Murad Khan

ORCID: 0000-0001-9905-8904
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • IPv6, Mobility, Handover, Networks, Security
  • Smart Grid Energy Management
  • Advanced Wireless Network Optimization
  • Cooperative Communication and Network Coding
  • Context-Aware Activity Recognition Systems
  • Wireless Networks and Protocols
  • IoT-based Smart Home Systems
  • Energy Efficient Wireless Sensor Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • Blockchain Technology Applications and Security
  • Mobile Ad Hoc Networks
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Energy Harvesting in Wireless Networks
  • Green IT and Sustainability
  • Building Energy and Comfort Optimization
  • Opportunistic and Delay-Tolerant Networks
  • Autonomous Vehicle Technology and Safety
  • Smart Cities and Technologies
  • User Authentication and Security Systems
  • Anomaly Detection Techniques and Applications
  • Internet Traffic Analysis and Secure E-voting
  • Electricity Theft Detection Techniques
  • Security in Wireless Sensor Networks

Kuwait College of Science and Technology
2022-2025

Jeju National University
2022-2025

Sarhad University of Science and Information Technology
2017-2024

Kuwait University
2024

Queen's University Belfast
2023

COMSATS University Islamabad
2023

Kyungpook National University
2013-2022

Islamia College University
2018

Abasyn University
2017

Wireless sensor networks (WSN) are one of the significant technologies due to their diverse applications such as health care monitoring, smart phones, military, disaster management, and other surveillance systems. Sensor nodes usually deployed in large number that work independently unattended harsh environments. Due constraint resources, typically scarce battery power, these wireless grouped into clusters for energy efficient communication. In clustering hierarchical schemes have achieved...

10.1155/2017/6457942 article EN cc-by Wireless Communications and Mobile Computing 2017-01-01

Human Activity Recognition plays a vital role in various fields, such as healthcare and smart environments. Traditional HAR methods rely on sensor or video data, but sensor-based systems have gained popularity due to their non-intrusive nature. Current challenges include variability data influenced by factors like placement, user differences, environmental conditions. Additionally, imbalanced datasets computational complexity hinder the performance of these real-world applications. To...

10.1038/s41598-025-88378-6 article EN cc-by-nc-nd Scientific Reports 2025-01-31

Wireless Sensor Networks (WSNs) are becoming ubiquitous in everyday life due to their applications weather forecasting, surveillance, implantable sensors for health monitoring and other plethora of applications. WSN is equipped with hundreds thousands small sensor nodes. As the size a node decreases, critical issues such as limited energy, computation time memory become even more highlighted. In case, network lifetime mainly depends on efficient use available resources. Organizing nearby...

10.1371/journal.pone.0180848 article EN cc-by PLoS ONE 2017-07-18

The Internet of Engineering Task (IETF) developed a lighter application protocol (Constrained Application Protocol (CoAP)) for the constrained IoT devices operating in lossy environments. Based on UDP, CoAP is lightweight and efficient compared to other protocols such as HTTP, MQTT, etc. also provides reliable communication among nodes wireless sensor networks addition features resource observation, discovery, congestion control, These capabilities have enabled implementation various domains...

10.3390/s20216391 article EN cc-by Sensors 2020-11-09

The Web of Things (WoT) plays an important role in the representation objects connected to Internet a more transparent and effective way. Thus, it enables seamless ubiquitous web communication between users smart things. Considering importance WoT, we propose WoT-based emerging sensor network (WoT-ESN), which collects data from sensors, routes web, integrate things into employing representational state transfer (REST) architecture. A home scenario is introduced evaluate proposed WoT-ESN...

10.3390/s17020332 article EN cc-by Sensors 2017-02-09

10.19080/jojms.2025.09.555760 article EN Juniper Online Journal Material Science 2025-01-22

10.1007/s13042-019-00950-5 article EN International Journal of Machine Learning and Cybernetics 2019-05-08

The scheduling of the operational time household appliances requires several parameters to be tuned according available energy supplied a smart home. However, multiple in home itself is NP-hard problem and thus an intelligent, heuristic method solved polynomial time. In this research work, we propose Real-time Scheduling Operational Time Household Appliances based on well-known value iterative reinforcement learning called Quality (RSOTHA-QL). proposed RSOTHA-QL scheme operates two phases....

10.1109/access.2020.3004151 article EN cc-by IEEE Access 2020-01-01

The rapid adoption of hydrogen as an eco-friendly energy source has necessitated the development intelligent power management systems capable efficiently utilizing resources. However, guaranteeing security and integrity hydrogen-related data become a significant challenge. This paper proposes pioneering approach to ensure secure analysis by integrating blockchain technology, enhancing trust, transparency, privacy in handling information. Combining with makes efficient utilization resources...

10.3390/smartcities6060142 article EN cc-by Smart Cities 2023-11-22

This research introduces an innovative approach for identifying duplicate questions within the Stack Overflow community, a challenging task in natural language processing. Leveraging deep learning techniques, our proposed methodology combines Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks to capture both local long-term dependencies textual data. We employ word embeddings, specifically Google's Word2Vec GloVe, enhance text representation. Extensive experiments...

10.1109/access.2024.3358422 article EN cc-by-nc-nd IEEE Access 2024-01-01

The upcoming models of vehicles will be able to communicate with each other and thus share and/or transfer information. A vehicular ad hoc network (VANET) is an application this communication that leads intelligent transportation system (ITS). Vehicle-to-vehicle (V2V) vehicle-to-infrastructure (V2I) are the two distinct types networks (VANET). V2V V2I technologies together known as V2X recently being tested. Continuous research enhance routing considers different characteristics exciting...

10.3390/electronics11152298 article EN Electronics 2022-07-23

Industrial Internet of Things (IIoT) is the other name industrial Internet. It integrates a variety existing automation technologies with computing, machine learning, and communication technologies. Vehicular ad hoc network, an application IIoT, self‐organized network vehicles which tends to provide improved road safety, diminished traffic congestion, ultimate comfort travellers. In VANETs, exchange data each directly or through roadside units (RSUs). Data dissemination in VANETs experiences...

10.1155/2018/1857202 article EN cc-by Wireless Communications and Mobile Computing 2018-01-01

Vehicular ad hoc network (VANET) is a wireless emerging technology that aims to provide safety and communication services drivers passengers. In VANETs, vehicles communicate with other directly or through road side units (RSU) for sharing traffic information. The data dissemination in VANETs challenging issue as the have share critical information real time. distribution usually done using broadcast method resulting inefficient use of resources. Therefore, avoid storm efficiently resources,...

10.1155/2017/4671892 article EN cc-by Mathematical Problems in Engineering 2017-01-01

Smart Grid (SG) infrastructure is an energy network connected with computer networks for communication over the internet and intranets. The revolution of SGs has also introduced new avenues security threats. Although Digital Certificates provide countermeasures, however, one issues that exist, how to efficiently distribute certificate revocation information among Edge devices. conventional mechanisms, including list (CRL) online status protocol (OCSP), are subjected some limitations in...

10.3390/su13052549 article EN Sustainability 2021-02-26
Coming Soon ...