Md. Jalil Piran

ORCID: 0000-0003-3229-6785
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Advanced Wireless Communication Technologies
  • Advanced MIMO Systems Optimization
  • Cognitive Radio Networks and Spectrum Sensing
  • Energy Harvesting in Wireless Networks
  • UAV Applications and Optimization
  • Privacy-Preserving Technologies in Data
  • Wireless Communication Security Techniques
  • Image and Video Quality Assessment
  • Cooperative Communication and Network Coding
  • Vehicular Ad Hoc Networks (VANETs)
  • Energy Efficient Wireless Sensor Networks
  • Brain Tumor Detection and Classification
  • IoT Networks and Protocols
  • Topic Modeling
  • Anomaly Detection Techniques and Applications
  • Wireless Body Area Networks
  • Sentiment Analysis and Opinion Mining
  • Software-Defined Networks and 5G
  • Opportunistic and Delay-Tolerant Networks
  • Image and Signal Denoising Methods
  • Millimeter-Wave Propagation and Modeling
  • Context-Aware Activity Recognition Systems
  • Flood Risk Assessment and Management

Sejong University
2016-2025

Seojeong University
2021-2022

Kyung Hee University
2014-2016

Yong In University
2015

Imperial College London
1984

Driven by the emergence of new compute-intensive applications and vision Internet Things (IoT), it is foreseen that emerging 5G network will face an unprecedented increase in traffic volume computation demands. However, end users mostly have limited storage capacities finite processing capabilities, thus how to run on resource-constrained has recently become a natural concern. Mobile edge computing (MEC), key technology fifth generation (5G) network, can optimize mobile resources hosting...

10.1109/access.2020.3001277 article EN cc-by IEEE Access 2020-01-01

The fast development of the Internet Things (IoT) technology in recent years has supported connections numerous smart things along with sensors and established seamless data exchange between them, so it leads to a stringy requirement for analysis storage platform such as cloud computing fog computing. Healthcare is one application domains IoT that draws enormous interest from industry, research community, public sector. improving patient safety, staff satisfaction, operational efficiency...

10.3390/electronics8070768 article EN Electronics 2019-07-09

Flooding produces debris and waste including liquids, dead animal bodies hazardous materials such as hospital waste. Debris causes serious threats to people’s health can even block the roads used give emergency aid, worsening situation. To cope with these issues, flood management systems (FMSs) are adopted for decision-making process of critical situations. Nowadays, conventional artificial intelligence computational (CI) methods applied early event detection, having a low false alarm rate....

10.1080/19942060.2018.1448896 article EN cc-by Engineering Applications of Computational Fluid Mechanics 2018-01-01

Summary Recently Internet of Things (IoT) is being used in several fields like smart city, agriculture, weather forecasting, grids, waste management, etc. Even though IoT has huge potential applications, there are some areas for improvement. In the current work, we have concentrated on minimizing energy consumption sensors network that will lead to an increase lifetime. this optimize consumption, most appropriate Cluster Head (CH) chosen network. The proposed work makes use a hybrid...

10.1002/spe.2797 article EN Software Practice and Experience 2020-02-11

Massive connectivity and limited energy are main challenges for the beyond 5G (B5G)-enabled massive Internet of Things (IoT) to maintain diversified Qualify Service (QoS) huge number IoT device users. Motivated by these challenges, this article studies performance cooperative simultaneous wireless information power transfer (SWIPT) nonorthogonal multiple access (NOMA) systems. Under practical assumption, residual hardware impairments (RHIs) channel estimation errors (CEEs) taken into...

10.1109/jiot.2020.3029754 article EN IEEE Internet of Things Journal 2020-10-09

The Industrial Internet of Things (IIoT) is an emerging technology that can promote the development industrial intelligence, improve production efficiency, and reduce manufacturing costs. However, anomalies IIoT devices might expose sensitive data about users high authenticity validity, resulting in security privacy threats to applications. That suggests significance anomaly detection executed by proper authorities. To address these problems, this paper, we propose a reliable strategy for...

10.1109/jiot.2021.3074382 article EN IEEE Internet of Things Journal 2021-04-21

By amalgamating recent communication and control technologies, computing data analytics techniques, modular manufacturing, Industry 4.0 promotes integrating cyber–physical worlds through systems (CPS) digital twin (DT) for monitoring, optimization, prognostics of industrial processes. A DT enables interaction with the image physical objects/processes to simulate, analyze, their real-time operation. is rapidly diffusing in numerous industries interdisciplinary advances Internet things (IIoT),...

