Kayhan Zrar GhafoorKnowledge University
Kayhan Zrar Ghafoor
PhD in Wireless Networks
About
101
Publications
42,650
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,988
Citations
Introduction
Publications
Publications (101)
Over the past ten years, the automotive industry and vehicular ad hoc networks (VANETs) have drawn the attention of numerous researchers. Vehicles in vehicular scenarios are traveling at high speed which leads to fast-changing of network topology and performance degradation of routing of data packets toward the destination. To overcome these obstac...
The focus on accurate Point-Of-Interest (POI) recommendation, specifically in location-based services (LBS), has gained all social-network developers’ attention. This is because the POI service has a significant role in helping users to locate targeted areas, including hospitals, airports, stations, billing addresses, post-office, shopping-mall, an...
Smart City is defined as the use of technology and ICT based innovation to provide efficient services within a system. Smart Cities concept increases the efficiency of urban services, enhancing quality of life and generates new economic opportunities. But to wonder, the debate on the term “SMART CITIES” still continues. It is a dynamic term, having...
This article mitigates the challenges of previously reported literature by reducing the operating cost and improving the performance of network. A genetic algorithm-based tabu search methodology is proposed to solve the link capacity and traffic allocation (CFA) problem in a computer communication network. An efficient modern super-heuristic search...
The first COVID-19 confirmed case was reported in Wuhan, China, and spread across the globe with an unprecedented impact on humanity. Since this pandemic requires pervasive diagnosis, developing smart, fast, and efficient detection techniques is significant. To this end, we have developed an Artificial Intelligence engine to classify the lung infla...
The Sustainable Development Goals of the United Nations prioritize sustainability by 2030. The fashion industry is one most substantial manufacturing industries that generate an economy of 3 trillion dollars and contributes to 2% of the world’s gross domestic product. In addition to this, the fashion industry must focus on social and environmental...
Vehicular ad hoc networks (VANETs) are counted as a state-of-art technology that can be considered to provide reliable communication which increases the safety and convenience of drivers on the road. Due to channel congestion occurrence in both highway and urban scenarios, many of VANET’s safety applications face degradation in their quality of ser...
Cyber-Physical Systems (CPS) are developed by the integration of computational algorithms and physical components and they exist as a result of technological advancement in embedded systems, distributed systems, and sophisticated networking technologies. Typically, these systems are intended to monitor and manipulate real-environment processes and...
The transportation problem is a very applicable and relevant logistic problem. In this paper, to test meta-heuristics on the transportation problem and also improve initial feasible solutions in few number of iterations, four recent and effective meta-heuristic algorithms are used to solve transportation problems. Laying Chicken Algorithm (LCA), Vo...
The topology optimization of computer communication network is studied based on improved genetic algorithm (GA), a network optimization design model based on the establishment of network reliability maximization under given cost constraints, and the corresponding improved GA is proposed. In this method, the corresponding computer communication netw...
To feed a growing population, sustainable agriculture practices are needed particularly for irrigation. Irrigation makes use of about 85% of the world’s freshwater resources. Thus, for efficient utilization of water in irrigation, conventional irrigation practices need to either be modified or be replaced with advanced and intelligent systems deplo...
The demand for using location-based services (LBSs) is rapidly increased, specifically in the last decade. Most people’s daily activities are related to LBS services, including navigation, billing address, tracking stuff, transportation, and other point-of-interest (POI). In the same manner, many solutions are widely available to process the positi...
Since the initial reports of the Coronavirus surfacing in Wuhan, China, the novel virus currently without a cure has spread like wildfire across the globe, the virus spread exponentially across all inhabited continent, catching local governments by surprise in many cases and bringing the world economy to a standstill. As local authorities work on a...
The current onboard wireless and sensors technologies have a significant role in improving day-to-day users’ activities. Examples of these technologies are WiFi, Bluetooth, Cellular, Global Navigation Satellite System (GNSS), proximity, camera, and inertial sensors. Using these technologies provides many applications from the range of communication...
This paper intended to investigate and analyze encryption algorithms that can be proposed to perform data security in 4G and 5G networks. The research explores different standards, services, and features presented via 4G and 5G networks. Also, the basic components of encryption algorithms (e.g., ZUC, SNOW 3G, and AES) are investigated. For instance...
