Adnan Nadeem Al Hassan

Adnan Nadeem Al Hassan
Verified
Adnan verified their affiliation via an institutional email.
Verified
Adnan verified their affiliation via an institutional email.
  • PhD (University of Surrey, UK), MCS, FHEA(UK), BSc (CS)
  • Professor at Islamic University of Madinah

About

112
Publications
171,720
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,312
Citations
Introduction
Prof. Adnan Nadeem received his Ph.D. degree from the Institute for Communication Systems, the University of Surrey in the U.K in 2011. He is a Professor & the Head of the Department of Computer Science in FCIS, Islamic University of Madinah. He has published more than 95 research papers in international journals and conferences including a patent & book chapter, its total Impact Factor is 101.17. He has more than 2440 citations of his work. He has also received several awards & Research Grants.
Current institution
Islamic University of Madinah
Current position
  • Professor
Additional affiliations
January 2018 - present
Islamic University of Madinah
Position
  • Professor (Associate)
April 2007 - January 2011
University of Surrey
Position
  • PhD Student
March 2014 - February 2015
Federal Urdu University of Arts, Science and Technology
Position
  • In Charge Department
Education
April 2007 - December 2010
University of Surrey
Field of study
  • Centre for Communication Systems Resaerch

Publications

Publications (112)
Article
Full-text available
Mobile ad hoc networks (MANETs) are well known to be vulnerable to various attacks due to their lack of centralized control, and their dynamic topology and energy-constrained operation. Much research in securing MANETs has focused on proposals which detect and prevent a specific kind of attack such as sleep deprivation, black hole, grey hole, rushi...
Article
Full-text available
Mobile Ad Hoc Networks are vulnerable to a variety of network layer attacks such as black hole, grey hole, sleep deprivation & rushing attacks. In this paper we present an intrusion detection & adaptive response mechanism for MANETs that detects a range of attacks and provides an effective response with low network degradation. We consider the defi...
Article
Full-text available
In the last decade, mobile ad hoc networks (MANETs) have emerged as a major next generation wireless networking technology. However, MANETs are vulnerable to various attacks at all layers, including in particular the network layer, because the design of most MANET routing protocols assumes that there is no malicious intruder node in the network. In...
Conference Paper
Full-text available
Most of the research in securing mobile ad hoc networks (MANETs) has focused on proposals which detect and prevent a specific kind of attack such as sleep deprivation, black hole, grey hole and rushing attacks. In this paper we broaden our previously developed algorithm AIDP and propose a generalized intrusion detection and prevention mechanism. We...
Article
Full-text available
The Internet of Things (IoT) technology facilitates real-time data collection through sensors, enhancing disease detection and management accuracy and crop efficiency. Pest infestations in cotton crops adversely impact its production and ultimately affect the nation's economy which depends on agriculture. Previous research has primarily focused on...
Article
Full-text available
Secure data transmission is critical in public video surveillance applications such as tracking missing persons in large crowd gatherings. It may help the security personnel to monitor & record the live feeds from multiple cameras. However, this live streaming could be falsified. Various cryptographic techniques have been proposed to ensure the int...
Conference Paper
Full-text available
The Kingdom of Saudi Arabia is one of the world’s leading fresh date producers. Identifying damaged date palm trees on the farm is important for saving water and stopping the spread of pest which has caused the damage. In this paper, we aim to evaluate the performance of IoT-based thermal image camera input for the automatic detection of damaged tr...
Article
Full-text available
Considering the importance of cotton products, timely identification of pests (flying moths—being a significant threat to cotton crops) helps to protect cotton crops and improve their production and quality. This study proposes real-time detection of Cotton Flying Moths (CFMs) with the assistance of an Internet of Things (IoT)-based system in the a...
Article
Full-text available
IoT technology and drones are indeed a step towards modernization. Everything from field monitoring to pest identification is being conducted through these technologies. In this paper, we consider the issue of smart pest detection and management of cotton plants which is an important crop for an agricultural country. We proposed an IoT framework to...
