SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Hassan Sodhro Ali) srt2:(2020)"

Search: WFRF:(Hassan Sodhro Ali) > (2020)

  • Result 1-10 of 14
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Sodhro, Ali Hassan, et al. (author)
  • An adaptive QoS computation for medical data processing in intelligent healthcare applications
  • 2020
  • In: Neural Computing and Applications. - : Springer. - 0941-0643 .- 1433-3058. ; 32:2020, s. 723-734
  • Journal article (peer-reviewed)abstract
    • Efficient computation of quality of service (QoS) during medical data processing through intelligent measurement methods is one of the mandatory requirements of the medial healthcare world. However, emergency medical services often involve transmission of critical data, thus having stringent requirements for network quality of service (QoS). This paper contributes in three distinct ways. First, it proposes the novel adaptive QoS computation algorithm (AQCA) for fair and efficient monitoring of the performance indicators, i.e., transmission power, duty cycle and route selection during medical data processing in healthcare applications. Second, framework of QoS computation in medical applications is proposed at physical, medium access control (MAC) and network layers. Third, QoS computation mechanism with proposed AQCA and quality of experience (QoE) is developed. Besides, proper examination of QoS computation for medical healthcare application is evaluated with 4–10 inches large-screen user terminal (UT) devices (for example, LCD panel size, resolution, etc.). These devices are based on high visualization, battery lifetime and power optimization for ECG service in emergency condition. These UT devices are used to achieve highest level of satisfaction in terms, i.e., less power drain, extended battery lifetime and optimal route selection. QoS parameters with estimation of QoE perception identify the degree of influence of each QoS parameters on the medical data processing is analyzed. The experimental results indicate that QoS is computed at physical, MAC and network layers with transmission power (− 15 dBm), delay (100 ms), jitter (40 ms), throughput (200 Bytes), duty cycle (10%) and route selection (optimal). Thus it can be said that proposed AQCA is the potential candidate for QoS computation than Baseline for medical healthcare applications.
  •  
2.
  • Sodhro, Ali Hassan, et al. (author)
  • Power Management Strategies for Medical Information Transmission in Wireless Body Sensor Networks
  • 2020
  • In: IEEE Consumer Electronics Magzine. - USA. ; 9:2, s. 47-51
  • Journal article (peer-reviewed)abstract
    • To minimize and manage the power drain, and extend battery lifetime of wireless body sensor networks (WBSN) is one of the major challenges. There are three key purposes of this survey article, first, to examine the downsides of the classical power-management methods in WBSNs; second, considering the life-critical applications and emergency contexts that are encompassed by WBSN; and, third, studying the impact of power-management techniques on resource-confined networks for economical healthcare. A specific power-management solution is also discussed.
  •  
3.
  • Ahmad, Ijaz, et al. (author)
  • Machine Learning Meets Communication Networks: Current Trends and Future Challenges
  • 2020
  • In: IEEE Access. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 2169-3536. ; 8, s. 223418-223460
  • Journal article (peer-reviewed)abstract
    • The growing network density and unprecedented increase in network traffic, caused by the massively expanding number of connected devices and online services, require intelligent network operations. Machine Learning (ML) has been applied in this regard in different types of networks and networking technologies to meet the requirements of future communicating devices and services. In this article, we provide a detailed account of current research on the application of ML in communication networks and shed light on future research challenges. Research on the application of ML in communication networks is described in: i) the three layers, i.e., physical, access, and network layers; and ii) novel computing and networking concepts such as Multi-access Edge Computing (MEC), Software Defined Networking (SDN), Network Functions Virtualization (NFV), and a brief overview of ML-based network security. Important future research challenges are identified and presented to help stir further research in key areas in this direction.
  •  
4.
