- Cloud Computing and Resource Management
- Distributed and Parallel Computing Systems
- Caching and Content Delivery
- Metaheuristic Optimization Algorithms Research
- IoT and Edge/Fog Computing
- Security in Wireless Sensor Networks
- Advanced Multi-Objective Optimization Algorithms
- Parallel Computing and Optimization Techniques
- Mobile Ad Hoc Networks
- Grey System Theory Applications
- Optimal Power Flow Distribution
- Smart Grid Energy Management
- Electric Power System Optimization
- Energy Efficient Wireless Sensor Networks
- Advanced Data Storage Technologies
- Medical Image Segmentation Techniques
- Remote-Sensing Image Classification
- Peer-to-Peer Network Technologies
- Evolutionary Algorithms and Applications
- Advanced Statistical Methods and Models
- Network Security and Intrusion Detection
- Image and Signal Denoising Methods
- Advanced Malware Detection Techniques
- Opportunistic and Delay-Tolerant Networks
- Internet Traffic Analysis and Secure E-voting
Abdul Wali Khan University Mardan
2017-2024
University of Haripur
2023
Kardan University
2022-2023
Bridge University
2022-2023
Sohar University
2023
Murray State University
2023
Saidu Teaching Hospital
2022-2023
University of Engineering and Technology Peshawar
2022
University of Peshawar
2022
Brunel University of London
2012-2015
Distributed network attacks are referred to, usually, as Denial of Service (DDoS) attacks. These take advantage specific limitations that apply to any arrangement asset, such the framework authorized organization's site. In existing research study, author worked on an old KDD dataset. It is necessary work with latest dataset identify current state DDoS This paper, used a machine learning approach for attack types classification and prediction. For this purpose, Random Forest XGBoost...
In this brief, a hybrid filter algorithm is developed to deal with the state estimation (SE) problem for power systems by taking into account impact from phasor measurement units (PMUs). Our aim include PMU measurements when designing dynamic estimators traditional measurements. Also, as data dropouts inevitably occur in transmission channels of meters control center, missing phenomenon also tackled estimator design. framework extended Kalman (EKF) algorithm, are treated inequality...
Internet of Things (IoT) is producing an extraordinary volume data daily, and it possible that the may become useless while on its way to cloud, due long distances. Fog/edge computing a new model for analysing acting time-sensitive data, adjacent where produced. Further, cloud services provided by large companies such as Google, can also be localised improve response time service agility. This accomplished through deploying small-scale datacentres in various locations, needed proximity...
Optimization is an important research field, especially in engineering, physical sciences, and economics. The main purpose of optimization to maximize the profit minimize cost production as well loss system. Evolutionary computation algorithms, such genetic algorithm particle swarm (PSO) have been successfully employed solving various problems. Owing its application potential promising performance discovering optimal solution, PSO has recognized a powerful technique attracted ever-increasing...
Abstract This work implements the recently developed n th state Markovian jumping particle swarm optimisation (PSO) algorithm with local search (NS-MJPSO loc ) awareness method to address economic/environmental dispatch (EED) problem. The proposed approach, known as Non-dominated Sorting Multi-objective PSO Local Best ), aims enhance performance of in multi-objective problems. is achieved by redefining concept best candidates within space optimisation. NS-MJPSO uses an evolutionary...
Selective image segmentation is one of the most significant subjects in medical imaging and real-world applications. We present a robust selective model based on local spatial distance utilizing dual-level set variational formulation this study. Our concept tries to partition all objects using global level function selected item different (local). combines marker function, edge detection, distance, active contour without edges into one. The new noise gives better performance for images...
Multi-processor systems consist of more than one processor and are mostly used for computationally intensive applications. Real-time those that require completing execution tasks within a pre-defined deadline. Traditionally, multiprocessor given attention in periodic models, where executed at regular intervals time. Gradually, as maturity design had increased; their usage has become very common real-time to execute both aperiodic tasks. As the priority an task is usually but not essentially...
Recent development and research in the field of communication technologies have congested unlicensed spectrum. It has resulted uncontrolled unrestricted interference to low-powered wireless sensor network based Internet Things (IoT). On other hand, these advancements necessitated IoT be designed with limited cost, low-energy consumption efficient spectrum utilization. The issue utilization is solved by cognitive radio (CR) network, a low-cost solution utilize efficiently. In CR networks...
DDoS attacks are launched through sending a large quantity of packets to target machine, using instantaneous teamwork multiple hosts which distributed throughout the Grid computing environment. Today on Internet in general and especially Computing environment has become visible issue computer networks. easy generate but their detection is very difficult task therefore, an attractive weapon for hackers. streams do not have familiar characteristics, therefore currently available IDS cannot...
In image segmentation and in general processing, noise outliers distort contained information posing this way a great challenge for accurate results. To ensure correct presence of outliers, it is necessary to identify the isolate them during denoising pre-processing or impose suitable constraints into framework. paper, we removing supported by well-designed theory variational framework segmentation. We investigate novel approach based on power mean function equipped with well established...
It is an established fact that the data transmission between two devices or processes achieved via packets, according to rules and regulations of TCP/IP protocol suite. The said involves all layers different involved in follow same rule TCP / IP suite either on device devices. In this paper, we proposed algorithm with help which being transmitted from one process another using file if both are device. Our uses only top layers, i.e., Application Transport, a while, rest Network, Data Link...
MANETs (Mobile Ad Hoc Networks) are infrastructure-less, temporary wireless networks, consisting of several stations. No specific topology is defined in MANETs. have various applications computer such as providing communication a domicile lacking network groundwork and proper infrastructure. In MANET, data packet may crisscross numerous hops until reaching its target location, making it exposed to attacks. The packets MANET dropping Mobility there but security the main issue still....
The file server is a key factor to accomplish the data sharing essential in distributed systems. perhaps most heavily used resource of systems and as an outcome; its performance vital critical victory system. explosive growth Web contents Internet users has led increasing concentration on two major challenges these systems: scalability high availability network A simple load-sharing mechanism for NFS client switch lightly-load based number client's RPC requests period time, making more...