72 results on '"Khalid Mahmood Awan"'
Search Results
2. Some q-Symmetric Integral Inequalities Involving s-Convex Functions
- Author
-
Ammara Nosheen, Sana Ijaz, Khuram Ali Khan, Khalid Mahmood Awan, Marwan Ali Albahar, and Mohammed Thanoon
- Subjects
quantum calculus ,q-symmetric quantum calculus ,Ostrowski-type inequalities ,Hermite–Hadamard-type inequalities ,Mathematics ,QA1-939 - Abstract
The q-symmetric analogues of Hölder, Minkowski, and power mean inequalities are presented in this paper. The obtained inequalities along with a Montgomery identity involving q-symmetric integrals are used to extend some Ostrowski-type inequalities. The q-symmetric derivatives of the functions involved in these Ostrowski-type inequalities are convex or s-convex. Moreover, some Hermite–Hadamard inequalities for convex functions as well as for s-convex functions are also acquired with the help of q-symmetric calculus in the present work. Some examples are included to support the effectiveness of the proved results.
- Published
- 2023
- Full Text
- View/download PDF
3. Multivariate Hardy and Littlewood inequalities on time scales
- Author
-
Ammara Nosheen, Aneela Nawaz, Khuram Ali Khan, and Khalid Mahmood Awan
- Subjects
Hardy and Littlewood inequalities ,Wirtinger type inequality ,Time scales calculus ,Mathematics ,QA1-939 - Abstract
In the paper we extend some Hardy and Littlewood type inequalities on time scales for the function of n variables. Special cases of obtained results include generalized Wirtinger, Hardy and Littlewood type inequalities.
- Published
- 2020
- Full Text
- View/download PDF
4. New Developments on Ostrowski Type Inequalities via q-Fractional Integrals Involving s-Convex Functions
- Author
-
Xiaoming Wang, Khuram Ali Khan, Allah Ditta, Ammara Nosheen, Khalid Mahmood Awan, and Rostin Matendo Mabela
- Subjects
Mathematics ,QA1-939 - Abstract
In the present paper, q-fractional integral operators are used to construct quantum analogue of Ostrowski type inequalities for the class of s-convex functions. The limiting cases include the nonfractional existing cases from literature. Specially, Ostrowski type inequalities for q-integrals and Ostrowski type inequalities for convex functions are deduced.
- Published
- 2022
- Full Text
- View/download PDF
5. Ostrowski Type Inequalities for s-Convex Functions via q-Integrals
- Author
-
Khuram Ali Khan, Allah Ditta, Ammara Nosheen, Khalid Mahmood Awan, and Rostin Matendo Mabela
- Subjects
Mathematics ,QA1-939 - Abstract
The new outcomes of the present paper are q-analogues (q stands for quantum calculus) of Hermite-Hadamard type inequality, Montgomery identity, and Ostrowski type inequalities for s-convex mappings. Some new bounds of Ostrowski type functionals are obtained by using Hölder, Minkowski, and power mean inequalities via quantum calculus. Special cases of new results include existing results from the literature.
- Published
- 2022
- Full Text
- View/download PDF
6. Bivariate Montgomery identity for alpha diamond integrals
- Author
-
Masud Ahmad, Khalid Mahmood Awan, Shehzad Hameed, Khuram Ali Khan, and Ammara Nosheen
- Subjects
Time scales ,Montgomery identity ,Delta integrals ,Nabla integrals ,Alpha diamond integrals ,Mathematics ,QA1-939 - Abstract
Abstract In the paper, some variants of Montgomery identity with the help of delta and nabla integrals are established which are useful to produce Montgomery identity involving alpha diamond integrals for function of two variables. The aforementioned identity is discussed in discrete, continuous, quantum calculus as well and employed to obtain Ostrowski type inequality for monotonically increasing function with respect to both parameters.
- Published
- 2019
- Full Text
- View/download PDF
7. In-Vehicle Cognitive Route Decision Using Fuzzy Modeling and Artificial Neural Network
- Author
-
Yousaf Saeed, Khalil Ahmed, Mahdi Zareei, Asim Zeb, Cesar Vargas-Rosales, and Khalid Mahmood Awan
- Subjects
VANET ,cognition ,fuzzy model ,artificial neural network ,vehicle route ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The departments of transportation worldwide are facing various challenges despite introducing and incorporating various vehicular features. One of such challenges is to make vehicles autonomous, intelligent, and capable of self-learning to evolve their knowledge repository. In this paper, human cognition is proposed to be implemented in vehicles so that they can perform human-like decisions. Therefore, the process of vehicular route decision is debated cognitively in order to provide route information intelligently. The in-vehicle routes provided by the GPS are not optimal and lack on-demand user requirements. GPS connectivity issues, in certain conditions, make it difficult for vehicles to take real-time decisions. This leads to the idea of self-decision by the vehicle controller. We propose a cognitive framework for vehicles to make self-decisions that use cognitive memory for storing route experiences. The framework strengthens the existing in-vehicle route finding capability and its provision in a more realistic manner. The user is provided with all available route-related information that is required for the journey. In addition, the route episodes are learned, stored, and accessed inside the cognitive memory for an optimal route provision. The vehicle learns about the routes and matures with route-experience by itself with the passage of time. In simulations, fuzzy modeling is used to validate the impact of cognitive parameters over static/conventional parameters. Moreover, artificial neural networks are used to minimize the error rate in learning to achieve cognitive route decisions. The proposed in-vehicle cognitive framework outperforms the existing route provision system that is inadequate and provokes the user's anxieties during driving. Besides, the proposed scheme gradually gets mature in delivering optimal as well as latest route-related information.
- Published
- 2019
- Full Text
- View/download PDF
8. Multivariate Dynamic Sneak-Out Inequalities on Time Scales
- Author
-
Ammara Nosheen, Aneeqa Aslam, Khuram Ali Khan, Khalid Mahmood Awan, and Hamid Reza Moradi
- Subjects
Mathematics ,QA1-939 - Abstract
In this study, we extend some “sneak-out” inequalities on time scales for a function depending on more than one parameter. The results are proved by using the induction principle and time scale version of Minkowski inequalities. In seeking applications, these inequalities are discussed in classical, discrete, and quantum calculus.
- Published
- 2021
- Full Text
- View/download PDF
9. Extensions of Ostrowski Type Inequalities via h-Integrals and s-Convexity
- Author
-
Khuram Ali Khan, Khalid Mahmood Awan, Allah Ditta, Ammara Nosheen, and Rostin Mabela Matendo
- Subjects
Mathematics ,QA1-939 - Abstract
In this paper, Hölder, Minkowski, and power mean inequalities are used to establish Ostrowski type inequalities for s-convex functions via h-calculus. The new inequalities are generalized versions of Ostrowski type inequalities available in literature.
