Fawad Qayum | University of Malakand (original) (raw)
Papers by Fawad Qayum
Journal of software, Oct 4, 2022
The objective of this paper is to provide a detailed overview on the classification and applicati... more The objective of this paper is to provide a detailed overview on the classification and applications of medical image registration. Issues in medical image registration are also presented along with their promising solutions and research guidelines. In this review, general concepts, classification, applications and issues in medical image registration is presented and analyzed in a comprehensive manner. The methods used for analysis is unique from already published work because we have performed detailed investigation on the classification, applications and issues in medical image registration. The knowledge on the work that has been developed in the area is presented in a compact and systematic form. This work provides contribution to field of medical image registration by providing a useful platform for both researchers and clinicians in the field.
Abstract: To improve scalability and understandability of search-based refactoring, in this paper... more Abstract: To improve scalability and understandability of search-based refactoring, in this paper, we propose a formulation based on graph transfor-mation which allows us to make use of partial order semantics and an associ-ated analysis technique, the approximated unfolding of graph transformation systems. We use graphs to represent object-oriented software architectures at the class level and graph transformations to describe their refactoring operations. In the unfolding we can identify dependencies and conflicts be-tween refactoring steps leading to an implicit and therefore more scalable representation of the search space. An optimisation algorithm based on the Ant Colony paradigm is used to explore this search space, aiming to find a sequence of refactoring steps that leads to the best design at a minimal costs.
It is always better to detect and dispatch flaws at design level before the start of development ... more It is always better to detect and dispatch flaws at design level before the start of development for better and economic results. Refactoring is considered as a better way to address the design flaws. To the best of our knowledge, none of the available techniques targets non-dispatchable flaws of the design model in their approaches. In this paper, we are focused on multiple aspects that have been missed by the existing researchers of refactoring. For example, use of coupling to define flaws in the design model; secondly, use of refactoring to address the non-dispatchable flaws in the design models; thirdly, confirmation that whether addressing of a design flaw caused other flaws or not. Furthermore, we have used real life example of a telephonic call system to elaborate our approach.
To improve automation and traceability of search-based refactoring, in this thesis we propose a f... more To improve automation and traceability of search-based refactoring, in this thesis we propose a formulation of using graph transformation, where graphs represent object-oriented software architectures at the class level and rules describe refactoring operations. This formalisation allows us to make use of partial order semantics and an associated analysis technique, the approximated unfolding of graph transformation systems. In the unfolding we can identify dependencies and conflicts between refactoring steps leading to an implicit and therefore more scalable representation of the search space by sets of transformation steps equipped with relations of causality and conflict. To implement search based refactoring we make use of the approximated unfolding of graph transformation systems. An optimisation algorithm based on the Ant Colony paradigm is used to explore the search space, aiming to find a sequence of refactoring steps that leads to the best design at a minimal cost. Alternat...
IEEE Access
The Internet-of-drones (IoD) environment is a layered network control architecture designed to ma... more The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones' navigation services. The main entities in IoD are drones, ground station, and external user. Before operationalizing a drone in IoD, a control infrastructure is mandatory for securing its open network channel (Flying Ad Hoc Networks FANETs). An attacker can easily capture data from the available network channel and use it for their own purpose. Its protection is challenging, as it guarantees message integrity, non-repudiation, authenticity, and authorization amongst all the participants. Incredibly, without a robust authentication protocol, the task is sensitive and challenging one to solve. This research focus on the security of the communication path between drone and ground station and solving the noted vulnerabilities like stolen-verifier, privileged-insider attacks, and outdated-data-transmission/design flaws often reported in the current authentication protocols for IoD. We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. Its security has been verified formally using Random Oracle Model (ROM), ProVerif2.02 and informally using assumptions and pragmatic illustration. The performance evaluation proved that the proposed protocol is lightweight compared to prior protocols and recommended for implementation in the real-world IoD environment.
Network and Communication Technologies, Apr 26, 2018
Client-server computing is the analytical development of compatible programming with significant ... more Client-server computing is the analytical development of compatible programming with significant supposition and the detachment of a massive program into its fundamental parts ("modules"), which can create the chance for extra enhancement, inconsiderable improvement, and prominent maintainability. In client-server computing, total extensive modules don't need to be accomplished within the similar memory space totally but can execute independently on a suitable hardware and software platform according to their behavior. The user authentication is the dominant constraint for client-server computing that limits the illegitimate right of entry into the main workstation. This research is mainly focused on the design of a robust authentication scheme for client-server architecture computing. It carries some additional features like security, virtualization, user's programs security, individuality supervision, integrity, control access to server and authentication. The proposed background also delivers the characteristic supervision, mutual authentication, and establishment of secure session key among users and the remote server.