Article
Full-text available
Augmented reality (AR) has gained enormous popularity and acceptance in the past few years. AR is indeed a combination of different immersive experiences and solutions that serve as integrated components to assemble and accelerate the augmented reality phenomena as a workable and marvelous adaptive solution for many realms. These solutions of AR in...
Article
Full-text available
This paper presents a large gathering dataset of images extracted from publicly filmed videos by 24 cameras installed on the premises of Masjid Al-Nabvi, Madinah, Saudi Arabia. This dataset consists of raw and processed images reflecting a highly challenging and unconstrained environment. The methodology for building the dataset consists of four co...
Article
Full-text available
Citation: Syed, T.A.; Jan, S.; Siddiqui, M.S.; Alzahrani, A.; Nadeem, A.; Ali, A.; Ullah, A. CAR-Tourist: An Integrity-Preserved Collaborative Augmented Reality Framework-Tourism as a Use-Case.
Article
Full-text available
The unprecedented growth in Augmented Reality (AR) has captured the focus of researchers and the industrial sector. The development of AR applications and their implementation in various domains is broadening. One of the advancements in the field of AR is Collaborative AR, which provides ample opportunities for the members of a team to work on a pa...
Article
In today’s world, the strong economy of a country plays an important role in the journey of development. Many factors help improve the economy and one of these factors is tourism. There are many countries in which their economy is based on tourism. Saudi Arabia is also targeting that their major economic reliance should shift to tourism. Based on t...
Article
Full-text available
Electricity is still a highly demanding resource in developing countries, especifically in rural areas. Local communities in developing countries are now focusing on generating their own electricity using solar and trading the energy which is in access to the supplier. Energy trading at the peer-to-peer level is a novel paradigm. It allows customer...
Article
Full-text available
Locating a missing child or elderly person in a large gathering through face recognition in videos is still challenging because of various dynamic factors. In this paper, we present an intelligent mechanism for tracking missing persons in an unconstrained large gathering scenario of Al-Nabawi Mosque, Madinah, KSA. The proposed mechanism in this pap...
Article
Full-text available
The probability of losing vulnerable companions, such as children or older ones, in large gatherings is high, and their tracking is challenging. We proposed a novel integration of face-recognition algorithms with a soft voting scheme, which was applied, on low-resolution cropped images of detected faces, in order to locate missing persons in a chal...
Article
Full-text available
During the time of the pandemic, travel restrictions have impacted the tourism industry with an estimated loss of more than a trillion USD; however, at the same time, we have seen a significant increase in profits for the industries which empower remote connectivity. Various studies have identified the positive impact of virtual tourism, in which t...
Article
Full-text available
Virtual Tourism (VT) is a booming business with potential perspectives in the entertainment and financial industry. Due to travel restrictions, safety concerns, and expensive travelling the younger generation is showing interest in virtual tourism instead of traditional tourism. However, virtual tourism does not financially benefit the service prov...
Article
Full-text available
In the last few years, the wireless body area network (WBAN) has emerged as an appealing and viable option in the e-health application domain. WBAN technology is primarily used to offer continuous screening of health data to patients, independent of their location, time, or activity. A WBAN, on the other hand, is vulnerable to different cyberattack...
Article
Full-text available
Abstract—Social media has become one of the most important sources of news in our lives, but the process of validating news and limiting rumors remains an open research issue. Many researchers have suggested using Blockchain to solve this problem, but it has traditionally failed due to the large volume of data and users in such environments. In thi...
Article
Full-text available
The history of the world during the pandemic era shows a worse kind of treatment to the effected people. The year 2020 is known as a terrifying year due to pandemics in the world. It badly exposes the healthcare system's weakness especially in the developing countries like Pakistan. Ambulance services played a major role in transporting affected pe...