Supply chains (SC) present performance bottlenecks that contribute to a high level of costs, infiltration of product quality, and impact productivity. Examples of such inhibitors include the bullwhip effect, new product lines, high inventory, and restrictive data flows. These bottlenecks can force manufacturers to source more raw materials and incr...
With time smart services have become more domineering than ever before however, the pertinent security considerations fade to correspond with growing heterogeneity in the internet of things (IoT) devices and new technologies coupled with resource constraints, crafting IoT‐based systems more susceptible to cyber‐attacks. To ensure a secure IoT envir...
Harris Hawks Optimizer (HHO) is one of the many recent algorithms in the field of metaheuristics. The HHO algorithm mimics the cooperative behavior of Harris Hawks and their foraging behavior in nature called surprise pounce. HHO benefits from a small number of controlling parameters setting, simplicity of implementation, and a high level of explor...
The novel coronavirus 2019 (COVID-19) first appeared in Wuhan province of China and spread
quickly around the globe and became a pandemic. The gold standard for confirming COVID-19
infection is through Reverse Transcription-Polymerase Chain Reaction (RT-PCR) assay. The lack of
sufficient RT-PCR testing capacity, false negative results of RT-PCR, ti...
Meta-heuristic algorithms have been proposed to solve several optimization problems in different research areas due to their unique attractive features. Traditionally, heuristic approaches are designed separately for discrete and continuous problems. This paper leverages the meta-heuristic algorithm for solving NP-hard problems in both continuous a...
Without an effective vaccine, treatment, or therapy, the COVID-19 spreading like fire and claiming lives. Countries began to adopt various strategies such as lockdown, mass testing, tracing, quarantine, sanitization, isolation, and treatment to contain COVID-19. However, it was soon realized that we need to take the help of powerful technologies to...
In this paper, we performed a comparative analysis using machine learning algorithms named support vector machine (SVM), decision tree (DT), k-nearest neighbor (kNN), and convolution neural network (CNN) to classify pneumonia level (mild, progressive, and severe stage) of the COVID-19 confirmed patients. More precisely, the proposed model consists...
Internet of Vehicles have attracted a lot of attention in the automotive industry and academia recently. We are witnessing rapid advances in vehicular technologies which comprise many components such as On-Board Units (OBUs) and sensors. These sensors generate a large amount of data, which can be used to inform and facilitate decision making (for e...
p>Since the initial reports of the Coronavirus surfacing in Wuhan, China; the novel virus currently without a cure has spread like a wildfire across the globe. The virus spread exponentially across all inhabited continent; catching local governments by surprise in many cases and bringing the world economy to a standstill. As local authorities work...
p>Since the initial reports of the Coronavirus surfacing in Wuhan, China; the novel virus currently without a cure has spread like a wildfire across the globe. The virus spread exponentially across all inhabited continent; catching local governments by surprise in many cases and bringing the world economy to a standstill. As local authorities work...
The emergence of novel COVID-19 causes an over-load in health system and high mortality rate. The key priority is to contain the epidemic and prevent the infection rate. In this context, many countries are now in some degree of lockdown to ensure extreme social distancing of entire population and hence slowing down the epidemic spread. Furthermore,...
Web applications are regarded as a popular platform to exchange information with users. These applications have to be able to process Big-Data quickly and to serve users in a timely manner with accurate information posted in news portals which can be a huge challenge to overcome. Huge computation power is needed to crawl the web and process big-dat...
The emergence of novel COVID-19 causing an overload on public health sector and a high fatality rate. The key priority is to contain the epidemic and prevent the infection rate.It is imperative to stress on ensuring extreme social distancing of the entire population and hence slowing down the epidemic spread. Further, there is a need for an efficie...
In the Internet of Vehicles (IoV), vehicles communicate wirelessly with other vehicles, sensors, pedestrians, and roadside units. IoV is aimed at improving road safety, driving comfort, and traffic efficiency. However, IoV is exposed to a range of threats to security and privacy. The presence of dishonest and misbehaving peers in the system is of a...
