Solving TSP problem by using genetic algorithm FH Khan, N Khan, S Inayatullah, ST Nizami International Journal of Basic & Applied Sciences 9 (10), 79-88, 2009 | 52 | 2009 |
A secure crypto base authentication and communication suite in wireless body area network (WBAN) for IoT applications DS Agha, FH Khan, R Shams, HH Rizvi, F Qazi Wireless Personal Communications 103 (4), 2877-2890, 2018 | 25 | 2018 |
Hill cipher key generation algorithm by using orthogonal matrix FH Khan, R Shams, F Qazi, D Agha Int. J. Innov. Sci. Mod. Eng 3 (3), 5-7, 2015 | 15 | 2015 |
Internet of things in telemedicine: a discussion regarding to several implementation R Shams, FH KHAN, F SALEEM Journal of Information Communication Technologies and Robotic Applications …, 2018 | 13 | 2018 |
Critical analysis of localization and time synchronization algorithms in underwater wireless sensor networks: issues and challenges R Shams, FH Khan, M Amir, P Otero, J Poncela Wireless Personal Communications 116, 1231-1258, 2021 | 10 | 2021 |
Deployment of sensors to optimize the network coverage using genetic algorithm FH Khan, R Shams, M Umair, M Waseem Sir Syed University Research Journal of Engineering & Technology 2 (1), 4-4, 2012 | 10 | 2012 |
A new approach to represent the geometric and physical interpretation of fractional order derivatives of polynomial function and its application in field of sciences ST Nizami, N Khan, FH Khan Can. J. Comput. Math. Nat. Sci. Eng. Med 1, 1-8, 2010 | 10 | 2010 |
Joint algorithm for multi-hop localization and time synchronization in underwater sensors networks using single anchor R Shams, P Otero, M Aamir, FH Khan IEEE Access 9, 27945-27958, 2021 | 9 | 2021 |
Cryptosystem an Implementation of RSA using Verilog R Shams, FH Khan, M Umair International Journal of Computer Networks and Communications Security 1 (3 …, 2013 | 8 | 2013 |
A new method for finding the cost of assignment problem using genetic algorithm of artificial intelligence ST Nizami, JA Khan, FH Khan, N Khan, S Inayatullah International Journal of Latest Trends in Computing 2 (1), 135-137, 2011 | 8 | 2011 |
Enhancing the security of communication using encryption algorithm based on ASCII values of data F Qazi, FH Khan, KN Kiani, S Ahmed, SA Khan International Journal of Security and Its Application 11 (3), 59-68, 2017 | 7 | 2017 |
Weighted fuzzy soft matrix theory and its decision making N Khan, FH Khan, GS Thakur International Journal 2 (10), 2013 | 7 | 2013 |
Solving wireless network scheduling problem by genetic algorithm R Shams, FH Khan IAMURE International Journal of Mathematics, Engineering and Technology 4 (1 …, 2012 | 7 | 2012 |
Modification in Hill Cipher for Cryptographic Application F Qazi, FH Khan, SA Khan, S ur Rehamn 3c Tecnología: glosas de innovación aplicadas a la pyme 8 (1), 240-257, 2019 | 6 | 2019 |
Enhancing the security of vehicle to road side unit (RSU) communication with key generation and advanced encryption procedure in vehicular ad-hoc network (VANET) F Qazi, FH Khan, KN Kiani, SA Khan Indian Journal of Science and Technology 10, 36, 2017 | 6 | 2017 |
New artificial-free phase 1 simplex method N Khan, S Inayatullah, M Imtiaz, FH Khan arXiv preprint arXiv:1304.2107, 2013 | 6 | 2013 |
Extreme rainfall frequency analysis for Balakot, Pakistan, using Gumbel’s distribution F Zamir, F Hanif, S Naz Arabian Journal of Geosciences 14, 1-10, 2021 | 5 | 2021 |
Neural minimization methods (NMM) for solving variable order fractional delay differential equations (FDDEs) with simulated annealing (SA) A Shaikh, MA Jamal, F Hanif, MSA Khan, S Inayatullah PloS one 14 (10), e0223476, 2019 | 5 | 2019 |
Implementation of data encryption standard (DES) on FPGA FH Khan, R Shams, A Hasan, N Hasan Journal of Information Communication Technologies and Robotic Applications …, 2018 | 5 | 2018 |
Intrusion detection in wireless networks using Genetic Algorithm FH Khan, R Shams, M Aamir, M Waseem, M Memon 2015 2nd International Conference on Computing for Sustainable Global …, 2015 | 5 | 2015 |