Muhammad Awais

Muhammad Awais
  • PhD Scholar in Communication Systems
  • PhD Student at Lancaster University

About

46
Publications
21,210
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
982
Citations
Introduction
Muhammad Awais is pursuing a Ph.D. degree in Communication Systems from the School of Computing and Communications from Lancaster University, Bailrigg, Lancaster LA1 4YW, UK, where he is also working as a Teaching Assistant. He has authored over 20+ articles in technical journals and international conferences. He also serves as a Regular Reviewer for numerous ISI indexed journals. Additionally, he holds the best paper award. He is passionate about UWSNs, IoT-UWSNs, and Blockchain-based Systems.
Current institution
Lancaster University
Current position
  • PhD Student
Additional affiliations
March 2020 - present
Lancaster University
Position
  • Teaching Assitant
Description
  • Ph.D. Scholar and Teaching Assistant at School of Computing and Communications, Lancaster University, Bailrigg, Lancaster LA1 4YW, United Kingdom
December 2017 - December 2019
COMSATS University Islamabad
Position
  • Research Associate
Description
  • I was working as a research associate in Research Department at "COMSATS University Islamabad", Islamabad Campus 44000, Pakistan.
Education
April 2020 - April 2023
Lancaster University
Field of study
  • Communication Systems

Publications

Publications (46)
Article
Full-text available
Nowadays, automated appliances are exponentially increasing. Therefore, there is a need for a scheme to accomplish the electricity demand of automated appliances. Recently, many Demand Side Management (DSM) schemes have been explored to alleviate Electricity Cost (EC) and Peak to Average Ratio (PAR). In this paper, energy consumption problem in a r...
Article
Full-text available
Daily operations and planning in a smart grid require a day-ahead load forecasting of its customers. The accuracy of day-ahead load-forecasting models has a significant impact on many decisions such as scheduling of fuel purchases, system security assessment, economic scheduling of generating capacity, and planning for energy transactions. However,...
Article
Full-text available
Nowadays, the Internet of Things enabled Underwater Wireless Sensor Network (IoT-UWSN) is suffering from serious performance restrictions, i.e., high End to End (E2E) delay, low energy efficiency, low data reliability, etc. The necessity of efficient, reliable, collision and interference-free communication has become a challenging task for the rese...
Conference Paper
Full-text available
The emergence of smart homes appliances has generated a high volume of data on smart meters belonging to different customers which, however, can not share their data in deregulated smart grids due to privacy concern. Although, these data are important for the service provider in order to provide an efficient service. To encourage customers particip...
Conference Paper
Full-text available
Non-orthogonal multiple access (NOMA) is a promising radio access technique that enables massive connectivity and increased spectral efficiency. The deployment of aerial base stations (ABSs) as a relay is also an optimistic goal that fairly serves a large number of internet of things (IoT) devices. On one side, ABS-assisted communication leverages...
Article
Next-generation wireless networks envision ubiquitous access and computational capabilities by seamlessly integrating aerial and terrestrial networks. Digital twin (DT) technology emerges as a proactive and cost-effective approach for resourcelimited networks. Mobile edge computing (MEC) is pivotal in facilitating mobile offloading, particularly un...
Article
The development of futuristic wireless infrastructure necessitates low power consumption, high reliability, and massive connectivity. One of the most promising solutions to address these requirements is the integration of aerial base station (ABS) based communication systems that employ both in the air (aerial) and on the ground (terrestrial) compo...
Article
Full-text available
The smart energy consumption of any household, maintaining the thermal comfort level of the occupant, is of great interest. Sensors and Internet-of-Things (IoT)-based intelligent hardware setups control the home appliances intelligently and ensure smart energy consumption, considering environment parameters. However, the effects of environment-driv...
Article
Full-text available
Transmission rate is one of the contributing factors in the performance of Wireless Sensor Networks (WSNs). Congested network causes reduced network response time, queuing delay and more packet loss. To address the issue of congestion, we have proposed transmission rate control methods. To avoid the congestion, we have adjusted the transmission rat...
Chapter
The spread of the COVID-19 pandemic, commonly called coronavirus, has caused serious problems in society leading to the deaths of many people, affecting businesses, jobs, and education all over the globe. Social distancing, and avoiding group gathering and physical contact are the potential solutions to reduce the spread of the virus. In this chapt...
Conference Paper
Full-text available
The pandemic COVID-19, commonly known as coronavirus, initiated in Wuhan, China, in December 2019, has become a major concern across the world over the past few months [1]. This respiratory disease is caused by severe acute respiratory syndrome coronavirus-2 (SARS-CoV-2) and affects the victim with breathlessness, fever, cough, and fatigue. Accordi...
Article
Full-text available
The anatomy of Red Blood Cells (RBCs) in blood smear images plays an important role in the detection of several diseases. The automated image-based technique is fast and accurate for the analysis of blood cells morphology that can save time of both pathologists as well as that of patients. In this paper, we propose a novel method which segment and...