The first COVID-19 confirmed case is reported in Wuhan, China and spread across the globe with unprecedented impact on humanity. Since this pandemic requires pervasive diagnosis, it is significant to develop smart, fast and efficient detection technique. To this end, we developed an Artificial Intelligence (AI) engine to classify the lung inflammat...
The first COVID-19 confirmed case is reported in Wuhan, China and spread across the globe with unprecedented impact on humanity. Since this pandemic requires pervasive diagnosis, it is significant to develop smart, fast and efficient detection technique. To this end, we developed an Artificial Intelligence (AI) engine to classify the lung inflammat...
In this paper, fingerprint referencing methods based on wireless fidelity Wi-Fi received signal strength (RSS) have used for indoor positioning. More precisely, Naïve Bayes, decision tree (DT), and support vector machine (SVM) one-to-one multi-classes and error-correcting-output-codes classifier are to enable accurate indoor positioning. Then, norm...
Indoor localization algorithms in smart cities often use Wi‐Fi fingerprints as a database of Received Signal Strength (RSS) and its corresponding position coordinate for position estimation. However, the issue of fingerprinting is the use of different platform‐devices. To this end, we propose a Long Short‐Term Memory (LSTM)‐based novel indoor posit...
The emergence of novel COVID-19 causing an overload in health system and high mortality rate. The key priority is to contain the epidemic and prevent the infection rate. In this context, many countries are now in some degree of lockdown to ensure extreme social distancing of entire population and hence slowing down the epidemic spread. Further, aut...
COVID-19 (also known as 2019 Novel Coronavirus) first emerged in Wuhan, China and spread across the globe with unprecedented effect and has now become the greatest crisis of the modern era. The COVID-19 has proved much more pervasive demands for diagnosis that has driven researchers to develop more intelligent, highly responsive and efficient detec...
Coronaviruses are a famous family of viruses that causes illness in human or animals. The new type of corona virus COVID-19 disease was firstly discovered in Wuhan-China. However, recently, the virus has been widely spread in most of the world countries and is reported as a pandemic. Further, nowadays, all the world countries are striving to contro...
Vehicle-to-infrastructure (V2I) communication enables a variety of applications and services, including safety, infotainment, mobility, payment, and so on, to be accessed and consumed. However, V2I requires seamless connectivity without having to worry about transitions between and across heterogeneous networks. In the next generation 5G heterogene...
Radio access technologies, such as C-V2X and DSRC, have been used to support robust communication in connected vehicles scenarios. However, existing studies mostly dealt with homogenous vehicular networks, where coexistence of different radio access technologies in vehicles are not considered. More precisely, such multi-radio interface environments...
Swarm robotics is an emerging robotic domain that aims to accomplish complex tasks with the cooperative effort of a group of simple robots. These robots communicate and share information to coordinate their actions for achieving a common goal. However, existing mechanisms of control and communications are not very secure, efficient, and also rely o...
Providing the position of mobile devices from outdoors into indoors seamlessly is one of the most viable user demands in most location-based-service (LBS) applications. Mobile devices, when outdoors, use global navigation satellite systems (GNSS) information to define their location accurately. However, when indoors or in harsh environments, GNSS s...
In indoor/outdoor environments, special cares need to be given to locate smartphones which are used by most of the people. Locating or tracking is valuable for those people who are in dangerous falling-situations or they are used for shopping and billing services, inside the buildings. This tracking system needs a new positioning mechanism to offer...
Smart Cities Cybersecurity and Privacy examines the latest research developments and their outcomes for safe, secure, and trusting smart cities residents.
Smart cities improve the quality of life of citizens in their energy and water usage, healthcare, environmental impact, transportation needs, and many other critical city services. Recent advanc...
The modern adoption of e-Commerce has accelerated the need for effective customer protection, as part of the roadmap to expanding e-Commerce in smart cities. Before fully adopting e-Commerce for smart city applications, there are a few challenges that need to be addressed; mainly security and fraud risks. Here, credit cards are the most popular tar...
Software Defined Internet of Vehicles (SDIoV) has emerged as a promising field of study as it could overcome the shortcomings of traditional vehicular networks, such as offering efficient data transmission and traffic shaping in different vehicular scenarios to satisfy all the requirements of applications on the fly. Although routing solutions are...
