期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Mobile Ad-Hoc Networks Applications and Its Challenges 被引量:1
1
作者 Naeem Raza muhammad umar aftab +2 位作者 muhammad Qasim Akbar Omair Ashraf muhammad Irfan 《Communications and Network》 2016年第3期131-136,共6页
Mobile Ad-Hoc Network (MANET) is an infrastructure less wireless network of autonomous collection of mobile nodes (Smart phones, Laptops, iPads, PDAs etc.). Network is self-configured to reconstruct its topology and r... Mobile Ad-Hoc Network (MANET) is an infrastructure less wireless network of autonomous collection of mobile nodes (Smart phones, Laptops, iPads, PDAs etc.). Network is self-configured to reconstruct its topology and routing table information for the exchange of data packets on the joining and leaving of each node on ad-hoc basis. This paper is based on the MANET applications and challenges. The researchers can get the overall concept of MANET as well as its applications and challenges. 展开更多
关键词 MANET MANET Challenges and Applications
在线阅读 下载PDF
Multi-Layer Graph Generative Model Using AutoEncoder for Recommendation Systems 被引量:1
2
作者 Syed Falahuddin Quadri Xiaoyu Li +2 位作者 Desheng Zheng muhammad umar aftab Yiming Huang 《Journal on Big Data》 2019年第1期1-7,共7页
Given the glut of information on the web,it is crucially important to have a system,which will parse the information appropriately and recommend users with relevant information,this class of systems is known as Recomm... Given the glut of information on the web,it is crucially important to have a system,which will parse the information appropriately and recommend users with relevant information,this class of systems is known as Recommendation Systems(RS)-it is one of the most extensively used systems on the web today.Recently,Deep Learning(DL)models are being used to generate recommendations,as it has shown state-of-the-art(SoTA)results in the field of Speech Recognition and Computer Vision in the last decade.However,the RS is a much harder problem,as the central variable in the recommendation system’s environment is the chaotic nature of the human’s purchasing/consuming behaviors and their interest.These user-item interactions cannot be fully represented in the Euclidean-Space,as it will trivialize the interaction and undermine the implicit interactions patterns.So to preserve the implicit as well as explicit interactions of user and items,we propose a new graph based recommendation framework.The fundamental idea behind this framework is not only to generate the recommendations in the unsupervised fashion but to learn the dynamics of the graph and predict the short and long term interest of the users.In this paper,we propose the first step,a heuristic multi-layer high-dimensional graph which preserves the implicit and explicit interactions between users and items using SoTA Deep Learning models such as AutoEncoders.To generate recommendation from this generated graph a new class of neural network architecture-Graph Neural Network-can be used. 展开更多
关键词 RECOMMENDATION systems autoencoder knowledge REPRESENTATION REPRESENTATION learning graph-structured data
在线阅读 下载PDF
A Review Study of Wireless Sensor Networks and Its Security 被引量:1
3
作者 muhammad umar aftab Omair Ashraf +3 位作者 muhammad Irfan muhammad Majid Amna Nisar muhammad Asif Habib 《Communications and Network》 2015年第4期172-179,共8页
The confluence of cheap wireless communication, sensing and computation has produced a new group of smart devices and by using thousands of these kind of devices in self-organizing networks has formed a new technology... The confluence of cheap wireless communication, sensing and computation has produced a new group of smart devices and by using thousands of these kind of devices in self-organizing networks has formed a new technology that is called wireless sensor networks (WSNs). WSNs use sensor nodes that placed in open areas or in public places and with a huge number that creates many problems for the researchers and network designer, for giving an appropriate design for the wireless network. The problems are security, routing of data and processing of large amount of data etc. This paper describes the types of WSNs and the possible solutions for tackling the listed problems and solution of many other problems. This paper will deliver the knowledge about the WSN and types with literature review so that a person can get more knowledge about this emerging field. 展开更多
关键词 WSN OVERVIEW of WSN WSN with TYPES WSN SECURITY RBAC
暂未订购
Analyzing and Enabling the Harmonious Coexistence of Heterogeneous Industrial Wireless Networks
4
作者 Bilal Khan Danish Shehzad +2 位作者 Numan Shafi Ga-Young Kim muhammad umar aftab 《Computers, Materials & Continua》 SCIE EI 2022年第10期1671-1690,共20页