  • Nisar, Kashif, et al. (author)
  • A survey on the architecture, application, and security of software defined networking: Challenges and open issues
  • 2020
  • In: INTERNET OF THINGS. - : ELSEVIER. - 2543-1536 .- 2542-6605. ; 12
  • Research review (peer-reviewed)abstract
    • Software Defined Networking (SDN) is a new technology that makes computer networks farther programmable. SDN is currently attracting significant consideration from both academia and industry. SDN is simplifying organisations to implement applications and assist flexible delivery, offering the capability of scaling network resources in lockstep with application and data. This technology allows the user to manage the network easily by permitting the user to control the applications and operating system. SDN not only introduces new ways of interaction within network devices, but it also gives more flexibility for the existing and future networking designs and operations. SDN is an innovative approach to design, implement, and manage networks that separate the network control (control plane) and the forwarding process (data plane) for a better user experience. The main differentiation between SDN and Traditional Networking is that SDN removes the decision-making part from the routers and it provides, logically, a centralised Control-Plane that creates a network view for the control and management applications. Through the establishment of SDN, many new network capabilities and services have been enabled, such as Software Engineering, Traffic Engineering, Network Virtualisation and Automation, and Orchestration for Cloud Applications. This paper surveys the state-of-the-art contribution such as a comparison between SDN and traditional networking. Also, comparison with other survey works on SDN, new information about controller, details about OpenFlow architecture, configuration, comprehensive contribution about SDN security threat and countermeasures, SDN applications, benefit of SDN, and Emulation & Tested for SDN. In addition, some existing and representative SDN tools from both industry and academia are explained. Moreover, future direction of SDN security solutions is discussed in detail. (C) 2020 Elsevier B.V. All rights reserved.
  •  
5.
  • Sodhro, Ali, et al. (author)
  • AI-Enabled Reliable Channel Modelling Architecture for  FoG Computing Vehicular Networks’
  • 2020
  • In: IEEE Wireless Communication Magazine. - IEEE : IEEE. - 1536-1284 .- 1558-0687. ; 27:2, s. 14-21
  • Journal article (peer-reviewed)abstract
    • Artificial intelligence (AI)-driven fog computing (FC) and its emerging role in vehicular networks is playing a remarkable role in revolutionizing daily human lives. Fog radio access networks are accommodating billions of Internet of Things devices for real-time interactive applications at high reliability. One of the critical challenges in today's vehicular networks is the lack of standard wireless channel models with better quality of service (QoS) for passengers while enjoying pleasurable travel (i.e., highly visualized videos, images, news, phone calls to friends/relatives). To remedy these issues, this article contributes significantly in four ways. First, we develop a novel AI-based reliable and interference-free mobility management algorithm (RIMMA) for fog computing intra-vehicular networks, because traffic monitoring and driver's safety management are important and basic foundations. The proposed RIMMA in association with FC significantly improves computation, communication, cooperation, and storage space. Furthermore, its self-adaptive, reliable, intelligent, and mobility-aware nature, and sporadic contents are monitored effectively in highly mobile vehicles. Second, we propose a reliable and delay-tolerant wireless channel model with better QoS for passengers. Third, we propose a novel reliable and efficient multi-layer fog driven inter-vehicular framework. Fourth, we optimize QoS in terms of mobility, reliability, and packet loss ratio. Also, the proposed RIMMA is compared to an existing competitive conventional method (i.e., baseline). Experimental results reveal that the proposed RIMMA outperforms the traditional technique for intercity vehicular networks.
  •  
6.
  • Borhani, Mohammad, 1993-, et al. (author)
  • Secure and resilient communications in the industrial internet
  • 2020
  • In: Guide to disaster-resilient communication networks. - Cham : Springer. - 9783030446840 ; , s. 219-242
  • Book chapter (other academic/artistic)abstract
    • The Industrial Internet brings the promise of increased efficiency through on-demand manufacturing and maintenance, combining sensors data from engines and industrial devices with big data analysis in the cloud. In this chapter, we survey the main challenges that the Industrial Internet faces from a networking viewpoint. We especially focus on security, as critical industrial components could be exposed over the Internet, affecting resilience. We describe two approaches, Identity-Defined Networking and Software-Defined Virtual Private LAN Services as potential network architectures for the Industrial Internet.
  •  
7.
  • Dayo, Zaheer Ahmed, et al. (author)
  • A Compact High-Gain Coplanar Waveguide-Fed Antenna for Military RADAR Applications
  • 2020
  • In: International Journal of Antennas and Propagation. - : HINDAWI LTD. - 1687-5869 .- 1687-5877. ; 2020
  • Journal article (peer-reviewed)abstract
    • This paper presents a new design of a compact, high-gain coplanar waveguide-fed antenna and proposes a multielement approach to attain enhanced characteristics. The proposed method overcomes the simulation and geometrical complexity and achieves optimal performance features. The antenna prototype is carefully designed, and simulation results have been analyzed. The proposed antenna was fabricated on a new WangLing TP-2 laminate with dimensions (0.195 lambda x 0.163 lambda x 0.0052 lambda) at the lowest resonance of 9.78 GHz. The results have been tested and experimentally verified. The antenna model achieved excellent performance including a peak realized gain better than 9.0 dBi, optimal radiation efficiency better than 87.6% over the operating band, and a good relative bandwidth of 11.48% at 10 dB return loss. Symmetrical stable far-field radiation pattern in orthogonal planes and strong distribution of current are observed. Moreover, a comparative analysis with state-of-the-artwork is presented. The measured and simulation result shows a good agreement. The high-performance antenna results reveal that the proposed model is a good contender of military airborne, land, and naval radar applications.