- Published
- 2021
- Full Text
- View/download PDF
10. Some Dynamic Inequalities via Diamond Integrals for Function of Several Variables
- Author
-
Muhammad Bilal, Khuram Ali Khan, Hijaz Ahmad, Ammara Nosheen, Khalid Mahmood Awan, Sameh Askar, and Mosleh Alharthi
- Subjects
time scale calculus ,diamond integrals ,Jensen inequality ,hardy inequality ,Thermodynamics ,QC310.15-319 ,Mathematics ,QA1-939 ,Analysis ,QA299.6-433 - Abstract
In this paper, Jensen’s inequality and Fubini’s Theorem are extended for the function of several variables via diamond integrals of time scale calculus. These extensions are used to generalize Hardy-type inequalities with general kernels via diamond integrals for the function of several variables. Some Hardy Hilbert and Polya Knop type inequalities are also discussed as special cases. Classical and new inequalities are deduced from the main results using special kernels and particular time scales.
- Published
- 2021
- Full Text
- View/download PDF
11. A Proposed IoT-Enabled Smart Waste Bin Management System and Efficient Route Selection
- Author
-
Asim Zeb, Qurban Ali, Muhammad Qaiser Saleem, Khalid Mahmood Awan, Ali Saeed Alowayr, Jamal Uddin, Saleem Iqbal, and Faisal Bashir
- Subjects
Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Internet of Things (IoT) is an emerging technology that offers promising solutions to modernize the traditional systems. It accords promising result in crystallizing smart cities, smart homes, smart industries, and smart environment. This article presents the smart waste management architecture for smart cities and efficient routing technique considering least delay for the architecture. In wireless sensor networks, end-to-end delay is one of the important Quality of Services (QoS) parameter to overcome delay in data communication. In this article, we consider end-to-end delay minimization in smart waste management application. The term “end-to-end delay” is defined as the total time taken by a single packet to reach the destination node. The proposed scheme considers the interference level, the length of the routing path, and the number of hops along the path. The simulation results show that the proposed scheme outperforms current schemes.
- Published
- 2019
- Full Text
- View/download PDF
12. Barrier Access Control Using Sensors Platform and Vehicle License Plate Characters Recognition
- Author
-
Farman Ullah, Hafeez Anwar, Iram Shahzadi, Ata Ur Rehman, Shizra Mehmood, Sania Niaz, Khalid Mahmood Awan, Ajmal Khan, and Daehan Kwak
- Subjects
barrier control ,sensors platform ,vehicle detection ,license plate recognition ,raspberry-pi ,features extraction ,machine learning algorithms ,Chemical technology ,TP1-1185 - Abstract
The paper proposes a sensors platform to control a barrier that is installed for vehicles entrance. This platform is automatized by image-based license plate recognition of the vehicle. However, in situations where standardized license plates are not used, such image-based recognition becomes non-trivial and challenging due to the variations in license plate background, fonts and deformations. The proposed method first detects the approaching vehicle via ultrasonic sensors and, at the same time, captures its image via a camera installed along with the barrier. From this image, the license plate is automatically extracted and further processed to segment the license plate characters. Finally, these characters are recognized with the help of a standard optical character recognition (OCR) pipeline. The evaluation of the proposed system shows an accuracy of 98% for license plates extraction, 96% for character segmentation and 93% for character recognition.
- Published
- 2019
- Full Text
- View/download PDF
13. Design of evolutionary finite difference solver for numerical treatment of computer virus propagation with countermeasures model.
- Author
-
Muhammad Asif Zahoor Raja, Ammara Mehmood, Sadia Ashraf, Khalid Mahmood Awan, and Peng Shi 0001
- Published
- 2022
- Full Text
- View/download PDF
14. Congestion aware reward based scheme based on delay tolerant networks for emergency evacuation in 6G-based internet of things networks.
- Author
-
Khalid Mahmood Awan, Madeeha Tariq, Kashif Naseer Qureshi, Thomas Newe, and Gwanggil Jeon
- Published
- 2023
- Full Text
- View/download PDF
15. Multi-Class Skin Cancer Detection and Classification Using Hybrid Features Extraction Techniques.
- Author
-
Mahnoor Masood, Khalid Iqbal, Qasim Khan, Ali Saeed Alowayr, Khalid Mahmood Awan, Muhammad Qaiser Saleem, and Elturabi Osman Ahmed Habib
- Published
- 2020
- Full Text
- View/download PDF
16. Toward Generating Human-Centered Video Annotations.
- Author
-
Aniqa Dilawari, Muhammad Usman Ghani Khan, Zahoor-Ur Rehman, Khalid Mahmood Awan, Irfan Mehmood, and Seungmin Rho
- Published
- 2020
- Full Text
- View/download PDF
17. Certificateless Proxy Reencryption Scheme (CPRES) Based on Hyperelliptic Curve for Access Control in Content-Centric Network (CCN).
- Author
-
Zahid Ullah, Asim Zeb, Insaf Ullah, Khalid Mahmood Awan, Yousaf Saeed, Muhammad Irfan Uddin, Mahmoud Ahmad Al-Khasawneh, Marwan Mahmoud, and Mahdi Zareei
- Published
- 2020
- Full Text
- View/download PDF
18. Energy-aware cluster-based routing optimization for WSNs in the livestock industry.
- Author
-
Khalid Mahmood Awan, Hafiz Husnain Raza Sherazi, Ahmad Ali, Razi Iqbal, Zuhaib Ashfaq Khan, and Mithun Mukherjee 0001
- Published
- 2022
- Full Text
- View/download PDF
19. Energy efficient cluster based routing algorithm for wireless sensors networks.
- Author
-
Khalid Mahmood Awan, Ahmad Ali, Farhan Aadil, and Kashif Naseer Qureshi
- Published
- 2018
- Full Text
- View/download PDF
20. Underwater Wireless Sensor Networks: A Review of Recent Issues and Challenges.
- Author
-
Khalid Mahmood Awan, Peer Azmat Shah, Khalid Iqbal, Saira Andleeb Gillani, Waqas Ahmad, and Yunyoung Nam
- Published
- 2019
- Full Text
- View/download PDF
21. Machine learning-assisted signature and heuristic-based detection of malwares in Android devices.
- Author
-
Zahoor-Ur Rehman, Sidra Nasim Khan, Khan Muhammad 0001, Jong Weon Lee 0002, Zhihan Lv, Sung Wook Baik, Peer Azmat Shah, Khalid Mahmood Awan, and Irfan Mehmood
- Published
- 2018
- Full Text
- View/download PDF
22. A Route Optimized Distributed IP-Based Mobility Management Protocol for Seamless Handoff across Wireless Mesh Networks.
