An image encryption scheme based on DNA computing and multiple chaotic systems

M Samiullah, W Aslam, H Nazir, MI Lali… - IEEE …, 2020‏ - ieeexplore.ieee.org
A number of techniques for securing plaintext, images and video frames have been
developed in cryptography using jointly DNA computing and Chaos Theory. With the …

Optimal multiple key‐based homomorphic encryption with deep neural networks to secure medical data transmission and diagnosis

JA Alzubi, OA Alzubi, M Beseiso, AK Budati… - Expert …, 2022‏ - Wiley Online Library
Medical database classification problems can be considered as complex optimization
problems to assure the diagnosis support precisely. In healthcare, several computer …

Bipolar fully recurrent deep structured neural learning based attack detection for securing industrial sensor networks

JA Alzubi - Transactions on Emerging Telecommunications …, 2021‏ - Wiley Online Library
Attack detection is a significant problem to be resolved to attain security in industrial sensor
network. Few research works have been designed for performing attack discovery process …

Cryptosystem design based on Hermitian curves for IoT security

OA Alzubi, JA Alzubi, O Dorgham… - The Journal of …, 2020‏ - Springer
The ultimate goal of modern cryptography is to protect the information resource and make it
absolutely unbreakable and beyond compromise. However, throughout the history of …

An intelligent approach of intrusion detection in mobile crowd sourcing systems in the context of IoT based SMART city

MVVP Kantipudi, R Aluvalu, S Velamuri - Smart Science, 2023‏ - Taylor & Francis
The recent era of pervasive computing has evolved with various applications and has
ground-breaking realities in mobile crowdsourcing (MCS). Multiple attempts have been …

A deception model robust to eavesdrop** over communication for social network systems

AE Omolara, A Jantan, OI Abiodun, KV Dada… - IEEE …, 2019‏ - ieeexplore.ieee.org
Communication security deals with attributes such as confidentiality, integrity, and
availability. The current strategies used to achieve covertness of communication employs …

BECS-II: an updated bio-inspired electrocommunication system for small underwater robots

T Chen, H He, G **e - Bioinspiration & Biomimetics, 2023‏ - iopscience.iop.org
Some weakly electric fish can use electric signals to interact and communicate with each
other in dark and complex underwater environments where traditional underwater …

[PDF][PDF] The Impact of Part-Time and Full-Time Work on Employees' Efficiency the Importance of Flexible Work Arrangements.

LPL Cavaliere, Z Chabani, AR Chowdhury… - … Online Journal of …, 2021‏ - researchgate.net
Flexible work arrangements are now becoming truly normal, aiming to enhance workers'
quality of life. Currently, various businesses and organizations are adopting this contracting …

SRAKN: Secure roaming authentication and key negotiation protocol for space information network

J Guo, Y Du, Z Sun, R Wu, X Wu, L Zhang… - Computer …, 2023‏ - Elsevier
Abstract Nowadays, the Space Information Network (SIN) with global signal coverage, large
capacity, bandwidth-on-demand flexibility, and multiple services has attracted more and …

Performance analysis of high throughput map decoder for turbo codes and self concatenated convolutional codes

F Shaheen, MFU Butt, S Agha, SX Ng… - IEEE Access, 2019‏ - ieeexplore.ieee.org
The effect of parallelism on Bit Error Rate (BER) performance of Turbo Code (TC) and Self
Concatenated Convolutional Code (SECCC) with different levels of parallelism and frame …