Papers by Muhammad Kamran

Sensors, 2021
With the emerging growth of digital data in information systems, technology faces the challenge o... more With the emerging growth of digital data in information systems, technology faces the challenge of knowledge prevention, ownership rights protection, security, and privacy measurement of valuable and sensitive data. On-demand availability of various data as services in a shared and automated environment has become a reality with the advent of cloud computing. The digital fingerprinting technique has been adopted as an effective solution to protect the copyright and privacy of digital properties from illegal distribution and identification of malicious traitors over the cloud. Furthermore, it is used to trace the unauthorized distribution and the user of multimedia content distributed through the cloud. In this paper, we propose a novel fingerprinting technique for the cloud environment to protect numeric attributes in relational databases for digital privacy management. The proposed solution with the novel fingerprinting scheme is robust and efficient. It can address challenges such...
Toxic secretions of Xenorhabdus and their efficacy against crop insect pests
Biocontrol agents: entomopathogenic and slug parasitic nematodes

Synthesis of Soluble and Highly Thermally Stable Polyaniline- Titanium Dioxide Composite via Inverse Emulsion Polymerization
Journal of the Chemical Society of Pakistan, 2019
Polyaniline (PANI)/Titanium dioxide (TiO2) composites were prepared by polymerization of aniline ... more Polyaniline (PANI)/Titanium dioxide (TiO2) composites were prepared by polymerization of aniline in the presence of TiO2 using inverse emulsion polymerization protocol. In this method 2-butanol and chloroform were used as dispersing media and the materials were tested for corrosion protection of stainless steel in Indian Ocean water. The amount of aniline, oxidant (Benzoyl peroxide), Dodecylbenzenesulphonic acid (DBSA) surfactant and metal oxide (TiO2) were varied in the reaction bath for optimum yield. The as-synthesized PANI and PANI-TiO2 composites were soluble in a number of common organic solvents and characterized with Ultravilot-visivble (UV-Vis) and Fourier Transform Infra-Red (FT-IR) spectroscopies. The surface morphology, particle size and crystinality were determined with Scanning Electron Microscopy (SEM) and XRays Diffraction (XRD) analysis. Thermogravimetric analysis (TGA) was employed to determine thermal stability of the composite. The total mass loss was found to be 58% in PANI as compared to 22% in PANI-TiO2 showing comparatively higher thermal stability of the composites. The composites were electrochemically active in acidic medium and reduced corrosion rate of steel to 0.9083 mm/ year Indian Ocean water. Finally it was concluded that PANI-TiO2 composites could be employed as anticorrosive coatings for steel in aggressive corrosive environment
LSCIC Pre-processor Design with Constriction Elucidation
First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06)
This paper presents the novel behavioral architecture of LSCIC (Layered Scalable Concurrent Image... more This paper presents the novel behavioral architecture of LSCIC (Layered Scalable Concurrent Image Compression) pre processor chip by utilizing scalable compression algorithm. This design separates enhanced and base layer pixels prior to concurrent compression operation in ...

False spider mites (Acari: Tenuipalpidae) associated with date palm orchards in Saudi Arabia: description of two new species and new recordsÂ
Systematic and Applied Acarology, 2015
Abstract Within the scope of a project investigating phytophagous and predacious mites associated... more Abstract Within the scope of a project investigating phytophagous and predacious mites associated with date palm,Phoenix dactylifera L. (Arecaceae), a comprehensive survey was conducted at five different provinces of Saudi Arabia. Eleven species within eight genera of false spider mites (Acari: Tenuipalpidae) were recorded from date palm trees, ground cover plants, and soil debris. Among them, three genera, Dolichotetranychus Sayed, Phytoptipalpus Sayed and Pseudoleptus Bruyant and three species, Pentamerismus retusus Meyer, Pseudoleptus kermanshahiensis Khanjani, Khanjani, Saboori & Seeman and Tenuipalpus bagdadensis Al-Gboory, are new to the mite fauna of Saudi Arabia. Two new species, Phytoptipalpus phoenicis sp. nov. and Dolichotetranychus riyadhensis sp. nov., collected from P. dactylifera and Cynodon dactylon L. (Poaceae), respectively, are described and illustrated. A key to species of Tenuipalpidae reported from date palms worldwide is given.
Cotton crop improvement through maintaining seed quality during production and storage
Pakistan journal of zoology
Genus Lasioerythraeus and species Pollux workandae (Prostigmata: Erythraeidae) were first time re... more Genus Lasioerythraeus and species Pollux workandae (Prostigmata: Erythraeidae) were first time reported from Pakistan. Lasioerythraeus setarius n.sp. is described and illustrated from a larva, collected from a weed, Setaria viridis L. (Poaceae). A key to the larval species of Lasioerythraeus is provided.
Wuhan University Journal of Natural Sciences, 2006
The key problem of securing multicast is to generate, distribute and update Session Encryption Ke... more The key problem of securing multicast is to generate, distribute and update Session Encryption Key(SEK). After analyzing PE scheme and its shortage, a group key distribution scheme utilizing a polynomial expansion with multi-seed(M-PE)is proposed. Its operation is demonstrated by using multi-seed, the group member is partitioned to many subgroups. While updating the SEK, computation is needed only in one of subgroups, the other of them will use the computation history to update their SEK. A prototype test system is designed in order to validate our new scheme especially for its computable complexity. In the system, a kind of technology of producing a strict prime number is introduced as well as a table is designed in order to reduce the computation complexity.
International Journal of Applied Physics and Mathematics, 2013
Our present study on Zinc Oxide is for window layer of thin film based solar cells. ZnO thin film... more Our present study on Zinc Oxide is for window layer of thin film based solar cells. ZnO thin films are of great importance and yields very promising results. ZnO thin films prepared by Sol-Gel process using spin coating at a speed of 2000 RPM for 30 seconds. The precursor sol was prepared by mixing of 2-proponal and zinc acetate dehydrate (ZAD) and using mono-ethanolamine (MEA) as stabilizer. ZnO sol was prepared varying sol concentration by 0.1M, 0.3M and 0.5M respectively. A comparison of optical and structural properties of ZnO annealed and un-annealed thin films are done by the help of XRD, SEM and UV-VIS-IR spectroscopy.
International Journal of Poultry Science, 2002