- Author
-
Peer Azmat Shah, Khalid Mahmood Awan, Zahoor-Ur Rehman, Khalid Iqbal, Farhan Aadil, Khan Muhammad 0001, Irfan Mehmood, and Sung Wook Baik
- Published
- 2018
- Full Text
- View/download PDF
23. Hardy-Leindler Type Inequalities for Multiple Integrals on Time Scales
- Author
-
Ammara Nosheen, Khalid Mahmood Awan, Khuram Ali Khan, Hijaz Ahmad, and Atia Tul Qadeer
- Subjects
General Mathematics - Abstract
Hardy-Leindler type inequalities and their converses for multiple integrals on time scales are proved by using Fubini’s theorem and induction principle. Some generalized versions of Hardy, Wirtinger and Leindler inequalities in both continuous and discrete cases are also derived in seek of applications.
- Published
- 2023
- Full Text
- View/download PDF
24. Design of evolutionary finite difference solver for numerical treatment of computer virus propagation with countermeasures model
- Author
-
Peng Shi, Khalid Mahmood Awan, Ammara Mehmood, Muhammad Asif Zahoor Raja, and Sadia Ashraf
- Subjects
Numerical Analysis ,General Computer Science ,Discretization ,Computational complexity theory ,business.industry ,Computer science ,Applied Mathematics ,Finite difference ,Solver ,Residual ,Evolutionary computation ,Theoretical Computer Science ,Nonlinear system ,Modeling and Simulation ,Local search (optimization) ,business ,Algorithm - Abstract
In the present study, a novel application of integrated evolutionary computing paradigm is presented for the analysis of nonlinear systems of differential equations representing the dynamics of virus propagation model in computer networks by exploiting the discretization strength of finite difference procedure, global search efficacy of genetic algorithms (GAs) aided with interior-point method (IPM) as efficient local search mechanism. Residual error based cost function is constructed by utilizing the effectiveness of approximation in mean square error sense and combined strength of GA-IPM is used as a viable optimization mechanism to find the solution of the problem. The proposed scheme is implemented for dynamical analysis of the model in terms of susceptible-infected and protected computer nodes by varying the probabilities of infections, countermeasures, curing and immunity while keeping connected and disconnected rates fixed. The statistical performance evaluated by means of deviations from reference Adams numerical results are practiced viably through performance metrics of accuracy and computational complexity to demonstrate the worth of integrated stochastic solver.
- Published
- 2022
- Full Text
- View/download PDF
25. Multi-Class Skin Cancer Detection and Classification Using Hybrid Features Extraction Techniques
- Author
-
Ali Saeed Alowayr, Qasim S. Khan, Khalid Mahmood Awan, Elturabi Osman Ahmed Habib, Mahnoor Masood, Muhammad Qaiser Saleem, and Khalid Iqbal
- Subjects
integumentary system ,Computer science ,business.industry ,Extraction (chemistry) ,medicine ,Health Informatics ,Radiology, Nuclear Medicine and imaging ,Pattern recognition ,Artificial intelligence ,Skin cancer ,business ,medicine.disease ,Class (biology) - Abstract
Skin cancer is measured as one of the fatal types of cancer diseases in humans, among numerous kinds of malignancy. Current diagnostic classifications are lacking in finding an effective treatment. The effective and early stage treatment of skin disease can increase the survival rate of patients. Substantial investigative work has been developed to improve computer aided diagnosis system to detect cancer at early stage. However, early detection of skin cancer still requires better accuracy through experiment on digital skin lesion images as a multiclass classification, rather than using biopsy methods. This paper presents an intelligent framework to detect and classify four types of skin cancer. Before classification, noise removal from skin lesion is performed by gaussian filter. Textural and colour features are extracted from skin lesion to detect and classify cancer into four types. Support vector Machine is trained to classify Melanoma, Nevus, Basal and Squamous skin cancer types. Extensive experiments are performed on standard benchmark skin cancer images dataset with an improvement in accuracy of 92.41% after comparison with the well-known methods.
- Published
- 2020
- Full Text
- View/download PDF
26. Extension of Montgomery identity via Taylor polynomial on time scales
- Author
-
Ammara Nosheen, Khalid Mahmood Awan, Khuram Ali Khan, and Sumaiya Malik
- Subjects
Algebra ,symbols.namesake ,General Mathematics ,Identity (philosophy) ,media_common.quotation_subject ,Taylor series ,symbols ,Extension (predicate logic) ,Mathematics ,media_common - Published
- 2020
- Full Text
- View/download PDF
27. Some Dynamic Inequalities via Diamond Integrals for Function of Several Variables
- Author
-
Hijaz Ahmad, Sameh S. Askar, Khalid Mahmood Awan, Mosleh Alharthi, Ammara Nosheen, Muhammad Bilal, and Khuram Ali Khan
- Subjects
Statistics and Probability ,Pure mathematics ,QA299.6-433 ,Inequality ,media_common.quotation_subject ,Jensen inequality ,Diamond ,Statistical and Nonlinear Physics ,Function (mathematics) ,Time-scale calculus ,diamond integrals ,engineering.material ,Type (model theory) ,hardy inequality ,Fubini's theorem ,engineering ,time scale calculus ,QA1-939 ,Thermodynamics ,QC310.15-319 ,Jensen's inequality ,Mathematics ,Analysis ,media_common - Abstract
In this paper, Jensen’s inequality and Fubini’s Theorem are extended for the function of several variables via diamond integrals of time scale calculus. These extensions are used to generalize Hardy-type inequalities with general kernels via diamond integrals for the function of several variables. Some Hardy Hilbert and Polya Knop type inequalities are also discussed as special cases. Classical and new inequalities are deduced from the main results using special kernels and particular time scales.
- Published
- 2021
28. Multivariate Hardy and Littlewood inequalities on time scales
- Author
-
Khuram Ali Khan, Ammara Nosheen, Aneela Nawaz, and Khalid Mahmood Awan
- Subjects
Pure mathematics ,Multivariate statistics ,Inequality ,General Mathematics ,media_common.quotation_subject ,010102 general mathematics ,Function (mathematics) ,Type (model theory) ,01 natural sciences ,0103 physical sciences ,0101 mathematics ,010303 astronomy & astrophysics ,Mathematics ,media_common - Abstract
In the paper we extend some Hardy and Littlewood type inequalities on time scales for the function of n variables. Special cases of obtained results include generalized Wirtinger, Hardy and Littlewood type inequalities.
