Muhammad Usman

ORCID: 0000-0001-6170-0922
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced MIMO Systems Optimization
  • Network Security and Intrusion Detection
  • Indoor and Outdoor Localization Technologies
  • Wireless Communication Security Techniques
  • Energy Efficient Wireless Sensor Networks
  • IoT and Edge/Fog Computing
  • Software-Defined Networks and 5G
  • Gait Recognition and Analysis
  • Advanced Authentication Protocols Security
  • Non-Invasive Vital Sign Monitoring
  • Opportunistic and Delay-Tolerant Networks
  • Hand Gesture Recognition Systems
  • Speech and Audio Processing
  • Cryptographic Implementations and Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Optical Wireless Communication Technologies
  • Anomaly Detection Techniques and Applications
  • Molecular Communication and Nanonetworks
  • Electric Power System Optimization
  • Wireless Networks and Protocols
  • Wireless Body Area Networks
  • Energy Harvesting in Wireless Networks
  • Hearing Impairment and Communication
  • Solar Radiation and Photovoltaics
  • Cooperative Communication and Network Coding

Glasgow Caledonian University
2022-2025

Commonwealth Scientific and Industrial Research Organisation
2025

The University of Melbourne
2025

Data61
2025

Instituto Politécnico Nacional
2024

University of Sargodha
2024

University of Lahore
2024

Hamad bin Khalifa University
2018-2023

University of Glasgow
2021-2023

Qatar Foundation
2020-2023

The device-to-device (D2D) communication paradigm in 5G networks provides an effective infrastructure to enable different smart city applications such as public safety. In future cities, dense deployment of wireless sensor (WSNs) can be integrated with using D2D communication. enables direct between nearby user equipments (UEs) cellular or ad hoc links, thereby improving the spectrum utilization, system throughput, and energy efficiency network. this paper, we propose a hierarchal...

10.1109/access.2015.2479855 article EN cc-by-nc-nd IEEE Access 2015-01-01

Future wireless networks are expected to provide augmented and data-intensive services in a multi-vendor multi-proprietor scenario. This scenario introduces relevant challenges the networking infrastructure, especially terms of flexibility interoperability, that could be addressed by extending concept Virtualization Software Defined Networking (SDN) or wired-cum-wireless world. paper provides review perspectives extension SDN paradigm domain identifying current trends proposed solutions,...

10.1109/mcom.2015.7120042 article EN IEEE Communications Magazine 2015-06-01

Human activity monitoring is an exciting research area to assist independent living among disabled and elderly population. Various techniques have been proposed recognise human activities, such as exploiting sensors, cameras, wearables, contactless microwave sensing. Among these, the sensing has recently gained significant attention due its merit solve privacy concerns of cameras discomfort caused by wearables. However, existing a basic disadvantage requiring controlled ideal settings for...

10.1038/s41377-022-00906-5 article EN cc-by Light Science & Applications 2022-07-07

Abstract In the technologically changing world, demand for ultra‐reliable, faster, low power, and secure communication has significantly risen in recent years. Researchers have shown immense interest emerging quantum computing (QC) due to its potentials of solving complexity robust efficient manner. It is envisioned that QC can act as critical enablers strong catalysts considerably reduce complexities boost future sixth generation (6G) beyond systems terms their security. this study,...

10.1049/qtc2.12060 article EN cc-by IET Quantum Communication 2023-05-31

This letter proposes a group key distribution scheme using smart contract-based blockchain technology. The contract’s functions allow for securely distributing the session key, following initial legitimacy detection public infrastructure-based authentication. For message authentication, we propose lightweight symmetric cryptography-based signature method, supporting security and privacy requirements of vehicular ad hoc networks (VANETs). Our discussion examined scheme’s robustness against...

10.1109/lnet.2023.3234491 article EN IEEE Networking Letters 2023-01-05

Wireless body area networks (WBANs) play a vital role in shaping today's healthcare systems. Given the critical nature of WBAN one's health to automatically monitor and diagnose issues, security privacy these systems need special attention. In this paper, we first propose novel four-tier architecture remote monitoring system then identify requirements challenges at each tier. We provide concise survey literature aimed improving WBANs present comprehensive overview problem. particular, stress...

10.1109/access.2018.2873825 article EN cc-by IEEE Access 2018-01-01

The problem of Lip-reading has become an important research challenge in recent years. goal is to recognise speech from lip movements. Most the technologies developed so far are camera-based, which require video recording target. However, these have well-known limitations occlusion and ambient lighting with serious privacy concerns. Furthermore, vision-based not useful for multi-modal hearing aids coronavirus (COVID-19) environment, where face masks a norm. This paper aims solve fundamental...

