between Host HIV model: stability analysis and solution using memetic computing”, July 2019, Turkish Journal of Electrical Engineering and Computer Sciences 27(4):2769-2783 DOI: 10.3906/elk-1812-57
  7. Insafullah, Asghar Khan. An Energy Efficient and Formally Secured Certificate-Based Signcryption for Wireless Body Area Networks with the Internet of Things. Electronics 2019, 8, 1171
  8. Asghar Khan et al. An Efficient and Provably Secure Certificateless Blind Signature
    Scheme for Flying Ad-hoc Network Based on Multi-Access Edge Computing. Electronics 2019
  9. Asghar Khan; Qureshi, I.M. Low-cost, Rapid and Energy-efficient Hybrid Wireless Technology for Future Deployment of Flying-Ad-hoc Networks. Drones 2019,3(1),16.
  10. Asghar Khan; Dual-Radio Dual-Band Configuration for Flexible Communication in Flying Ad-hoc Networks (FANET). In International Conference on Communication Technologies (ComTech’2019), MCS, NUST, 2019.
  11. Insaf Ullah, Noor-Ul-Amin, Muhammad Naem, and Hizbullah Khattak. 2019. A Novel Provable Secured Signcryption Scheme(𝒫𝒮𝒮𝒮): An Hyper Elliptic Curve Based Approach. Mathematics 2019, 7, 686
  12. A Lightweight and Provable Secure Proxy Signcryption Scheme Based on Hyper Elliptic Curve. information technology and control, 2019
  13. Insaf Ullah, Noor-Ul-Amin. A Light Weight and Provable Secured Certificate-Less Signcryption Approach for Crowdsourced IIOT Applications. Symetry. 2019
  14. Muhammad Adnan Khan, Muhammad Umair, Muhammad Aamir Saleem, Ayesha Nasir, and Muhammad Nadeem Ali, “DE Using Improved Opposite based Swarm Optimization for MIMO Systems” Accepted for publication in Jrnl.of Intelligent and Fuzzy Systems. 2019.

2018

  1. Irshad, Mehreen; Sharif, Muhammad; Yasmin, Mussarat; Khan, Amjad. 2018. A Survey on Left Ventricle Segmentation Techniques in Cardiac Short Axis MRI. Current Medical Imaging Reviews, Volume 14, Number 2, pp. 223-237(15)
  2. Attique ur Rehman , Hasan Raza, and Israr Akhter,SECURITY ENHANCEMENT OF HILL CIPHER BY USING NON-SQUARE MATRIX APPROACH, 4 International Conference on Knowledge, and Innovations,Engineering , Science and Technology.2018
  3. Asghar Khan; Khan, I.U.; Safi, A.; Qureshi, I.M. Dynamic Routing in Flying Ad-Hoc Networks Using Topology-Based Routing Protocols. Drones 2018, 2, 27.
  4. Khan, I.U, Qureshi, I.M, Khan, M.A. Comparative Analysis and Route Optimization of State-of-the-Art Routing Protocols. EAI Endorsed Transactions on Mobile Networks and Applications, Vol 3, issue 13, March, 2018.
  5. Asghar Khan; Khan, I.U.; Qureshi, I.M.; Alam, M.K.; Shah, S.B.; Shafiq, M. Deployment of reliable,simple, and cost-effective medium access control protocols for multi-layer flying ad-hoc networks. In Proceedings of the 2nd International Conference on Future Networks and Distributed Systems (ICFNDS ’18), Amman, Jordan, 26–27 June 2018, 49.
  6. Khan, I.U, Qureshi, I.M, Khan, M.A. Ant Colony based Optimization techniques to mitigate Dynamic Routing Challenges in Packet based Networks. In Proceedings of the 2nd International Conference on Future Networks and Distributed Systems (ICFNDS ’18), Amman, Jordan, 26–27 June 2018.
  7. Asghar Khan; Khan, I.U.; Qureshi, I. M, Nasim, M. A; Javed, U; khan, M.W. On the Performance analysis of Flying Ad-Hoc Networks using Directional Antenna. In Proceeding of the 5th International Multi-Topic ICT Conference 2018 (IMTIC’18), April 25–27, 2018, Karachi, Pakistan.
  8. Asghar Khan; Alvi, Bilal; Khan, I.U.; Safi, A. Drones for Good in Smart Cities: A Review. International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing (EECCMC). 28th & 29th January 2018, India.