  •  
8.
  • Liyanage, Madhusanka, et al. (author)
  • Securing the Communication of Industrial Internet
  • 2020
  • In: Guide to Disaster-resilient Communication Networks. - : Springer. - 9783030446840
  • Book chapter (peer-reviewed)abstract
    • The popularity of new cyber-physical systems such as Industrial Internetor Industrial Internet of Things (IIoT) in new applications is creating new requirementssuch as high security, enhanced scalability, and optimal utilization of networkresources, efficient energy management and low operational cost. Specifically, theincreasing number of connected devices and new services will result in the increasingcapacity requirements for the cyber-physical systems. Thus, accommodating thesecure connectivity for this expected traffic growth is an imminent requirement offuture cyber-physical systems. Although the existing secure communication architecturesare able to provide a sufcient level of security, they are suffering from limitationssuch as limited scalability, over utilization of network resources and highoperational cost, mainly due to the complex and static security management procedures.On these grounds, SDN and NFV are promising technologies which areexpected to solve the limitations in current communication networks. The pursuit ofa cohesive cyber security strategy will minimize the risks and enable society to take advantage of the opportunities associated with the IIoT. In this chapter, we presentsthe possible secure connectivity solutions for IIoT/Industrial Internet.
  •  
9.
  • Muzammal, Muhammad, et al. (author)
  • A Multi-sensor Data Fusion Enabled Ensemble Approach for Medical Data from Body Sensor Networks
  • 2020
  • In: Information Fusion. - : Elsevier. - 1566-2535 .- 1872-6305. ; 53:2020, s. 155-164
  • Journal article (peer-reviewed)abstract
    • Wireless Body Sensor Network (BSNs) are wearable sensors with varying sensing, storage, computation, and transmission capabilities. When data is obtained from multiple devices, multi-sensor fusion is desirable to transform potentially erroneous sensor data into high quality fused data. In this work, a data fusion enabled Ensemble approach is proposed to work with medical data obtained from BSNs in a fog computing environment. Daily activity data is obtained from a collection of sensors which is fused together to generate high quality activity data. The fused data is later input to an Ensemble classifier for early heart disease prediction. The ensembles are hosted in a Fog computing environment and the prediction computations are performed in a decentralised manners. The results from the individual nodes in the fog computing environment are then combined to produce a unified output. For the classification purpose, a novel kernel random forest ensemble is used that produces significantly better quality results than random forest. An extensive experimental study supports the applicability of the solution and the obtained results are promising, as we obtain 98% accuracy when the tree depth is equal to 15, number of estimators is 40, and 8 features are considered for the prediction task.
  •  
10.
  • Nykvist, Carl, et al. (author)
  • A lightweight portable intrusion detection communication system for auditing applications
  • 2020
  • In: International Journal of Communication Systems. - : WILEY. - 1074-5351 .- 1099-1131. ; 33:7
  • Journal article (peer-reviewed)abstract
    • The goal of this paper is to develop, deploy, test, and evaluatea a lightweight portable intrusion detection system (LPIDS) over wireless networks by adopting two different string matching algorithms: Aho-Corasick algorithm and Knuth-Morris-Pratt algorithm (KMP). Thus, this research contributes in three ways. First, an efficient and lightweight IDS (LPIDS) is proposed. Second, the LPIDS was developed, implemented, tested, and evaluated using Aho-Corasick and KMP on two different hardware platforms: Wi-Fi Pineapple and Raspberry Pi. Third, a comparative analysis of proposed LPIDS is done in terms of network metrics such as throughput, power consumption, and response time with regard to their counterparts. Additionally, the proposed LPIDS is suggested for consultants while performing security audits. The experimental results reveal that Aho-Corasick performs better than KMP throughout the majority of the process, but KMP is typically faster in the beginning with fewer rules. Similarly, Raspberry Pi shows remarkably higher performance than Wi-Fi Pineapple in all of the measurements. Moreover, we compared the throughput between LPIDS and Snort, it is observed and analyzed that former has significantly higher throughput than later when most of the rules do not include content parameters. This paper concludes that due to computational complexity and slow hardware processing capabilities of Wi-Fi Pineapple, it could not become suitable IDS in the presence of different pattern matching strategies. Finally, we propose modification of Snort to increase the throughput of the system.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-10 of 14

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view