Khaleel Ahmad
Swami Vivekanand Subharti University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Khaleel Ahmad.
international conference on communication systems and network technologies | 2014
Ankur Chaudhary; Khaleel Ahmad; M. A. Rizvi
E-commerce provides low transaction costs and more convenient business mode to all over world customers. We describe many asymmetric approaches which use in E-commerce transaction and other supported cryptography algorithms which are essential in working setup of E-commerce. In this paper, we propose a model of E-transaction based on PGP. It will show that how much secure payment and customer order of information will be efficiently handled by PGP based on dual signature. Along with, we also derive a comparison table of all asymmetric algorithms in which we analysis all the properties of algorithms.
international conference on issues and challenges in intelligent computing techniques | 2014
Gaurav Tyagi; Khaleel Ahmad; M. N. Doja
Malwares are very precarious problem for Internet users. They are malicious software or programs, programmed by attackers to interrupt computer operation, gather delicate information, or gain access to client computer system. Key-logger is one of the massive threat among various malwares. It can be a hardware key-logger or software key-logger which records the keystrokes and store them in a log file and email that file to the attacker, if attacker wants to do so. It is baleful for system user or end users who use online banking rarely or ordinarily. In this paper, we propose a technique for prevention of password from a key-logger spywares and give assurance of security of password from key-logger spywares.
Archive | 2018
Sonal Dubey; Kritika Verma; M. A. Rizvi; Khaleel Ahmad
Cloud computing is a technology which deals with the collection of a large number of computers connected together on communication networks, for example the Internet. Cloud computing, dynamically increases computing capacity or add capabilities with minimum intervention of humans and without much investment in new infrastructure. At this moment cloud computing is at infancy stage, with many groups of providers, delivering cloud-based services, from full-scale applications to storage services. In the present era, IT sector turned into cloud-based services independently, but cloud computing integrators and aggregators as of now up and coming. The virtual servers in cloud computing virtually exist and so they can be scaled on the fly without affecting the client, to some extent in spite of being physically objectified, cloud gets expanded or compressed. In this paper, an attempt is made to do a SWOT analysis of a cloud computing environment as many users are in dilemma whether to use it or not. What are the benefits and disadvantages in using the cloud? A critical and detail analysis is done by mapping its Strengths (S), Weakness (W), Opportunity (O), and Threat (T) in different ways.
international conference on communication systems and network technologies | 2015
Khaleel Ahmad; Abdul Wahid; M.Pasha Quadri; Afrah Fathima
A cloud management platform allows users to run a multitenant atmosphere exploiting the resources from the virtual infrastructure. Although, clouds area unit is engineered with SaaS, PaaS and IaaS service layers. Infrastructure services area unit is the first and foremost typical non-public cloud services. For efficiency and high-performance in the cloud management platform, we propose the parallel virtualization in the cloud computing environment. Data centers are created which can be used by multiple users at the same time by apportioning capabilities as the need arises had made this possible. Elasticity can be effectively achieved via parallel virtualization in IaaS to community cloud.
international conference on computational intelligence and communication networks | 2014
Abdul Wahid; Khaleel Ahmad; Gaurav Tyagi; M. A. Rizvi
Cloud computing is one of the major technologies which has gained popularity in computer sciences and information technology domain. Cloud computing has changed the way of doing business by an enterprise in general and data management, retrieval & storage within a business enterprise in particular. Smartphone usage has grown rapidly in tandem with cloud computing by providing different services/applications using cloud computing. Most of the Smartphone do run on Android operating system. Android OS is the widely used Smartphone operating systems with huge user base. Everyday hundreds and thousands of application are added to the repository of Android by different vendors and are easily available for installation to android users. As most of the applications are developed by third party giving way to possible loopholes which result in different threats to security & privacy of data. These threats are critical when a user is suing cloud storage or services on Smartphone devices and if the device is stolen it may lead to access of information by an unauthorized user. This unauthorized access to information can be misused which creates distrust among the users of cloud computing on android devices. In this paper a methodology has been proposed to secure data and information from unauthorized access using android cloud application.
international conference on signal processing | 2013
Khaleel Ahmad; Gaurav Kumar
Fourth generation technology will offer many impressive network capabilities with new level of user application like high end video, game etc. Quality of service is the one of major component and fundamental framework of a 4G broadband wireless network for desired delivery of service in evolving Internet applications to end users, and managing the network resources. A flexible quality of service (QoS) approach for cell edge user with small cell incorporate into network with game theory which will be desirable solution of future to deliver the incumbent QoS. A novel coalesce model of game theory is propose to enhance the QoS at the edge of cell, for which different game theories model based on cooperative and non cooperative game theory with adaptive beam forming are discussed with different scenario of implementation with small cell in the network.
IIUM Engineering Journal | 2011
Khaleel Ahmad
International Journal of Information Technology | 2017
Khaleel Ahmad; Muneera Fathima; Vishal Jain; Afrah Fathima
International Journal of Information Technology | 2018
Khaleel Ahmad; Monika Sahu; Madhup Shrivastava; M. A. Rizvi; Vishal Jain
Archive | 2016
Mohd Omar; Khaleel Ahmad; M. A. Rizvi
Collaboration
Dive into the Khaleel Ahmad's collaboration.
Sher-e-Kashmir University of Agricultural Sciences and Technology of Kashmir
View shared research outputs