Muhammad Aamir Khan

Muhammad Aamir Khan
National University of Computer and Emerging Sciences · Department of Computer Science

Researcher in Pattern Recognition & Machine Learning

About

45
Publications
17,405
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
640
Citations
Additional affiliations
January 2010 - present
National University of Computer and Emerging Sciences
Education
May 2007 - June 2013
September 2005 - April 2007
Natioanl University of Computer and Emerging Sciences
Field of study
  • Computer science

Publications

Publications (45)
Article
Load management (LM) is supposed to have a vital role in future energy management systems. This article presents overview and comparison of LM techniques along with related technologies and implementation challenges in smart grid. The article also covers consumer and utility concerns in context of LM to enhance readers’ intuition about the topic. T...
Article
Full-text available
Mobility models play a vital role on the performance accuracy of simulations in Wireless Body Area Networks (WBANs). In this article, we propose a mobility model for the movement of nodes according to the posture patterns formed either because of psychological stress or any kind of mobility. During routine activities, body exhibits different postur...
Conference Paper
Full-text available
Data streams are high volume of multi-dimensional unlabeled data generated in environments such as stock market, astronomical data, Weblogs, Click streams, Flood, Fire and Crops monitoring. Knowledge discovery in data streams is valuable task for research, business and community. The fundamental step of knowledge discovery in data stream is the cla...
Conference Paper
In this paper, design and development of a ubiquitous tracking system is proposed, in which vehicles are tracked and controlled us-ing the prevailing cellular technologies. The system contains a GPS receiver and a GSM modem interfaced with a microcontroller. To track any vehicle, the vehicle's owner has to send an SMS to the tracking system install...
Conference Paper
In this paper, we consider an Energy Con-sumption Scheduler (ECS) unit inside a smart meter. The function of ECS is to flatten the peaks in the load curve of residential type users. The ECS dually communicates with the user as well as power utility in smart grid real time communication environment. Each user has a specific power capacity limit for...
Article
Aim of this study is analyzing energy conservation which is one of the most vital aspects in Wireless Sensor Networks (WSNs) for better network durability, since sensor nodes have limited resources of energy. In our propose technique, we have shown that how in presence of existing Error Control Coding (ECC) techniques and decoder complexity energy...
Article
Demand Side Management (DSM) is one of the most important aspects in future smart grids: towards electricity generation cost by minimizing the expensive thermal peak power plants. The DSM greatly affects the individual users' cost as well as the per unit cost. The main objective of this paper is to develop a Generic Demand Side Management (G-DSM) m...
Article
Energy efficient routing protocols are consistently cited as efficient solutions for Wireless Sensor Networks (WSNs) routing. The area of WSNs is one of the emerging and fast growing fields which brought low cost, low power and multi-functional sensor nodes. In this paper, we examine some protocols related to homogeneous and heterogeneous networks....
Article
In Wireless Multi-hop Networks (WMhNs), routing protocols with energy efficient and delay reduction techniques are needed to fulfill users demands. In this paper, we present Linear Programming models (LP_models) to assess and enhance reactive routing protocols. To practically examine constraints of respective LP_models over reactive protocols, we s...
Article
Wireless Multi-hop Networks (WMhNs) provide users with the facility to communicate while moving with whatever the node speed, the node density and the number of traffic flows they want, without any unwanted delay and/or disruption. This paper contributes Linear Programming models (LP_models) for WMhNs. In WMhNs, different routing protocols are used...
Article
Wireless Sensor Networks (WSNs) consist of numerous sensors which send sensed data to base station. Energy conservation is an important issue for sensor nodes as they have limited power.Many routing protocols have been proposed earlier for energy efficiency of both homogeneous and heterogeneous environments. We can prolong our stability and network...
Article
As sensor nodes are deployed anywhere in a wireless sensor network, hence their communication can be easily monitored. In these networks, message protection and node identification are very issues. Hence, security of large scale such networks requires efficient key distribution and management mechanisms. Quantum cryptography and particularly quantu...
Article
This paper presents comparison of Access Techniques used in Medium Access Control (MAC) protocol for Wireless Body Area Networks (WBANs). Comparison is performed between Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), Pure ALOHA and Slotted ALOHA (S-A...
Article
With increase in ageing population, health care market keeps growing. There is a need for monitoring of health issues. Wireless Body Area Network (WBAN) consists of wireless sensors attached on or inside human body for monitoring vital health related problems e.g, Electro Cardiogram (ECG), Electro Encephalogram (EEG), ElectronyStagmography (ENG) et...
Article
The clustering algorithm are considered as a kind of key technique used to reduce energy consumption. It can help in increasing the stability period and network life time. Routing protocol for efficient energy utilization should be designed for heterogeneous Wireless Sensor Networks (WSNs). We purpose Hybrid-DEEC (H-DEEC), a chain and cluster based...
Article
Wireless Sensor Networks (WSNs) are comprised of thousands of sensor nodes, with restricted energy, that co-operate to accomplish a sensing task. Various routing Protocols are designed for transmission in WSNs. In this paper, we proposed a hybrid routing protocol: Zonal-Stable Election Protocol (Z-SEP) for heterogeneous WSNs. In this protocol, some...
Article
Cluster based Wireless Sensor Networks (WSNs) have been widely used for better performance in terms of energy efficiency. Efficient use of energy is challenging task of designing these protocols. Energy holedare created due to quickly drain the energy of a few nodes due to non-uniform distribution in the network. Normally, energy holes make the dat...