- Published
- 2019
- Full Text
- View/download PDF
29. An extension of Petrović’s inequality for \(h−\)convex (\(h−\)concave) functions in plane
- Author
-
Atiq Ur Rehman, Wasim Iqbal, Ghulam Farid, and Khalid Mahmood Awan
- Subjects
Inequality ,Concave function ,Chemistry ,petrović’s inequality ,media_common.quotation_subject ,lcsh:Mathematics ,h − convex functions on coordinates ,Regular polygon ,Extension (predicate logic) ,lcsh:QA1-939 ,Combinatorics ,h − convex functions ,In plane ,h − concave functions ,media_common - Abstract
In this paper, Petrović’s inequality is generalized for \(h−\)convex functions on coordinates with the condition that \(h\) is supermultiplicative. In the case, when \(h\) is submultiplicative, Petrović’s inequality is generalized for \(h−\) concave functions. Also particular cases for \(P−\) function, Godunova-Levin functions, \(s−\) Godunova-Levin functions and \(s−\) convex functions has been discussed.
- Published
- 2019
30. A Congestion Aware Route Suggestion Protocol for Traffic Management in Internet of Vehicles
- Author
-
Khalid Mahmood Awan, Zuhaib Ashfaq Khan, Saleem Iqbal, Kashif Sattar, Hafiz Husnain Raza Sherazi, and Muhammad Jamal Ahmed
- Subjects
Multidisciplinary ,business.industry ,Wireless network ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,010102 general mathematics ,01 natural sciences ,Travel time ,Smart transportation ,Traffic congestion ,Distraction ,The Internet ,0101 mathematics ,business ,Protocol (object-oriented programming) ,Urban environment ,Computer network - Abstract
Nowadays, both the modern and developing countries are planning to deploy Internet of Vehicles for smart transportation systems to face the traffic congestion problems. Shifting from current road conditions to smart ones is a real challenge where all the vehicles and road infrastructure are not equipped with wireless network interfaces. The urban environment is more congested than highway scenarios and has more issues of delay and travel time. Various types of route suggestion protocols have been proposed where most of them consider smart vehicles which are equipped with smart and intelligent communication devices. The most of existing schemes have not considered non-equipped vehicles which have a major cause of traffic congestion. This paper presents a route suggestion protocol to suggest an optimal congestion aware route in the network. Equipped and non-equipped vehicles are taking into account for congestion index formulation along with driving distraction factors. Simulation results indicated the greater performance of proposed protocol and reduce the travel time effectively when works with IoV as compared to traditional route suggestion protocols.
- Published
- 2019
- Full Text
- View/download PDF
31. Toward Generating Human-Centered Video Annotations
- Author
-
Khalid Mahmood Awan, Aniqa Dilawari, Zahoor ur Rehman, M. Usman Ghani Khan, Seungmin Rho, and Irfan Mehmood
- Subjects
0209 industrial biotechnology ,business.industry ,Computer science ,Applied Mathematics ,Deep learning ,Video sequence ,02 engineering and technology ,Task (project management) ,Annotation ,020901 industrial engineering & automation ,Manual annotation ,Minimum bounding box ,Signal Processing ,Computer vision algorithms ,Computer vision ,Artificial intelligence ,business - Abstract
In the past few decades, research has been carried out to automatically find humans in a video sequence. Automatically detecting humans in videos is gaining interest for numerous applications such as driver assistance system, security, people counting, human gait characterization, video annotations, retrieval, or crowd flow analysis. Manual annotation of a video is a time-consuming task that involves human annotators which varying biases. In this paper, we have presented three computer vision algorithms (contour-based, HOG-based and SURF-based) and proposed a deep learning technique that automatically extracts spatiotemporal annotations of human and represents it by a bounding box. We have performed experiments and the accuracy obtained for each method is 86%, 92.5%, 94%, and 95.5%, respectively. Results show that not only annotation accuracy has increased but the human effort has reduced with respect to manual annotations. We have also introduced a new dataset ASSVS_KICS which is captured through a high-quality stationary camera and contain scenarios based on our community for video surveillance research.
- Published
- 2019
- Full Text
- View/download PDF
32. In-Vehicle Cognitive Route Decision Using Fuzzy Modeling and Artificial Neural Network
- Author
-
Cesar Vargas-Rosales, Khalil Ahmed, Khalid Mahmood Awan, Asim Zeb, Mahdi Zareei, and Yousaf Saeed
- Subjects
Scheme (programming language) ,cognition ,VANET ,General Computer Science ,Artificial neural network ,Computer science ,business.industry ,Process (engineering) ,Distributed computing ,General Engineering ,Cognition ,User requirements document ,Fuzzy logic ,vehicle route ,Control theory ,Global Positioning System ,General Materials Science ,fuzzy model ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,computer ,lcsh:TK1-9971 ,artificial neural network ,computer.programming_language - Abstract
The departments of transportation worldwide are facing various challenges despite introducing and incorporating various vehicular features. One of such challenges is to make vehicles autonomous, intelligent, and capable of self-learning to evolve their knowledge repository. In this paper, human cognition is proposed to be implemented in vehicles so that they can perform human-like decisions. Therefore, the process of vehicular route decision is debated cognitively in order to provide route information intelligently. The in-vehicle routes provided by the GPS are not optimal and lack on-demand user requirements. GPS connectivity issues, in certain conditions, make it difficult for vehicles to take real-time decisions. This leads to the idea of self-decision by the vehicle controller. We propose a cognitive framework for vehicles to make self-decisions that use cognitive memory for storing route experiences. The framework strengthens the existing in-vehicle route finding capability and its provision in a more realistic manner. The user is provided with all available route-related information that is required for the journey. In addition, the route episodes are learned, stored, and accessed inside the cognitive memory for an optimal route provision. The vehicle learns about the routes and matures with route-experience by itself with the passage of time. In simulations, fuzzy modeling is used to validate the impact of cognitive parameters over static/conventional parameters. Moreover, artificial neural networks are used to minimize the error rate in learning to achieve cognitive route decisions. The proposed in-vehicle cognitive framework outperforms the existing route provision system that is inadequate and provokes the user's anxieties during driving. Besides, the proposed scheme gradually gets mature in delivering optimal as well as latest route-related information.