  9. Insaf Ullah, and Sadaf. 2018. Secure and Light Weight Scheme for Electronic Payment System. (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 9, No. 4.
  10. Abid ur Rahman,and Insaf Ullah. 2018. A Lightweight Multi-Message and Multi-Receiver Heterogeneous Hybrid Signcryption Scheme based on Hyper Elliptic Curve. (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 9, No. 5.
  11. Hizbullah Khattak, Noor Ul Amin, Ikram ud Din, Insafullah, Jawaid Iqbal.2018. LeafPopDown: Leaf Popular Down Caching Strategy for Information-Centric Networking. (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 9, No. 2.
  12. Yasmeen, A., Javaid, N., Rehman, O. U., Iftikhar, H., Malik, M. F., & Muhammad, F. J. (2018, June). Efficient resource provisioning for smart buildings utilizing fog and cloud based environment. In 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)(pp. 811-816). IEEE.
  13. Yasmeen, A., Javaid, N., Zahoor, S., Iftikhar, H., Shafiq, S., & Khan, Z. A. (2018, March). Optimal Energy Management in Microgrids Using Meta-heuristic Technique. In International Conference on Emerging Internetworking, Data & Web Technologies (pp. 303-314). Springer, Cham.
  14. Yasmeen, A., Javaid, N., Fatima, I., Nadeem, Z., Khan, A., & Khan, Z. A. (2018, March). A Metaheuristic Scheduling of Home Energy Management System. In International Conference on Emerging Internetworking, Data & Web Technologies (pp. 214-224). Springer, Cham.
  15. Zahoor, S., Javaid, N., Khalid, A., Yasmeen, A., & Nadeem, Z. (2018, July). Fog Computing Based Energy Management System Model for Smart Buildings. In International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (pp. 719-727). Springer, Cham.
  16. Zahoor, S., Javaid, N., Zafar, A., Yasmeen, A., & Khan, Z. A. (2018, March). Exploiting Meta-heuristic Technique for Optimal Operation of Microgrid. In International Conference on Emerging Internetworking, Data & Web Technologies (pp. 281-291). Springer, Cham.
  17. Zahoor, S., Javaid, N., Yasmeen, A., Shafi, I., Khan, A., & Khan, Z. A. (2018, March). Optimized Energy Management Strategy for Home and Office. In International Conference on Emerging Internetworking, Data & Web Technologies (pp. 237-246). Springer, Cham.
  18. Javaid, N., Mohsin, S. M., Iqbal, A., Yasmeen, A., & Ali, I. (2018, July). A Hybrid Bat-Crow Search Algorithm Based Home Energy Management in Smart Grid. In Conference on Complex, Intelligent, and Software Intensive Systems (pp. 75-88). Springer, Cham.
  19. Umar Farooq, Waseem Ahmed, Sadia Mazhar, Fog computing and internet of things: Architecture, Aplliartions and challenges. In 3rd Global conference on Wireless and optical Communication,(GCWOC, 2018)

2017

  1. Latif S, Akraam S, and MAS (2017). Channel assignment using differential evolution algorithm in cognitive radio networks. International Journal of Advanced and Applied Sciences, 4(8): 160-166.
  2. Shahzad Latif, Suhail Akraam, and Muhammad Aamer Saleem (2017) “Joint Optimization of Interference and Cost in Cognitive Radio Heterogeneous Network Using Fuzzy Logic Powered Ants,” Wireless Communications and Mobile Computing, vol. 2017, Article ID 1075252, 11 pages. doi:10.1155/2017/1075252
  3. Raza H, Khan NM (2017). Low Complexity Linear Channel Estimation for MIMO Communication Systems. Wireless Personal Communications; 97(4):5031-44.
  4. Khan NM, Raza H (2017). Processing-Efficient Distributed Adaptive RLS Filtering for Computationally Constrained Platforms. Wireless Communications and Mobile Computing. Volume 2017, Article ID 1248796, 7 pages.
  5. Ehsan Elahi, Hasan Raza, and Saqib Ali (2017). A new 3D Playfair Secure Cipher Generation Model, International Conference on Emerging Technologies (ICET), 27-28 December, CUST Islamabad.