10.1016/j.jnca.2021.103309 article EN cc-by Journal of Network and Computer Applications 2022-01-11

The abnormal growth of malignant or nonmalignant tissues in the brain causes long-term damage to brain. Magnetic resonance imaging (MRI) is one most common methods detecting tumors. To determine whether a patient has tumor, MRI filters are physically examined by experts after they received. It possible for images different specialists produce inconsistent results since professionals formulate evaluations differently. Furthermore, merely identifying tumor not enough. begin treatment as soon...

10.1109/jbhi.2023.3266614 article EN IEEE Journal of Biomedical and Health Informatics 2023-04-12

10.1016/j.engappai.2023.106361 article EN Engineering Applications of Artificial Intelligence 2023-05-10

The intermittent and uncertain nature of wind places a premium on accurate power forecasting for the reliable efficient operation grids with large-scale penetration. Herein, six-month-ahead models were developed using tree-based learning algorithms. Three to investigate impact input data accuracy. first model was trained average standard deviation speed values measured at height 40 m 10-min sampling time. To evaluate time performance, second 1-h, 12-h, 24-h times. assess effect measuring...

10.1109/access.2020.3017442 article EN cc-by IEEE Access 2020-01-01

Recently, edge artificial intelligence techniques (e.g., federated learning) are emerged to unleash the potential of big data from Internet Things (IoT). By learning knowledge on local devices, privacy preserving and Quality Service (QoS) guaranteed. Nevertheless, dilemma between limited on-device battery capacities high energy demands in is not resolved. When exhausted, process will have be interrupted. In this article, we propose a novel wirelessly powered (WPEG) framework, which aims...

10.1109/jiot.2020.3024246 article EN IEEE Internet of Things Journal 2020-09-15

Cellular Internet of Things (IoT) is considered as de facto paradigm to improve the communication and computation systems. IoT connects massive number physical virtual objects using cellular networks. The latest generation networks, e.g. fifth-generation (5G), use evolutionary revolutionary technologies notably performance wireless However, given envisioned new use-cases, e.g., holographic communication, ever-increasing deployment smart-physical end-devices in IoT, volume network traffic has...

10.48550/arxiv.2101.12475 preprint EN cc-by arXiv (Cornell University) 2021-01-01

Internet of Things acts an essential role in our everyday lives and it definitely has the potential to grow on importance revolutionize future. However, present communication technologies have several security related issues which is required provide secure end connectivity among services. Moreover, due recent, rapid growth quantum technologies, most common mechanisms considered today may be soon imperilled. Thus, modern during their construction also require power resist various attacks...

10.1109/access.2020.2992820 article EN cc-by IEEE Access 2020-01-01

The fifth generation (5G) of wireless communication is in its infancy, and evolving versions will be launched over the coming years. However, according to exposing inherent constraints 5G emerging applications services with stringent requirements e.g. latency, energy/bit, traffic capacity, peak data rate, reliability, telecom researchers are turning their attention conceptualize next communications, i.e. 6G. In this paper, we investigate 6G challenges, requirements, trends. Furthermore,...

10.1109/iccece46942.2019.8941882 preprint EN 2019-08-01

With the worldwide large-scale outbreak of COVID-19, Internet Medical Things (IoMT), as a new type (IoT)-based intelligent medical system, is being used for COVID-19 prevention and detection. However, since widespread use IoMT will generate large amount sensitive information related to patients, it becoming more important yet challenging ensure data security privacy applications in IoMT. The leakage private during fusion process cause serious problems affect people's willingness contribute...

10.1109/jiot.2020.3033129 article EN IEEE Internet of Things Journal 2020-10-22

Industrial Internet of Things (IIoT) is ushering in huge development opportunities the era Industry 4.0. However, there are significant data security and privacy challenges during automatic real-time collection, monitoring for industrial applications IIoT. Data IIoT closely related to reliability users, which determined by user authentication that have been widely used as an effective approach. existing mechanisms suffer from single factor poor adaptability with rapid growth number users...

10.1109/tii.2021.3049405 article EN IEEE Transactions on Industrial Informatics 2021-01-05

Surveillance drones, called as unmanned aerial vehicles (UAVs), are aircrafts that utilized to collect video recordings, still images, or live of the targets, such vehicles, people specific areas. Particularly in battlefield surveillance, there is high possibility eavesdropping, inserting, modifying deleting messages during communications among deployed drones and ground station server (GSS). This leads launch several potential attacks by an adversary, main-in-middle, impersonation,...

10.1109/jiot.2020.3049003 article EN IEEE Internet of Things Journal 2021-01-04
Coming Soon ...