- Published
- 2019
33. A Data Augmentation-Based Framework to Handle Class Imbalance Problem for Alzheimer’s Stage Detection
- Author
-
Khalid Mahmood Awan, Irfan Mehmood, Muazzam Maqsood, Oh-Young Song, Sitara Afzal, Umair Khan, Farhan Aadil, and Faria Nazir
- Subjects
General Computer Science ,Computer science ,02 engineering and technology ,Disease ,Machine learning ,computer.software_genre ,03 medical and health sciences ,Class imbalance ,0302 clinical medicine ,Open research ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,Dementia ,General Materials Science ,Stage (cooking) ,business.industry ,Deep learning ,General Engineering ,020207 software engineering ,medicine.disease ,Artificial intelligence ,Alzheimer's disease ,business ,Transfer of learning ,computer ,030217 neurology & neurosurgery - Abstract
Alzheimer's Disease (AD) is the most common form of dementia. It gradually increases from mild stage to severe, affecting the ability to perform common daily tasks without assistance. It is a neurodegenerative illness, presently having no specified cure. Computer-Aided Diagnostic Systems have played an important role to help physicians to identify AD. However, the diagnosis of AD into its four stages; No Dementia, Very Mild Dementia, Mild Dementia, and Moderate Dementia remains an open research area. Deep learning assisted computer-aided solutions are proved to be more useful because of their high accuracy. However, the most common problem with deep learning architecture is that large training data is required. Furthermore, the samples should be evenly distributed among the classes to avoid the class imbalance problem. The publicly available dataset (OASIS) has serious class imbalance problem. In this research, we employed a transfer learning-based technique using data augmentation for 3D Magnetic Resonance Imaging (MRI) views from OASIS dataset. The accuracy of the proposed model utilizing a single view of the brain MRI is 98.41% while using 3D-views is 95.11%. The proposed system outperformed the existing techniques for Alzheimer disease stages.
- Published
- 2019
- Full Text
- View/download PDF
34. Multivariate Dynamic Sneak-Out Inequalities on Time Scales
- Author
-
Aneeqa Aslam, Hamid Reza Moradi, Khuram Ali Khan, Ammara Nosheen, and Khalid Mahmood Awan
- Subjects
Multivariate statistics ,Article Subject ,Inequality ,Scale (ratio) ,General Mathematics ,media_common.quotation_subject ,Function (mathematics) ,Quantum calculus ,Minkowski space ,QA1-939 ,Applied mathematics ,Mathematics ,media_common - Abstract
In this study, we extend some “sneak-out” inequalities on time scales for a function depending on more than one parameter. The results are proved by using the induction principle and time scale version of Minkowski inequalities. In seeking applications, these inequalities are discussed in classical, discrete, and quantum calculus.
- Published
- 2021
35. Smart Handoff Technique for Internet of Vehicles Communication using Dynamic Edge-Backup Node
- Author
-
Ali Safaa Sadiq, Malik Nadeem, Khalid Mahmood Awan, Abdullah Alghushami, Khaled M. Rabie, and Imran Khan
- Subjects
ComputingMethodologies_SIMULATIONANDMODELING ,Computer Networks and Communications ,Computer science ,Wireless ad hoc network ,Mobile computing ,lcsh:TK7800-8360 ,02 engineering and technology ,edge computing ,0203 mechanical engineering ,Backup ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,cluster ,Edge computing ,traffic ,Vehicular ad hoc network ,business.industry ,Node (networking) ,vehicular ,lcsh:Electronics ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Network mobility ,020206 networking & telecommunications ,020302 automobile design & engineering ,handoff ,mobility ,Handover ,Hardware and Architecture ,Control and Systems Engineering ,Signal Processing ,The Internet ,business ,Computer network - Abstract
A vehicular adhoc network (VANET) recently emerged in the the Internet of Vehicles (IoV), it involves the computational processing of moving vehicles. Nowadays, IoV has turned into an interesting field of research as vehicles can be equipped with processors, sensors, and communication devices. IoV gives rise to handoff, which involves changing the connection points during the online communication session. This presents a major challenge for which many standardized solutions are recommended. Although there are various proposed techniques and methods to support seamless handover procedure in IoV, there are still some open research issues, such as unavoidable packet loss rate and latency. On the other hand, the emerged concept of edge mobile computing has gained crucial attention by researchers that could help in reducing computational complexities and decreasing communication delay. Hence, this paper specifically studies the handoff challenges in cluster based handoff using new concept of dynamic edge-backup node. The outcomes are evaluated and contrasted with the network mobility method, our proposed technique, and other cluster-based technologies. The results show that coherence in communication during the handoff method can be upgraded, enhanced, and improved utilizing the proposed technique.
- Published
- 2020
36. Certificateless Proxy Reencryption Scheme (CPRES) Based on Hyperelliptic Curve for Access Control in Content-Centric Network (CCN)
- Author
-
Mahmoud Ahmad Al-Khasawneh, Mahdi Zareei, M. Irfan Uddin, Insaf Ullah, Khalid Mahmood Awan, Marwan Mahmoud, Asim Zeb, Zahid Ullah, and Yousaf Saeed
- Subjects
Scheme (programming language) ,Article Subject ,Computer Networks and Communications ,business.industry ,Computer science ,020206 networking & telecommunications ,Access control ,02 engineering and technology ,TK5101-6720 ,Encryption ,Database-centric architecture ,Computer Science Applications ,0202 electrical engineering, electronic engineering, information engineering ,Telecommunication ,020201 artificial intelligence & image processing ,The Internet ,Routing (electronic design automation) ,business ,Host (network) ,Hyperelliptic curve ,computer ,Computer network ,computer.programming_language - Abstract
Information-centric networking is the developing model envisioned by an increasing body of the data communication research community, which shifts the current network paradigm from host centric to data centric, well-known to information-centric networking (ICN). Further, the ICN adopts different types of architectures to extend the growth of the Internet infrastructure, e.g., name-based routing and in-network caching. As a result, the data can be easily routed and accessed within the network. However, when the producer generates contents for authentic consumers, then it is necessary for him/her to have a technique for content confidentiality, privacy, and access control. To provide the previously mentioned services, this paper presents a certificateless proxy reencryption scheme (CPRES) based on the hyperelliptic curve for access control in the content-centric network (CCN). Using certificateless PRE, the power of the key generation center (KGC) is limited to only the generation of partial keys to secure the access to the content. With the help of these partial keys, the producer further calculates keys for encryption and reencryption process. The simulation results show that the proposed scheme provides secure access to content during end-to-end communication. Moreover, the proposed CPRES scheme outperforms in terms of low computational energy and efficient utilization of communication bandwidth.