Evaluation of Age, Gender and Parental Factors Affecting Child Behavior in the Dental Surgery
Objectives: The aim of this study was to know the effect of gender, age, parental education (lite... more Objectives: The aim of this study was to know the effect of gender, age, parental education (literacy) and parental socioeconomic status on child behavior in dental surgery. Methodology: One hundred and twenty six children who reported to Department of Paedodontics, Khyber College of Dentistry, Peshawar for various dental problems were included in this study. A specially designed proforma was used to collect information from parents onage, gender, parental education (literacy), socioeconomic status. Frankl behavior rating scale was used to record child behavior in dental surgery. The data was then subjected to statistical analysis using SPSS version 16. Results: Majority of the children (44.4%) belonged to low socio-economic group followed by middle (29.4%) and high (26.2%) socio-economic groups. The parents of 55 children(43.7%) had college/university education followed by 39 parents (31%) having up to high school education. Thirty two parents (25.4%) were uneducated. According to ...

The stimulation of seed germination by smoke and aqueous smoke extracts has received much attenti... more The stimulation of seed germination by smoke and aqueous smoke extracts has received much attention in recent years. However, the combine effects of smoke with plant hormones on seed germination remain unknown. This investigation describes how lettuce (Lactuca sativa) seeds respond to smoke solution and how the smoke solution can alleviate abscisic acid (ABA) stress. The results showed that plant extracted smoke treated seeds had significantly quicker germination, higher germination percentage, fresh weight, relative seed germination percentage, peak value, germination value, shoot and root length, germination index and vigor index as compared to control. No germination was observed in ABA (0.1mM) treated seeds but significant number of seeds germinated when ABA and smoke solutions were mixed together. It was observed that smoke solutions overcome the inhibitory effects of ABA and improved germination and seedling vigor, indicating that smoke alleviated ABA stress not only at the germination level but also at seedling stage.
A novel and robust fingerprinting technique for digital data based on Genetic Algorithm
2014 11th Annual High Capacity Optical Networks and Emerging/Enabling Technologies (Photonics for Energy), 2014
With the rapid sharing of secret documents over the Internet, identifying an unauthorized copying... more With the rapid sharing of secret documents over the Internet, identifying an unauthorized copying and identity of the guilty agent is becoming more important. Fingerprinting techniques ensure ownership protection and tamper proofing and help in identifying the guilty agent who is responsible for the data leakage. However, these techniques are not robust when the guilty agent attacks the data in a large amount. In this paper a novel and robust, fingerprinting technique is proposed through employing Genetic Algorithm (GA) - a biologically inspired evolutionary computation technique. The robustness of the proposed technique is demonstrated against collusion, deletion and alteration attacks.

IEEE Transactions on Knowledge and Data Engineering, 2015
Advancement in information technology is playing an increasing role in the use of information sys... more Advancement in information technology is playing an increasing role in the use of information systems comprising relational databases. These databases are used effectively in collaborative environments for information extraction; consequently, they are vulnerable to security threats concerning ownership rights and data tampering. Watermarking is advocated to enforce ownership rights over shared relational data and for providing a means for tackling data tampering. When ownership rights are enforced using watermarking, the underlying data undergoes certain modifications; as a result of which, the data quality gets compromised. Reversible watermarking is employed to ensure data quality along-with data recovery. However, such techniques are usually not robust against malicious attacks and do not provide any mechanism to selectively watermark a particular attribute by taking into account its role in knowledge discovery. Therefore, reversible watermarking is required that ensures; (i) watermark encoding and decoding by accounting for the role of all the features in knowledge discovery; and, (ii) original data recovery in the presence of active malicious attacks. In this paper, a robust and semi-blind reversible watermarking (RRW) technique for numerical relational data has been proposed that addresses the above objectives. Experimental studies prove the effectiveness of RRW against malicious attacks and show that the proposed technique outperforms existing ones.

