- Masonry and Concrete Structural Analysis
- Cloud Computing and Resource Management
- Energy Efficient Wireless Sensor Networks
- Seismic Performance and Analysis
- Structural Behavior of Reinforced Concrete
- Real-Time Systems Scheduling
- Mobile Ad Hoc Networks
- Distributed and Parallel Computing Systems
- Building materials and conservation
- Blockchain Technology Applications and Security
- Advanced Database Systems and Queries
- Hygrothermal properties of building materials
- Cryptography and Data Security
- Cloud Data Security Solutions
- Structural Response to Dynamic Loads
- Chaos-based Image/Signal Encryption
- Distributed systems and fault tolerance
- Parallel Computing and Optimization Techniques
- Innovative concrete reinforcement materials
- IoT-based Smart Home Systems
- IoT and Edge/Fog Computing
- Advanced Steganography and Watermarking Techniques
- Graph Theory and Algorithms
- Energy Harvesting in Wireless Networks
- Structural Load-Bearing Analysis
Jamia Millia Islamia
2016-2025
East West University
2024
University of Engineering and Technology Peshawar
2012-2022
Government of India
2017
For efficient data gathering in context to energy dissipation, WSN is divided into clusters. Clustering not only organizes a deployed network connected hierarchy but also balances the load thereby dragging out lifetime of system. In cluster based WSN, every sensor node sends gathered information coordinator their respective cluster. The holds responsibility aggregation collected & route it sink network. this paper, fuzzy balanced cost CH selection algorithm (FBECS) proposed which...
Public Key Infrastructure (PKI) is used in Blockchain Technology to authenticate the entities and ensure integrity of blockchain. Proper Protection Bitcoin wallet required for private keys, seeds keys stored external hardware infrastructure. In this paper, overview Blockchain, analysis existing PKI key management are discussed. To achieve confidentiality sensitive records over network, a Group Management scheme secure group communication also proposed.
This paper presents experimental and numerical investigations conducted on typical dhajji buildings found in the northern mountainous areas of Kashmir surrounding regions to evaluate their in-plane lateral load response. The work included an quasistatic cyclic test three full-scale walls as well monotonic tension bend tests main connections. results show that dhajji-dewari system possesses tremendous resilience against forces. function connections, especially connections between vertical...
Seismic performance assessment is carried out for reinforced concrete structure built in low-strength lacking confining ties beam-column joint. Shake-table tests were performed on 1/3rd scaled two-story frame using design-spectrum-compatible accelerogram, to various target levels. The observed with beam longitudinal bar slip and pullout. Joints no experienced extensive damage, cover/core spalling. could resist 70% of the design ground motion remain within code-specified drift limit. code...
This study presents experimental results of quasi-static load test conducted on two full-scale brick masonry walls, one unreinforced and the other confined, to investigate their in-plane lateral behavior before after retrofitting. The walls were constructed closely following system commonly used in Pakistan most South Asian countries. retrofitting tested peak resistance. damaged then retrofitted with grout injection followed by ferrocement overlay retested ultimate failure under identical...
This paper presents an experimental study on the performance of a full-scale unreinforced brick masonry (URM) building system tested under quasi-static loading at Earthquake Engineering Centre, University and Technology in Peshawar, Pakistan. The configuration materials used single-story URM are typical those found northern areas Pakistan affected by 2005 Kashmir earthquake. is part ongoing research for earthquake impact assessment city Abbottabad. Combined shear flexural behavior was...
The global rapid increase in waste tyres accumulation, as well the looming social and environmental concerns, have become major threats recent times. use of Recycled Steel Fiber (RSF) extracted from fiber reinforced concrete can be great profitable engineering applications however choice suitable length volume fractions RSF is presently key challenge that requires research exploration. present experimental work aims at investigating influence varying lengths (7.62 10.16 cm) dosages (1, 1.5,...
<title>Abstract</title> Today, classification is a significant task in data science, and many industries, including healthcare, transport, banking sectors, are required to classify the data. In this NISQ era, quantum computers capable of solving complex challenges can predict results with minimum features. The neural network being studied extensively for machine learning problems. paper, we have performed multiclass using variational circuits on benchmark datasets. A combination classical...
The existing reinforced concrete (RC) buildings around the globe are at risk to earthquakes events due various deficiencies arising for previous codes and construction execution. These vulnerable RC structures retrofitted with different techniques improve their seismic load carrying potential. One of most used techniques, Eccentric Steel Bracing (ESB), has appeared as a favorable technique enhancing strength structures. In this study, application ESB along combination epoxy is investigated....
Rubble-stone masonry structures are found abundantly in the Asian countries along Himalayan range. Such usually constructed dry-stone or mud mortar, which makes them susceptible to damage and collapse earthquakes. In order study seismic behavior of these structures, dynamic shake table tests on three reduced-scale rubble-stone models were conducted. The comprised a representative school building, residential model incorporating simple cost-effective features form horizontal vertical...
Since longer lifetime of the network is utmost requirement WSN, cluster formation can serve this purpose efficiently. In clustering, a node takes charge to coordinate and receive information from member nodes transfer it sink. With imbalance energy dissipation by sensor node, may lead premature failure network. Therefore, robust balanced clustering algorithm solve issue in which worthy candidate will play head role. paper, an enhanced based on fuzzy logic E-CAFL propound improvement over...
Summary Wireless sensor network (WSN) is a key technology that can support Industrial Revolution 4.0. The nodes (SNs) are the important component of WSN. Recharge or repair batteries SNs impossible, and thus, energy most valuable resource Over years, many methods have been proposed to conserve precious concern in WSN how much be saved, which contribute better life WSN‐assisted IoT output reduced when wide region deployed. Energy‐efficient routing one ways reduce power consumption WSNs....
Summary A high‐performance heterogeneous computing environment provides resources for efficient computation of scientific Big Data workflow applications. application comprises thousands interdependent tasks with precedence constraints. Basically, the performance systems mainly depends on scheduling algorithms. These algorithms are considered an NP‐complete problem. In this article, a List Scheduling Task Duplication (LSTD) algorithm is proposed that efficiently minimizes makespan The LSTD...
Cloud Database Management System is a new emerging concept recently introduced in the world. In of Standard architecture not yet been implemented. this paper we are proposing framework for 5-layered cloud database management system. First layer External Layer, closest to user, which manageability, providing transparency and security important issue that should be considered. Second Conceptual Middleware as there heterogeneous databases clouds available market, so here interoperability major...
Summary Wireless Sensor Network (WSN) is developing rapidly and used extensively in various critical applications like military, health, environment etc. Sometimes, the WSN indiscriminately deployed unattended hostile terrains such as border or remote region where besides energy efficiency, security another important issue to be addressed. The adversary can have unauthorised access which lead tampering, modification, interception, eavesdropping With intention of improving efficacy WSN,...