Dur-e-Shawar-Agha

Engr. Dur-e-Shawar Agha

Senior Lecturer Department of Software Engineering

Dur-e-Shawar Agha, working as a Senior Lecturer in the Department of Software Engineering of Sir Syed University of Engineering and Technology, Karachi, Pakistan. I did my BS in Computer Engineering and MS in Computer Engineering (Specialization in Computer Networks) from Sir Syed University of Engineering and Technology, Karachi, Pakistan. My research interests are Cryptography, Artificial Intelligence and Wireless Sensor Network.

“BS Computer Engineering (SSUET)
MS (Computer Networks) SSUET
PhD ( progress) Department of Computer Science (Uok)”

“F. Qazi, F. H. Khan and D. Shawar Agha, “Modification in Hill Cipher for Cryptographic Application”, 3C Techlogia, Special Issue. Pp. 240-257, (2019) DOI: http://dx.doi.org/10.17993/3ctecno.2019.specialissue2.240-257. (Indexed by ESCI included in Master Journal list).

D. Shawar Agha, F. Qazi, F. H. Khan, R. Shams, and H. Hassan Rizvi, “A Secure Crypto Base Authentication and Communication Suite in Wireless Body Area Network (WBAN) for IoT Applications”, Wireless Personal Communications, Vol. Issue, PP. (2018). https://doi.org/10.1007/s1127. ISI indexed (Impact Factor 1.0423)

D. Agha, F. Qazi, F. H. Khan, M. S. A. Khan, “Efficient Priority based Data Aggregation in WBAN”, Journal of Fundamental and Applied Sciences, Special Issue 5, Vol. 10, pp. 1357-1368, (2018). (Indexed by ESCI included in Master Journal list).

F. Qazi, F. H. Khan S. A. Khan, D. S. Agha and B. Das “Secure Identity-Based Cryptographic Approach for Vehicular Ah-hoc Networks”, International Journal of Security and its Applications Vol. 12, No. 1pp. 59-68, (2018). (Indexed by ESCI included in Master Journal list).

D.S. Agha, M. Rehman, M. Huzaifa, Q.M. Shahzaib and S.B. Kamal, “TELL ME (AN ASSISTANT FOR THE VISUALLY CHALLENGED)”, International Journal of New Technologies in Science and Engineering Vol. 4, Issue. 3, (2017), ISSN 2349-0780.

D.S. Agha, F.H. Khan, R. Shams and R.N. Enam “Regenerate the Shredded Documents by using Memetic Algorithm”, International Journal of Hybrid Information Technology Vol. 10, No.2 (2017), pp. 97-106 http://dx.doi.org/10.14257/ijhit.2017.10.2.10

D.S. Agha, S.A. Khan, H. Fakhruddin and H.H. Rizvi “Security Enhancing by using ASCII Values and Substitution Technique for Symmetric Key Cryptography”, Indian Journal of Science and Technology, Vol 10(36), (2017). DOI: 10.17485/ijst/2017/v10i36/119181, ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645

F. Qazi, D. S. Agha and S. Bano “Model for Laptop Theft Tracking and Data Retrieving”, Journal of Information Communication Technologies and Robotic Applications, Vol. 7, Issue 2016, pp. 66-71 (2016). HEC recognized.

F. Qazi, F. H. Khan, R. Shams and D.S. Agha, “Hill cipher key generation algorithm by using orthogonal matrix”, International Journal of Innovative Science and Modern Engineering (IJISME), Volume-3 Issue-3, February 2015, pp 5-7, ISI index, impact factor 1.67.

Second Chance Page Replacement Algorithm with Optimal (SCAO), IEEE Xplore, 2019.

Centralized Log Management Using Elasticsearch, Logstash and Kibana, , IEEE Xplore , 2020

Safeguard Identification: Safeguard As An Essential Aspect, IEEE Xplore, 2020”