Article
Full-text available
Blockchain is a revolutionary technology that is making a great impact on modern society due to its transparency, decentralization, and security properties. Blockchain gained considerable attention due to its very first application of Cryptocurrencies e.g., Bitcoin. In the near future, Blockchain technology is determined to transform the way we liv...
Article
Full-text available
With the rapid growth and commercialization of wearable sensor technology, the research community foresees great potential of Body Area Sensor Network (BASN) applications in the healthcare industry, including elderly healthcare. We consider the issue of fall in elderly, which has severe consequences including death. Most of the related proposals in...
Article
Full-text available
More than two millions of pilgrims visit the holy cities of Makkah and Madinah, in Kingdom of Saudi Arabia, to perform Hajj and Umrah rituals every year. Ensuring safety of the pilgrims is the top priority of Saudi government. Therefore, kingdom considers health, safety and security a red line that is not supposed to be crossed at any extent, consi...
Article
Full-text available
In huge crowd gatherings such as Hajj, the probability of losing personal belongings of the pilgrim is relatively high. The consequences are also severe in some cases for example when someone loses his passport or valuables without which it is difficult to travel back to his country. Therefore, in this paper, we propose modeling and prototype appli...
Conference Paper
Full-text available
Performing various transactions on real estate records in the government organization is a cumbersome task and has many pitfalls. There are a number of problems with the existing land registry systems. First, the process of land registry and transferring of a land is currently manual. Even though, some of the processes and records are digitized, ho...
Conference Paper
Key Management in Delay Tolerant Networks (DTN) still remains an unsolved complex problem. Due to peculiar characteristics of DTN, important challenges that make it difficult to design key management architecture are: 1) no systematic requirement analysis is undertaken to define its components, their composition and prescribed functions; and 2) no...
Article
Full-text available
In huge crowd gatherings such as Hajj, the probability of losing personal belongings of the pilgrim is relatively high. The consequences are also severe in some cases for example when someone loses his passport or valuables without which it is diffi cult to travel back to his country. Therefore, in this paper, we propose modeling and prototype appl...
Article
Full-text available
In huge crowd gatherings such as Hajj, the probability of losing personal belongings of the pilgrim is relatively high. The consequences are also severe in some cases for example when someone loses his passport or valuables without which it is diffi cult to travel back to his country. Therefore, in this paper, we propose modeling and prototype appl...
Article
Full-text available
Transactions related to vehicles include manufacturing, buying, selling, paying insurance(takaful), obtaining regular inspection, leasing a vehicle from banks, getting in an accident, engaging in a traffic violation, calculating price predictions and renting a vehicle. Many people perform transactions related to vehicles in their daily life; transp...
Article
Full-text available
Data tracking is of great significance and a central part in digital forensics. In today's complex network design, Internet of Things (IoT) devices communicate with each other and require strong security mechanisms. In maintaining an audit trail of IoT devices or provenance of IoT device data, it is important to know the origins of requests to ensu...
Article
Full-text available
In the past few years, the implementation of blockchain technology for various applications has been widely discussed in the research community and the industry. There are sufficient number of articles that discuss the possibility of applying blockchain technology in various areas, such as, healthcare, IoT, and business. However, in this article, w...
Poster
Full-text available
Improved Hajj and Umrah pilgrim's services is a major target areas in vision 2030 • Huge no of Pilgrims increase chances of loosing their personal belonging or companion • A pilgrim may loose passport without which he/ she cannot travel • No online system is available for reporting lost item and persons • We Propose modelling and prototype applicat...
Article
Full-text available
This paper defines two major data sets 1) from wearable inertial measurement sensors and 2) wearable ECG SHIMMER™ sensors. The first dataset is devised to benchmark techniques dealing with human behavior analysis based on multimodal inertial measurement wearable SHIMMER™ sensors unit during research studies “Fall Detection System for the Elderly Ba...
