Muhammad Shiraz

Muhammad Shiraz
Federal Urdu University of Arts, Science & Technology · Computer Science

PhD

About

62
Publications
66,567
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,201
Citations
Additional affiliations
October 2014 - May 2015
University of Malaya
Position
  • PostDoc Position

Publications

Publications (62)
Thesis
Full-text available
Forecasting the electricity load provides its future trends, consumption patterns and its usage. There is no proper strategy to monitor the energy consumption and generation; and high variation among them. Many strategies are used to overcome this problem. The correct selection of parameter values of a classifier is still an issue. Therefore, an op...
Article
Full-text available
Feature selection is the process of identifying the most relevant features from the given data having a large feature space. Microarray datasets are comprised of high-quality features and very few samples of data. Feature selection is performed on such datasets to identify the optimal feature subset. The major goal of feature selection is to improv...
Thesis
Full-text available
In this digitalized world, the most prominent technology Internet of Things (IoT) has emerged that cause massive growth in network traffic. At the same time, intrusion threats have become more sophisticated. Communication over the network has become vulnerable to attacks. Many Intrusion Detection Systems (IDS) were developed to monitor and find abn...
Thesis
Full-text available
The advent of the new millennium with the digital age and space technology promise favors humankind in every perspective. The technology renders us with electric power and has infinite use in multiple electronic accessories. The electric power produced by different sources is distributed to consumers by the transmission line and grid stations. Duri...
Article
Full-text available
Modern cellular systems have adopted dense frequency reuse to address the growing amount of mobile data traffic. The system capacity is improved accordingly; however, this is at the cost of augmented Inter-Cell Interference (ICI). Recently, Fractional Frequency Reuse (FFR) has emerged as an efficient ICI management scheme in Orthogonal Frequency-Di...
Article
Full-text available
Machine Learning based anomaly detection ap- proaches have long training and validation cycles. With IoT devices rapidly proliferating, training anomaly models on a per device basis is impractical. This work explores the “transfer- ability” of a pre-trained autoencoder model across devices of similar and different nature. We hypothesized that devic...
Article
Full-text available
The main purpose of educational institutions is to provide quality education to their students. However, it is difficult to analyze large data manually. Educational data mining is more effective as compared to statistical methods used to explore data in educational settings to analyze students’ performance. The objective of the study is to use diff...
Article
Full-text available
The advent of the new millennium, with the promises of the digital age and space technology, favors humankind in every perspective. The technology provides us with electric power and has infinite use in multiple electronic accessories. The electric power produced by different sources is distributed to consumers by the transmission line and grid sta...
Article
Full-text available
The population is increasing rapidly, due to which the number of vehicles has increased, but the transportation system has not yet developed as development occurred in technologies. Currently, the lowest capacity and old infrastructure of roads do not support the amount of vehicles flow which cause traffic congestion. The purpose of this survey is...
Article
Full-text available
Wireless sensor networks (WSNs) are spatially scattered networks equipped with an extensive number of nodes to check and record different ecological states such as humidity, temperature, pressure, and lightning states. WSN network provides different services to a client such as monitoring, detection, and runtime decision-making against events occur...
Article
Mobile Crowd Sensing (MCS) is a developing category of Internet of Things applications that are used in Intelligent Transportation System to improve the transport system. In today’s metropolitan life, traffic congestion in busy hours is the main problem due to which many commuters are unable to reach their destination on time, motorist time and ext...
Article
Full-text available
Wireless sensor networks (WSNs) have captivated substantial attention from both industrial and academic research in the last few years. The major factor behind the research efforts in that field is their vast range of applications which include surveillance systems, military operations, health care, environment event monitoring, and human safety. H...
Article
Mobile cloud computing (MCC) is an increasingly popular research topic, partly due to the widespread adoption of mobile devices and cloud services among individual and organizational users. Security and privacy of data-at-rest and data-in-transit are two of several key issues that need to be addressed. Traditional authentication models employ third...
Article
Full-text available
The latest developments in mobile computing technology have increased the computing capabilities of smart mobile devices (SMDs). However, SMDs are still constrained by low bandwidth, processing potential, storage capacity, and battery lifetime. To overcome these problems, the rich resources and powerful computational cloud is tapped for enabling in...
Article
Full-text available
Cloud computing has emerged as a popular computing model to process data and execute computationally intensive applications in a pay-as-you-go manner. Due to the ever-increasing demand for cloud-based applications, it is becoming difficult to efficiently allocate resources according to user requests while satisfying the service-level agreement betw...
Article
Full-text available
In recent years, the migration of the computational workloadto computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, clo...
Article
Full-text available
