Inayat Ali

ORCID: 0000-0001-8847-294X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Traffic and Congestion Control
  • Privacy-Preserving Technologies in Data
  • IoT and Edge/Fog Computing
  • Software-Defined Networks and 5G
  • Peer-to-Peer Network Technologies
  • Cooperative Communication and Network Coding
  • Caching and Content Delivery
  • Vehicular Ad Hoc Networks (VANETs)
  • Energy Efficient Wireless Sensor Networks
  • Privacy, Security, and Data Protection
  • Network Security and Intrusion Detection
  • Network Packet Processing and Optimization
  • Advanced Optical Network Technologies
  • Computational Drug Discovery Methods
  • Biomedical Text Mining and Ontologies
  • Internet Traffic Analysis and Secure E-voting
  • Online and Blended Learning
  • Multimedia Communication and Technology
  • Nanomaterials for catalytic reactions
  • Cardiovascular Function and Risk Factors
  • Cloud Computing and Remote Desktop Technologies
  • Mobile Agent-Based Network Management
  • Opportunistic and Delay-Tolerant Networks
  • Solar Radiation and Photovoltaics
  • Recommender Systems and Techniques

Electronics and Telecommunications Research Institute
2023-2024

B.S. Abdur Rahman Crescent Institute of Science & Technology
2013-2024

Korea Institute of Science & Technology Information
2019-2021

Galgotias University
2021

Korea University of Science and Technology
2019-2021

COMSATS University Islamabad
2017

<p>Electricity is a major source of energy for fast growing population and the use nonrenewable harmful our environment. This reason belongs to devastating environment, so it required take immediate action solve these problems which result solar development. Production can be maximizing if we follower. The part panels microcontroller with arrangement LDR sensor used follow sun, where sensors less efficient track sun because low sensitivity LDR. We are proposing method more effetely...

10.11591/ijpeds.v12.i3.pp1431-1438 article EN International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering 2021-09-01

Network-assisted congestion control leveraging Explicit Congestion Notification (ECN) is an effective way to deal with issues on the Internet. However, we believe that existing ECN mechanism in TCP/IP protocol stack may require further optimization effectively address evolving challenges introduced by emerging technologies like immersive AR/VR applications and burgeoning field of Internet Things (IoT). To end, propose a multilevel notification called Enhanced (EECN) leverages two bits IP...

10.48550/arxiv.2501.08535 preprint EN arXiv (Cornell University) 2025-01-14

Congestion in the network is a persistent issue that becoming more challenging with advent of technologies such as metaverse and immersive AR/VR applications. Therefore, we propose Enhanced ECN (EECN), novel network-assisted congestion feedback protocol redesigns legacy ECN. EECN notifies two levels encoded existing bits, unlike which delivers only Boolean information about congestion. Additionally, control algorithm leverages this multilevel from using EECN. Our proposed mechanism can...

10.1145/3651863.3651885 article EN 2024-03-27

Named Data Networking (NDN), an extension of the Content-centric network (CCN), is not unfamiliar word. It considered as one promising future architecture. NDN focuses on naming content regardless end-to-end device addresses. has been adopted for vehicular ad hoc networks (VANETs), and it results. Though robust architecture, many challenges still exist, including consumer producer mobility, naming, Interest data packet flooding. In NDN, vehicle broadcasts required content. The or...

10.1109/access.2021.3133016 article EN cc-by IEEE Access 2021-01-01

Managing queuing delays is crucial for maintaining Quality of Service (QoS) in real-time media communications. Customizing traditional routing protocols to meet specific QoS requirements—particularly terms minimizing delay and jitter media—can be both complex time-intensive. Furthermore, these often encounter challenges when adapted vendor-specific hardware implementations. To address issues, this paper leverages the programmable features Software-Defined Networking (SDN) simplify process...

10.3390/app14199066 article EN cc-by Applied Sciences 2024-10-08

Cloud-based e-learning is a technology used to enhance teaching and learning in universities. However, its adoption technical universities low, research into the factors influencing teacher limited. To address this situation, study was conducted at Ghanaian examine determinants of teachers’ cloud-based e-learning. The involved 1258 respondents, majority whom were male (853, or 67.8%), aged between 30 40 (47%), 79.1% had master’s degree. results showed that individuals with degree higher...

10.3991/ijep.v14i5.47841 article EN International Journal of Engineering Pedagogy (iJEP) 2024-06-05

Information-centric networking (ICN) is one of the promising solutions that cater to challenges IP-based networking. ICN shifts access model a data-centric model. Named Data Networking (NDN) flexible architecture, which based on content distribution considering data as core entity rather than hosts. User-generated mobile contents for real-time multimedia communication such Internet telephony are very common these days and increasing both in quality quantity. In NDN, producer mobility...