Article
Full-text available
The annual Islamic pilgrimage, Hajj has become very easy and planned in this era. Authorities in the Kingdom considering to make this Holy event more secure, convenient and controlled by planning strategically and comprehensively. For this, Government launched a program, called Vision 2030. This program intends to facilitate and serve Muslims who g...
Article
Full-text available
Main focus of any organization functioning in today's competitive marketplace is to gain and sustain competitive advantage. With the huge volumes of data stored in databases, data marts and data warehouses coupled with advanced data analysis tools, managers are now in a better position to make smart and effective decisions which result in competiti...
Article
Full-text available
Main focus of any organization functioning in today's competitive marketplace is to gain and sustain competitive advantage. With the huge volumes of data stored in databases, data marts and data warehouses coupled with advanced data analysis tools, managers are now in a better position to make smart and effective decisions which result in competiti...
Data
This is the list of top Elsevier journals [1] related to the research areas of computer science with details of various important parameters including review speed, impact factor, acceptance rate etc. Reference: [1] M. Fanany, "Elsevier computer science Journals list with key parameters" , university Indonesia.
Article
Everything is connected in one way or another in this universe and forms a network such as the internet, biological network (genome network, neural network), physical networks (infrastructure based networks of roads, trains and other communication networks), plant and ecological network, social networks (friendship, coworker, coauthor etc.). Comple...
Article
Full-text available
Fall is one of the major cause of deaths in elderly along with other chronic diseases in all over the world. Therefore, it is important to find a cost effective, non-intrusive and lightweight solution for early fall detection and prevention in elderly. Several fall detection systems have been proposed, using the different types of sensors and techn...
Article
Full-text available
Fall is one of the major cause of deaths in elderly along with other chronic diseases in all over the world. Therefore, it is important to find a cost effective, non-intrusive and lightweight solution for early fall detection and prevention in elderly. Several fall detection systems have been proposed, using the different types of sensors and techn...
Article
Full-text available
Internet of Things (IoT) network are considered the future in monitoring and surveillance. With the advent of autonomous organization, and network and service management, conventional networks are fast integrated with IoT networks. With minimal human interaction, the security of IoT data travelling through the networks becomes more critical. Data P...
Article
Full-text available
Wireless sensor network technology is widely used in the western world for improving agriculture output. However, in the developing countries, the adaptation of technology is very slow due to various factors such as cost and unawareness of farmers with the technology. There are reports in the literature related to the precision agriculture and hope...
Article
Human behavior inference through smart pervasive technologies is a new research avenue. Sophistication in interaction modalities with self-customization based on context makes interaction easier in natural settings. Despite greater sophistication, disabled and elderly person still face difficulties in interaction with smart devices. The interaction...
Article
Full-text available
Wireless Body Area Sensors Networks (BAN) have emerged as new applied wireless networking technology with the development of wearable and implanted sensors. BAN has novel application in healthcare, sports, human activity monitoring, disability assistance and entertain- ment. BAN is now using for real time monitoring and as- sistance of the patients...
Article
Full-text available
One of main reason of road-side accidents (RSA) is the negligence by the driver. Drivers do not concentrate on the road and their surroundings, which would result in deadly accidents both on road and off the road. Using a mobile phone, eating while driving, talking or looking back, and sleeping are some of the activities by drivers that cause these...
Article
Assistive technology has the potential to support persons with dementia (PWDs) in their daily life activities and provide them quality of life services. This paper proposes a novel mechanism in order to manage disorientation or time and place problem of PWD through the use of Bluetooth low energy devices, smart watch and smart phone/ tablet. The pr...
Conference Paper
Full-text available
A Microgrid (MG) is a viable and scalable approach to integrate distributed sources, ensure reliable and secure energy supply to the remote and the mission critical grid. Smarter monitoring, control and energy management is required to ensure economical and reliable operation of the MG. Equipping an MG with smarter sensor for monitoring along with...
