Muhammad Asim

Muhammad Asim
GuangDong University of Technology

PhD in Computer Science and Engineering (Central Suth University China)
Looking for Research Collaborators

About

23
Publications
3,762
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
127
Citations
Citations since 2017
21 Research Items
121 Citations
20172018201920202021202220230204060
20172018201920202021202220230204060
20172018201920202021202220230204060
20172018201920202021202220230204060
Introduction
Muhammad Asim received the M.S. degree in Mathematics from University of Peshawar, Peshawar, Pakistan in 2013 and the M.Phil. degree in Mathematics from Kohat University of Science & Technology, Kohat, Pakistan in 2016. He received the Ph.D. degree in Computer Science and Technology from Central South University, Changsha, China. His current research interests include computational intelligence techniques, cloud computing, and edge computing. 

Publications

Publications (23)
Article
Unsupervised domain adaptation (UDA) describes a set of techniques for using previously acquired knowledge from labeled original data to support task completion in comparable but unlabeled target data. Existing UDA methods often use two classifiers to detect misaligned local areas between the original and prey vocations, resulting in poor implement...
Article
Full-text available
In recent years, autonomous vehicles have become more and more popular due to their broad influence over society, as they increase passenger safety and convenience, lower fuel consumption, reduce traffic blockage and accidents, save costs, and enhance reliability. However, autonomous vehicles suffer from some functionality errors which need to be m...
Article
Full-text available
This paper presents a multi-unmanned aerial vehicle (UAV)-assisted mobile edge computing system, where multiple UAVs are used to serve mobile users. We aim to minimize the overall energy consumption of the system by planning the trajectories of UAVs. To plan the trajectories of UAVs, we need to consider the deployment of hovering points (HPs) of UA...
Article
Full-text available
To solve constrained optimization problems (COPs), teaching learning-based optimization (TLBO) has been used in this study as a baseline algorithm. Different constraint handling techniques (CHTs) are incorporated in the framework of TLBO. The superiority of feasibility (SF) is one of the most commonly used and much effective CHTs with various decis...
Article
Full-text available
With the popularity of autonomous vehicles and the rapid development of intelligent transportation, the application scenarios for detecting pedestrians in everyday life are becoming more and more widespread, with high and high application value. Pedestrian detection is the basis of many human-based tasks, including speed tracking, pedestrian motion...
Article
Full-text available
This article presents a multi-intelligent reflecting surface (IRS)-and multi-unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) system for 5G/6G networks. In the studied system, multiple UAVs are integrated for providing services to large-scale user equipment (UEs) with the help of multiple IRSs. This article aims to minimize the ov...
Article
Full-text available
Mobile crowd-sensing (MCS) is a well-known paradigm used for obtaining sensed data by using sensors found in smart devices. With the rise of more sensing tasks and workers in the MCS system, it is now essential to design an efficient approach for task allocation. Moreover, to ensure the completion of the tasks, it is necessary to incentivise the wo...
Article
This paper presents an energy and task completion time minimization scheme for the unmanned aerial vehicles (UAVs)-empowered mobile edge computing (MEC) system, where several UAVs are deployed to serve large-scale users’ equipment (UEs). The aim is to minimize the weighted sum of energy consumption and task completion time of the system by planning...
Article
Full-text available
This paper proposes a multi-unmanned aerial vehicle (UAV)-enabled autonomous mobile edge computing (MEC) system, in which several UAVs are deployed to provide services to user devices (UDs). The aim is to reduce/minimize the overall energy consumption of the autonomous system via designing the optimal trajectories of multiple UAVs. The problem is v...
Article
Full-text available
Generally, big interaction networks keep the interaction records of actors over a certain period. With the rapid increase of these networks users, the demand for frequent subgraph mining on a large database is more and more intense. However, most of the existing studies of frequent subgraphs have not considered the temporal information of the graph...
Article
Full-text available
This paper presents a multi-unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) system, where multiple UAVs (variable number of UAVs) are deployed to serve Internet of Things devices (IoTDs). We aim to minimize the sum of hovering and flying energies of UAVs by optimizing the trajectories of UAVs. The problem is very complicated as w...
Preprint
Full-text available
This paper presents a multi-unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) system, where multiple UAVs are used to serve mobile users (MUs). We aim to minimize the overall energy consumption of the system by planning the trajectories of UAVs. To plan the trajectories of UAVs, we need to consider the deployment of hovering points...
Article
Full-text available
Estimation of software cost (ESC) is considered a crucial task in the software management life cycle as well as time and quality. Prior to the development of a software project, precise estimations are required in the form of person month and time. In the last few decades, various parametric and non-algorithmic or non-parametric approaches regardin...
Article
Full-text available
Cloud computing (CC) is a centralized computing paradigm that accumulates resources centrally and provides these resources to users through Internet. Although CC holds a large number of resources, it may not be acceptable by real-time mobile applications, as it is usually far away from users geographically. On the other hand, edge computing (EC), w...
Preprint
Full-text available
Cloud computing (CC) is a centralized computing paradigm that accumulates resources centrally and provides these resources to users through Internet. Although CC holds a large number of resources, it may not be acceptable by real-time mobile applications, as it is usually far away from users geographically. On the other hand, edge computing (EC), w...
Conference Paper
Full-text available
Estimating Cost of Software (ECS) is a very essential aspect of a software development life cycle. Accurate estimations are needed in terms of person month and development time for software projects. Several project estimation techniques have been developed such as parametric and non-parametric. Estimation by parametric is one of the convenient met...
Article
Full-text available
In the last two decades the field evolutionary computation has become a mainstream and several types of evolutionary algorithms are developed for solving optimization and search problems. Evolutionary algorithms (EAs) are mainly inspired from the biological process of evolution. They do not demand for any concrete information such as continuity or...
Conference Paper
Full-text available
http://www.uetpeshawar.edu.pk/spi_2016/

Network

Cited By

Projects

Projects (3)
Project
Share your research and achievements with the world. Let the world know your worth.
Project
Share Data Science Research