Saeed Ullah Jan

Saeed Ullah Jan
Govt College Wari (Dir Upper) Khyber Pakhtunkhwa Pakistan · Computer Science

PhD
Outstanding Researcher, Reviewer, Writer & Teacher. Working on HE Management in strengthening academics, research & HRM

About

57
Publications
119,651
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
302
Citations
Introduction
SAEED ULLAH JAN received BS, MPhil, and PhD degrees in Computer Science from the University of Malakand Khyber Pakhtunkhwa, Pakistan. Currently, he works as BS Controller of Examinations for 09 BS Disciplines, with 1700 students at Govt. College Wari (Dir Upper)—a far-flung remote area of the province where most youngsters have no access to Universities/Institutions for higher education. He has published more than 25 SCI articles of IF>100. He is expert in cybersecurity.
Additional affiliations
February 2008 - January 2022
Govt College Wari (Dir Upper) Khyber Pakhtunkhwa Pakistan
Position
  • Head of Department
February 2008 - January 2012
Govt Degree College Chitral Khyber Pakhtunkhwa
Position
  • Lecturer
Description
  • Started Computer Science discipline, Develop a well-organized Computer Lab, Supervise the Examinations System of University of Malakand, Conducted Volunteer Awareness Session for students regarding Computers Science discipline, Hosted many conferences
July 2007 - present
Higher Education Department Govt of Khyber Pakhtunkhwa
Position
  • Lecturer
Description
  • Teaching Controller of Exams Focal Person HEMIS - Cell Focal Person Emergency Service Focal Person Biometric Attendance System Previous: Hostel Warden Dy: Chief Proctor
Education
September 2017 - December 2020
University of Malakand
Field of study
  • Computer Science
March 2013 - September 2016
University of Malakand
Field of study
  • Computer Science
October 2002 - May 2007
University of Malakand
Field of study
  • Computer Science