Article
Full-text available
This paper presents a continuous maximum power point tracking algorithm to get better the effectiveness of the photovoltaic panel by capturing the maximum output power from it and ensure optimum power availability to the load. As the incident solar radiation and the temperature of the panel changes continuously, in such an unpredictable parameters...
Article
This paper presents a continuous maximum power point tracking algorithm to get better the effectiveness of the photovoltaic panel by capturing the maximum output power from it and ensure optimum power availability to the load. As the incident solar radiation and the temperature of the panel changes continuously, in such an unpredictable parameters...
Article
IEEE 802.15.4 standard is designed for low power and low data rate applications with high reliability. It operates in beacon enable and non-beacon enable modes. In this work, we analyze delay, throughput, load, and end-to-end delay of nonbeacon enable mode. Analysis of these parameters are performed at varying data rates. Evaluation of non beacon e...
Conference Paper
Full-text available
Software component selection is the most important part of component based software development. A large amount of time is invested in searching and selecting the most appropriate component from component repository. Different methods are used to select components quickly and efficiently. In the proposed method we have used part of off the shelf op...
Article
Classifying patterns into two classes is a typical problem of binary classification in pattern recognition. Binary classification is an industrial problem in many fields like medicine, search mechanism, diagnostic of disease in humans, security and many other aspects. In this paper, we have proposed a random subspace based ensemble data dependent c...
Article
Full-text available
In this paper we have investigated three aspects of classifier fusion system applied to the gender classification problem. To find the minimum subset of feature for which the classifier fusion system has better performance, comparison of the three classifier fusion models and the effect of training to testing ratio on the overall output of the clas...
Article
In this paper we have investigated three aspects of classifier fusion system applied to the gender classification problem. To find the minimum subset of feature for which the classifier fusion system has better performance, comparison of the three classifier fusion models and the effect of training to testing ratio on the overall output of the clas...
Conference Paper
Full-text available
In this paper we present our work on copy detection in short Urdu text passages. Given two passages one as the source text and another as the copied text it is determined whether the second passage is plagiarized version of the source text? We have developed an algorithm for plagiarism detection. We have used the n-gram model for word retrieval and...
Conference Paper
Full-text available
In Pattern recognition, ensembles of classifiers are used to increase the performance and accuracy of classification systems. The creation of ensembles, selection of base classifiers and combining the decisions of the classifiers is an active research area. In this paper we propose a method of ensemble creation that is based on fuzzy clustering (Fu...
Article
A low temperature similar to 350 degrees C, low cost germanium dioxide (GeO(2)) nanowire (NW) synthesis process has been developed under ambient conditions. Nanowires can be grown on a number of different surfaces including silicon, quartz, Al(2)O(3) and aluminum nitride (AlN) by first coating the substrates with a thin layer of gold. The as grown...
Conference Paper
Full-text available
In protein fold recognition problem an effort is made to assign a fold to given proteins, this is of practical importance and has diverse application in the field of bioinformatics such as the discovery of new drugs, the individual implication of amino acid in a protein and bringing improvement in a specific protein function. In this paper, we have...
Chapter
Full-text available
In this paper we aim to investigate the trade off in selection of an accurate, robust and cost-effective classification model for binary classification problem. With empirical observation we present the evaluation of one-class and two-class classification model. We have experimented with four two-class and one-class classifier models on five UCI da...
Chapter
Full-text available
With the advent of internet, every aspect of life is going online. From online working to watching videos, everything is now available on the internet. With the greater business benefits, increased availability and other online business advantages, there is a major challenge of security and ownership of data. Videos downloaded from an online store...
Conference Paper
Full-text available
Web applications have gained an enormous increase in popularity for providing various facilities online, such as e-shopping, e-banking, e-ticketing, e-learning etc. As the use of web applications grow, there is an increase in the attacks on web applications as well. Among these attacking techniques, SQL Injection has been emerging as one of the mos...
Article
Germanium dioxide nanowires have been synthesized on gold-coated silicon substrate in the temperature range 400-500degC utilizing a simple quartz tube furnace setup. The source vapor of germanium oxide was formed by thermal evaporation of metallic germanium in an oxidizing environment. The nanowire growth follows the catalyst assisted vapor-liquid-...
Conference Paper
Full-text available
In this paper we have investigated three aspects of classifier fusion system applied to the gender classification problem. To find the minimum subset of features for which the classifier fusion system has better performance, comparison of the three classifier fusion models and the effect of training to testing ratio on the overall output of the cla...
Article
We utilized bulk-synthesized nanowires (NWs) of germanium dioxide as nanoscale structures that can be coated with noble metals to allow the excitation of surface plasmons over a broad frequency range. The NWs were synthesized on substrates of silicon using gold-catalyst-assisted vapor–liquid–solid (VLS) growth mechanism in a simple quartz tube furn...

Network

Cited By