IET Communications
Currently, every user outsources a huge amount of shared secrets remotely from different servers ... more Currently, every user outsources a huge amount of shared secrets remotely from different servers and utilises synchrony resources. To make all types of operations secure for the end-user, synchronous storage is vital and asynchronous storage might lead to the unavailability of successful services. Hence, a robust authentication scheme is mandatory for such purpose which not only confirms the synchrony of the distributed shared resources but also secure access to shared secrets. So far no one has offered an accurate and flawless secure mechanism despite serious attempts. For this purpose, the authors have designed an improved and robust authentication protocol to ensure the security, integrity, and confidentiality of information and synchrony of shared secrets up to a maximum level. The security of the proposed dynamic mechanism has been verified both formally using random Oracle model and verification toolkit ProVerif2.00 and informally using assumptions and theorems. A delicate balance between security and performance has been shown in the performance analysis section of the study.
To improve scalability and understandability of search-based refactoring, in this paper, we propo... more To improve scalability and understandability of search-based refactoring, in this paper, we propose a formulation based on graph transformation which allows us to make use of partial order semantics and an associated analysis technique, the approximated unfolding of graph transformation systems. We use graphs to represent object-oriented software architectures at the class level and graph transformations to describe their refactoring operations. In the unfolding we can identify dependencies and conflicts between refactoring steps leading to an implicit and therefore more scalable representation of the search space. An optimisation algorithm based on the Ant Colony paradigm is used to explore this search space, aiming to find a sequence of refactoring steps that leads to the best design at a minimal costs.
Neural Computing and Applications
International Journal of Distributed Sensor Networks
In video surveillance, person tracking is considered as challenging task. Numerous computer visio... more In video surveillance, person tracking is considered as challenging task. Numerous computer vision, machine and deep learning–based techniques have been developed in recent years. Majority of these techniques are based on frontal view images/video sequences. The advancement of convolutional neural network reforms the way of object tracking. The network layers of convolutional neural network models trained on a number of images or video sequences improve speed and accuracy of object tracking. In this work, the generalization performance of existing pre-trained deep learning models have investigated for overhead view person detection and tracking, under different experimental conditions. The object tracking method Generic Object Tracking Using Regression Networks (GOTURN) which has been yielding outstanding tracking results in recent years is explored for person tracking using overhead views. This work mainly focused on overhead view person tracking using Faster region convolutional n...
April 2020
The SIP (Session Initiation Protocol) is an application and presentation layer signaling protocol... more The SIP (Session Initiation Protocol) is an application and presentation layer signaling protocol used for initiating, continuing and terminating multimedia session for the end user. It gains much attention of the researchers because it is exposed to several threats and noticed challenging vulnerabilities from time to time. Consequently, the security of SIP is a crucial task and many efforts have been made by different researchers and tried to divert the attention towards its solution. But still, no one claims with conviction about a foolproof secure mechanism for SIP. As users extensively use SIP services, the mutual authentication and key agreement among the participants is an important issue. So, robust authentication and key agreement scheme are mandatory for enhancing security, legitimacy and better complexities. Therefore, we present an improved three-factor authentication scheme that caters all the weakness and known attacks in Mishra et al. scheme. The proposed scheme not on...
Computational and Mathematical Organization Theory
International Journal of Information and Computer Security
SSRN Electronic Journal
Secure information sharing has become very popular in immigration, military applications, healthc... more Secure information sharing has become very popular in immigration, military applications, healthcare, education and foreign affairs for the past few years. The security and privacy of such type of information cannot easily be compromised because the secure communication utilizes both wireless and wired communication media for exchanging sensitive information. Voice over IP (VoIP) offers many unique capabilities to its users. An important robust dynamism behind the use of IP telephony is cost savings, especially for businesses with large data networks. By transporting voice traffic over IP-based networks, businesses can decrease or abolish the toll charges related to carrying calls over the Public Switched Telephone Network (PSTN). Session Initiation Protocol (SIP) promises simple and efficient management of multimedia sessions amongst several users. To improve the security, integrity, authenticity and privacy issues while sharing sensitive information, numerous authentication schemes or set-ofrules have been recommended by different researchers in recent times. These authentication schemes are vulnerable to prospective security flaws e.g. replay attack, masquerading, insider attack, impersonation, password guessing, server spoofing, Denning Sacco and denial-of-service (DoS). Further, these schemes also fail to deliver mutual authentication. Almost, no researcher claims with conviction about a foolproof secure authentication scheme. This research mainly focuses on designing VoIP system based on SIP scheme that caters all the weaknesses in these schemes having low computation costs and low communication complexity and low storage overhead and shows a significant balance between performance and security. The proposed protocol also offers mutual authentication and reliable information delivery between user and server. A provable formal security analysis for the scheme will also be established mathematically, using BAN logic of authentication.