Vehicular communication requires vehicles to self-organize through the exchange of periodic beacons. Recent analysis on beaconing indicates that the standards for beaconing restrict the desired performance of vehicular applications. This situation can be attributed to the quality of the available transmission medium, persistent change in the traffi...
Article
Cloud log forensics (CLF) mitigates the investigation process by identifying the malicious behavior of attackers through profound cloud log analysis. However, the accessibility attributes of cloud logs obstruct accomplishment of the goal to investigate cloud logs for various susceptibilities. Accessibility involves the issues of cloud log access, s...
Article
Full-text available
Virtualization efficiently manages the ever-increasing demand for storage, computing, and networking resources in large-scale Cloud Data Centers. Virtualization attains multifarious resource management objectives including proactive server maintenance, load balancing, pervasive service availability, power management, and fault tolerance by virtual...
Article
Modern Cloud Data Centers exploit virtualization for efficient resource management to reduce cloud computational cost and energy budget. Virtualization empowered by virtual machine (VM) migration meets the ever increasing demands of dynamic workload by relocating VMs within Cloud Data Centers. VM migration helps successfully achieve various resourc...
Article
Full-text available
The latest developments in mobile computing technology have changed user preferences for computing. However, in spite of all the advancements in the recent years, Smart Mobile Devices (SMDs) are still low potential computing devices which are limited in memory capacity, CPU speed and battery power lifetime. Therefore, Mobile Cloud Computing (MCC) e...
Article
Vehicular ad hoc networks (VANETs) form an evolving field of wireless technology that focuses on a wide range of useful applications from safety-related applications to infotainment services. Radio propagation models (RPMs) in VANETs require a high level of realistic detail due to mobility, the nature of the network, technology limitations and urge...
Article
Full-text available
The increasing use and ubiquity of the Internet facilitate dissemination of word-of-mouth through blogs, online forums, newsgroups, and consumer's reviews. Online consumer's reviews present tremendous opportunities and challenges for consumers and marketers. One of the challenges is to develop interactive marketing practices for making connections...
Article
Full-text available
Man-At-The-End (MATE) attacks and fortifications are difficult to analyze, model, and evaluate predominantly for three reasons: Firstly, the attacker is human and therefore, utilizes motivation, creativity, and ingenuity. Secondly, the attacker has limitless and authorized access of the target. Thirdly, all major protections stand up to a determine...
Article
Full-text available
In recent years, the Internet has enabled access to widespread remote services in the distributed computing environment; however, integrity of data transmission in the distributed computing platform is hindered by a number of security issues. For instance, the botnet phenomenon is a prominent threat to Internet security, including the threat of mal...
Conference Paper
Full-text available
Mobile cloud computing (MCC) is fast becoming one of the most essential research topics for distributed resource networks. Users can easily access cloud while offloading their mobile applications from anywhere anytime. Being easy to access, intruder attacks mobile networks to acquire credential from mobile applications inside and outside the cloud...
Article
The data center network (DCN), which is an important component of data centers, consists of a large number of hosted servers and switches connected with high speed communication links. A DCN enables the deployment of resources centralization and on-demand access of the information and services of data centers to users. In recent years, the scale of...
Article
Full-text available
The latest developments in mobile computing technology have enabled intensive applications on the modern Smartphones. However, such applications are still constrained by limitations in processing potentials, storage capacity and battery lifetime of the Smart Mobile Devices (SMDs). Therefore, Mobile Cloud Computing (MCC) leverages the application pr...
Article
Full-text available
Computational clouds are increasingly becoming popular for the provisioning of computing resources and service on demand basis. As a backbone in computational clouds, a set of applications are configured over virtual machines running on a large number of server machines in data center networks (DCNs). Currently, DCNs use tree-based architecture whi...
Article
Mobile Cloud Computing (MCC) leverages computational clouds for mitigating resources limitations in mobile devices. However, the mobility attribute of mobile devices and the intrinsic limitations of wireless access medium obstruct to achieve the goal of seamless connectivity for accessing distributed services in MCC. Mobility involves the issues of...
Article
Full-text available
Big Data has gained much attention from the academia and the IT industry. In the digital and computing world, information is generated and collected at a rate that rapidly exceeds the boundary range. Currently, over 2 billion people worldwide are connected to the Internet, and over 5 billion individuals own mobile phones. By 2020, 50 billion device...
Article
Full-text available
Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrel...
Article
Full-text available
DOWLOAD link: http://www.zju.edu.cn/jzus/openiptxt.php?doi=10.1631/jzus.C1300332 Over the past few years, numerous traffic safety applications have been developed using vehicular ad hoc networks (VANETs). These applications represent public interest and require network-wide dissemination techniques. On the other hand, certain non-safety applicatio...
Article
Full-text available
Cloud computing (CC) has recently been receiving tremendous attention from the IT industry and academic researchers. CC leverages its unique services to cloud customers in a pay-as-you-go, anytime, anywhere manner. Cloud services provide dynamically scalable services through the Internet on demand. Therefore, service provisioning plays a key role i...
Article
