Aqeel-ur Rehman

Orcid: 0000-0002-3083-6066

According to our database1, Aqeel-ur Rehman authored at least 32 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Violating the standard assumption underlying the process monitoring: Perfect measurements.
Qual. Reliab. Eng. Int., 2022

Machine Learning Based Prediction of Reference Evapotranspiration (ET<sub>0</sub>) Using IoT.
IEEE Access, 2022

2021
QoS Enhancement of AODV Routing for MBANs.
Wirel. Pers. Commun., 2021

IoT-Enabled Smart Socket.
Wirel. Pers. Commun., 2021

An innovative technique for image encryption using tri-partite graph and chaotic maps.
Multim. Tools Appl., 2021

Deep Learning-Based Correct Answer Prediction for Developer Forums.
IEEE Access, 2021

A Generic Approach for Wheat Disease Classification and Verification Using Expert Opinion for Knowledge-Based Decisions.
IEEE Access, 2021

A Gray Image Encryption Technique Using the Concept of Water Waves, Chaos and Hash Function.
IEEE Access, 2021

2020
Ontology-based transformation and verification of uml class model.
Int. Arab J. Inf. Technol., 2020

DM-GKM: A key management scheme for dynamic group based applications.
Comput. Networks, 2020

A Color Image Encryption Algorithm Based on One Time Key, Chaos Theory, and Concept of Rotor Machine.
IEEE Access, 2020

Performance Analysis of Classification Algorithms on Birth Dataset.
IEEE Access, 2020

K-Means and K-Medoids: Cluster Analysis on Birth Data Collected in City Muzaffarabad, Kashmir.
IEEE Access, 2020

2019
Sinkhole Attacks in Wireless Sensor Networks: A Survey.
Wirel. Pers. Commun., 2019

Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules.
Multim. Tools Appl., 2019

A novel robust dual diffusion/confusion encryption technique for color image based on Chaos, DNA and SHA-2.
Multim. Tools Appl., 2019

A highly efficient color image encryption based on linear transformation using chaos theory and SHA-2.
Multim. Tools Appl., 2019

A Selective Cross-Substitution Technique for Encrypting Color Images Using Chaos, DNA Rules and SHA-512.
IEEE Access, 2019

2018
Ontology-Based Finite Satisfiability of UML Class Model.
IEEE Access, 2018

2017
Bio-inspired energy harvesting in WSN: a survey.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

2016
A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps.
Multim. Tools Appl., 2016

An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules.
Multim. Tools Appl., 2016

IDHOCNET: A Novel ID Centric Architecture for Ad Hoc Networks.
J. Comput. Networks Commun., 2016

Security and Privacy Issues in IoT.
Int. J. Commun. Networks Inf. Secur., 2016

A Toolkit for Prototype Implementation of E-Governance Service System Readiness Assessment Framework.
Proceedings of the HCI in Business, Government, and Organizations: Information Systems, 2016

2015
Selective encryption for gray images based on chaos and DNA complementary rules.
Multim. Tools Appl., 2015

IDHOCNET-A Novel Protocol Stack and Architecture for Ad hoc Networks.
Int. J. Commun. Networks Inf. Secur., 2015

2014
A review of wireless sensors and networks' applications in agriculture.
Comput. Stand. Interfaces, 2014

2013
HANDY: a hybrid association rules mining approach for network layer discovery of services for mobile ad hoc network.
Wirel. Networks, 2013

Towards decision support model for ubiquitous agriculture.
Proceedings of the Eighth International Conference on Digital Information Management (ICDIM 2013), 2013

2011
Proactive Security Mechanism and Design for Firewall.
J. Information Security, 2011

2008
Building a Smart University Using RFID Technology.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008


  Loading...