Computational and Mathematical Organization Theory
Journal of software, Oct 4, 2022
The objective of this paper is to provide a detailed overview on the classification and applicati... more The objective of this paper is to provide a detailed overview on the classification and applications of medical image registration. Issues in medical image registration are also presented along with their promising solutions and research guidelines. In this review, general concepts, classification, applications and issues in medical image registration is presented and analyzed in a comprehensive manner. The methods used for analysis is unique from already published work because we have performed detailed investigation on the classification, applications and issues in medical image registration. The knowledge on the work that has been developed in the area is presented in a compact and systematic form. This work provides contribution to field of medical image registration by providing a useful platform for both researchers and clinicians in the field.
Abstract: To improve scalability and understandability of search-based refactoring, in this paper... more Abstract: To improve scalability and understandability of search-based refactoring, in this paper, we propose a formulation based on graph transfor-mation which allows us to make use of partial order semantics and an associ-ated analysis technique, the approximated unfolding of graph transformation systems. We use graphs to represent object-oriented software architectures at the class level and graph transformations to describe their refactoring operations. In the unfolding we can identify dependencies and conflicts be-tween refactoring steps leading to an implicit and therefore more scalable representation of the search space. An optimisation algorithm based on the Ant Colony paradigm is used to explore this search space, aiming to find a sequence of refactoring steps that leads to the best design at a minimal costs.
It is always better to detect and dispatch flaws at design level before the start of development ... more It is always better to detect and dispatch flaws at design level before the start of development for better and economic results. Refactoring is considered as a better way to address the design flaws. To the best of our knowledge, none of the available techniques targets non-dispatchable flaws of the design model in their approaches. In this paper, we are focused on multiple aspects that have been missed by the existing researchers of refactoring. For example, use of coupling to define flaws in the design model; secondly, use of refactoring to address the non-dispatchable flaws in the design models; thirdly, confirmation that whether addressing of a design flaw caused other flaws or not. Furthermore, we have used real life example of a telephonic call system to elaborate our approach.
To improve automation and traceability of search-based refactoring, in this thesis we propose a f... more To improve automation and traceability of search-based refactoring, in this thesis we propose a formulation of using graph transformation, where graphs represent object-oriented software architectures at the class level and rules describe refactoring operations. This formalisation allows us to make use of partial order semantics and an associated analysis technique, the approximated unfolding of graph transformation systems. In the unfolding we can identify dependencies and conflicts between refactoring steps leading to an implicit and therefore more scalable representation of the search space by sets of transformation steps equipped with relations of causality and conflict. To implement search based refactoring we make use of the approximated unfolding of graph transformation systems. An optimisation algorithm based on the Ant Colony paradigm is used to explore the search space, aiming to find a sequence of refactoring steps that leads to the best design at a minimal cost. Alternat...
IEEE Access
The Internet-of-drones (IoD) environment is a layered network control architecture designed to ma... more The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones' navigation services. The main entities in IoD are drones, ground station, and external user. Before operationalizing a drone in IoD, a control infrastructure is mandatory for securing its open network channel (Flying Ad Hoc Networks FANETs). An attacker can easily capture data from the available network channel and use it for their own purpose. Its protection is challenging, as it guarantees message integrity, non-repudiation, authenticity, and authorization amongst all the participants. Incredibly, without a robust authentication protocol, the task is sensitive and challenging one to solve. This research focus on the security of the communication path between drone and ground station and solving the noted vulnerabilities like stolen-verifier, privileged-insider attacks, and outdated-data-transmission/design flaws often reported in the current authentication protocols for IoD. We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. Its security has been verified formally using Random Oracle Model (ROM), ProVerif2.02 and informally using assumptions and pragmatic illustration. The performance evaluation proved that the proposed protocol is lightweight compared to prior protocols and recommended for implementation in the real-world IoD environment.
Network and Communication Technologies, Apr 26, 2018
Client-server computing is the analytical development of compatible programming with significant ... more Client-server computing is the analytical development of compatible programming with significant supposition and the detachment of a massive program into its fundamental parts ("modules"), which can create the chance for extra enhancement, inconsiderable improvement, and prominent maintainability. In client-server computing, total extensive modules don't need to be accomplished within the similar memory space totally but can execute independently on a suitable hardware and software platform according to their behavior. The user authentication is the dominant constraint for client-server computing that limits the illegitimate right of entry into the main workstation. This research is mainly focused on the design of a robust authentication scheme for client-server architecture computing. It carries some additional features like security, virtualization, user's programs security, individuality supervision, integrity, control access to server and authentication. The proposed background also delivers the characteristic supervision, mutual authentication, and establishment of secure session key among users and the remote server.