PLOS ONE, 2015
Genetic data, in digital format, is used in different biological phenomena such as DNA translatio... more Genetic data, in digital format, is used in different biological phenomena such as DNA translation, mRNA transcription and protein synthesis. The accuracy of these biological phenomena depend on genetic codes and all subsequent processes. To computerize the biological procedures, different domain experts are provided with the authorized access of the genetic codes; as a consequence, the ownership protection of such data is inevitable. For this purpose, watermarks serve as the proof of ownership of data. While protecting data, embedded hidden messages (watermarks) influence the genetic data; therefore, the accurate execution of the relevant processes and the overall result becomes questionable. Most of the DNA based watermarking techniques modify the genetic data and are therefore vulnerable to information loss. Distortion-free techniques make sure that no modifications occur during watermarking; however, they are fragile to malicious attacks and therefore cannot be used for ownership protection (particularly, in presence of a threat model). Therefore, there is a need for a technique that must be robust and should also prevent unwanted modifications. In this spirit, a watermarking technique with aforementioned characteristics has been proposed in this paper. The proposed technique makes sure that: (i) the ownership rights are protected by means of a robust watermark; and (ii) the integrity of genetic data is preserved. The proposed technique-GenInfoGuard-ensures its robustness through the "watermark encoding" in permuted values, and exhibits high decoding accuracy against various malicious attacks.

Annals of thoracic and cardiovascular surgery : official journal of the Association of Thoracic and Cardiovascular Surgeons of Asia, 2008
It is not uncommon for aspirin therapy to be withheld before coronary artery bypass grafting (CAB... more It is not uncommon for aspirin therapy to be withheld before coronary artery bypass grafting (CABG) because it is thought to increase the risk of postoperative bleeding. Many studies have shown that continued aspirin therapy reduces postoperative myocardial infarction and increases survival. The purpose of this study is to analyze the effect of preoperative aspirin on postoperative bleeding in patients undergoing CABG. Patients (n=30) undergoing CABG were divided into two groups, group 1 (n=15) who received aspirin till the day of surgery, and group 2 in whom aspirin was stopped 5 days before surgery. Postoperative bleeding up to 76 h (approximately 3 days) was noted in both groups. Preoperative, intraoperative, and postoperative variables were equal in both groups. Postoperative bleeding in the 2nd hour was significantly lower in group 1 compared to group 2 (p=0.004). Bleeding 28-76 h postoperatively was also significantly lower in the first group (p=0.043). Our study suggests that...
Design Optimization of Hub for 3-Bladed Horizontal Axis Tidal Turbine
Applied Mechanics and Materials, 2014
In this paper, Wind turbines knowledge, which is already matured enough, is effectively used for ... more In this paper, Wind turbines knowledge, which is already matured enough, is effectively used for design of horizontal axis tidal turbine (HATT) hub. Design optimization keeping in view the shape and strength for minimum weight was done using ANSYS software. Maximum stress concentration areas are found to be the blade roots and edges of shaft connection. A novel approach is used to optimize the fillet radii along with overall thickness.
Investigating the Pitting Resistance of 316 Stainless Steel in Ringer's Solution Using the Cyclic Polarization Technique
Defect and Diffusion Forum, 2013
Corrosion rate, corrosion potential and susceptibility to pitting corrosion of a metal are measur... more Corrosion rate, corrosion potential and susceptibility to pitting corrosion of a metal are measured using cyclic polarization Direct Current (DC) electrochemical technique. The aim of the present research is to investigate the pit nucleation resistance of polished, ground and passivated surfaces of 316 stainless steels in Ringers solution. The electrochemical cyclic polarization results showed that polished surface gave better pitting resistance as compared to ground surface. It was also observed that passivation treatment gave better pitting resistance to both polished and ground surface of 316 stainless steels in Ringers solution.

A novel vehicle-to-grid technology with constraint analysis-a review
2014 International Conference on Emerging Technologies (ICET), 2014
This paper presents a detailed review of a vehicle-to-grid (V2G) technology, and analyzes its imp... more This paper presents a detailed review of a vehicle-to-grid (V2G) technology, and analyzes its impacts on power distribution networks. It is shown in this study that a vehicle, equipped with the ability of a V2G application, offers various features such as regulation of active power, support for reactive power, load balancing, current harmonics filtering etc. These features can enable ancillary services including, spinning reserve and control of voltage and frequency. However, the technology of V2G also creates challenging issues, for instance, degradation of batteries, communication overhead between an EV and a grid, changes in whole infrastructure of a distribution network (DN). This paper shows the present scenarios and analyze the impact of implementation V2G & G2V modes on DNs. V2G system have an impact on major factors of electric grid like reliability, efficiency, losses, and system stability. Our study also shows that the economic benefits of a V2G technology heavily depend on the strategies of charging and vehicle aggregation.
Uploads
Papers by Muhammad Kamran