Aqeel KhaliqueJamia Hamdard · Department of Computer Science & Engineering
Aqeel Khalique
M.Tech. CSE
About
29
Publications
40,089
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
277
Citations
Introduction
Aqeel Khalique currently works at the Department of Computer Science & Engineering, Jamia Hamdard University. Aqeel does research in Computer Communications (Networks), Information Systems (Business Informatics) and Information Security. Their current project is 'Trust model on IoT'.
Publications
Publications (29)
The present invention introduces an innovative system that seamlessly integrates machine learning (ML) algorithms and Internet of Things (IoT) technology to enhance road safety through real-time accident detection and notification system. Leveraging a network of IoT sensors, including cameras, accelerometers, and GPS units, in conjunction with adva...
The utilization of cloud computing has become increasingly popular due to the benefit of eliminating the need for upfront capital investments in hardware and software. All services are provided on a pay-per-use basis. Database-as-a-service (DBaaS) becomes a promising method to provide cloud applications with reliable and flexible data storage servi...
In the last decade, cloud computing has seen an exponential growth, which has raised concerns about the energy consumption of cloud data centers. The sprawling data centers that house thousands of servers, networking devices, displays, racks, and cooling machines consume vast amounts of energy. To address this issue, virtual machine (VM) consolidat...
Learning analytics in higher education continues to promote scientific developments in today's world. Because of the quick acceptance of LA, educators are not precisely specifying the conditions and consequences of implementing LA in higher education. Although LA is a potential new topic, stakeholders in institutions of higher learning still need t...
With the rapid development of deep learning techniques, new innovative license plate recognition systems have gained considerable attention from researchers all over the world. These systems have numerous applications, such as law enforcement, parking lot management, toll terminals, traffic regulation, etc. At present, most of these systems rely he...
In recent years, the application of various recommendation algorithms on over-the-top (OTT) platforms such as Amazon Prime and Netflix has been explored, but the existing recommendation systems are less effective because either they fail to take an advantage of exploiting the inherent user relationship or they are not capable of precisely defining...
COVID-19 widespread incorporates an overcome effect on the exchequer of all the nations over the world. Within the field of investigation, COVID-19 widespread estimation and examination have ended up a modern region of intrigue to be investigated in detail. A few considerations have been conducted with different approaches to gauge the damage and s...
According to the United Nations World Commission on Environment Development (1987), development is sustainable if it meets the needs of the present without compromising the ability of future generations. The concern for the environment in this context was first introduced at the United Nations Conference on the Human Environment (Stockholm Conferen...
Internet of Things (IoT) devices are growing to be more than 20 billion by the end of 2020. IoT devices were evolved from wireless sensor networks (WSNs). IoT devices are applicable in numerous scientific fields and hence becoming a universal application for every need. Industry 4.0 is a result of the ever-growing IoT network. In IoT, sensor nodes...
The current era of computing is witnessing a huge amount of data being generated with every passing moment. This massive data if nourished effectively can open new horizons for the computing world. The modern world is slowly but surely moving towards the automation age where every entity and object is being automated to perform desired tasks withou...
In cloud environment, huge amount of data is stored in data centers. These data are generated from numerous sources such as social media, social networking and others. These data are generally in form of text, image, audio or video. These data are exponentially increasing due to huge amount of multiple streams generating these data at every millise...
Objective: The proliferation of internet results in exponential increase of the connected devices across the globe. These devices are continuously communicating with each other for several computational and information exchange tasks. These connected devices belong to IoT network and are also known as devices everywhere, anywhere. Methods: These Io...
In cloud environment, huge amount of data is stored in data centers.
These data are generated from numerous sources such as social media, social
networking and others. These data are generally in form of text, image, audio or
video. These data are exponentially increasing due to huge amount of multiple
streams generating these data at every millise...
In cloud environment, access to cloud services is authenticated using several authentication mechanisms. Two different mechanisms are widely used namely single sign-on (SSO) and multi-factor authentication (MFA). SSO removes the need to sign-in to individual services of a company or system by providing a single sign-in interface managed through acc...
In cryptography there are many types of algorithms which use random numbers in network security. To make the encryption and decryption process more robust, a certain level of randomness should be used to make it unpredictable. Random numbers are the sequence of numbers placed in such a way that the values present in the sequence should be uniformly...
Reinforcement learning is a flourishing machine learning concept that has greatly influenced how robots are designed and taught to solve problems without human intervention. Robotics is not an alien discipline anymore, and we have several great innovations in this field that promise to impact lives for the better. However, humanoid robots are still...
In Information & Communication Technology (ICT), communication plays vital role in current era of technology. Nowadays, ICT is being used among huge population to communicate for different purposes. For security reason, several security mechanisms are taken as standard in different communication technologies. However, security mechanisms only preve...
Caching techniques has helped developers to deliver
applications that are capable of fast turnaround
time which otherwise could have been much slower
and under-performed software solutions, less
worthy of user’s appreciation. Caching can typically
be used at both hardware and software levels with
the same ultimate goal of either achieving higher
th...
Security is of major concern in Information & Communication Technologies (ICT). Valuable data and information must be protected from attackers. In ICT, information is easily accessible and thus efficient security mechanisms are employed to prevent any attack. This paper presents a review about the security and ethics, their relationship with each o...
In today’s digital era, users are increasingly accessing countless number of applications every day. For accessing these services, the users first have to authenticate themselves and need to maintain a separate set of username and password for each application. This led to the development of Single Sign On (SSO). This paper presents review on SSO e...
Cryptography is used for secure communication since ancient days for providing confidentiality, integrity and availability of the information. Public key cryptography is a classification of cryptography having pair of keys for encryption and decryption. Public key cryptography provides security and authentication using several algorithms. The Rives...
Communication in today’s world is mostly dependent on
mobile phones allowing users to exchange messages, ideas,
videos and audios. Numerous instant messengers are available
for mobile devices which are better alternative over SMS
technology. However, increased use of instant messengers
also gave rise to its negative impact including unwanted...
Random numbers are sequences of integers which show absolutely no relation to each other anywhere in the sequence. Pseudo random numbers (PRNs) are random numbers which can be generated deterministically. Pseudo random numbers are widely used in cryptographic protocols to provide secrecy. A wide variety of pseudo random number generators (PRNGs) we...
The Elliptic Curve Digital Signature Algorithm (ECDSA) is theelliptic curve analogue of the Digital Signature Algorithm(DSA). It was accepted in 1999 as an ANSI standard, and wasaccepted in 2000 as IEEE and NIST standards. It was alsoaccepted in 1998 as an ISO standard, and is under considerationfor inclusion in some other ISO standards. Unlike the...
Public Key Cryptography (PKC) is recently playing an essentialrole in electronic banking and financial transactions. EllipticCurve Cryptography (ECC) is one of the best public keytechniques for its small key size and high security and is suitablefor secure access of smart cards because implementation onsmart cards is challenging due to memory, band...