- Opportunistic and Delay-Tolerant Networks
- Mobile Ad Hoc Networks
- Vehicular Ad Hoc Networks (VANETs)
- Wireless Communication Networks Research
- Parallel Computing and Optimization Techniques
- PAPR reduction in OFDM
- Cooperative Communication and Network Coding
- Network Security and Intrusion Detection
- Software-Defined Networks and 5G
- Caching and Content Delivery
- Energy Efficient Wireless Sensor Networks
- Cognitive Radio Networks and Spectrum Sensing
- Bluetooth and Wireless Communication Technologies
- Embedded Systems Design Techniques
- IoT and Edge/Fog Computing
- Advanced Wireless Communication Technologies
- Real-Time Systems Scheduling
- Advanced Power Amplifier Design
- VLSI and FPGA Design Techniques
- Congenital Heart Disease Studies
- User Authentication and Security Systems
- UAV Applications and Optimization
- Human Mobility and Location-Based Analysis
- Network Packet Processing and Optimization
- Cardiovascular Conditions and Treatments
University of the Sciences
2009-2023
National University of Sciences and Technology
2005-2023
South East Technological University
2022
Universitatea Națională de Știință și Tehnologie Politehnica București
2013-2014
The University of Texas at Austin
2008-2010
National University of Science and Technology
2009
Abstract We live in the era of Intelligent Transport Systems (ITS), which is an extension Vehicular AdHoc Networks (VANETs). In VANETs, vehicles act as nodes connected with each other and sometimes a public station. Vehicles continuously exchange collect information to provide innovative transportation services; for example, traffic management, navigation, autonomous driving, generation alerts. However, VANETs are extremely challenging data collection, due their high mobility dynamic network...
Vehicular Ad-Hoc Networks (VANETs) are a challenging yet active research area. It offers wide range of applications, including Intelligent Transport System (ITS), effective road traffic monitoring, efficient flow and safety applications. During real-time data gathering for emergency scenarios, the fixed silent segments cause problem smooth communication. Moreover, critical ITS operations may be delayed due to this problem. This paper proposes Real-Time Traffic-Aware Data Gathering Protocol...
History-based branch direction predictors for conditional branches are shown to be highly accurate. Indirect however, hard predict as they may have multiple targets corresponding a single indirect instruction. We propose the Value Based BTB Indexing (VBBI), correlation-based target address prediction scheme jump instructions. For each static hard-to-predict instruction, compiler identifies `hint instruction', whose output value strongly correlates with of At run time, addresses instruction...
In transfer learning, two major activities, i.e., pretraining and fine-tuning, are carried out to perform downstream tasks. The advent of transformer architecture bidirectional language models, e.g., encoder representation from (BERT), enables the functionality learning. Besides, BERT bridges limitations unidirectional models by removing dependency on recurrent neural network (RNN). also supports attention mechanism read input any side understand sentence context better. It is analyzed that...
In this paper, a novel rotation and scale invariant approach for texture classification based on Gabor filters has been proposed. These are designed to capture the visual content of images their impulse responses which sensitive scaling in images. The filter rearranged according exhibiting response having largest amplitude, followed by calculation patterns after binarizing particular threshold. This threshold is obtained as average energy at pixel. binary converted decimal numbers,...
Infrastructure-less (sometimes known as ad-hoc) networking paradigm is very appealing and potentially shaping its future into almost all emerging networks (i.e., IoT, wireless sensor networks, vehicular ad-hoc emergency, tactical radio etc.). However, when conventional protocols are used, such often perform poorly, mainly because of interference within the network limited throughput. Recent advancements in communications have enabled full-duplex (FD) operation by suppressing...
The revolution of IoT highly impacts on different applications such as remote sensing, smart cities, and digital healthcare. People use devices for performing business transactions, daily tasks, healthcare monitoring. generate huge amounts data assets that have potential applications. Biometrics is a application sensors data. traditional biometric methods PINs, passwords are exposed to numerous attacks replication, repeated passwords, etc. Sensors' data-based continuous authentication...
In the process of software development, regression testing is one major activities that done after making modifications in current system or whenever a evolves. But, test suite size increases with addition new cases and it becomes in-efficient because occurrence redundant, broken, obsolete cases. For reason, results additional time budget to run all these Many researchers have proposed computational intelligence conventional approaches for dealing this problem they achieved an optimized by...
In this letter, a connected dominating set based on-demand routing (CDS-OR) mechanism is proposed for wireless ad hoc networks. We argue that there exists trade-off between CDS size and the amount of information exchanged formation in fully distributed network. Smaller beneficial essential minimizing cost, but (via hello or topology control messages) adds significant traffic overhead to The CDS-OR protocol assures message sizes never exceed small constant, an increase network has no impact...