Article
Full-text available
MANETs (Mobile Ad-hoc Networks) applications in various walks of life in the last two decades have resulted in introduction of its sub technologies such as VANETs (Vehicular Ad-hoc Network). In this paper, we focus on new ad hoc networking technology called FANET (Flying Ad-hoc Network). FANET introduces the ad hoc networking of flying UAVs to allo...
Article
Full-text available
Programming is one of the career rewarding skills; however, learning programming skill is extremely hard and arduous as supported by several studies. The first programming language has an everlasting impact on the programmer’s program’s development abilities. In most of the universities the imperative paradigm is used for introductory programming c...
Article
Full-text available
Smart monitoring of critical components of Microgrids is required to ensure their economic and reliable operation. We implement a working MG as a test bed which is controlled by an advance distributed control system (DCS). We integrate a smart sensors network supporting internet of things (IoT) into the DCS for real-time as well as time lapsed cond...
Article
Full-text available
Everything in this world is encapsulated by space and time fence. Our daily life activities are utterly linked and related with other objects in vicinity. Therefore, a strong relationship exist with our current location, time (including past, present and future) and event through with we are moving as an object also affect our activities in life. O...
Article
Full-text available
Everything in this world is encapsulated by space and time fence. Our daily life activities are utterly linked and related with other objects in vicinity. Therefore, a strong relationship exist with our current location, time (including past, present and future) and event through with we are moving as an object also affect our activities in life. O...
Article
Full-text available
Dysgraphia, a learning disability associated with writing skills, hinders students to put their thought on paper and write correctly. Writing problems hit students most frequently that one third students become failed to acquire writing skill. Different IT based assistance solutions available for dysgraphia students but most of them are accommodati...
Article
Full-text available
Objectives: Falling in the elderly is considered a major cause of death. In recent years, ambient and wireless sensor platforms have been extensively used in developed countries for the detection of falls in the elderly. However, we believe extra efforts are required to address this issue in developing countries, such as Pakistan, where most deaths...
Article
Full-text available
Objectives: Falling in the elderly is considered a major cause of death. In recent years, ambient and wireless sensor platforms have been extensively used in developed countries for the detection of falls in the elderly. However, we believe extra efforts are required to address this issue in developing countries, such as Pakistan, where most deaths...
Article
Full-text available
In today's world the rapid advancements in Micro-Electromechanical Systems (MEMS) and Nano technology have improved almost all the aspects of daily life routine with the help of different smart devices such as smart phones, compact electronic devices etc. The prime example of these emerging developments is the development of wireless sensors for he...
Article
Full-text available
Underwater wireless sensor network is an emerging wireless networking technology (UWSN). UWSN has various applications for example it can be used for monitoring seismic activities, underwater animal, pipeline etc. UWSN face challenges in their MAC later operations. Different energy efficient MAC protocols have been proposed for underwater wireless...
Article
Full-text available
MANETs (Mobile Ad Hoc Networks) have applications in various walks of life from rescue operations to battle fieled operations, personal and commercial. However, routing operations in MANETs are still vulnerable to anomalies and DoS (Denial of Service) attacks such as sleep deprivation. In SD (Sleep Deprivation) attack malicious node exploits the vu...
Conference Paper
Full-text available
Abstract: In today’s world the rapid advancements in Micro-Electromechanical Systems (MEMS) and Nano technology improved almost all the aspects of daily life routine with the help of different smart devices such as smart phones, compact electronic devices etc. The prime example of these emerging developments is the development of wireless sensors f...
Article
Full-text available
Person with disability and older people need assistance in activities of daily living (ADL). Numerous models exist to view disability with a distinct perspective and provide/propose solution to address the effects and consequences caused by disability and limitation as a result of old age. Present study proposed and evaluated technological model of...
Article
Full-text available
Today the field of wireless sensors have the dominance in almost every person’s daily life. Therefore researchers are exasperating to make these sensors more dynamic, accurate and high performance computational devices as well as small in size, and also in the application area of these small sensors. The wearable sensors are the one type which are...