Publications

Publications (57)
Conference Paper
Full-text available
This paper is about the selection of scheduling algorithm for real time system. In this paper we compared different scheduling algorithms and from these comparison we get another algorithm which is good in performance as compared to the existing one. First we compare ACO and EDF but both have some merits and demerits. ACO is not good when system is...
Article
Full-text available
Secure information sharing has become very popular in immigration, military applications, healthcare, education and foreign affairs for the past few years. The security and privacy of such type of information cannot easily be compromised because the secure communication utilizes both wireless and wired communication media for exchanging sensitive i...
Article
Full-text available
Decentralized Edge Computing Networks (DECN) environments have emerged with the advent of the IoT to reduce delays, bringing data processing closer to where the data is generated to improve the processing of volumetric data at high speed instead of being sent to clouds to facilitate real-time applications. However, the security and privacy of the d...
Article
Full-text available
The Internet of Things (IoT) is a transformative technology that has found applications in diverse domains, including automation, logistics, grid, transportation, healthcare, and more. In these domains, IoT systems generate a significant amount of data, which can be stored in a cloud. However, cloud computing may not be practical in certain delay‐s...
Article
Full-text available
• Challenges, advantages and disadvantages of combining Agile, DevOps, and Cloud. • The role of mindset in the integration of Agile, DevOps, and Cloud. • Addressing mindset challenges for successful integration. • The most suitable Agile methodology for integration. • The role of software testing in ensuring the integration.
Preprint
Full-text available
Context : In today’s fast-paced digital landscape, integrating DevOps, cloud, and agile methodologies is crucial for meeting software demands. However, this integration remains under-researched.Objective : This study explores the integration of Agile, Cloud, and DevOps in today’s software development landscape. It aims to analyze the challenges and...
Article
Full-text available
The infrastructureless architecture for Internet-of-Drones (IoD) environment regulates drones in airspace for performing tactical tasks. Synergy is crucial for IoD participants; otherwise, complex task completion is impossible because IoD is a newer area that has gained more attention for domestic and commercial usage. However, wireless communicati...
Article
Full-text available
The Internet has advanced so quickly that we can now access any service at any time, from any location. As a result of this capability, People around the world can benefit from the popularity and convenience of teleworking systems. Teleworking systems, however, are vulnerable to a range of attacks; as an unauthorized user enters the open communicat...
Conference Paper
Being an essential component of 5G and beyond, the Internet of Drones (IoD) enables a legitimate operator to employ several drones to carry out distinct missions in restricted airspace under the control of the Ground Control Station (GCS). Communication with the external user (mobile operator), the central server, and other drones is accomplished v...
Article
Full-text available
Cloud computing is vital in various applications, such as healthcare, transportation, governance, and mobile computing. When using a public cloud server, it is mandatory to be secured from all known threats because a minor attacker’s disturbance severely threatens the whole system. A public cloud server is posed with numerous threats; an adversary...
Article
Full-text available
Recent events dedicated to e-healthcare systems demonstrated that a critical mass of users using e-health services and applications are being created and producing a tremendous output, such as improved patient monitoring, faster diagnosis, and better disease management. However, despite the benefits and availability of e-health systems, widespread...
Article
Machine learning plays a pivotal role in constructing learning models and leveraging abundant image data for feature extraction, which is essential for achieving accurate and efficient image enhancement through optimization algorithms. Traditional gradient descent methods are confined to optimizing independent parameters, while recent algorithms ne...
Article
Full-text available
With the emergence of the Internet of Things (IoT) and the rapid advancement in sensor technology, wireless medical sensor networks (WMSNs) have become increasingly important in improving health services. WMSNs are deployed for remote monitoring and collecting physiological data of patients for diagnosis and treatment. With the assistance of wearab...
Article
Full-text available
In the above article [1], the following corrections are necessary: Section II, preliminaries, subsection E Adversary Model – This model is based on [2], suppose the proposed protocol is denoted by $\prod $ , entities involved are Mobile-Device (M), Drone (D), ground-control-station (GCS) and many instances are $\pi $ means an ith instance of $\prod...
Article
Full-text available
Perfect forward secrecy, cross-verification, and robust mutual authentication guarantee secure communication through unfavorable and unsafe channels. The speedy development in wireless communication and drone-assisted networking technology has miserable significance in many areas, including wildlife monitoring, sidewalk checking, infrastructure ins...
Article
Full-text available
The network-enabled smart objects are evolving everywhere in the modern era to solve numerous problems like real-world data collection from the environment, communication, analysis, and security. However, these objects (Internet-of-Things), in combination with low latency networks, are still not qualified for complex tasks and do not deliver effici...
Article
Full-text available
With the rapid miniaturization in sensor technology, Internet-of-Drones (IoD) has delighted researchers towards information transmission security among drones with the control station server (CSS). In IoD, the drone is different in shapes, sizes, characteristics, and configurations. It can be classified on the purpose of its deployment, either in t...
Conference Paper