- Published
- 2020
37. Machine learning-assisted signature and heuristic-based detection of malwares in Android devices
- Author
-
Irfan Mehmood, Peer Azmat Shah, Khalid Mahmood Awan, Sidra Khan, Zahoor-ur Rehman, Jong Weon Lee, Khan Muhammad, Zhihan Lv, and Sung Wook Baik
- Subjects
Reverse engineering ,General Computer Science ,business.industry ,Computer science ,Decision tree ,020207 software engineering ,02 engineering and technology ,computer.software_genre ,Machine learning ,Support vector machine ,ComputingMethodologies_PATTERNRECOGNITION ,Control and Systems Engineering ,0202 electrical engineering, electronic engineering, information engineering ,Malware ,020201 artificial intelligence & image processing ,Artificial intelligence ,Electrical and Electronic Engineering ,Android (operating system) ,business ,computer - Abstract
Malware detection is an important factor in the security of the smart devices. However, currently utilized signature-based methods cannot provide accurate detection of zero-day attacks and polymorphic viruses. In this context, an efficient hybrid framework is presented for detection of malware in Android Apps. The proposed framework considers both signature and heuristic-based analysis for Android Apps. We have reverse engineered the Android Apps to extract manifest files, and binaries, and employed state-of-the-art machine learning algorithms to efficiently detect malwares. For this purpose, a rigorous set of experiments are performed using various classifiers such as SVM, Decision Tree, W-J48 and KNN. It has been observed that SVM in case of binaries and KNN in case of manifest.xml files are the most suitable options in robustly detecting the malware in Android devices. The proposed framework is tested on benchmark datasets and results show improved accuracy in malware detection.
- Published
- 2018
- Full Text
- View/download PDF
38. Optimum bandwidth allocation in wireless networks using differential evolution
- Author
-
Peer Azmat Shah, Zahoor-ur-Rehman, Khalid Mahmood Awan, and Zahid Afzal
- Subjects
Serviceability (computer) ,General Computer Science ,Wireless network ,Computer science ,business.industry ,020209 energy ,Quality of service ,Evolutionary algorithm ,Particle swarm optimization ,020206 networking & telecommunications ,Computational intelligence ,02 engineering and technology ,Bandwidth allocation ,Differential evolution ,0202 electrical engineering, electronic engineering, information engineering ,business ,Computer network - Abstract
Wireless networking is experiencing a tremendous growth in new standards of communication and computer applications. Currently, wireless networks exist in various forms, providing different facilities. However, due to some limitations as compared with wired counterparts, wireless networks face several major challenges and one of them is optimum bandwidth allocation. The focus of optimum bandwidth allocation is to reduce the losses and satisfying quality of service (QoS) requirements. In wireless networks, the term bandwidth allocation is attributed as the distribution of bandwidth resources among different users, which affects the serviceability of the entire system. Though many studies related to bandwidth allocation have been reported already, however, only sub-optimal solutions have been provided so far. In this research, we proposed to use the differential evolution (DE) algorithm to allocate bandwidth through a bandwidth reservation scheme in the Cellular IP network, in order to improve the QoS at an acceptable level. DE belongs to a class of evolutionary algorithms (EA), like particle swarm optimization and genetic algorithm. A DE-based method is used which looks for any free bandwidth in the cell or in adjacent cells and provides it to the cell where required. In case, it fails to find the free available bandwidth then it will search the bandwidth which is standby for non real-time users and allocates it to the real-time users that will help in improving the QoS in terms of connection/call dropping probability for real-time users. Simulation results show that the proposed method performs better as compared to previously used EA models for bandwidth allocation.
- Published
- 2018
- Full Text
- View/download PDF
39. A Route Optimized Distributed IP-Based Mobility Management Protocol for Seamless Handoff across Wireless Mesh Networks
- Author
-
Farhan Aadil, Irfan Mehmood, Peer Azmat Shah, Khalid Iqbal, Khalid Mahmood Awan, Sung Wook Baik, Zahoor-ur-Rehman, and Khan Muhammad
- Subjects
business.product_category ,Access network ,Wireless mesh network ,Computer Networks and Communications ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,02 engineering and technology ,Handover ,Hardware and Architecture ,Packet loss ,0202 electrical engineering, electronic engineering, information engineering ,Internet access ,Overhead (computing) ,020201 artificial intelligence & image processing ,Single point of failure ,business ,Mobility management ,Software ,Information Systems ,Computer network - Abstract
A Wireless Mesh Network (WMN) can provide Internet connectivity to end users through heterogenous access network technologies. However, the mobility of mobile nodes across these access networks in WMNs results in service disruption. Existing mobility management protocols are designed for single hop networks and are centralized in nature. A Distributed IP-based Mobility Management Protocol (DIMMP) is proposed in this paper that provides seamless mobility with service continuation for mobile nodes when they roam across WMNs. Instead of relying on a centralized mobility anchor, the mobility functionality is distributed at multiple nodes in the WMN, in order to reduce the chances of potential single point of failure. The proposed protocol manages both types of mobilities i.e. intra-WMN and inter-WMN and uses a new enhanced route optimization procedure. Simulation results show that this work has contributed by improving the performance of handoff procedure with respect to handoff latency, packet loss and signalling overhead, as compared to the existing protocols.
- Published
- 2018
- Full Text
- View/download PDF
40. Fuzzy Logic Based Enhanced AOMDV with Link Status Classification for Efficient Multi-Path Routing in Multi-Hop Wireless Networks
- Author
-
Ghadah Aldabbagh, Khalid Mahmood Awan, Farman Marwat, Halabi Hasbullah, Farhan Aadil, and Peer Azmat Shah
- Subjects
Computer science ,Wireless network ,business.industry ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,010401 analytical chemistry ,020206 networking & telecommunications ,02 engineering and technology ,General Chemistry ,Condensed Matter Physics ,01 natural sciences ,Fuzzy logic ,0104 chemical sciences ,Hop (networking) ,Computational Mathematics ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Multi path routing ,General Materials Science ,Electrical and Electronic Engineering ,business ,Computer network - Abstract
Nodes in a multi-hop wireless network rely on each other to maintain network connectivity. A primary design objective of these networks is to eliminate or minimize the unavailability of network at some point. However, the movement of nodes creates service disruption and delay as path failure detection and re-establishment consume considerable amount of time. Existing solutions for link classification and prediction operate on discrete values resulting in performance degradation. This problem can best be modelled using fuzzy logic. This work presents a new fuzzy logic based link status classification mechanism for the use with multipath routing protocols in multi-hop wireless networks. The new Enhanced Adhoc On-demand Multipath Distance Vector (eAOMDV) uses fuzzy logic to classify the link status as active, about-to-break or broken. On the basis of fuzzy input parameters RSSI, velocity, distance and bit error rate, the fuzzy based classification mechanism predicts in advance that a particular link, on the active path between the sender and receiver, is about-to-break and helps the reactive multipath routing protocol to start the rerouting operation, thus minimizing the service disruption time, route discovery frequency, end-to-end delay and the packet loss.