Article
Full-text available
Wireless Body Area Sensor Network (WBAN) has emerged as special type of wireless sensor networks. This emerging networking technology has applications in healthcare, sports & fitness, activity monitoring and disability assistance. Most of the work in literature in WBAN focuses on MAC and Physical layer. In contrast to this, in this paper, we presen...
Article
Full-text available
Today the field of wireless sensors have the dominance in almost every person’s daily life. Therefore researchers are exasperating to make these sensors more dynamic, accurate and high performance computational devices as well as small in size, and also in the application area of these small sensors. The wearable sensors are the one type which are...
Article
Full-text available
Almost all the human being real life concerned domains are taking advantage of latest technologies for enhancing their process, procedures and operations. This integration of technological innovations provides ease of access, flexibility, transparency, reliability and speed for the concerned process and procedures. Rapid growth of ICT (Information...
Article
Full-text available
People raise speaker volume during conversation on mobile phone as proximty become noisy, and do not lower it down when noise level decreases. Presented work help to mitigate hearing impairments, caused by excessive use of mobile phone users of all age groups. Work has been carried to automate in-call speaker volume with respect to comfortable hear...
Article
Full-text available
Objective: To analyse the frequency of different types of amblyopia and its association with gender. Methods: The cross-sectional study was conducted from March 2014 to October 2014 at the Department of Ophthalmology of a tertiary care hospital inKarachi. The patients were classified into different types of amblyopia like anisometropic, strabism...
Article
Full-text available
An enormous amount of data is being pooled through the use of social media which is being mined to get benefits in different areas such as healthcare, business, and learning. Providing care to elderly at their home environment is understood as a complex problem and different types of systems are being proposed which can eliminate the presence of ca...
Conference Paper
Full-text available
Due to the availability of inexpensive, small and powerful wireless devices such as cell phones, tablet pc, PDAs, applications of Mobile Ad Hoc Network (MANETs) has increased exponentiallyin real life. Manet’s network layer operations are vulnerable to different attacks such as the Sybil. In Sybil attack the attacker use multiple identities during...
Data
The dataset is devised to benchmark techniques dealing with human behavior analysis based on multimodal inertial measurement wearable shimmer sensors. The data set is available at http://adnan-nadeem.com/data-repository/ The dataset comprises body motion recordings for several volunteers of diverse profile while performing certain physical activiti...
Article
Full-text available
Knowledge management is gaining more and more attention from business management with a consideration of knowledge as a critical intellectual resource for organization in getting successful competitive advantage. The aim of integrating of KM processes with business processes is to add value, provide supports and increase productivity. The role of t...
Article
Full-text available
Gene ontology (GO) is a key initiative of bioinformatics to provide uniform description of gene product in different public databases. The GO project has initiated 3 (three) structured and organized controlled vocabularies (i.e. ontology) that describes gene products in term of cellular components, biological processes and functions in an independe...
Article
Full-text available
Pakistan is an agricultural country which depends on agriculture and crops for its economic survival. WSN is an emerging technology all over the world and it is used in agriculture for monitoring different parameters. In this paper we review literature related to general agriculture monitoring, pest disease monitoring, and different pest control me...
Article
Full-text available
Every year a huge amount of charity is collected in Pakistan which is then used to provide different basic needs to needy population. Charity organizations face difficulties when they manage their activities. One of the most challenging tasks for the organizations is to verify donor and needy both. This work proposes a charity model based on Archim...
Article
Full-text available
The word ‘Climate Change” is not as simple and small in meaning as it seen. It exhibits dangerous and alarming consequences. Climate changes is continuous process from East to West, North to South, Soil to Sky, Water to Air, Forest to Desert, Ocean to Mountains, in fact everywhere. Climate change Monitoring (CCM) is the phenomena to observe and rec...
Article
In recent years the task of recognizing human face with the help of a machine has acquired a significant attention among researchers. A wide range of commercial and law enforcement applications largely accounts for this developing trend. Although current face recognition systems have reached a certain maturity level they are still far away from the...