Nowadays multiple wireless communication systems operate in industrial environments side by side.In such an environment performance of one wireless network can be degraded by the collocated hostile wireless network ha... Nowadays multiple wireless communication systems operate in industrial environments side by side.In such an environment performance of one wireless network can be degraded by the collocated hostile wireless network having higher transmission power or higher carrier sensing threshold.Unlike the previous research works which considered IEEE 802.15.4 for the Industrial Wireless communication systems(iWCS)this paper examines the coexistence of IEEE 802.11 based iWCS used for delay-stringent communication in process automation and gWLAN(general-purpose WLAN)used for non-real time communication.In this paper,we present a Markov chain-based performance model that described the transmission failure of iWCS due to geographical collision with gWLAN.The presented analytic model accurately determines throughput,packet transaction delay,and packet loss probability of iWCS when it is collocated with gWLAN.The results of the Markov model match more than 90%with our simulation results.Furthermore,we proposed an adaptive transmission power control technique for iWCS to overcome the potential interferences caused by the gWLAN transmissions.The simulation results show that the proposed technique significantly improves iWCS performance in terms of throughput,packet transaction,and cycle period reduction.Moreover,it enables the industrial network for the use of delay critical applications in the presence of gWLAN without affecting its performance. 展开更多
关键词 Round robin distributed coordination function INTERFERENCE CSMA ieee 802.11 factory automation process automation
在线阅读 下载PDF
A Compromise Programming to Task Assignment Problem in Software Development Project
5
作者 Ngo Tung Son Jafreezal Jaafar +3 位作者 Izzatdin Abdul Aziz Bui Ngoc Anh Hoang Duc Binh muhammad umar aftab 《Computers, Materials & Continua》 SCIE EI 2021年第12期3429-3444,共16页
The scheduling process that aims to assign tasks to members is a difficult job in project management.It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process.This st... The scheduling process that aims to assign tasks to members is a difficult job in project management.It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process.This study aims to propose an approach based on multi-objective combinatorial optimization to do this automatically.The generated schedule directs the project to be completed with the shortest critical path,at the minimum cost,while maintaining its quality.There are several real-world business constraints related to human resources,the similarity of the tasks added to the optimization model,and the literature’s traditional rules.To support the decision-maker to evaluate different decision strategies,we use compromise programming to transform multiobjective optimization(MOP)into a single-objective problem.We designed a genetic algorithm scheme to solve the transformed problem.The proposed method allows the incorporation of the model as a navigator for search agents in the optimal solution search process by transferring the objective function to the agents’fitness function.The optimizer can effectively find compromise solutions even if the user may or may not assign a priority to particular objectives.These are achieved through a combination of nonpreference and preference approaches.The experimental results show that the proposed method worked well on the tested dataset. 展开更多
关键词 MAKESPAN RCPSP SCHEDULING MOP combinatorial optimization compromise programming genetic algorithm
在线阅读 下载PDF
Multi Sensor-Based Implicit User Identification
6
作者 muhammad Ahmad Rana Aamir Raza +5 位作者 Manuel Mazzara Salvatore Distefano Ali Kashif Bashir Adil Khan muhammad Shahzad Sarfraz muhammad umar aftab 《Computers, Materials & Continua》 SCIE EI 2021年第8期1673-1692,共20页
Smartphones have ubiquitously integrated into our home and work environments,however,users normally rely on explicit but inefficient identification processes in a controlled environment.Therefore,when a device is stol... Smartphones have ubiquitously integrated into our home and work environments,however,users normally rely on explicit but inefficient identification processes in a controlled environment.Therefore,when a device is stolen,a thief can have access to the owner’s personal information and services against the stored passwords.As a result of this potential scenario,this work proposes an automatic legitimate user identification system based on gait biometrics extracted from user walking patterns captured by smartphone sensors.A set of preprocessing schemes are applied to calibrate noisy and invalid samples and augment the gait-induced time and frequency domain features,then further optimized using a non-linear unsupervised feature selection method.The selected features create an underlying gait biometric representation able to discriminate among individuals and identify them uniquely.Different classifiers are adopted to achieve accurate legitimate user identification.Extensive experiments on a group of 16 individuals in an indoor environment show the effectiveness of the proposed solution:with 5 to 70 samples per window,KNN and bagging classifiers achieve 87–99%accuracy,82–98%for ELM,and 81–94%for SVM.The proposed pipeline achieves a 100%true positive and 0%false-negative rate for almost all classifiers. 展开更多
关键词 SENSORS SMARTPHONE legitimate user identification
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部