10.1155/2019/3531567 article EN cc-by Mobile Information Systems 2019-05-13

Immersive technologies such as virtual reality (VR), augmented (AR), and holograms will change users' digital experience. These immersive have a multitude of applications, including telesurgeries, teleconferencing, Internet shopping, computer games, etc. Holographic-type communication (HTC) is type media that provides an experience to users. However, HTC has different characteristics network requirements, the existing architecture transport protocols may not be able cope with stringent...

10.1109/icufn57995.2023.10199443 article EN 2023-07-04

10.1504/ijbra.2025.10066073 article EN International Journal of Bioinformatics Research and Applications 2024-08-17

Packet losses in the network significantly impact performance. Most TCP variants reduce transmission rate when detecting packet losses, assuming congestion, resulting lower throughput and affecting bandwidth-intensive applications like immersive applications. However, not all are due to congestion; some occur wireless link issues, which we refer as non-congestive losses. In today's hybrid Internet, packets of a single flow may traverse wired segments reach their destination. should react...

10.48550/arxiv.2408.03007 preprint EN arXiv (Cornell University) 2024-08-06

The rapid expansion of cloud computing e-learning systems has empowered educators to reach learners worldwide. However, a critical study gap exists: the impact lecturers’ technological anxiety on their adoption intentions remains unexplored in technical universities Ghana. This addresses this by investigating anxiety’s influence within virtual environment (VE). We examine mediating role competitive pressure and moderating anxiety. Using PLSSEM, we analysed data from surveys conducted among...

10.3991/ijim.v18i17.49661 article EN International Journal of Interactive Mobile Technologies (iJIM) 2024-09-11

Real-time applications such as multimedia streaming and video conferencing have quite stringent Quality of Service (QoS) requirements from the network, because they are more sensitive to available bandwidth loss rate than non real-time traffic. To provide scalable simple mechanism for multicast services, Probe-Based Multicast Admission Control (PBMAC) scheme was proposed. In this paper, PBMAC is studied so-called subsequent request problem found in PBMAC, which degrades system performance...

10.1109/icccet.2011.5762491 article EN 2011-03-01

Immersive technologies such as virtual reality (VR), augmented (AR), and holograms will change users' digital experience. These immersive have a multitude of applications, including telesurgeries, teleconferencing, Internet shopping, computer games, etc. Holographic-type communication (HTC) is type media that provides an experience to users. However, HTC has different characteristics network requirements, the existing architecture transport protocols may not be able cope with stringent...

10.48550/arxiv.2306.16692 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Applications providing location-based services (LBS) have gained much attention and importance with the notion of internet things (IoT). Users are utilising LBS by their location information to third-party service providers. However, data is very sensitive that can reveal user's private life adversaries. The passive pervasive collection in IoT upsurges serious issues privacy. Privacy-preserving a hot research topic. Many anonymisation obfuscation techniques proposed overcome privacy issue....

10.1504/ijahuc.2019.10024680 article EN International Journal of Ad Hoc and Ubiquitous Computing 2019-01-01

Named-Data Networking (NDN) is the most active instance of Information-centric (ICN) having a very research community. NDN racing for future Internet architecture by removing dependence on IP addresses, location, and host-to-host communication model. The paradigm in revolves around content/data naming content, securing it instead channel, retrieving content its names not address machine that hosts data. has lots benefits large scale scientific data as expressive support, access control,...

10.7840/kics.2019.44.10.1860 article EN The Journal of Korean Institute of Communications and Information Sciences 2019-10-27

Applications providing location-based services (LBS) have gained much attention and importance with the notion of internet things (IoT). Users are utilising LBS by their location information to third-party service providers. However, data is very sensitive that can reveal user's private life adversaries. The passive pervasive collection in IoT upsurges serious issues privacy. Privacy-preserving a hot research topic. Many anonymisation obfuscation techniques proposed overcome privacy issue....

10.1504/ijahuc.2019.103142 article EN International Journal of Ad Hoc and Ubiquitous Computing 2019-01-01

Applications providing location-based services (LBS) have gained much attention and importance with the notion of internet things (IoT). Users are utilizing LBS by their location information to third-party service providers. However, data is very sensitive that can reveal user's private life adversaries. The passive pervasive collection in IoT upsurges serious issues privacy. Privacy-preserving a hot research topic. Many anonymization obfuscation techniques been proposed overcome privacy...

10.48550/arxiv.2212.08241 preprint EN public-domain arXiv (Cornell University) 2022-01-01

10.1504/ijdmb.2021.122855 article EN International Journal of Data Mining and Bioinformatics 2021-01-01
Coming Soon ...