Research Proposal
Wireless Body Area Sensor Networks (WBASNs) applications have emerged as major type of Wireless Sensor Networks (WSN). Ample research work has already carried out to improve the QoS in WSN. However, QoS provision in WBASN needs further investigation. Majority of the research work in WBASN improves the QoS considering timeliness, latency or energy a...
Article
Full-text available
Mobile ad hoc Networks and Vehicular Ad Hoc networks have emerged as advanced wireless networks. These networks have their applications in various walks of life. Mobility of nodes in these networks is a major benefit for the end users. However, modeling the mobility of the nodes in these networks is a key for the researcher. In this paper, we first...
Article
Full-text available
People with disability of any kind i.e. physical, mental or psychological may still be able to actively participate in society and spend a better life by using Assistive Technology devices/appliances. Assistive technology refers to the technology that provides assistance to disable person in reducing the effects of disability and enabling them to t...
Article
Full-text available
The most important concern in the medical domain is to consider the interpretation of data and perform accurate diagnosis. To improve diagnostic process and avoid misdiagnosis, many e-Health systems use artificial intelligence method and especially artificial neural network to manipulate diverse type of clinical data. A common bone disease ‘osteopo...
Article
Full-text available
Since the data or information has become an asset of any organizations, therefore revealing, misusing and sharing the personal data of any individual or company are considered as a type of cyber crime. Therefore acts are there in different regions of the world to address this crime. The countries where acts are approved need to improve it by indulg...
Article
Full-text available
Wireless Body Area Sensor Networks (WBASNs) applications have emerged as major type of Wireless Sensor Networks (WSN). It has a wide range of applications and plays a vital role in a society, particularly in health care system. Healthcare applications using WBASN required uninterrupted and reliable communication. In healthcare applications particul...
Article
Full-text available
Wireless Body area sensor networks (WBASN) are an interesting and emerging application of wireless sensor networks. WBASN has a wide range of applications but health care is most beneficiary of this technology, which requires uninterrupted and reliable communication between sensors, Sinks and outside WBASN. This paper introduces the reliability asp...
Article
Full-text available
Mobile Ad hoc Networks are one of the fast growing self organized networks, which has application in wider domains such as crisis management, battlefield, personal networking. However, due to cooperative nature of the network MANETs are vulnerable to various types of misbehaviour from both legitimate and malicious users. It is tricky to distinguish...
Research Proposal
Wireless Body Area Sensor Networks (WBASNs) applications have emerged as major type of Wireless Sensor Networks (WSN). It has a wide range of applications and plays a vital role in a society, particularly in health care system. Healthcare applications using WBASN required uninterrupted and reliable communication. In healthcare applications particul...
Poster
Full-text available
This poster introduce these emerging wireless networking technologies and highlight current research trends in these areas.
Poster
Full-text available
In this poster discussed the Rushing Attack in Manet, and different techniques to reduce the harmful effect of Rushing Attack. In the future, we will deduct some new techniques to prevent the Rushing attack in Manet.
Poster
Full-text available
BASN consists of sensors placed in and around the human body for monitoring a different body functions.This poster introduces the existing WBASN applications and suggests some future applications of WBASN

Questions

Questions (4)
Question
Kindly provide your feedback, experience, research on using chirp spread spectrum based equipment/ devices for tracking.
Adnan
Question
There are various obvious questions that are asked these days about the next generation of Energy trading, their technological challenges and beneficiaries. Do you foresee that at micro-level home consumers will be able to take advantage through trading their reserve energies?
Question
The integration of this feature with existing off the shelf CCTV surveillance solutions.
Question
Research community has aggressively exploring the potential of blockchain technology for the last few years. This technology has made people think of mitigating the role of central authority. Could blockchain replace central banks in a practical and legal terms! (What do you think?)
Regards
Dr Adnan Nadeem

Network

Cited By