The Industrial Internet of Things (IIoT) is the use of Internet of Things (IoT) technologies in manufacturing. The vehicular ad hoc networks (VANETs) are a typical application of IIoT. Benefiting from Dedicated Short-Range Communication (DSRC) technology, vehicles can communicate with each other through wireless manner. Therefore, road safety is ab...
Sophisticated Intrusion attacks against various types of networks are ever increasing today with the exploitation of modern technologies which often severely affect wireless networks. In order to improve the effectiveness of Intrusion Detection Systems (IDSs), data analysis methods such as data mining and classification methods are often integrated...
As part of the new era Internet of Things, an evolved form of Vehicle Ad-hoc Networks has recently emerged as the Internet of Vehicles (IoV). IoV has obtained a lot of attention among smart vehicle manufactures and illustrations due to its promising potential, but there are still some problems and challenges that need to be addressed. Transmission...
Wireless sensor networks (WSNs) have captivated substantial attention from both industrial and academic research in the last few years. The major factor behind the research efforts in that field is their vast range of applications which include surveillance systems, military operations, health care, environment event monitoring, and human safety. H...
Due to the high attenuation of the water at high frequencies, underwater communications in freshwater are not being investigated so much. Many current underwater communication systems are based on acoustic or optical techniques. The use of electromagnetic (EM) waves in this medium, even in short distances, increases the bandwidth, which definitely...
Neighborhood discovery is a fundamental link layer service for safety and non-safety applications in VANETs. Till now, this service is made available by beaconing. But, several studies demonstrate its inefficiency. In the literature, several papers propose adaptive strategies to alleviate the channel load problem, but packet loss due to collision r...
Vehicular Ad Hoc Network (VANET) is emerged as an important research area that provides ubiquitous short-range connectivity among moving vehicles. This network enables efficient traffic safety and infotainment applications. One of the promising applications is video transmission in vehicle-to-vehicle or vehicle-to-infrastructure environments. But,...
The demand for more sophisticated Location-Based Services (LBS) in terms of applications variety and accuracy is tripling every year since the emergence of the smartphone a few years ago. Equally, smartphone manufacturers are mounting several wireless communication and localization technologies, inertial sensors as well as powerful processing capab...
Recently Worldwide Interoperability for Microwave Access (WiMAX) mesh network has emerged as a promising wireless technology in order to enable fast, cost-effective network deployment. However, achieving these requirements is a daunting task due to the mesh subscriber station failures in the presence of the adversarial environment. In fact, mesh su...
Twitter is one of the biggest microblogging platforms that millions of Tweets of maximum size 140 characters are posted every day by its users. Recently many research efforts have been presented towards analyzing the content of information in Twitter for marketing purposes. However, existing analysis approaches have shortcomings in terms of exploit...
Recent developments in hardware, software and communication technologies have resulted in increasing interest in the use of wireless local area networks (WLANs). Mobile devices with embedded WLAN functionality are becoming increasingly popular. Such devices must be designed to support applications that require high quality of service (QoS) and have...
Exchanging information efficiently between vehicles or between vehicles to infrastructure is a keystone to successful deployment of vehicular ad-hoc networks (VANETs). This information is required by safety applications to work properly. So, this helps to promote foresighted driving which aim to provide a comfortable, safer and more efficient traff...
This paper proposes an Advanced Mobility Handover (AMH) scheme based on Wireless Local Area Networks (WLANs) by developing a network layer handover procedure which triggers messages to be sent to the next access point. The proposed AMH scheme performs the network handover process, which is represented by binding update procedure in advance during t...
We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN...
We propose an adaptive handover prediction (AHP) scheme for seamless mobility based wireless networks. That is, the AHP scheme incorporates fuzzy logic with AP prediction process in order to lend cognitive capability to handover decision making. Selection metrics, including received signal strength, mobile node relative direction towards the access...
In most of the existing geographical forwarding methods of Vehicular Ad hoc NETwork (VANET), a node periodically sends "hello" messages to determine the positional information of its direct neighbors. Each node stores and maintains more or less accurate information of its direct neighbors in a table. However, due to high mobility vehicles and traff...