  6. Muhammad Adnan Khan, Muhammad Umair, Muhammad Aamir Saleem Choudhryand Muhammad Nadeem Ali (2017). Efficient MUD in OFDMA using Swarm Intelligence, December 30-31, 2017, ICICT IBA Karachi.
  7. Muhammad Asghar Khan, Ijaz Mansoor Qureshi, Alamgir Safi, Inam Ullah Khan (2017). Flying Ad-Hoc Networks (FANETs): A Review of Communication Architectures, and Routing Protocols, First International Conference on Latest trends in Electrical Engineering and Computing Technologies (INTELLECT) November 15–16, 2017, Karachi, Pakistan.
  8. InamUllah Khan, IjazMansoor Qureshi, Muhammad Asghar Khan (2017). Comparative Analysis and Route Optimization of State of the Art Routing Protocols, EAI International Conference on Future Intelligent Vehicular Technologies October 17-19, 2017, Islamabad Pakistan.
  9. Inam Ullah Khan, Professor Dr. Ijaz Mansoor Qureshi Qureshi, Engr. Muhammad Asghar Khanand Phd Scholar Syed Bilal Hussain Shah “Route Optimization & Comparative Analysis To Find An Efficient Routing Protocol” International Journal of Advanced Computer Science and Applications (IJACSA) February 2017 Edition (Volume 8 No 2).
  10. N.F. Awang Iskandar, A. Khan, P.C. Lim, Y.C. Wang. 2017. Automatic Segmentation Measuring Function for Cardiac MR-Left Ventricle (LV) Images. Journal of Telecommunication, Electronic and Computer Engineering (JTEC) Volume 9,Issue-10,Pages165-171.
  11. DNF Awang Iskandar, PC Lim, A Said, NH Mohd Amin, A Khan, H Ujir. 2017. Preliminary Experiment Results of Left Ventricular Remodelling Prediction Using Machine Learning Algorithms. Journal of Telecommunication, Electronic and Computer Engineering (JTEC). Volume 9, Issue 2-10,Pages 119-124
  12. Khan, A., Awang Iskandar, D. N. F., Ujir, H., & Chai, W. Y. (2017). Automatic Segmentation of CMRIs for LV Contour Detection. Lecture Notes in Electrical Engineering, 313–319. doi:10.1007/978-981-10-1721-6_34
  13. Raza H, Khan N M. 2017. Low Complexity Linear Channel Estimation for MIMO Communication Systems. Wireless Personal Communications. Dec 1;97(4):5031-44.
  14. Khan N M, Raza H. Processing-Efficient Distributed Adaptive RLS Filtering for Computationally Constrained Platforms. Wireless Communications and Mobile Computing. 2017;2017
  15. Elahi E, Raza H, Ali S. A new 3D playfair based secure cipher generation model. In2017 13th International Conference on Emerging Technologies (ICET) 2017 Dec 27 (pp. 1-4). IEEE.
  16. Khan, M.A.; Qureshi, I.M.; Safi, A.; Khan, I.U. Flying Ad-Hoc Networks (FANETs): A Review of Communication architectures, and Routing protocols. In Proceedings of the 2017 First International Conference on Latest Trends in Electrical Engineering and Computing Technologies (INTELLECT), Karachi, Pakistan, 15–16 November 2017; pp. 692–699.
  17. Khan, I.U, Qureshi, I.M, Khan, M.A. Comparative Analysis and Route Optimization of State-of-the-Art Routing Protocols. EAI International Conference on Future Intelligent Vehicular Technologies October 17–19, 2017, Islamabad, Pakistan.
  18. Asad Mehmood, Insaf Ullah, Noor-Ul-Amin, Arif Iqbal Umar, sultan Ullah.2017. Public Verifiable Generalized Authenticated Encryption (ℙℙ₢Ǣ) based on Hyper Elliptic Curve. J. Appl. Environ. Biol. Sci., 7(12)69-73.
  19. Anwar Sadat, Rashid Ahmad, Insaf Ullah, Hizbullah Khattak, Sultan Ullah.2017. Multi-Receiver Signcryption Based on Hyper Elliptic Curve Crypto System. J. Appl. Environ. Biol. Sci., 7(12)194-200.
  20. Ahmad, M., Khan, A., Nadeem, Z., Yasmeen, A., Fatima, I., Zahoor, S., & Javaid, N. (2017, November). A Hybrid Genetic Based on Harmony Search Method to Schedule Electric Tasks in Smart Home. In International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (pp. 154-166). Springer, Cham.
