- Network Traffic and Congestion Control
- Privacy-Preserving Technologies in Data
- IoT and Edge/Fog Computing
- Software-Defined Networks and 5G
- Peer-to-Peer Network Technologies
- Cooperative Communication and Network Coding
- Caching and Content Delivery
- Vehicular Ad Hoc Networks (VANETs)
- Energy Efficient Wireless Sensor Networks
- Privacy, Security, and Data Protection
- Network Security and Intrusion Detection
- Network Packet Processing and Optimization
- Advanced Optical Network Technologies
- Computational Drug Discovery Methods
- Biomedical Text Mining and Ontologies
- Internet Traffic Analysis and Secure E-voting
- Online and Blended Learning
- Multimedia Communication and Technology
- Nanomaterials for catalytic reactions
- Cardiovascular Function and Risk Factors
- Cloud Computing and Remote Desktop Technologies
- Mobile Agent-Based Network Management
- Opportunistic and Delay-Tolerant Networks
- Solar Radiation and Photovoltaics
- Recommender Systems and Techniques
Electronics and Telecommunications Research Institute
2023-2024
B.S. Abdur Rahman Crescent Institute of Science & Technology
2013-2024
Korea Institute of Science & Technology Information
2019-2021
Galgotias University
2021
Korea University of Science and Technology
2019-2021
COMSATS University Islamabad
2017
<p>Electricity is a major source of energy for fast growing population and the use nonrenewable harmful our environment. This reason belongs to devastating environment, so it required take immediate action solve these problems which result solar development. Production can be maximizing if we follower. The part panels microcontroller with arrangement LDR sensor used follow sun, where sensors less efficient track sun because low sensitivity LDR. We are proposing method more effetely...
Network-assisted congestion control leveraging Explicit Congestion Notification (ECN) is an effective way to deal with issues on the Internet. However, we believe that existing ECN mechanism in TCP/IP protocol stack may require further optimization effectively address evolving challenges introduced by emerging technologies like immersive AR/VR applications and burgeoning field of Internet Things (IoT). To end, propose a multilevel notification called Enhanced (EECN) leverages two bits IP...
Congestion in the network is a persistent issue that becoming more challenging with advent of technologies such as metaverse and immersive AR/VR applications. Therefore, we propose Enhanced ECN (EECN), novel network-assisted congestion feedback protocol redesigns legacy ECN. EECN notifies two levels encoded existing bits, unlike which delivers only Boolean information about congestion. Additionally, control algorithm leverages this multilevel from using EECN. Our proposed mechanism can...
Named Data Networking (NDN), an extension of the Content-centric network (CCN), is not unfamiliar word. It considered as one promising future architecture. NDN focuses on naming content regardless end-to-end device addresses. has been adopted for vehicular ad hoc networks (VANETs), and it results. Though robust architecture, many challenges still exist, including consumer producer mobility, naming, Interest data packet flooding. In NDN, vehicle broadcasts required content. The or...
Managing queuing delays is crucial for maintaining Quality of Service (QoS) in real-time media communications. Customizing traditional routing protocols to meet specific QoS requirements—particularly terms minimizing delay and jitter media—can be both complex time-intensive. Furthermore, these often encounter challenges when adapted vendor-specific hardware implementations. To address issues, this paper leverages the programmable features Software-Defined Networking (SDN) simplify process...
Cloud-based e-learning is a technology used to enhance teaching and learning in universities. However, its adoption technical universities low, research into the factors influencing teacher limited. To address this situation, study was conducted at Ghanaian examine determinants of teachers’ cloud-based e-learning. The involved 1258 respondents, majority whom were male (853, or 67.8%), aged between 30 40 (47%), 79.1% had master’s degree. results showed that individuals with degree higher...
Information-centric networking (ICN) is one of the promising solutions that cater to challenges IP-based networking. ICN shifts access model a data-centric model. Named Data Networking (NDN) flexible architecture, which based on content distribution considering data as core entity rather than hosts. User-generated mobile contents for real-time multimedia communication such Internet telephony are very common these days and increasing both in quality quantity. In NDN, producer mobility...
Immersive technologies such as virtual reality (VR), augmented (AR), and holograms will change users' digital experience. These immersive have a multitude of applications, including telesurgeries, teleconferencing, Internet shopping, computer games, etc. Holographic-type communication (HTC) is type media that provides an experience to users. However, HTC has different characteristics network requirements, the existing architecture transport protocols may not be able cope with stringent...
Packet losses in the network significantly impact performance. Most TCP variants reduce transmission rate when detecting packet losses, assuming congestion, resulting lower throughput and affecting bandwidth-intensive applications like immersive applications. However, not all are due to congestion; some occur wireless link issues, which we refer as non-congestive losses. In today's hybrid Internet, packets of a single flow may traverse wired segments reach their destination. should react...
The rapid expansion of cloud computing e-learning systems has empowered educators to reach learners worldwide. However, a critical study gap exists: the impact lecturers’ technological anxiety on their adoption intentions remains unexplored in technical universities Ghana. This addresses this by investigating anxiety’s influence within virtual environment (VE). We examine mediating role competitive pressure and moderating anxiety. Using PLSSEM, we analysed data from surveys conducted among...
Real-time applications such as multimedia streaming and video conferencing have quite stringent Quality of Service (QoS) requirements from the network, because they are more sensitive to available bandwidth loss rate than non real-time traffic. To provide scalable simple mechanism for multicast services, Probe-Based Multicast Admission Control (PBMAC) scheme was proposed. In this paper, PBMAC is studied so-called subsequent request problem found in PBMAC, which degrades system performance...
Immersive technologies such as virtual reality (VR), augmented (AR), and holograms will change users' digital experience. These immersive have a multitude of applications, including telesurgeries, teleconferencing, Internet shopping, computer games, etc. Holographic-type communication (HTC) is type media that provides an experience to users. However, HTC has different characteristics network requirements, the existing architecture transport protocols may not be able cope with stringent...
Applications providing location-based services (LBS) have gained much attention and importance with the notion of internet things (IoT). Users are utilising LBS by their location information to third-party service providers. However, data is very sensitive that can reveal user's private life adversaries. The passive pervasive collection in IoT upsurges serious issues privacy. Privacy-preserving a hot research topic. Many anonymisation obfuscation techniques proposed overcome privacy issue....
Named-Data Networking (NDN) is the most active instance of Information-centric (ICN) having a very research community. NDN racing for future Internet architecture by removing dependence on IP addresses, location, and host-to-host communication model. The paradigm in revolves around content/data naming content, securing it instead channel, retrieving content its names not address machine that hosts data. has lots benefits large scale scientific data as expressive support, access control,...
Applications providing location-based services (LBS) have gained much attention and importance with the notion of internet things (IoT). Users are utilising LBS by their location information to third-party service providers. However, data is very sensitive that can reveal user's private life adversaries. The passive pervasive collection in IoT upsurges serious issues privacy. Privacy-preserving a hot research topic. Many anonymisation obfuscation techniques proposed overcome privacy issue....
Applications providing location-based services (LBS) have gained much attention and importance with the notion of internet things (IoT). Users are utilizing LBS by their location information to third-party service providers. However, data is very sensitive that can reveal user's private life adversaries. The passive pervasive collection in IoT upsurges serious issues privacy. Privacy-preserving a hot research topic. Many anonymization obfuscation techniques been proposed overcome privacy...