- Robotic Path Planning Algorithms
- Distributed Control Multi-Agent Systems
- UAV Applications and Optimization
- Mobile Ad Hoc Networks
- Opportunistic and Delay-Tolerant Networks
- Interconnection Networks and Systems
- Mobile Agent-Based Network Management
- Caching and Content Delivery
- Cellular Automata and Applications
- Robotics and Sensor-Based Localization
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Cryptography and Data Security
- Vehicular Ad Hoc Networks (VANETs)
- Nanomaterials for catalytic reactions
- Chaos-based Image/Signal Encryption
- Advanced Neural Network Applications
- IPv6, Mobility, Handover, Networks, Security
- Advanced Steganography and Watermarking Techniques
- PAPR reduction in OFDM
- Energy Efficient Wireless Sensor Networks
- Security in Wireless Sensor Networks
- Context-Aware Activity Recognition Systems
- graph theory and CDMA systems
- Modular Robots and Swarm Intelligence
King Faisal University
2016-2023
University of the Punjab
2018
Information Technology University
2018
COMSATS University Islamabad
2006-2010
Ghulam Ishaq Khan Institute of Engineering Sciences and Technology
2004
The Open University
1987
Wireless Sensor Network (WSN) is known to be a highly resource constrained class of network where energy consumption one the prime concerns. In this research, cross layer design methodology was adopted an efficient routing protocol entitled “Position Responsive Routing Protocol” (PRRP). PRRP designed minimize consumed in each node by (1) reducing amount time which sensor idle listening state and (2) average communication distance over network. The performance proposed critically evaluated...
Two important aspects in dealing with autonomous navigation of a swarm drones are collision avoidance mechanism and formation control strategy; possible competition between these two modes operation may have negative implications for success efficiency the mission. This issue is exacerbated case distributed leader-follower based swarms since nodes concurrently decide act through individual observation neighbouring nodes' states actions. To dynamically handle this duality control, plan action...
This review paper critically analyzes the latest advancements in sustainable chemical processes and concentrates on three key areas, which are catalysis, integration of renewable energy sources, technologies to reduce water consumption. Catalysis is very crucial attaining an efficient transformation reactions as new exciting developments related non-precious metal catalysts biocatalysis improving more sustainable, lower-cost pathways while minimizing damaging byproducts. There a significant...
Collaborative robots represent an evolution in the field of swarm robotics that is pervasive modern industrial undertakings from manufacturing to exploration. Though there has been much work on path planning for autonomous employing floor plans, energy-efficient navigation unknown environments gaining traction. This presents a novel methodology low-overhead collaborative sensing, run-time mapping and localization, robot swarms. The aim optimize energy consumption as whole rather than...
Moving towards autonomy, unmanned vehicles rely heavily on state-of-the-art collision avoidance systems (CAS). However, the detection of obstacles especially during night-time is still a challenging task since lighting conditions are not sufficient for traditional cameras to function properly. Therefore, we exploit powerful attributes event-based perform obstacle in low conditions. Event trigger events asynchronously at high output temporal rate with dynamic range up 120 $dB$. The algorithm...
The focus of this work is to analyze the behavior an autonomous swarm, in which only leader or a dedicated set agents can take intelligent decisions with other just reacting information that received by those agents, when swarm comes across stationary dynamic obstacles. An energy-aware management algorithm proposed avoid over-sensation order optimize sensing energy based on amount obtained from environment. needed each agent determined swarm’s self-awareness space domain, i.e., its...
The focus of this work is to present a novel methodology for optimal distribution swarm formation on either side an obstacle, when evading the avoid overpopulation sides reduce agents' waiting delays, resulting in reduced overall mission time and lower energy consumption. To handle this, problem divided into two main parts: 1) disturbance phase: how morph optimally obstacle least possible situation at hand, 2) convergence resume intended shape once threat potential collision has been...
Intrusion detection systems (IDS) are complimentary to other security mechanisms such as access control and authentication. While signature based IDS limited known attacks only, anomaly capable of detecting novel attacks. However, usually trade performance for efficiency. We analyze various list the strengths weaknesses different schemes. conclude that abstract stack model proposed by D. Wagner Dean (see Proc. IEEE Symp. on Security Privacy, 2001) shows best in types attacks, while it...
Delay/disruption tolerant networks (DTNs) are known for frequent and long duration partitions end-to-end connectivity may be absent between the source destination. Anycast service is used applications such as information exchange in hazards/crisis situation, recourse discovery, etc Delay Tolerant Networks. For a specific type of DTN, where mobile nodes sparsely distributed, communicating via low radio range experience partition path not present at time message generation. We have proposed...
Symmetric and asymmetric encryption methods are used when a web browser is to reply emails, submit website forms, perform similar activities. Key size essential enable security, which means the longer key is, better security can be ensured. Purpose: This review aims present an overview of critical length, significant against different types cyber attacks. Methodology: research study based on systematic literature secondary data analysis. Results: The symmetric sizing participate in enabling...
Vehicular Ad-hoc network is an emerging technology, which takes vehicles as nodes and forms a wireless network. The topology of such changes rapidly the are in continuous motion with different speeds, leading to some serious issues that must be handled correctly order make VAN
Growing adoption of cryptocurrencies by institutional investors coupled with recurring incidents loss access to digital wallets have resulted in emergence custodial services for high net worth individuals and institutions.However, such are not economically feasible the wider community crypto owners who left no recourse recovery lost funds.This paper proposes a framework, AFAP, associating certain personally identifying information wallet so that user may prove ownership said wallet.Thus,...
Delay/disruption-tolerant networks (DTNs) are characterized by frequent and long duration partitions end-to-end connectivity may never be present between the source destination at message origination time. Anycast is an important service used for many applications in DTNs such as information exchange hazards/crisis situation, resource discovery etc. In this paper, we propose classification of into three subcategories, namely: utilizing ferries (MFN), interplanetary (IPN) intermittently...
This paper presents an optimal chaining technique for message authentication in lossy environments such as MANets. The scheme is similar topology to star but more economic terms of transmission and computational overhead. overhead independent group size it enables individual packet verification, so ideal selective multicast transmission, video audio streaming. generality the makes suitable many scenarios. A security vulnerability proposed has been identified that limits usefulness this...
The focus of this work is to present a novel methodology for optimal distribution swarm formation on either side an obstacle, when evading the avoid overpopulation sides reduce agents' waiting delays, resulting in reduced overall mission time and lower energy consumption. To handle this, problem divided into two main parts: 1) disturbance phase: how morph optimally obstacle least possible situation at hand, 2) convergence resume intended shape once threat potential collision has been...