No doubt that quality education is a need of any nation today. In light of this fact, each nation put a particular effort to improve education and academic research. The e-learning system in this connection will concentrate on educational services such as learning materials stuff, video sharing, and podcasting-a more socially connected Internet whe...
Presentation
Full-text available
Child labor is a severe problem that needs to be addressed. Children who continue to work as children fall behind in the competition. In Pakistan, where finding a job is difficult, such wandering children can be easy targets for mechanic workshops and brick kilns etc. Not for this reason, but because our first concern must be the human rights group...
Presentation
Full-text available
No doubt that quality education is a certain need of any nation, today. In light of this fact, each and every nation put a certain amount of effort to improve their education and academic research. The online education system in this connection will concentrate on the common educational related services such as learning materials stuff, video shari...
Presentation
Full-text available
Cryptography is the art of protecting information from unauthorized users. It is much relevant in today's era when everyone desires to preserve their privacy over the internet because the internet and media have taken the world by storm. It is a much ideal book for those who want to protect his/her data over the internet. It has many tutorials and...
Presentation
Full-text available
External Examiners were: 1) Prof; Dr. Muzzam A. Khan Khattak (Senior Member IEEE) Associate Professor Quaid-I-Azam University Islamabad 2) Dr. Subhan Ullah Asstt Prof; FAST Islamabad Foreign Examiners were: 1) Prof Dr. Fadi Al-Turjuman (Tureky) 2) Prof Dr. Yambo Rao China
Article
Full-text available
Drones are of different shapes, sizes, characteristics, and configurations. It can be classified for the purpose of its deployment, either in the civilian or military domain. The earliest usage of drones was totally for military purposes, but manufacturers promptly tested it for civilian fields like border surveillance, disaster relief, pipeline re...
Article
Full-text available
With the rapid miniaturization in sensor technology, ruddervator, arduino, and multi-rotor system, drone technology catches much attention of the researchers. It can be controlled remotely by a seated operator sitting to a powerful intelligence computer system (PICS) or an airborne control and command platform (AC2P). The two types of drones (recon...
Article
Full-text available
Biosensor is a means to transmit some physical phenomena, like body temperature, pulse, respiratory rate, electroencephalogram (EEG), electrocardiogram (ECG), and blood pressure. Such transmission is performed via Wireless Medical Sensor Network (WMSN) while diagnosing patients remotely through Internet-of-Medical-Things (IoMT). The sensitive data...
Article
Full-text available
The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones’ navigation services. The main entities in IoD are drones, ground station, and external user. Before operationalizing a drone in IoD, a control infra...
Article
Full-text available
Currently, every user outsources a huge amount of shared secrets remotely from different servers and utilises synchrony resources. To make all types of operations secure for the end‐user, synchronous storage is vital and asynchronous storage might lead to the unavailability of successful services. Hence, a robust authentication scheme is mandatory...
Article
Full-text available
Currently, every user outsources a huge amount of shared secrets remotely from different servers and utilises synchrony resources. To make all types of operations secure for the end-user, synchronous storage is vital and asynchronous storage might lead to the unavailability of successful services. Hence, a robust authentication scheme is mandatory...
Article
Full-text available
In this era of information technology, the protection of personal sensitive information is one of the most challenging tasks which will not allow any human being to escape from browsing, sharing and holding information. In this scenario different service provider offers services for its users to share their personal sensitive information, resources...
Preprint
Full-text available
From home appliances to industrial enterprises, the \emph{Information and Communication Technology (ICT)} industry is revolutionizing the world. We are witnessing the emergence of new technologies (e.g, Cloud computing, Fog computing, Internet of Things (IoT), Artificial Intelligence (AI) and Block-chain) which proves the growing use of ICT (e,g. b...
Article
Full-text available
The SIP (Session Initiation Protocol) is an application and presentation layer signaling protocol used for initiating, continuing and terminating multimedia session for the end user. It gains much attention of the researchers because it is exposed to several threats and noticed challenging vulnerabilities from time to time. Consequently, the securi...
Article
Full-text available
In this era of information technology, the protection of personal sensitive information is one of the most challenging tasks which won't allow any human being to escape from browsing, sharing and holding information. In this scenario different service provider offers services for its users to share their personal sensitive information, resources an...
Article
Full-text available
In this era of information technology, browsing information and the concept of information on human mind and attitude has bombarded from all sides, which won't allow any human being to escape from the invisible pitfall of information. In order to streamline this aggressive mode of information sciences at this defining moment, the gravity of the sit...
Article
Full-text available
Offshore Software Development Outsourcing (OSDO) is a modern business strategy for producing high quality software at low cost. OSDO refers to the practice of contracting to an offshore (extrinsic) organization to perform some or all software development work of a product. For the benefit of OSDO vendors, the present research aims to develop a “Com...
Article
Full-text available
The main purpose of this work is to explore the income distribution of both male and female in Pakistan over the period of 2010-2011. For this purpose, the lognormal distribution with known parameters is used as a model and its unknown parameters are estimated by three methods that are likelihood, moments and L-moments. The results show that citize...