Article
Full-text available
Segmentation of cursive text remains the challenging phase in the recognition of text. In OCR systems, the recognition accuracy of text is directly dependent on the quality of segmentation. In cursive text OCR systems, the segmentation of handwritten Urdu language text is a complex task because of the context sensitivity and diagonality of the text...
Article
Full-text available
Electrical load forecasting provides knowledge about future consumption and generation of electricity. There is a high level of fluctuation behavior between energy generation and consumption. Sometimes, the energy demand of the consumer becomes higher than the energy already generated, and vice versa. Electricity load forecasting provides a monitor...
Article
Full-text available
Due to the availability of fingerprint verification technology on mobile devices, fingerprint based human identification has become the most widely used biometric technology in everyday life. The elderly find digital payment applications difficult to operate and unsecure. This work has exploited fingerprint verification availability on mobile devic...
Article
Full-text available
Electrical load forecasting provides knowledge about future consumption and generation of electricity. There is a high level of fluctuation behavior between energy generation and consumption. Sometimes, the energy demand of the consumer becomes higher than the energy already generated, and vice versa. Electricity load forecasting provides a monitor...
Conference Paper
Full-text available
Besides the non-technical losses of power companies, theft of electricity is the most serious and dangerous one. The fraudulent power consumption degrades the quality of supply and increases the energy generation that impacts the whole grid system, which causes legitimate the users to pay a huge amount of electricity bills. Through data analysis me...
Conference Paper
Full-text available
During the past few years, use of e-commerce has grown to a large scale. Due to which, the use of credit card has also been increased. Many people now use credit cards for online shopping, e-billing, and other online payments. This frequent use of credit cards is pushing the organizations and banks to implement credit card fraud detection systems t...
Article
Full-text available
Accurate blood smear quantification with various blood cell samples is of great clinical importance. The conventional manual process of blood smear quantification is quite time consuming and is prone to errors. Therefore, this paper presents automatic detection of the most frequently occurring condition in human blood—microcytic hyperchromic anemia...
Article
Full-text available
Nowadays, there is a growing trend in smart cities. Therefore, the Internet of Things (IoT) enabled Underwater and Wireless Sensor Networks (I-UWSN) are mostly used for monitoring and exploring the environment with the help of smart technology, such as smart cities. The acoustic medium is used in underwater communication and radio frequency is most...
Article
Full-text available
Nowadays, there is a growing trend in smart cities. Therefore, Terrestrial and Internet of Things (IoT) enabled Underwater Wireless Sensor Networks (TWSNs and IoT-UWSNs) are mostly used for observing and communicating via smart technologies. For the sake of collecting the desired information from the underwater environment, multiple acoustic sensor...
Article
Full-text available
Forecasting the electricity load provides its future trends, consumption patterns and its usage. There is no proper strategy to monitor the energy consumption and generation; and high variation among them. Many strategies are used to overcome this problem. The correct selection of parameter values of a classifier is still an issue. Therefore, an op...
Article
Full-text available
Conventional RSA algorithm, being a basis for several proposed cryptosystems, has remarkable security laps with respect to confidentiality and integrity over the internet which can be compromised by state-of-the-art attacks, especially, for different types of data generation, transmission, and analysis by IoT applications. This security threat hind...
Article
Full-text available
Internet of Things enabled Underwater Wireless Sensor Networks (IoT-UWSNs) are quite useful in monitoring different tasks including: from instrument monitoring to the climate recording and from pollution control to the prediction of natural disasters. However, there are some challenges, which affect the performance of a network, i.e., void hole occ...
Article
Full-text available
Conventional RSA algorithm, being a basis for several proposed cryptosystems, has remarkable security laps with respect to confidentiality and integrity over the internet which can be compromised by state-of-the-art attacks, especially, for different types of data generation, transmission, and analysis by IoT applications. This security threat hind...
Article
Full-text available
The future of the Internet of Things (IoT) is interlinked with digital communication in smart cities. The digital signal power spectrum of smart IoT devices is greatly needed to provide communication support. The line codes play a significant role in data bit transmission in digital communication. The existing line-coding techniques are designed fo...
Thesis
Full-text available
Underwater Wireless Sensor Network (UWSN) is quite useful in monitoring different tasks including: from instrument monitoring to the climate recording and from pollution control to the prediction of natural disasters, etc. Recently, different routing protocols have been proposed in UWSN to explore the underwater environment for military and scienti...