Generally, the routing protocols for mobile md hoc networks (MANETs) employ a proactive or reactive (on-demand) strategy to facilitate multi-hop routes between different nodes. But, MANETs are ideal such wide range of applications that single protocol is not well suited all network conditions. Hybrid can address this problem by benefiting from both strategies. In article, hybrid CEHR proposed. employs only fraction nodes (core nodes) generate topology broadcasts, while assuring...
Background: Patent Ductus Arteriosus (PDA) is a congenital cardiacdisease of children. Lot work has been done to evaluate the usefulness ofmanagement procedure including medical management and surgery but there isno evidence risk factors associated with PDA. Aim: To find out theassociation leading patent ductus arteriosus in Method: Acase control study was conducted on 240 children, which 120 were cases and120 controls. Children 1-15 years either gender included studythrough Simple Random...
The advancement and spread of the Internet-of-Things (IoT) have massively been increased over a decade. With widespread IoT networks, it is becoming difficult to acquire execute real-time data. Network function virtualization (NFV) provides flexible efficient solution for IoT-based applications service management. NFV creates virtualized environment that can run large number micro-services different by using virtual network functions (VNFs) through placement chaining. In this paper, we...
A tactical network mainly consists of software-defined radios (SDRs) integrated with programmable and reconfigurable features that provide the addition customization different waveforms for scenarios, e.g., situational awareness, video, or voice transmission. The network, which is mission-critical, congested, delay-sensitive, operates in infrastructure-less terrains self-forming self-healing capabilities. It demands reliability need to survive by seamlessly maintaining continuous...
Unlike commercial networks, the tactical networks drive in a critical environment and without backbone infrastructure. These involve mission-critical operations that are dependent on rapid reliable transfer of delay-sensitive data to conduct command control (C2). Owing decentralized dynamic nature, need survive by maintaining seamless simultaneous time-sensitive communication among software-defined radios (SDRs). Under mobility network topology, link status continuously changes cause...
Generally, the multicast routing protocols for mobile ad hoc networks (MANETs) build and maintain a group shared (tree or mesh-based) delivery structure, which results in inefficient propagation of traffic. In this article, source tree based protocol CAMT is proposed. employs only fraction nodes (core nodes) to disseminate their own neighbors' interests network, while assuring representation all receivers these messages. As result, small number interest messages are generated. Moreover,...
Tactical software defined radio (SDR) networks demand stringent requirements of latency, throughput, and reliability. In the past, significant efforts have been made to achieve maximal efficiency with modifications improvements either in an individual layer or through cross-layer design its working protocol. this paper, we propose a novel consisting adaptive multi-input medium access control (AMI-MAC) along intelligent channel allocation scheme supported by multiband multimode physical...
In this fast growing technology and tight integration of physical devices in conventional networks, the resource management adaptive scalability is a problematic undertaking particularly when it comes to network security measures. Current work focuses on software defined (SDN) function virtualization (NFV) based solution address problems management. However, deployment, configuration implementation SDN/NFV-based remains real challenge. To overcome research challenge, paper presents SDN-NFVs...
Mobile Ad hoc Networks (MANETs) augment the conventional wireless networking paradigm by facilitating multi-hop routes among participating nodes, without help from any pre-constructed infrastructure. This potency is endowed many state of art routing protocols proposed in recent years. Some these focus on proactive formulation and maintenance to every destination, some follow a rather reactive approach locate route only when it needed, others try find balance between both. article reviews...
In this paper we have implemented experimental testbed of Heterogeneous Mobile ad hoc network. We consider nodes equipped with Ethernet, 802.11g and Bluetooth. A switching algorithm is proposed that run on having multiple interfaces called gateway nodes. Switching performs two functions. First it captures the network traffic decision, second forwards packet to desired interface. Testbed Linux. To integrate Bluetooth, Bluetooth Network Encapsulation Protocol (BNEP) used. Different scenarios...
Unmanned aerial vehicles (UAVs) are in general faster to deploy and easier operate due many off-the-shelf guidance, navigation, control solutions. Such solutions usually support short-range line-of-sight operations. However, operating a swarm of UAVs for surveillance purposes diverse terrains requires cost-effective wireless connectivity, infrastructure-less operation, adaptive mobility models, multiclass routing solutions, tailored ground station . In this article, we address the challenge...
Software defined radio (SDR) networks are required to achieve endurance, reliability, efficient data transmission, and adaptability various operating requirements. Their immediate deployment in perilous ventures without the use of any permanent infrastructure has made them an inevitable choice for ad hoc tactical scenarios. The design SDR waveforms face challenges due rising requirements cognition reconfigurability. It is not possible fulfill these heterogeneous diverse quality-of-service...