Despite of substantial technological advancements in the recent years, Smart Mobile Devices (SMDs) are still low potential computing devices. Therefore, Mobile Cloud Computing (MCC) deploys computational offloading for augmenting SMDs. The contemporary Computational Offloading Frameworks (COFs) implement resources intensive procedures for computati...
Article
Mobile cloud computing (MCC) enables the development of computational intensive mobile applications by leveraging the application processing services of computational clouds. Contemporary distributed application processing frameworks use runtime partitioning of elastic applications in which additional computing resources are occurred in runtime app...
Article
Full-text available
Big Data has gained much attention from the academia and the IT industry. In the digital and computing world, information is generated and collected at a rate that rapidly exceeds the boundary range. Currently, over 2 billion people worldwide are connected to the Internet, and over 5 billion individuals own mobile phones. By 2020, 50 billion device...
Article
Cloud computing enables access to the widespread services and resources in cloud datacenters for mitigating resource limitations in low-potential client devices. Computational cloud is an attractive platform for computational offloading due to the attributes of scalability and availability of resources. Therefore, mobile cloud computing (MCC) lever...
Article
Full-text available
The latest developments in mobile computing technology have increased the computing capabilities of smartphones in terms of storage capacity, features support such as multimodal connectivity, and support for customized user applications. Mobile devices are, however, still intrinsically limited by low bandwidth, computing power, and battery lifetime...
Conference Paper
Cognitive Radio Networks have changed the communication paradigm by opportunistically using available spectrum. In such networks, Secondary User vacates the channel when it detects the Primary User. The frequent channel switching degrades the throughput of Cognitive Radio Networks. Current schemes suggest only the selection of Primary Channel if th...
Article
Full-text available
In Cognitive Radio Networks, the application throughput is not only affected by primary user activity but also by numerous environment factors such as interference. Therefore, channel assignment for cognitive radio networks should not only consider channel idle time but also an error rate perceived on the channel. The spectrum-aware channel assignm...
Article
Full-text available
Multiple wireless devices are being widely deployed in Intelligent Transportation System (ITS) services on the road to establish end-to-end connection between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) networks. Vehicular ad hoc networks (VANETs) play an important role in supporting V2V and V2I communications (also called V2X comm...
Conference Paper
Full-text available
Big Data has gained much attention from the academia and the IT industry. In the digital and computing world, information is generated and collected at a rate that rapidly exceeds the boundary range. Currently, over 2 billion people worldwide are connected to the Internet, and over 5 billion individuals own mobile phones. By 2020, 50 billion device...
Article
In mobile cloud computing, application offloading is implemented as a software level solution for augmenting computing potentials of smart mobile devices. VM is one of the prominent approaches for offloading computational load to cloud server nodes. A challenging aspect of such frameworks is the additional computing resources utilization in the dep...
Article
Full-text available
The latest developments in mobile devices technology have made smartphones as the future computing and service access devices. Users expect to run computational intensive applications on Smart Mobile Devices (SMDs) in the same way as powerful stationary computers. However in spite of all the advancements in recent years, SMDs are still low potentia...
Conference Paper
Full-text available
The recent efforts in Mobile Cloud Computing (MCC) focus on defining novel methods, policies and mechanisms for efficiently leveraging the services of cloud data centers for mitigating resources constraints in mobile devices. To test these newly developed methods and policies, researchers need tools for evaluating the hypothesis prior to deployment...
Article
Full-text available
The vision of augmenting computing capabilities of mobile devices, especially smartphones with least cost is likely transforming to reality leveraging cloud computing. Cloud exploitation by mobile devices breeds a new research domain called Mobile Cloud Computing (MCC). However, issues like portability and interoperability should be addressed for m...
Article
Full-text available
Mobile Cloud Computing (MCC) is the state-ofthe- art mobile computing technology aims to alleviate resource poverty of mobile devices. Recently, several approaches and techniques have been proposed to augment mobile devices by leveraging cloud computing. However, long-WAN latency and trust are still two major issues in MCC that hinder its vision. I...
Article
Delivering Rich User eXperience (RUX) with the current explosion of smartphone as real ubiquitous computing device requires adaptive application architecture. Rich Mobile Application (RMA) is likely the candidate architecture for future mobile applications to deliver rich, immersive experience to the smartphone users. Research and development in do...
Article
In Mobile Cloud Computing (MCC), Virtual Machine (VM) migration based process offloading is a dominant approach to enhance Smart Mobile Devices (SMDs). A challenging aspect of VM deployment is the additional computing resources usage in the deployment and management of VM which obliges computing resources for VM creation and configuration. The mana...
Conference Paper
The lightness of distributed application processing platform becomes more imperative with rapid proliferation of SMDs and ever increasing demand to utilize SMDs for intensive applications. Lightweight framework aspires for minimum possible overhead and optimal possible resources utilization on SMDs. Traditionally the distributed platform is establi...