- Advanced Wireless Communication Technologies
- Cooperative Communication and Network Coding
- Full-Duplex Wireless Communications
- Wireless Communication Security Techniques
- Mobile Ad Hoc Networks
- Opportunistic and Delay-Tolerant Networks
- Energy Harvesting in Wireless Networks
- Indoor and Outdoor Localization Technologies
- Antenna Design and Analysis
- Advanced MIMO Systems Optimization
- IoT Networks and Protocols
- Wireless Networks and Protocols
- Music and Audio Processing
- Optical Wireless Communication Technologies
- Radio Wave Propagation Studies
- Blockchain Technology Applications and Security
- Vehicular Ad Hoc Networks (VANETs)
- Underwater Vehicles and Communication Systems
- Autonomous Vehicle Technology and Safety
- IoT and GPS-based Vehicle Safety Systems
- Antenna Design and Optimization
- Millimeter-Wave Propagation and Modeling
- Speech and Audio Processing
- Advanced Malware Detection Techniques
- Satellite Communication Systems
Management and Science University
2025
University of Management and Technology
2018-2024
Lahore University of Management Sciences
2014-2019
Virginia Tech
2008
The automotive industry is transitioning towards intelligent, connected, and autonomous vehicles to avoid traffic congestion, conflicts, collisions with increased driver safety. Connected (CAV) must be aware of their surroundings act as per environment. Communication infrastructure can vital in transmitting necessary information peers receiving critical for timely decisions. This article provides a comprehensive review the topic, covering aspects enabling wireless technologies sensor fusion....
Abstract Future connected and autonomous vehicles (CAVs) must be secured against cyberattacks for their everyday functions on the road so that safety of passengers can ensured. This article presents a holistic review cybersecurity attacks sensors threats regarding multi‐modal sensor fusion. A comprehensive intra‐vehicle inter‐vehicle communications is presented afterward. Besides analysis conventional countermeasures CAV systems, detailed modern machine learning, federated blockchain...
The increasing use of Global Positioning System (GPS)-based autonomous drones in various civilian and military applications has raised concerns about malicious or unintentionally harmful activities that can be carried through them. It is necessary to detect these intruding within protected areas prevent their unauthorized access by denying them entry. We propose a framework combines the detection using an L-band radar then counters transmitting fake GPS coordinates toward drones, effectively...
Abstract With the increasing user density of wireless networks, various partitioning techniques or algorithms segregate users into smaller, more manageable clusters. The benefit clustering in non-orthogonal multiple access (NOMA) is to optimize resource allocation and improve network performance, spectral efficiency, fairness next-generation particularly scenarios with a high diverse channel conditions. users, creates clusters before implementing within these In this paper, we have organized...
This paper reports data collected during the first Mobile Ad-hoc Network Interoperability And Cooperation (MANIAC) Challenge, a multi-institution competition that allows us to study issues of interoperability and cooperation in mobile ad hoc networks (MANETs). We characterize network topology routing. The former includes connectivity diameter, node degree distribution, clustering, frequency changes. latter route length asymmetry, changes, packet delivery ratio. Results show high even when...
We propose layered multiplexed-coded decode-and-forward (LMDF) relaying for a wireless multicast network. Splitting the message into two layers, source encodes them separately and maps to quadrature amplitude modulation (QAM) constellation achieve superposition, thus allowing partial recovery at relay destinations. The key component of LMDF is multiplexed coding that enables each destination divert all channel resources toward decoding layers remain unrecoverable from source's transmission....
This paper presents a prototype implementation and experimental performance evaluation of compress- and-forward (CF) relaying using software-defined radios. Under QPSK transmissions from all nodes, the relay demodulates received signal before applying distributed joint source-channel coding (DJSCC) implemented with help an off-the- shelf convolutional code. The destination employs two stages standard BCJR decoding; DJSCC decoding stage for relay's demodulated data followed by another to...
