Muhammad Naeem

ORCID: 0000-0002-8236-3803
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Energy Harvesting in Wireless Networks
  • Smart Grid Security and Resilience
  • Software-Defined Networks and 5G
  • Underwater Vehicles and Communication Systems
  • Advanced Malware Detection Techniques
  • Reinforcement Learning in Robotics
  • Autonomous Vehicle Technology and Safety
  • Network Traffic and Congestion Control
  • Network Time Synchronization Technologies
  • Photovoltaic System Optimization Techniques
  • IoT Networks and Protocols
  • solar cell performance optimization
  • Water Quality Monitoring Technologies
  • Brain Tumor Detection and Classification
  • Robotic Path Planning Algorithms
  • Formal Methods in Verification
  • Bluetooth and Wireless Communication Technologies
  • Advanced Battery Technologies Research
  • Network Security and Intrusion Detection

Aalborg University
2021-2024

Embedded Systems (United States)
2021

Manchester Metropolitan University
2011

Wireless sensor nodes are usually powered by batteries that have limited energy capacity. In many applications, the installed in inaccessible locations where they problematic to replace or recharge. Therefore, optimization is crucial for increasing node's lifetime. This study presents a method analysis and prediction of consumption Sigfox-based wireless nodes. The illustrated use case monitor water level drainage lines cities improve surface wastewater management. We propose formal...

10.1109/jsen.2023.3261667 article EN IEEE Sensors Journal 2023-03-28

The architecture and construction of a simple embedded web server system with due account its application for remote condition monitoring photovoltaic (PV) installation is presented. system, which based on PIC18 microcontroller, uses the Internet as medium communications between central control point PV system. It allows various parameters such temperature an individual module open-circuit voltage to be remotely accurately measured monitored. This permits early detection any technical...

10.1109/isgteurope.2011.6162761 article EN 2011-12-01

In recent years, Sigfox has earned a prominent place in the Low-Power Wide-Area Network arena, attracting attention of industry, academia, and standards development organizations. As sensors actuators used devices aim to be operated for long time with no maintenance, Sigfox's low energy consumption characteristics are part its appeal real-world applications. Prior work described this paper, Simulator 3 had support protocol, paper presents module simulate protocol. The is parametric respect...

10.1145/3532577.3532599 article EN 2022-06-15

Digital Wireless Sensor Nodes (DWSN) are usually powered by a battery source that has limited energy capacity. In many applications, the nodes installed in inaccessible locations, and it is quite difficult or impossible to install large frequently change battery. So, optimisation crucial order increase node's lifetime. This study presents aware analysis of Sigfox based DWSN, which designed monitor water level drainage lines city improve surface- waste-water management. We propose model-based...

10.1109/meco52532.2021.9460152 article EN 2022 11th Mediterranean Conference on Embedded Computing (MECO) 2021-06-07

Real-time audio/video transmission through Internet media is an important part of communication. Due to bandwidth limitations and a noisy environment, delivery multimedia content remote location not 100% guaranteed. These are the basic cause missing packets which affect Quality Service (QoS). A protocol for recovery lost described in [Maxemchuk, Nicholas F., K. Padmanabhan, S. Lo. "A cooperative packet multicast video." Network Protocols, 1997. Proc. 1997 International Conference on. IEEE]....

10.1109/access.2024.3389738 article EN cc-by IEEE Access 2024-01-01

SYN flooding is one of the most challenging problems that many networks applications face, particularly those are security-related. Disrupting a server's daily function and assigning it to other tasks leaves constantly busy server processes little usable data. In this research, comprehensive INDIGSOL approach demonstrated not only detects but also prevents attacker(s) from making such attempts in future. The designed has four modules as node registration validation, packet capturing, dynamic...

10.47059/revistageintec.v11i4.2334 article EN Revista Gestão Inovação e Tecnologias 2021-07-22
Coming Soon ...