  21. Fatima, I., Khalid, A., Zahoor, S., Yasmeen, A., Arif, S., Zafar, U., & Javaid, N. (2017, November). Home Energy Management System Using Ant Colony Optimization Technique in Microgrid. In International Conference on Broadband and Wireless Computing, Communication and Applications (pp. 267-279). Springer, Cham.
  22. Saeed, M. S., Khalid, A., Nadeem, Z., Younas, M. A., Raza, S. Z., & Javaid, N. (2017, November). Power Management in Smart Grid for Residential Consumers. In International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (pp. 415-423). Springer, Cham
  23. Khalid, R., Abid, S., Zafar, A., Yasmeen, A., Khan, Z. A., Qasim, U., & Javaid, N. (2017, July). Fuzzy Energy Management Controller for Smart Homes. In International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (pp. 200-207). Springer, Cham.

2016

  1. Umair, M., Khan, M.A. and Choudhry, M.A.S., 2016. International Journal of Advanced and Applied Sciences.
  2. Umair, M., Khan, M.A. and Choudry, M.A.S., Latif S,. 2016. Fuzzy Approach based two Layered Block Coded Adaptive MC-CDMA system with FT/ST. Res. J. Recent Sci., 5(3), 50-57
  3. Khan, M.A., Umair, M., Choudhry, M.A.S. and Muhammad, K., 2016. Cooperative Co-evolutionary based MUD for SLT-MC-CDMA system. International Journal of Computer Science and Information Security14(8), p.334.
  4. Safi, A., Khan, I.U., Hassan, M.A. and Khan, M.A, 2016. Mobile Ad hoc networks in the Global system of Interconnected Computer Networks. IJSEAT4(9), pp.434-451.
  5. Hafeez,S.,Khan, M.A.,ur Rehman,I. and Asif, R.M.,Laser Bounce Listening System.
  6. Asif, R.M., Aziz, A., ur Rehman, I. and Khan, M.A., Few Decades Survey on Renewable Energy and Smart Grid Approach.
  7. Khan, M.A. and Asif, R.M., Review of Communication Protocols for FANETs (Flying Ad-Hoc Networks).
  8. Shah, A., Shahzad, M., Siddiqi, M.W.U. and Khan, M.A., Novel Architecture for Future Li-Fi Wireless Technology.
  9. U. Khan, W. Y. Chai, C. S. See and A. Khan, 2016″X-Ray Image Enhancement Using a Boundary Division Wiener Filter and Wavelet-Based Image Fusion Approach,” Journal of Information Processing Systems, vol. 12, no. 1, pp. 35~45,. DOI: 10.3745/JIPS.02.0029.
  10. Hafiz, S; Khan, M.A. Laser Bounce Listening System. 2nd International Conference on Emerging Trends in Engineering, Management and Sciences. December 28-30, 2016 (ICETEMS-2016) Peshawar, Pakistan.
  11. Raees , M. A; Adnan, A,; Inam. R, Khan, M.A. Few Decades Survey on Renewable Energy and Smart Grid Approach” 2nd International Conference on Emerging Trends in Engineering, Management and Scineces” December 28-30, 2016 (ICETEMS-2016) Peshawar, Pakistan.
  12. Hizbullah, K & Umar, Arif & , Insafullah. (2016). A Khattak Approach for Detection and Removal of Black and Gray Hole Attacks in Manet. Indian Journal of Science and Technology. 9. 1-4. 10.17485/ijst/2016/v9i4/77755.
  13. Shawar Gul, Noor Ul Amin, Faisal Bahadur, Insafullah, Muazzam Ali Khan. 2016. A Light Weight Secure Protocol For Data Transmission In Vanet. International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 7.
  14. Insaf Ullah, Rehan Ullah,& Noor ul Amin. 2016. A New Efficient two tire secure protocol. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 14, No. 6.
  15. Hizbullah Khattak, Arif Iqbal Umar, Insaf Ullah. 2016. A Secure Protocol For Vanet Using Proxy Blind Signature Based On Elliptic Curve. International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 7.
