Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Privacy-preserving V2I communication and secure authentication using ECC with physical unclonable function

    In recent years, service provided based on the location has brought a tremendous change in our lives. However, one of the biggest challenges is to preserve users’ privacy which upon leakage could have disastro...

    Iqra Nawaz, Munam Ali Shah, Abid Khan, Seunggil Jeon in Wireless Networks (2024)

  2. Article

    Correction: Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger

    Zainab Iftikhar, Adeel Anjum, Abid Khan, Munam Ali Shah, Gwanggil Jeon in Cluster Computing (2023)

  3. No Access

    Article

    Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger

    With the growth in Vehicular Ad Hoc Network (VANET) technology, many vehicular devices are communicating with each other and with the edge nodes, generating a massive amount of data. One of the biggest challen...

    Zainab Iftikhar, Adeel Anjum, Abid Khan, Munam Ali Shah, Gwanggil Jeon in Cluster Computing (2023)

  4. Article

    Open Access

    An infrastructure-assisted job scheduling and task coordination in volunteer computing-based VANET

    Vehicular networks as the key enablers in Intelligent Transportation Systems (ITS) and the Internet of Things (IoT) are key components of smart sustainable cities. Vehicles as a significant component of smart ...

    Abdul Waheed, Munam Ali Shah, Abid Khan, Gwanggil Jeon in Complex & Intelligent Systems (2023)

  5. Article

    Achieving data privacy for decision support systems in times of massive data sharing

    The world is suffering from a new pandemic of Covid-19 that is affecting human lives. The collection of records for Covid-19 patients is necessary to tackle that situation. The decision support systems (DSS) a...

    Rabeeha Fazal, Munam Ali Shah, Hasan Ali Khattak, Hafiz Tayyab Rauf in Cluster Computing (2022)

  6. No Access

    Article

    Collaborative multi-agents in dynamic industrial internet of things using deep reinforcement learning

    Sustainable cities are envisioned to have economic and industrial steps toward reducing pollution. Many real-world applications such as autonomous vehicles, transportation, traffic signals, and industrial auto...

    Ali Raza, Munam Ali Shah, Hasan Ali Khattak in Environment, Development and Sustainability (2022)

  7. No Access

    Chapter

    A Meta Sensor-Based Autonomous Vehicle Safety System for Collision Avoidance Using Li-Fi Technology

    The primary objective of an autonomous vehicle (AV) is to provide a safe and driverless vehicle experience on the road. To accomplish collision free journey, an AV collects data from external entities such as ...

    Amil Roohani Dar, Munam Ali Shah in Intelligent Cyber-Physical Systems for Aut… (2022)

  8. No Access

    Article

    Resource allocation in SDN based 5G cellular networks

    The deployment and operation of Fifth Generation (5G) network is expected in 2020. The 5G aim to provide high throughput, reduced latency, increased capacity and a shift from service-orientation to user-orient...

    Sahrish Khan Tayyaba, Munam Ali Shah in Peer-to-Peer Networking and Applications (2019)

  9. No Access

    Article

    A reliability aware protocol for cooperative communication in cognitive radio networks

    One of the challenging tasks in cognitive radio (CR) networks is to agree on a common control channel to exchange control information. This paper presents a novel medium access control (MAC) protocol for CR ne...

    Munam Ali Shah, Si-**g Zhang, Hong-Ji Yang in International Journal of Automation and Co… (2019)

  10. Chapter and Conference Paper

    On Efficiency of Scrambled Image Forensics Service Using Support Vector Machine

    Images can be a very good evidence during investigation of a crime scene. At the same time they can also contain very personal information which should not be exposed without the consent of the involved people

    Sahibzada Muhammad Shuja, Raja Farhat Makhdoom Khan in Services – SERVICES 2019 (2019)

  11. No Access

    Chapter

    Internet Traffic Flow Analysis in Fog Computing: An Experimental Case Study

    Fog computing (FC) is a new model, which extends cloud computing services to the edge of computing networks. Different aspects of FC, such as security, have been extensively explored in the existing research. ...

    Waleed Rafiq, Abdul Wahid, Munam Ali Shah in Recent Trends and Advances in Wireless and… (2019)

  12. No Access

    Chapter

    Big Data in Healthcare: A Survey

    Big Data is all about procedures, processes, tools and techniques used which an organization can manipulate, create and manage very large amount of data and storage facilities. Healthcare is one of the biggest...

    Muhammad Mashab Farooqi, Munam Ali Shah in Applications of Intelligent Technologies i… (2019)

  13. No Access

    Chapter

    Seven Pillars to Achieve Energy Efficiency in High-Performance Computing Data Centers

    Nowadays, data centers and high-performance computing (HPC) systems are crucial for intensive computing environments. The energy efficiency in HPC is an evergreen problem. Moreover, energy-efficient design and...

    Sardar Mehboob Hussain, Abdul Wahid in Recent Trends and Advances in Wireless and… (2019)

  14. No Access

    Chapter

    Scheduling Algorithms for High-Performance Computing: An Application Perspective of Fog Computing

    High-performance computing (HPC) demands many computers to perform multiple tasks concurrently and efficiently. For efficient resource utilization and for better response time, different scheduling algorithms ...

    Sidra Razzaq, Abdul Wahid, Faheem Khan in Recent Trends and Advances in Wireless and… (2019)

  15. No Access

    Chapter

    Exploring IoT Applications for Disaster Management: Identifying Key Factors and Proposing Future Directions

    In the last few decades, disasters made a huge loss to human beings, natural resources, and other assets. As we are living in an era of technology, there can be no other way better than using ICT (information ...

    Umara Zafar, Munam Ali Shah, Abdul Wahid in Recent Trends and Advances in Wireless and… (2019)

  16. No Access

    Article

    ESOT: a new privacy model for preserving location privacy in Internet of Things

    The Internet of Things (IoT) means connecting everything with every other thing through the Internet. In IoT, millions of devices communicate to exchange data and information with each other. During communicat...

    Ikram Ullah, Munam Ali Shah, Abdul Wahid, Amjad Mehmood in Telecommunication Systems (2018)

  17. No Access

    Chapter and Conference Paper

    Online Signature Verification: A Survey on Authentication in Smartphones

    Smart phones are advance generation of mobile phones. They enable us to access a large variety of services like data storages, voice communication, wireless connectivity etc. As the number of services increase...

    Waseem Akram, Munam Ali Shah in Advances in Ubiquitous Networking 2 (2017)

  18. Article

    Open Access

    Erratum to: A survey on MAC protocols for complex self-organizing cognitive radio networks

    Munam Ali Shah, Si**g Zhang, Muhammad Kamran in Complex Adaptive Systems Modeling (2016)

  19. Article

    Open Access

    A survey on MAC protocols for complex self-organizing cognitive radio networks

    Complex self-organizing cognitive radio (CR) networks serve as a framework for accessing the spectrum allocation dynamically where the vacant channels can be used by CR nodes opportunistically. CR devices must...

    Munam Ali Shah, Si**g Zhang, Muhammad Kamran in Complex Adaptive Systems Modeling (2016)

  20. No Access

    Article

    Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices

    With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligator...

    Syeda Mariam Muzammal, Munam Ali Shah in International Journal of Automation and Co… (2016)

previous disabled Page of 2