10.1038/s41467-022-32231-1 article EN cc-by Nature Communications 2022-09-07

By 2050, experts estimate that the agricultural produce must increase by 60%–70% to meet needs of ever increasing population world. To this aim, concept precision agriculture or smart farming has recently been coined. The idea is well represented as a management system, having ability monitor, observe, sense, measure and control health water contents in plants at nano-scale crops macro-scale. goal maximise production while preserving vital resources. combination terahertz (THz) based sensing...

10.3389/frcmn.2022.836506 article EN cc-by Frontiers in Communications and Networks 2022-03-11

Intelligent transportation systems are an emerging technology that facilitates real-time vehicle-to-everything communication. Hence, securing and authenticating data packets for intra- inter-vehicle communication fundamental security services in vehicular ad-hoc networks (VANETs). However, public-key cryptography (PKC) is commonly used signature-based authentication, which consumes significant computation resources bandwidth signatures generation verification, key distribution. Therefore,...

10.1016/j.jisa.2023.103476 article EN cc-by Journal of Information Security and Applications 2023-03-28

Despite the rapid advancements in consumer electronics, data transmitted by sensing devices a smart home environment are still vulnerable to anomalies due node faults, transmission errors, or attacks. This affects reliability of received sensed and may lead incorrect decision making at both local (i.e., home) global city) levels. study introduces novel mobile agent-based cross-layer anomaly detection scheme, which takes into account stochastic variability obtained from packets, defines fuzzy...

10.1109/tce.2015.7150594 article EN IEEE Transactions on Consumer Electronics 2015-05-01

Location-based services (LBS) in smart cities have drastically altered the way operate, giving a new dimension to life of citizens. LBS rely on location device, where proximity estimation remains at its core. The applications range from social networking and marketing vehicle-to-everything communications. In many these applications, there is an increasing need trend learn physical distance between nearby devices. This paper elaborates upon current needs compares them against available...

10.1109/access.2018.2826041 article EN cc-by-nc-nd IEEE Access 2018-01-01

Artificial Intelligence (AI) and Machine Learning (ML) have gained a huge interest from academia industry in solving very complex problems several fields. In this paper, we present short survey of the main application areas AI/ML SDN NFV based networks. We classify advancements area different categories on their track identify corresponding AI techniques utilized. addition, discuss challenges future directions area. stress that can play vital role providing way towards self-configured,...

10.1109/ssd.2019.8893244 article EN 2022 19th International Multi-Conference on Systems, Signals & Devices (SSD) 2019-03-01

UML is the de-facto industry standard to design object-oriented software. provides a set of diagrams model every aspect an application in sufficient detail, but lacks any mechanism rigorously check consistency between models. Today, most effort applied on creating accurate and consistent models rather than implementing design. Automatic code generation from has emerged as promising area recent years. The accuracy generated some ways depends consistency. In this paper, we present survey...

10.1109/asea.2008.40 article EN 2008-12-01

Personalized hydration level monitoring play vital role in sports, health, wellbeing and safety of a person while performing particular set activities. Clinical staff must be mindful numerous physiological symptoms that identify the optimum specific to person, event environment. Hence, it becomes extremely critical monitor levels human body avoid potential complications fatalities. Hydration tracking solutions available literature are either inefficient invasive or require clinical trials....

10.1038/s41598-022-07754-8 article EN cc-by Scientific Reports 2022-03-08

Sign language is a means of communication between the deaf community and normal hearing people who use hand gestures, facial expressions, body to communicate. It has same level complexity as spoken language, but it does not employ sentence structure English. The motions in sign comprise range distinct finger articulations that are occasionally synchronized with head, face, body. Existing recognition systems mainly camera-based, which have fundamental limitations poor lighting conditions,...

10.1109/embc48229.2022.9871491 article EN 2022 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC) 2022-07-11

Device-to-Device (D2D) communication and cognitive radio are among the key technologies that can help to solve bandwidth bottleneck problem of cellular networks. Such maintain necessary between user devices in case natural disasters traffic hotspot situations. In this paper, we efficiently exploit relay selection cooperative beamforming (CBF) strategies for D2D show securely communicate with each other without infrastructure support. We propose a cluster-based hierarchical topology multi-hop...

10.1109/tccn.2018.2801339 article EN IEEE Transactions on Cognitive Communications and Networking 2018-02-02

Sign language is utilized by deaf-mute to communicate through hand movements, body postures, and facial emotions. The motions in sign comprise a range of distinct finger articulations that are occasionally synchronized with the head, face, body. Automatic recognition (SLR) highly challenging area still remains its infancy compared speech after almost three decades research. Current wearable vision-based systems for SLR intrusive suffer from limitations ambient lighting privacy concerns. To...

10.1109/tcss.2022.3210288 article EN IEEE Transactions on Computational Social Systems 2022-10-13
Coming Soon ...