- Published
- 2017
- Full Text
- View/download PDF
41. Energy‐aware cluster‐based routing optimization for WSNs in the livestock industry
- Author
-
Hafiz Husnain Raza Sherazi, Mithun Mukherjee, Khalid Mahmood Awan, Ahmad Ali, Zohaib Khan, and Razi Iqbal
- Subjects
Computer science ,business.industry ,Livestock ,Electrical and Electronic Engineering ,Routing (electronic design automation) ,business ,Energy (signal processing) ,Cluster based ,Computer network - Published
- 2019
- Full Text
- View/download PDF
42. RCER: Reliable Cluster-based Energy-aware Routing protocol for heterogeneous Wireless Sensor Networks
- Author
-
Osama E. Sheta, Naveed Islam, Khalid Mahmood Awan, Muhammad Qaisar Saleem, Naveed Abbas, Waheed Ur Rehman, Tabinda Salam, and Khalid Haseeb
- Subjects
Routing protocol ,Computer and Information Sciences ,Research Validity ,Time Factors ,Science ,Political Science ,Social Sciences ,02 engineering and technology ,Round-trip delay time ,Elections ,Research and Analysis Methods ,01 natural sciences ,Computer Communication Networks ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,Cluster Analysis ,Centrality ,Damage Mechanics ,Multidisciplinary ,business.industry ,Physics ,010401 analytical chemistry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Reproducibility of Results ,Correction ,Classical Mechanics ,020206 networking & telecommunications ,Research Assessment ,0104 chemical sciences ,Signaling Networks ,Data Reduction ,Physical Sciences ,Telecommunications ,Medicine ,Engineering and Technology ,Routing (electronic design automation) ,Wireless Sensor Networks ,business ,Information Technology ,Wireless sensor network ,Wireless Technology ,Algorithms ,Network Analysis ,Computer network ,Efficient energy use ,Research Article - Abstract
Nowadays, because of the unpredictable nature of sensor nodes, propagating sensory data raises significant research challenges in Wireless Sensor Networks (WSNs). Recently, different cluster-based solutions are designed for the improvement of network stability and lifetime, however, most of the energy efficient solutions are developed for homogeneous networks, and use only a distance parameter for the data communication. Although, some existing solutions attempted to improve the selection of next-hop based on energy factor, nevertheless, such solutions are unstable and lack a reducing data delivery interruption in overloaded links. The aim of our proposed solution is to develop Reliable Cluster-based Energy-aware Routing (RCER) protocol for heterogeneous WSN, which lengthen network lifetime and decreases routing cost. Our proposed RCER protocol make use of heterogeneity nodes with respect to their energy and comprises of two main phases; firstly, the network field is parted in geographical clusters to make the network more energy-efficient and secondly; RCER attempts optimum routing for improving the next-hop selection by considering residual-energy, hop-count and weighted value of Round Trip Time (RTT) factors. Moreover, based on computing the measurement of wireless links and nodes status, RCER restore routing paths and provides network reliability with improved data delivery performance. Simulation results demonstrate significant development of RCER protocol against their competing solutions.
- Published
- 2019
43. Bivariate Montgomery identity for alpha diamond integrals
- Author
-
Ammara Nosheen, Khalid Mahmood Awan, Masud Ahmad, Shehzad Hameed, and Khuram Ali Khan
- Subjects
Nabla integrals ,Pure mathematics ,Delta integrals ,Algebra and Number Theory ,Binary function ,lcsh:Mathematics ,Applied Mathematics ,010102 general mathematics ,Monotonic function ,Montgomery identity ,Function (mathematics) ,Quantum calculus ,Time scales ,lcsh:QA1-939 ,01 natural sciences ,010101 applied mathematics ,Identity (mathematics) ,Alpha (programming language) ,Ordinary differential equation ,Alpha diamond integrals ,Nabla symbol ,0101 mathematics ,Analysis ,Mathematics - Abstract
In the paper, some variants of Montgomery identity with the help of delta and nabla integrals are established which are useful to produce Montgomery identity involving alpha diamond integrals for function of two variables. The aforementioned identity is discussed in discrete, continuous, quantum calculus as well and employed to obtain Ostrowski type inequality for monotonically increasing function with respect to both parameters.
- Published
- 2019
- Full Text
- View/download PDF
44. Barrier Access Control Using Sensors Platform and Vehicle License Plate Characters Recognition
- Author
-
Ajmal Khan, Shizra Mehmood, Daehan Kwak, Khalid Mahmood Awan, Sania Niaz, Ata Ur Rehman, Hafeez Anwar, Iram Shahzadi, and Farman Ullah
- Subjects
barrier control ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Access control ,02 engineering and technology ,lcsh:Chemical technology ,computer.software_genre ,Biochemistry ,Article ,Analytical Chemistry ,machine learning algorithms ,0202 electrical engineering, electronic engineering, information engineering ,lcsh:TP1-1185 ,Segmentation ,Computer vision ,Electrical and Electronic Engineering ,Instrumentation ,License ,license plate recognition ,business.industry ,Character (computing) ,020207 software engineering ,Optical character recognition ,Pipeline (software) ,Atomic and Molecular Physics, and Optics ,features extraction ,raspberry-pi ,vehicle detection ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,computer ,sensors platform - Abstract
The paper proposes a sensors platform to control a barrier that is installed for vehicles entrance. This platform is automatized by image-based license plate recognition of the vehicle. However, in situations where standardized license plates are not used, such image-based recognition becomes non-trivial and challenging due to the variations in license plate background, fonts and deformations. The proposed method first detects the approaching vehicle via ultrasonic sensors and, at the same time, captures its image via a camera installed along with the barrier. From this image, the license plate is automatically extracted and further processed to segment the license plate characters. Finally, these characters are recognized with the help of a standard optical character recognition (OCR) pipeline. The evaluation of the proposed system shows an accuracy of 98% for license plates extraction, 96% for character segmentation and 93% for character recognition.
- Published
- 2019
45. A Heterogeneous IoV Architecture for Data Forwarding in Vehicle to Infrastructure Communication
- Author
-
Razi Iqbal, Khalid Mahmood Awan, Shahzad Rizwan, Zuhaib Ashfaq Khan, Muhammad Imran, Hafiz Husnain Raza Sherazi, and Elhoseny, Mohamed
- Subjects
Vehicular ad hoc network ,business.product_category ,computer_science ,Article Subject ,Computer Networks and Communications ,Computer science ,business.industry ,Wireless ad hoc network ,Quality of service ,020206 networking & telecommunications ,02 engineering and technology ,TK5101-6720 ,Computer Science Applications ,Wireless network interface controller ,0202 electrical engineering, electronic engineering, information engineering ,Internet access ,Telecommunication ,Wireless ,020201 artificial intelligence & image processing ,The Internet ,business ,Heterogeneous network ,Computer network - Abstract
The Internet of vehicles (IoV) is a newly emerged wave that converges Internet of things (IoT) into vehicular networks to benefit from ubiquitous Internet connectivity. Despite various research efforts, vehicular networks are still striving to achieve higher data rate, seamless connectivity, scalability, security, and improved quality of service, which are the key enablers for IoV. It becomes even more critical to investigate novel design architectures to accomplish efficient and reliable data forwarding when it comes to handling the emergency communication infrastructure in the presence of natural epidemics. The article proposes a heterogeneous network architecture incorporating multiple wireless interfaces (e.g., wireless access in vehicular environment (WAVE), long-range wireless fidelity (WiFi), and fourth generation/long-term evolution (4G/LTE)) installed on the on-board units, exploiting the radio over fiber approach to establish a context-aware network connectivity. This heterogeneous network architecture attempts to meet the requirements of pervasive connectivity for vehicular ad hoc networks (VANETs) to make them scalable and adaptable for IoV supporting a range of emergency services. The architecture employs the Best Interface Selection (BIS) algorithm to always ensure reliable communication through the best available wireless interface to support seamless connectivity required for efficient data forwarding in vehicle to infrastructure (V2I) communication successfully avoiding the single point of failure. Moreover, the simulation results clearly argue about the suitability of the proposed architecture in IoV environment coping with different types of applications against individual wireless technologies.