IET Communications
Currently, every user outsources a huge amount of shared secrets remotely from different servers ... more Currently, every user outsources a huge amount of shared secrets remotely from different servers and utilises synchrony resources. To make all types of operations secure for the end-user, synchronous storage is vital and asynchronous storage might lead to the unavailability of successful services. Hence, a robust authentication scheme is mandatory for such purpose which not only confirms the synchrony of the distributed shared resources but also secure access to shared secrets. So far no one has offered an accurate and flawless secure mechanism despite serious attempts. For this purpose, the authors have designed an improved and robust authentication protocol to ensure the security, integrity, and confidentiality of information and synchrony of shared secrets up to a maximum level. The security of the proposed dynamic mechanism has been verified both formally using random Oracle model and verification toolkit ProVerif2.00 and informally using assumptions and theorems. A delicate balance between security and performance has been shown in the performance analysis section of the study.
To improve scalability and understandability of search-based refactoring, in this paper, we propo... more To improve scalability and understandability of search-based refactoring, in this paper, we propose a formulation based on graph transformation which allows us to make use of partial order semantics and an associated analysis technique, the approximated unfolding of graph transformation systems. We use graphs to represent object-oriented software architectures at the class level and graph transformations to describe their refactoring operations. In the unfolding we can identify dependencies and conflicts between refactoring steps leading to an implicit and therefore more scalable representation of the search space. An optimisation algorithm based on the Ant Colony paradigm is used to explore this search space, aiming to find a sequence of refactoring steps that leads to the best design at a minimal costs.
Neural Computing and Applications
International Journal of Distributed Sensor Networks
In video surveillance, person tracking is considered as challenging task. Numerous computer visio... more In video surveillance, person tracking is considered as challenging task. Numerous computer vision, machine and deep learning–based techniques have been developed in recent years. Majority of these techniques are based on frontal view images/video sequences. The advancement of convolutional neural network reforms the way of object tracking. The network layers of convolutional neural network models trained on a number of images or video sequences improve speed and accuracy of object tracking. In this work, the generalization performance of existing pre-trained deep learning models have investigated for overhead view person detection and tracking, under different experimental conditions. The object tracking method Generic Object Tracking Using Regression Networks (GOTURN) which has been yielding outstanding tracking results in recent years is explored for person tracking using overhead views. This work mainly focused on overhead view person tracking using Faster region convolutional n...
April 2020
The SIP (Session Initiation Protocol) is an application and presentation layer signaling protocol... more The SIP (Session Initiation Protocol) is an application and presentation layer signaling protocol used for initiating, continuing and terminating multimedia session for the end user. It gains much attention of the researchers because it is exposed to several threats and noticed challenging vulnerabilities from time to time. Consequently, the security of SIP is a crucial task and many efforts have been made by different researchers and tried to divert the attention towards its solution. But still, no one claims with conviction about a foolproof secure mechanism for SIP. As users extensively use SIP services, the mutual authentication and key agreement among the participants is an important issue. So, robust authentication and key agreement scheme are mandatory for enhancing security, legitimacy and better complexities. Therefore, we present an improved three-factor authentication scheme that caters all the weakness and known attacks in Mishra et al. scheme. The proposed scheme not on...
Computational and Mathematical Organization Theory
International Journal of Information and Computer Security
SSRN Electronic Journal
Secure information sharing has become very popular in immigration, military applications, healthc... more Secure information sharing has become very popular in immigration, military applications, healthcare, education and foreign affairs for the past few years. The security and privacy of such type of information cannot easily be compromised because the secure communication utilizes both wireless and wired communication media for exchanging sensitive information. Voice over IP (VoIP) offers many unique capabilities to its users. An important robust dynamism behind the use of IP telephony is cost savings, especially for businesses with large data networks. By transporting voice traffic over IP-based networks, businesses can decrease or abolish the toll charges related to carrying calls over the Public Switched Telephone Network (PSTN). Session Initiation Protocol (SIP) promises simple and efficient management of multimedia sessions amongst several users. To improve the security, integrity, authenticity and privacy issues while sharing sensitive information, numerous authentication schemes or set-ofrules have been recommended by different researchers in recent times. These authentication schemes are vulnerable to prospective security flaws e.g. replay attack, masquerading, insider attack, impersonation, password guessing, server spoofing, Denning Sacco and denial-of-service (DoS). Further, these schemes also fail to deliver mutual authentication. Almost, no researcher claims with conviction about a foolproof secure authentication scheme. This research mainly focuses on designing VoIP system based on SIP scheme that caters all the weaknesses in these schemes having low computation costs and low communication complexity and low storage overhead and shows a significant balance between performance and security. The proposed protocol also offers mutual authentication and reliable information delivery between user and server. A provable formal security analysis for the scheme will also be established mathematically, using BAN logic of authentication.
Computational and Mathematical Organization Theory