We consider an uplink non-orthogonal multiple access (NOMA) setup in which two nodes rely on a radio-frequency energy harvester with finite-capacity battery for their transmissions. investigate the effect of harvester's capacity average latency required successful delivery messages Rayleigh faded environment. Under successive interference cancellation decoding strategy automatic-repeat request protocol, we formulate as function both "charging time" and "decoding time". derive closed-form...
We consider two-user relay-aided uplink nonorthogonal multiple access (NOMA) with noisy network coding (NNC) at the relay. The NNC-based cooperation strategy relay relies on quantization followed by joint source-channel coding, while destination it utilizes decoding using non-orthogonal signals received from sources and After presenting information theoretic achievable rates for scheme, we discuss how outperforms conventional compress-and-forward (CF) even when has to global channel state...
We consider a non-orthogonal multiple access channel in which users communicate with base-station through dedicated relay. For this setup, we propose novel joint-noisy network-coded (J-NNC)-decode-and-forward (DF) cooperation scheme that employs NNC relaying opportunistic DF. The proposed utilizes the DF when messages from all are successfully decoded at relay and is unable to decode any one of users. In scenario decodes only subset users, joint encoding. derive information theoretic...
Optimal resource allocation is crucial for 5G and beyond networks, especially when connecting numerous IoT devices. In this paper, user clustering power challenges in the downlink of a multi-carrier NOMA system are investigated, with sum rate as optimization objective. The paper presents an iterative process, starting followed by users. Although simultaneous transmission multiple users achieves high throughput NOMA, it leads to more energy consumption, which limited battery capacity...
Reconfigurable Intelligent Surfaces (RIS) have emerged as a promising technology to enhance wireless communication systems by leveraging the propagation environment. This paper introduces novel approach optimize beamwidth of RIS for mitigating intra-beam interference. The proposed framework aims at achieving efficient beamforming while maintaining low interference levels. optimization problem is formulated convex task, seeking minimize beam pattern's ensuring precise alignment with desired...
Cooperation among nodes in an ad hoc network is essential for multi-hop communication. Non-cooperative or selfish reduce (or cease) cooperation by refusing to forward packets others. In this demo we showcase the interactions between various strategies and quantify their impact on timely delivery of traffic across routes. The are implemented under Linux operating system run composed virtual multiple physical workstations. includes interactive component that allows audience select strategy...
We consider layered decode-forward (DF) cooperation in a relay-aided wireless multicast network. Splitting the source-message into two equal layers, we provide unequal power allocation to individual layers through simple mapping operation on QAM constellation. The layering process thus allows destinations partially recover message from source's transmissions. At relay, propose multiplexed-coded approach that, with single transmission, caters for disparity number of decoded at different...
We consider layered decode-forward (DF) cooperation in a relay-aided wireless multicast network. Splitting the source-message into two equal layers, we provide unequal power allocation to individual layers through simple mapping operation on QAM constellation. The layering process thus allows destinations partially recover message from source's transmissions. At relay, propose multiplexed-coded approach that, with single transmission, caters for disparity number of decoded at different...
We design and implement a practical layered multiplexed-coded decode-forward (LMDF) relaying strategy for wide-band wireless multicast network. The proposed LMDF scheme relies on layering at the source, with individual layers provided unequal power allocation through simple bit-mapping operation to quadrature amplitude modulation constellations. At relay, utilizes approach that, single transmission, caters disparity in number of decoded different destinations. Under setup hard-decision...
We develop a practical layered detect-compress-and-forward (LDCF) coding framework for three-node relay network. Assuming all transmissions to be mapped Quadrature Amplitude Modulation (QAM) constellations, the LDCF at utilizes maximum-likelihood detection, followed by multi-level convolutional structure achieve distributed joint source-channel of detected indices. The layering is achieved mapping more important detection bit-planes significant QAM constellation, thus providing them higher...
We propose, design, and prototype (using software defined radios) a layered hybrid decode-estimate- and-forward relaying strategy. The scheme relies on splitting the source message into two layers with unequal error protection (UEP). Considering half-duplex relay operation, cooperation takes place over time-slots. attempts to decode both during first time-slot; probability of successfully decoding one being higher than other due UEP between layers. During second time-slot, transmits jointly...