Idrees Ahmed

ORCID: 0000-0003-0090-5478
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Scientific Computing and Data Management
  • Mobile Ad Hoc Networks
  • Cooperative Communication and Network Coding
  • Opportunistic and Delay-Tolerant Networks
  • Research Data Management Practices
  • Cloud Data Security Solutions
  • Privacy-Preserving Technologies in Data
  • Vehicular Ad Hoc Networks (VANETs)
  • Management of metastatic bone disease
  • Spinal Fractures and Fixation Techniques
  • Geochemistry and Geologic Mapping
  • Medical Imaging and Analysis
  • Foreign Language Teaching Methods
  • Innovative Educational Technologies
  • Security in Wireless Sensor Networks
  • Data Quality and Management
  • Educational Innovations and Challenges
  • Distributed and Parallel Computing Systems

COMSATS University Islamabad
2016-2018

Cooperation among nodes is mandatory for smooth operation of Mobile Ad Hoc Networks (MANETs) in terms data routing. A participating node may refuse to deplete its resources the benefit others because not getting any direct advantage service. Nodes showing such behavior are called selfish or non-cooperative nodes. Non-cooperative can severely affect performance MANETs. MANETs lead network partitioning. In this paper, we address issue by incorporating concept fuzzy logic closely coupled with...

10.1109/aina.2016.142 article EN 2016-03-01

Sensor networks support the collection and transmission of large volume data from different deployed environments. Source nodes send captured to base station (BS) through intermediate nodes. Data integrity is an important security challenge in Wireless Networks (WSN). One main requirements WSN received at BS. We explore problem efficient secure watermarked both one-to-one aggregation streaming sensor also detect malicious modifications original data. In this work, we propose a method verify...

10.1109/nbis.2016.35 article EN 2016-09-01

With the explosion of information in daily life, determining trustworthiness data has become inevitable. As from different sources can be used critical applications such as health-care and military for decision making, provenance plays an important role to gauge data. Although, lots research been conducted out on generation, management/storage dissemination various fields computing as: databases, scientific workflows, file systems, distributed cloud computing, wireless sensor networks....

10.1109/trustcom.2016.0307 article EN 2015 IEEE Trustcom/BigDataSE/ISPA 2016-08-01

Introduction: The measurement of cerebral ventricle size is crucial for diagnosing and differentiating early stages abnormal ventricular dilatation. This study aimed to establish a reference database normal sizes in adults Erbil, considering different age groups genders. Methods: A retrospective cross-sectional analysis was conducted at tertiary care hospital Erbil from January 2022 December 2024. Computerized tomography (CT) scans 173 (83 males 90 females) aged 18–99 years underwent...

10.34172/ijbsm.47679 article EN cc-by International journal of basic science in medicine 2024-09-30

Security schemes proposed for Mobile Ad hoc Networks (MANETs) based on node's trust computation consider packet drop as a sign of misbehaving from malicious nodes. However, this may not be always true because node mobility and limited processing capability feature nodes in MANETs. As are free to move MANETs, loss occur due mobility, non-availability next hop nodes, so on. Moreover, frequent data multiple sources, forwarding queue overflow that causes loss. Furthermore, also congestion the...

10.1109/trustcom/bigdatase.2018.00028 article EN 2018-08-01

To detect and isolate the misbehaving nodes in MANETs, reputation-based security schemes have been developed. These either utilize only first-hand (direct) information or both second-hand information, to compute trustworthiness of nodes. Both aforementioned categories their own strengths weaknesses under different network conditions scenarios. An adaptive scheme is desired that can optimally first second hand by assigning appropriate weights according conditions. In this paper, we analyze...

10.1109/trustcom.2016.0059 article EN 2015 IEEE Trustcom/BigDataSE/ISPA 2016-08-01

The major, trace, rare earth elements, and stable isotopes (carbon oxygen) compositions were analyzed to study the geochemical characteristics origin of Lower Jurassic dolomites from Sarki Sehkaniyan formations at Imbricated Zone, Northern Iraq. narrow range CaO MgO contents, their positive correlation, high Mg/Ca values suggest sedimentary early contemporaneous dolomitization. are characterized by low Fe, Mn, Sr, relatively moderate Na ΣREE formation temperatures, no LREE enrichment,...

10.2139/ssrn.4123461 article EN SSRN Electronic Journal 2022-01-01

Objectives: The study determined the radiological outcomes of short-segment vs. long-segment fixation thoracolumbar spine fractures.
 Materials and Methods: A total 322 patients (18 – 60 years) with fractures were included. Preoperative X-rays CT scans performed on all to determine integrity orientation pedicle. Cobb's approach was also used estimate kyphotic angle x-rays. posterior pedicle 65 screw in instances. Group (N = 161) received long segment at least two levels above below...

10.36552/pjns.v26i3.778 article EN Pakistan Journal Of Neurological Surgery 2022-09-30
Coming Soon ...