Aqeel Khalique

Aqeel Khalique
Jamia Hamdard · Department of Computer Science & Engineering

M.Tech. CSE

About

29
Publications
40,089
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
277
Citations
Introduction
Aqeel Khalique currently works at the Department of Computer Science & Engineering, Jamia Hamdard University. Aqeel does research in Computer Communications (Networks), Information Systems (Business Informatics) and Information Security. Their current project is 'Trust model on IoT'.

Publications

Publications (29)
Patent
Full-text available
The present invention introduces an innovative system that seamlessly integrates machine learning (ML) algorithms and Internet of Things (IoT) technology to enhance road safety through real-time accident detection and notification system. Leveraging a network of IoT sensors, including cameras, accelerometers, and GPS units, in conjunction with adva...
Conference Paper
Full-text available
The utilization of cloud computing has become increasingly popular due to the benefit of eliminating the need for upfront capital investments in hardware and software. All services are provided on a pay-per-use basis. Database-as-a-service (DBaaS) becomes a promising method to provide cloud applications with reliable and flexible data storage servi...
Conference Paper
Full-text available
In the last decade, cloud computing has seen an exponential growth, which has raised concerns about the energy consumption of cloud data centers. The sprawling data centers that house thousands of servers, networking devices, displays, racks, and cooling machines consume vast amounts of energy. To address this issue, virtual machine (VM) consolidat...
Conference Paper
Full-text available
Learning analytics in higher education continues to promote scientific developments in today's world. Because of the quick acceptance of LA, educators are not precisely specifying the conditions and consequences of implementing LA in higher education. Although LA is a potential new topic, stakeholders in institutions of higher learning still need t...
Article
Full-text available
With the rapid development of deep learning techniques, new innovative license plate recognition systems have gained considerable attention from researchers all over the world. These systems have numerous applications, such as law enforcement, parking lot management, toll terminals, traffic regulation, etc. At present, most of these systems rely he...
Article
Full-text available
In recent years, the application of various recommendation algorithms on over-the-top (OTT) platforms such as Amazon Prime and Netflix has been explored, but the existing recommendation systems are less effective because either they fail to take an advantage of exploiting the inherent user relationship or they are not capable of precisely defining...
Chapter
COVID-19 widespread incorporates an overcome effect on the exchequer of all the nations over the world. Within the field of investigation, COVID-19 widespread estimation and examination have ended up a modern region of intrigue to be investigated in detail. A few considerations have been conducted with different approaches to gauge the damage and s...
Chapter
According to the United Nations World Commission on Environment Development (1987), development is sustainable if it meets the needs of the present without compromising the ability of future generations. The concern for the environment in this context was first introduced at the United Nations Conference on the Human Environment (Stockholm Conferen...
Chapter
Internet of Things (IoT) devices are growing to be more than 20 billion by the end of 2020. IoT devices were evolved from wireless sensor networks (WSNs). IoT devices are applicable in numerous scientific fields and hence becoming a universal application for every need. Industry 4.0 is a result of the ever-growing IoT network. In IoT, sensor nodes...
Article
Full-text available
The current era of computing is witnessing a huge amount of data being generated with every passing moment. This massive data if nourished effectively can open new horizons for the computing world. The modern world is slowly but surely moving towards the automation age where every entity and object is being automated to perform desired tasks withou...
Chapter
In cloud environment, huge amount of data is stored in data centers. These data are generated from numerous sources such as social media, social networking and others. These data are generally in form of text, image, audio or video. These data are exponentially increasing due to huge amount of multiple streams generating these data at every millise...
Article
Full-text available
Objective: The proliferation of internet results in exponential increase of the connected devices across the globe. These devices are continuously communicating with each other for several computational and information exchange tasks. These connected devices belong to IoT network and are also known as devices everywhere, anywhere. Methods: These Io...
Conference Paper
In cloud environment, huge amount of data is stored in data centers. These data are generated from numerous sources such as social media, social networking and others. These data are generally in form of text, image, audio or video. These data are exponentially increasing due to huge amount of multiple streams generating these data at every millise...
Article
Full-text available
In cloud environment, access to cloud services is authenticated using several authentication mechanisms. Two different mechanisms are widely used namely single sign-on (SSO) and multi-factor authentication (MFA). SSO removes the need to sign-in to individual services of a company or system by providing a single sign-in interface managed through acc...
Article
Full-text available
In cryptography there are many types of algorithms which use random numbers in network security. To make the encryption and decryption process more robust, a certain level of randomness should be used to make it unpredictable. Random numbers are the sequence of numbers placed in such a way that the values present in the sequence should be uniformly...
Article
Full-text available
Reinforcement learning is a flourishing machine learning concept that has greatly influenced how robots are designed and taught to solve problems without human intervention. Robotics is not an alien discipline anymore, and we have several great innovations in this field that promise to impact lives for the better. However, humanoid robots are still...
Article
In Information & Communication Technology (ICT), communication plays vital role in current era of technology. Nowadays, ICT is being used among huge population to communicate for different purposes. For security reason, several security mechanisms are taken as standard in different communication technologies. However, security mechanisms only preve...
Article
Full-text available
Caching techniques has helped developers to deliver applications that are capable of fast turnaround time which otherwise could have been much slower and under-performed software solutions, less worthy of user’s appreciation. Caching can typically be used at both hardware and software levels with the same ultimate goal of either achieving higher th...
Article
Full-text available
Security is of major concern in Information & Communication Technologies (ICT). Valuable data and information must be protected from attackers. In ICT, information is easily accessible and thus efficient security mechanisms are employed to prevent any attack. This paper presents a review about the security and ethics, their relationship with each o...
Article
Full-text available
In today’s digital era, users are increasingly accessing countless number of applications every day. For accessing these services, the users first have to authenticate themselves and need to maintain a separate set of username and password for each application. This led to the development of Single Sign On (SSO). This paper presents review on SSO e...
Article
Cryptography is used for secure communication since ancient days for providing confidentiality, integrity and availability of the information. Public key cryptography is a classification of cryptography having pair of keys for encryption and decryption. Public key cryptography provides security and authentication using several algorithms. The Rives...
Article
Full-text available
Communication in today’s world is mostly dependent on mobile phones allowing users to exchange messages, ideas, videos and audios. Numerous instant messengers are available for mobile devices which are better alternative over SMS technology. However, increased use of instant messengers also gave rise to its negative impact including unwanted...
Article
Full-text available
Random numbers are sequences of integers which show absolutely no relation to each other anywhere in the sequence. Pseudo random numbers (PRNs) are random numbers which can be generated deterministically. Pseudo random numbers are widely used in cryptographic protocols to provide secrecy. A wide variety of pseudo random number generators (PRNGs) we...
Article
Full-text available
The Elliptic Curve Digital Signature Algorithm (ECDSA) is theelliptic curve analogue of the Digital Signature Algorithm(DSA). It was accepted in 1999 as an ANSI standard, and wasaccepted in 2000 as IEEE and NIST standards. It was alsoaccepted in 1998 as an ISO standard, and is under considerationfor inclusion in some other ISO standards. Unlike the...
Article
Public Key Cryptography (PKC) is recently playing an essentialrole in electronic banking and financial transactions. EllipticCurve Cryptography (ECC) is one of the best public keytechniques for its small key size and high security and is suitablefor secure access of smart cards because implementation onsmart cards is challenging due to memory, band...

Network

Cited By