Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Khaleel Ahmad is active.

Publication


Featured researches published by Khaleel Ahmad.


international conference on communication systems and network technologies | 2014

E-Commerce Security through Asymmetric Key Algorithm

Ankur Chaudhary; Khaleel Ahmad; M. A. Rizvi

E-commerce provides low transaction costs and more convenient business mode to all over world customers. We describe many asymmetric approaches which use in E-commerce transaction and other supported cryptography algorithms which are essential in working setup of E-commerce. In this paper, we propose a model of E-transaction based on PGP. It will show that how much secure payment and customer order of information will be efficiently handled by PGP based on dual signature. Along with, we also derive a comparison table of all asymmetric algorithms in which we analysis all the properties of algorithms.


international conference on issues and challenges in intelligent computing techniques | 2014

A novel framework for password securing system from key-logger spyware

Gaurav Tyagi; Khaleel Ahmad; M. N. Doja

Malwares are very precarious problem for Internet users. They are malicious software or programs, programmed by attackers to interrupt computer operation, gather delicate information, or gain access to client computer system. Key-logger is one of the massive threat among various malwares. It can be a hardware key-logger or software key-logger which records the keystrokes and store them in a log file and email that file to the attacker, if attacker wants to do so. It is baleful for system user or end users who use online banking rarely or ordinarily. In this paper, we propose a technique for prevention of password from a key-logger spywares and give assurance of security of password from key-logger spywares.


Archive | 2018

SWOT Analysis of Cloud Computing Environment

Sonal Dubey; Kritika Verma; M. A. Rizvi; Khaleel Ahmad

Cloud computing is a technology which deals with the collection of a large number of computers connected together on communication networks, for example the Internet. Cloud computing, dynamically increases computing capacity or add capabilities with minimum intervention of humans and without much investment in new infrastructure. At this moment cloud computing is at infancy stage, with many groups of providers, delivering cloud-based services, from full-scale applications to storage services. In the present era, IT sector turned into cloud-based services independently, but cloud computing integrators and aggregators as of now up and coming. The virtual servers in cloud computing virtually exist and so they can be scaled on the fly without affecting the client, to some extent in spite of being physically objectified, cloud gets expanded or compressed. In this paper, an attempt is made to do a SWOT analysis of a cloud computing environment as many users are in dilemma whether to use it or not. What are the benefits and disadvantages in using the cloud? A critical and detail analysis is done by mapping its Strengths (S), Weakness (W), Opportunity (O), and Threat (T) in different ways.


international conference on communication systems and network technologies | 2015

Parallel Virtualization in IaaS in Community Cloud

Khaleel Ahmad; Abdul Wahid; M.Pasha Quadri; Afrah Fathima

A cloud management platform allows users to run a multitenant atmosphere exploiting the resources from the virtual infrastructure. Although, clouds area unit is engineered with SaaS, PaaS and IaaS service layers. Infrastructure services area unit is the first and foremost typical non-public cloud services. For efficiency and high-performance in the cloud management platform, we propose the parallel virtualization in the cloud computing environment. Data centers are created which can be used by multiple users at the same time by apportioning capabilities as the need arises had made this possible. Elasticity can be effectively achieved via parallel virtualization in IaaS to community cloud.


international conference on computational intelligence and communication networks | 2014

Anti-theft Cloud Apps for Android Operating System

Abdul Wahid; Khaleel Ahmad; Gaurav Tyagi; M. A. Rizvi

Cloud computing is one of the major technologies which has gained popularity in computer sciences and information technology domain. Cloud computing has changed the way of doing business by an enterprise in general and data management, retrieval & storage within a business enterprise in particular. Smartphone usage has grown rapidly in tandem with cloud computing by providing different services/applications using cloud computing. Most of the Smartphone do run on Android operating system. Android OS is the widely used Smartphone operating systems with huge user base. Everyday hundreds and thousands of application are added to the repository of Android by different vendors and are easily available for installation to android users. As most of the applications are developed by third party giving way to possible loopholes which result in different threats to security & privacy of data. These threats are critical when a user is suing cloud storage or services on Smartphone devices and if the device is stolen it may lead to access of information by an unauthorized user. This unauthorized access to information can be misused which creates distrust among the users of cloud computing on android devices. In this paper a methodology has been proposed to secure data and information from unauthorized access using android cloud application.


international conference on signal processing | 2013

A novel coalesce model of game theory to enhance QoS of cell edge user

Khaleel Ahmad; Gaurav Kumar

Fourth generation technology will offer many impressive network capabilities with new level of user application like high end video, game etc. Quality of service is the one of major component and fundamental framework of a 4G broadband wireless network for desired delivery of service in evolving Internet applications to end users, and managing the network resources. A flexible quality of service (QoS) approach for cell edge user with small cell incorporate into network with game theory which will be desirable solution of future to deliver the incumbent QoS. A novel coalesce model of game theory is propose to enhance the QoS at the edge of cell, for which different game theories model based on cooperative and non cooperative game theory with adaptive beam forming are discussed with different scenario of implementation with small cell in the network.


IIUM Engineering Journal | 2011

ANALYSIS OF WEB MINING APPLICATIONS AND BENEFICIAL AREAS

Khaleel Ahmad


International Journal of Information Technology | 2017

FUZZY-PRoPHET: a novel routing protocol for opportunistic network

Khaleel Ahmad; Muneera Fathima; Vishal Jain; Afrah Fathima


International Journal of Information Technology | 2018

An efficient image retrieval tool: query based image management system

Khaleel Ahmad; Monika Sahu; Madhup Shrivastava; M. A. Rizvi; Vishal Jain


Archive | 2016

Content Based Image Retrieval System

Mohd Omar; Khaleel Ahmad; M. A. Rizvi

Collaboration


Dive into the Khaleel Ahmad's collaboration.

Top Co-Authors

Avatar

Gaurav Kumar

Swami Vivekanand Subharti University

View shared research outputs
Top Co-Authors

Avatar

Abdul Wahid

Gautam Buddha University

View shared research outputs
Top Co-Authors

Avatar

Ankur Chaudhary

Swami Vivekanand Subharti University

View shared research outputs
Top Co-Authors

Avatar

Gaurav Tyagi

Swami Vivekanand Subharti University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Anshuman K Saurabh

Swami Vivekanand Subharti University

View shared research outputs
Top Co-Authors

Avatar

Gauarv Kumar

Swami Vivekanand Subharti University

View shared research outputs
Top Co-Authors

Avatar

Mudasir M. Kirmani

Sher-e-Kashmir University of Agricultural Sciences and Technology of Kashmir

View shared research outputs
Top Co-Authors

Avatar

Sonal Dubey

Rajiv Gandhi Proudyogiki Vishwavidyalaya

View shared research outputs
Researchain Logo
Decentralizing Knowledge