Skip to main content

and
  1. No Access

    Article

    A reliability aware protocol for cooperative communication in cognitive radio networks

    One of the challenging tasks in cognitive radio (CR) networks is to agree on a common control channel to exchange control information. This paper presents a novel medium access control (MAC) protocol for CR ne...

    Munam Ali Shah, Si-**g Zhang, Hong-Ji Yang in International Journal of Automation and Co… (2019)

  2. No Access

    Chapter

    Internet Traffic Flow Analysis in Fog Computing: An Experimental Case Study

    Fog computing (FC) is a new model, which extends cloud computing services to the edge of computing networks. Different aspects of FC, such as security, have been extensively explored in the existing research. ...

    Waleed Rafiq, Abdul Wahid, Munam Ali Shah in Recent Trends and Advances in Wireless and… (2019)

  3. No Access

    Chapter

    Seven Pillars to Achieve Energy Efficiency in High-Performance Computing Data Centers

    Nowadays, data centers and high-performance computing (HPC) systems are crucial for intensive computing environments. The energy efficiency in HPC is an evergreen problem. Moreover, energy-efficient design and...

    Sardar Mehboob Hussain, Abdul Wahid in Recent Trends and Advances in Wireless and… (2019)

  4. No Access

    Chapter

    Scheduling Algorithms for High-Performance Computing: An Application Perspective of Fog Computing

    High-performance computing (HPC) demands many computers to perform multiple tasks concurrently and efficiently. For efficient resource utilization and for better response time, different scheduling algorithms ...

    Sidra Razzaq, Abdul Wahid, Faheem Khan in Recent Trends and Advances in Wireless and… (2019)

  5. No Access

    Chapter

    Exploring IoT Applications for Disaster Management: Identifying Key Factors and Proposing Future Directions

    In the last few decades, disasters made a huge loss to human beings, natural resources, and other assets. As we are living in an era of technology, there can be no other way better than using ICT (information ...

    Umara Zafar, Munam Ali Shah, Abdul Wahid in Recent Trends and Advances in Wireless and… (2019)

  6. No Access

    Article

    ESOT: a new privacy model for preserving location privacy in Internet of Things

    The Internet of Things (IoT) means connecting everything with every other thing through the Internet. In IoT, millions of devices communicate to exchange data and information with each other. During communicat...

    Ikram Ullah, Munam Ali Shah, Abdul Wahid, Amjad Mehmood in Telecommunication Systems (2018)

  7. No Access

    Article

    Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices

    With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligator...

    Syeda Mariam Muzammal, Munam Ali Shah in International Journal of Automation and Co… (2016)

  8. Article

    Erratum to: An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks

    Munam Ali Shah, Si**g Zhang, Carsten Maple in International Journal of Automation and Co… (2014)

  9. Article

    An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks

    The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased. Most of the spectrum bands have been allocated although many studie...

    Munam Ali Shah, Si**g Zhang, Carsten Maple in International Journal of Automation and Co… (2013)