  16. Insaf ullah, Muhammad suliman , Arif Iqbal Umar, Noor-Ul-Amind, Hizbullah Khattak. 2016. Deniable Authentication Protocol using Promised Signcrypion Based on Hyper Elliptic Curve. International Journal of Sciences: Basic and Applied Research (IJSBAR)(2016) Volume 25, No 2, pp 285-291
  17. Insaf Ullah, Noor –Ul-Amin, Hizbullah Khattak, Sultan Ullah, Asfandyar Khan. 2016. Multi Receiver Proxy Signcrypion Based on Hyper Elliptic Curve Cryptography. International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 12.
  18. Insaf Ullah , Noor Ul Amin, Arif Iqbal Umar , Hizbullah khattak. 2016. Proxy Promised Signcrypion Scheme Based on Elliptic Curve Crypto System. International Journal of Computer (IJC) (2016) Volume 20, No 1, pp 167-173.
  19. Anwar Sadat, Insaf Ullah, Hizbullah Khattakc, Sultan Ullah , Amjad-ur Rehman. 2016. Proxy Blind Signcrypion Based on Elliptic Curve. International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 3.
  20. Insaf Ullah, Inam Ul Haq, Noor Ul Amin, Arif Iqbal Umar , Hizbullah Khattak.2016. Proxy Signcrypion Scheme Based on Hyper Elliptic Curves. International Journal of Computer (IJC) (2016) Volume 20, No 1, pp 157-166.
  21. Zahid Ullah, Insaf Ullah, Haris Khan, Hizbullah Khattak, Sultan Ullah. 2016. Secure protocol for Mobile Agents Using Proxy Signcryption Scheme Based on Hyper Elliptic Curve. International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 12.
  22. Ullah, S., Junaid, M., Habib, F., Sana, Insafullah, & Hizbullah. (2016). A novel proxy blind signcryption scheme based on hyper elliptic curve. 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD).doi:10.1109/fskd.2016.7603481
  23. Farooqi, Muhammad Abdullah Adnan, Fahad Mumtaz Malik, Junaid Anwar, and Musayyab Ali. “Sampled Data Output Feedback Control Of Tri Rotor Unmanned Aerial Vehicle.” Science International 28, no. 1 (2016).

2015

  1. Khan, M.A., Umair, M. and Choudhry, M.A.S., 2015. GA based adaptive receiver for MC-CDMA system. Turkish Journal of Electrical Engineering & Computer Sciences23(Sup. 1), pp.2267-2277.
  2. Rashid, A., Tahir, S. and Choudhury, A.S., 2015. Detection of Brain Tumor in EEG Signals Using Independent Component Analysis. International Journal of Applied Mathematics, Electronics and Computers3(2), pp.78-82.
  3. Khan, M.A., Umair, M. and Choudry, M.A.S., 2015, December. Island differential evolution based adaptive receiver for MC-CDMA system. In Information and Communication Technologies (ICICT), 2015 International Conference on(pp. 1-6). IEEE.
  4. Umair, M., Khan, M.A. and Choudry, M.A.S., 2015, December. Island genetic algorithm based MUD for MC-CDMA system. In Information and Communication Technologies (ICICT), 2015 International Conference on(pp. 1-6). IEEE.
  5. GA Shah, A Khan, AA Shah, M Raza, M Sharif. 2015.A Review on Image Contrast Enhancement Techniques Using Histogram Equalization. Science International 27 (2)
  6. Sajid Muhammad, Hasan Raza, Zafar Iqbal, Muhammad Tayyab Ali, Mariam Akhtar Kayani, and M. Yaqoob Wani. “A Modified Adaptive Variable Step Size NLMS Adaptive Filtering Algorithm for Rayleigh Fading Environments.” International Journal of Advancements in Electronics and Electrical Engineering– IJAEEE, Vol. 4, no. 1, pp. 06-09, 2015.
  7. Khan, M.A, Raees, M,A. Shah, A. Review of communication Protocols for FANETs. 2nd International Conference on Engineering and Emerging Technologies March 26, 27, 2015, Lahore, Pakistan
  8. Shah,A; Khan ,M.A. Novel Architecture for Future Li-Fi Wireless Technology”.1st International Conference on Engineering and Emerging Technologies March 26, 27, 2015, Lahore, Pakistan.
  9. Ali, Musayyab, Muhammad Abdullah Adnan Farooqi, and Fahad Mumtaz Malik. 2015. H Infinity Control Of A Mechanical System With Backlash. Sci.Int.27(6),5059-5064.