- Published
- 2019
46. A Proposed IoT-Enabled Smart Waste Bin Management System and Efficient Route Selection
- Author
-
Khalid Mahmood Awan, Qurban Ali, Jamal Uddin, Ali Saeed Alowayr, Asim Zeb, Muhammad Qaiser Saleem, Faisal Bashir, and Saleem Iqbal
- Subjects
Article Subject ,Computer Networks and Communications ,Network packet ,business.industry ,Computer science ,Quality of service ,Node (networking) ,020208 electrical & electronic engineering ,020206 networking & telecommunications ,02 engineering and technology ,lcsh:QA75.5-76.95 ,Path (graph theory) ,Management system ,0202 electrical engineering, electronic engineering, information engineering ,Smart environment ,lcsh:Electronic computers. Computer science ,Routing (electronic design automation) ,business ,Wireless sensor network ,Information Systems ,Computer network - Abstract
Internet of Things (IoT) is an emerging technology that offers promising solutions to modernize the traditional systems. It accords promising result in crystallizing smart cities, smart homes, smart industries, and smart environment. This article presents the smart waste management architecture for smart cities and efficient routing technique considering least delay for the architecture. In wireless sensor networks, end-to-end delay is one of the important Quality of Services (QoS) parameter to overcome delay in data communication. In this article, we consider end-to-end delay minimization in smart waste management application. The term “end-to-end delay” is defined as the total time taken by a single packet to reach the destination node. The proposed scheme considers the interference level, the length of the routing path, and the number of hops along the path. The simulation results show that the proposed scheme outperforms current schemes.
- Published
- 2019
- Full Text
- View/download PDF
47. Underwater Wireless Sensor Networks: A Review of Recent Issues and Challenges
- Author
-
Saira Gillani, Peer Azmat Shah, Khalid Iqbal, Khalid Mahmood Awan, Waqas Ahmad, and Yunyoung Nam
- Subjects
Routing protocol ,Computer Networks and Communications ,Computer science ,business.industry ,Network packet ,lcsh:T ,020206 networking & telecommunications ,02 engineering and technology ,lcsh:Technology ,lcsh:Telecommunication ,lcsh:TK5101-6720 ,0202 electrical engineering, electronic engineering, information engineering ,Media access control ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,Routing (electronic design automation) ,Underwater ,business ,Underwater acoustic communication ,Information Systems ,Communication channel ,Computer network - Abstract
Underwater Wireless Sensor Networks (UWSNs) contain several components such as vehicles and sensors that are deployed in a specific acoustic area to perform collaborative monitoring and data collection tasks. These networks are used interactively between different nodes and ground-based stations. Presently, UWSNs face issues and challenges regarding limited bandwidth, high propagation delay, 3D topology, media access control, routing, resource utilization, and power constraints. In the last few decades, research community provided different methodologies to overcome these issues and challenges; however, some of them are still open for research due to variable characteristics of underwater environment. In this paper, a survey of UWSN regarding underwater communication channel, environmental factors, localization, media access control, routing protocols, and effect of packet size on communication is conducted. We compared presently available methodologies and discussed their pros and cons to highlight new directions of research for further improvement in underwater sensor networks.
- Published
- 2019
48. Companion inequalities to Ostrowski--Gr\'uss type inequality and applications
- Author
-
Mihaela Ribičić Penava, Khalid Mahmood Awan, and Josip Pečarić
- Subjects
Chebyshev functional ,Ostrowski-Grϋss type inequality ,Kantorovich inequality ,Mathematics::Functional Analysis ,Chebyshev functional,Ostrowski--Grüss type inequality ,Inequality ,General Mathematics ,media_common.quotation_subject ,Mathematics::Classical Analysis and ODEs ,Type inequality ,Absolute continuity ,Chebyshev's sum inequality ,Chebyshev filter ,Mathematics::Numerical Analysis ,Algebra ,Applied mathematics ,Differentiable function ,Mathematics ,media_common - Abstract
The aim of this paper is to give some companion inequalities to the Ostrowski-Grϋss type inequality for n-time differentiable absolutely continuous functions by using recently obtained bounds for the Chebyshev functional.
- Published
- 2015
- Full Text
- View/download PDF
49. Steffensen's generalization of Čebyšev inequality
- Author
-
Atiq Ur Rehman, Josip Pečarić, and Khalid Mahmood Awan
- Subjects
Inequality ,Generalization ,media_common.quotation_subject ,Calculus ,Analysis ,Mathematics ,media_common - Published
- 2015
- Full Text
- View/download PDF
50. Implementation of information security techniques on modern android based Kiosk ATM/remittance machines
- Author
-
Khalid Mahmood Awan, Muhammad Mudassar Yamin, Peer Azmat Shah, and Zahoor ur Rehman
- Subjects
010302 applied physics ,business.product_category ,Computer science ,media_common.quotation_subject ,Information security ,Interactive kiosk ,Payment ,computer.software_genre ,Computer security ,01 natural sciences ,Instruction set ,0103 physical sciences ,Malware ,Remittance ,Android (operating system) ,business ,GeneralLiterature_REFERENCE(e.g.,dictionaries,encyclopedias,glossaries) ,computer ,media_common - Abstract
ATM machines are rapidly developing and are finding new applications from bill payments to online fund transfers. Everything is getting smart in the modern world and ATM are no exceptions in this regard. The natural choice of manufacturers for making ATM smart is by making their function connected to android based system. However, android based Applications are inherently vulnerable and can be exploited by external attackers or by internal malicious users. This paper will discuss the vulnerabilities which are present in android based ATM and the techniques for fixing those vulnerabilities in Android based ATM machines.
- Published
- 2017
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.