Article
Full-text available
Nowadays, constrained battery life expectancy is an important issue for reliable data delivery in an Underwater Wireless Sensor Network (UWSN). Conventional transmission methodologies increase the transmission overhead, i.e., the collision of packets, which influence the data transmission. Replacement of the sensors' battery in brutal underwater en...
Conference Paper
Full-text available
Internet of Things (IoTs) is widely growing domain of the modern era. With the advancement in technologies, the use of IoTs devices also increases. However, security risks regarding service provisioning and data sharing also increases. There are many existing security approaches, although these approaches are not suitable for IoT devices due to the...
Conference Paper
Full-text available
In recent times, different routing protocols have been proposed in the Internet of Things enabled Underwater Wireless Sensor Networks (IoT-UWSNs) to explore the underwater environment for different purposes, i.e., scientific and military purposes. However, high Energy Consumption (EC), End to End (E2E) delay, low Packet Delivery Ratio (PDR) and min...
Chapter
Full-text available
Nowadays, limited battery lifespan in Underwater Wireless Sensor Networks (UWSNs) is one of the key concerns for reliable data delivery. Traditional transmission approaches increase the transmission overhead, i.e., packet collision and congestion, which affects the reliable data delivery. Additionally, replacement of the sensors battery in the hars...
Article
Full-text available
Underwater Wireless Sensor Networks (UWSNs) are promising and emerging frameworks having a wide range of applications. The underwater sensor deployment is beneficial; however, some factors limit the performance of the network, i.e., less reliability, high end-to-end delay and maximum energy dissipation. The provisioning of the aforementioned factor...
Conference Paper
Nowadays, to enhance the lifetime of an Under Water Sensor Networks (UWSNs), energy efficient and reliable data delivery in resource constraints are one of the key concerns. Traditional transmission approaches, increase the communication overhead which results in congestion and affects the reliable data delivery. In the current years, many routing...
Conference Paper
Full-text available
Nowadays, most encouraging strategy for best resources utilization and allocation in wireless multi-hop networks is BackPressure (BP) based routing. Throughput optimality, load-aware routing, priority aware routing, adaptive resource allocation and its simplicity of understanding are the key features of BP based routing protocols. In this article,...
Conference Paper
Full-text available
Home Energy Management Systems (HEMS) have been widely used for energy management in smart homes. Energy management in a smart home is a challenging task, which require efficient scheduling of appliances. The main focus of HEMS is to schedule the operation of appliances in such a way that it gives us optimized performance in terms of Peak to Averag...
Conference Paper
Energy optimization is important aspect of smart gird (SG). SG integrates communication and information technology in traditional grid. In SG there is two-way communication between consumer and utility. It includes smart meter, Energy Management Controller (EMC) and smart appliances. Users can shift load from on peak hours to off peak hours by adap...
Conference Paper
Full-text available
Nowadays, different schemes and ways are proposed to meet the user's load requirement of energy towards the Demand Side (DS) in order to encapsulate the energy resources. However, this Load Demand (LD) increases day by day. This increase in LD is causing serious energy crises to the utility and DS. As the usage of energy increases with the increase...
Conference Paper
It is important to secure personally identifiable and confidential information stored on portable devices such as laptops, and smartphones. Data is more appealing for thieves than the hardware itself. Encryption is the paramount protection measure to secure the confidential data. Full disk encryption (FDE) is a technique used when there is need to...
Conference Paper
Full-text available
In this paper, our goal is to minimize the electricity cost, electricity consumption at minimum user discomfort while considering the peak electricity consumption. Electricity consumption may not be the same in residential, commercial and industrial areas. It may vary from each and every area. It is a challenging task to maintain the balance betwee...
Conference Paper
Electricity is a valuable resource. With the increase of population, this valuable resource is being used inefficiently. To overcome this problem, electricity providers use various techniques like introducing different pricing schemes. In peak hours, when the usage of electricity is high, the utility increases the per unit cost. Therefore, usage of...
Conference Paper
Home energy management within the traditional grid is difficult, so Smart Grid (SG) is introduced by upgrading the traditional grid, i.e., adding the Information Technology (IT) and Sensors Network (SN) to traditional grids.SG manages the Demand of electricity and help in solving the electricity load management problem. Demand Side response has two...
Conference Paper
In this paper, we have evaluated the performance of Home Energy Management (HEM) using two meta-heuristic techniques: Chicken Swarm Optimization (CSO) and Bacterial Foraging Algorithm (BFA). We have classified the appliances in two catagories: fixed and shiftable/elastic appliances. Time of Use (ToU) pricing scheme is used for the calculation of el...

Network

Cited By