Article
Full-text available
World War II had shaken the bases capitalist yoke. The ever shining sun of British ascendency was on the verge of sinking. The two-edged sword of technological advancement and Machiavellian tactics of statecraft was no more paved her way in the eastern awakening society. British were facing failure in every sphere of politics in the subcontinent. T...
Thesis
Full-text available
Research methodology is a philosophical framework within which the research is conducted. It is basically a foundation for the whole thesis upon which the research is based. A methodology is considered to be most appropriate if it achieves the objectives of the research and replicable in other research areas of similar nature. The procedures of qua...
Article
Full-text available
Over the last few years green and sustainable software engineering has become a tremendous area for researchers and developing companies. The environmentally sound, Information & Communication Technology (ICT) products and sustainable green software gained much attraction for research. Because, software is a type of product that doesn’t provide any...
Article
Full-text available
This paper is about the selection of a scheduling algorithm for a real-time system. In this paper, we compared different scheduling algorithms and from these comparisons, we get another algorithm which is good in performance as compared to the existing one. First, we compare ACO (Ant Colony Optimization) and EDF (Earliest Deadline First) but both h...
Preprint
Full-text available
Theoretical work often gains provable security only at the cost of efficiency. There are schemes that are provably secured but are not efficient. There is a need to construct more encryption schemes which are provably secure, but also efficient. One approach used called random oracles, for gaining both security and efficiency in communication proto...
Article
World War II had shaken the bases capitalist yoke. The ever shining sun of British ascendency was on the verge of sinking. The two-edged sword of technological advancement and Machiavellian tactics of statecraft was no more paved her way in the eastern awakening society. British were facing failure in every sphere of politics in the subcontinent. T...
Poster
Full-text available
The client-server architecture allows a group of shared computing resources’ access to the community, anytime and at any place via the internet. These resources are available via these models such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). The demand of this client-server architecture is cu...
Method
Full-text available
The discrete logarithm problem characteristics are not only used for user authentication but can also for cryptographic key generation technique. Discrete logarithmic problem is very easy to compute h=g x for a given x, but very hard to find x given h and g.
Article
Full-text available
Whatsoever the future, it will not be as visualized. The education development of 2018 is completely different from that of 1918, or of 1981, and imagining future situations is not consequently informal. The potential dreams become outofdate faster than estimated. No one can tie a fixed configuration of the future. And such a situation either progr...
Book
Full-text available
"WSN is a self-organized network that consists of a distributed number of minor devices for performing the monitoring activities within the deployed environment. Many wildfires cause forest damages resulting in affecting of a large number of living organisms. This research study discusses a system design approach to wireless sensor network (WSN) ba...
Article
Full-text available
Client-server computing is the analytical development of compatible programming with significant supposition and the detachment of a massive program into its fundamental parts ("modules"), which can create the chance for extra enhancement, inconsiderable improvement, and prominent maintainability. In client-server computing, total extensive modules...
Article
Full-text available
Wireless Sensor Network is a self-organization network that consists of a distributed number of minor devices for performing the monitoring activities within the deployed environment. Many wildfires cause forest damages affecting a large number of living organisms. This research study discusses a system design approach to wireless sensor network (W...
Book
Full-text available
Life in today's world would be unimaginable without computers. They have made human lives better and happier. There are many computers uses in different fields of work. Engineers, architects, jewelers, and filmmakers all use computers to design things. Teachers, writers, and most office workers use computers for research, word processing and emaili...
Article
Full-text available
Secure information sharing has become very popular in immigration, military applications, healthcare, education and foreign affairs for the past few years. The security and privacy of such type of information cannot easily be compromised because the secure communication utilizes both wireless and wired communication media for exchanging sensitive i...
Research Proposal
Full-text available
The objectives of our research work are given below:- i. To present a general frame work that supports lightweight and privacy preserving authentication scheme based on three factors i.e. Password, Smart Card and Biometrics. ii. To improve preventive mechanism for User Anonymity, Replay Attack and DoS Attack during smart card authentication process...

Questions

Questions (17)
Question
Might the intelligence of someone be measured via H-Index or not?
Question
I want to run some code is here it is not possible
Question
Currently, the nCOVID19 pandemic situation is in its peak though out the world. It not only killed thousands of human beings but also destroyed the social life and economy of the world. This is the rapid disease ever seen in the history of the world. Due to this, a doctor, nurses and paramedical staff is afraid of investigating the patient. In this regard without a team of scientists, it is not possible for a single person to develop such a fast and secure monitoring system. You are cordially invited for teamwork.
Regards
JAN
Question
I have some technical issue, please anyone, reply here!
Thanks in advance

Network

Cited By