Tariq Umer

Tariq Umer
COMSATS Institute of Information Technology, Wah Cantt, Pakistan · Department of Computer Science

PhD Communication Systems

About

57
Publications
19,170
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,906
Citations

Publications

Publications (57)
Chapter
Rapid development of wireless technologies, such as the Internet of Things (IoT) and widely deployed fifth generation (5G) networks, are proved to be the embarkment of envisioning, and planning for sixth generation (6G) mobile networks. It is believed that 6G will provide extremely high data rates, low latency, and improved edge intelligence for hu...
Chapter
This chapter explores the transformative intersection of Federated Learning (FL) and the Internet of Underwater Things (IoUT), presenting a paradigm shift in how underwater things operate autonomously and efficiently. The unique challenges posed by the underwater environment necessitate innovative solutions, and FL emerges as a promising approach t...
Article
Full-text available
In Mobile Edge Computing, the framework of federated learning can enable collaborative learning models across edge nodes, without necessitating the direct exchange of data from edge nodes. It addresses significant challenges encompassing access rights, privacy, security, and the utilization of heterogeneous data sources over mobile edge computing....
Article
Full-text available
The approach of federated learning (FL) addresses significant challenges, including access rights, privacy, security, and the availability of diverse data. However, edge devices produce and collect data in a non-independent and identically distributed (non-IID) manner. Therefore, it is possible that the number of data samples may vary among the edg...
Article
Full-text available
The major challenge faced by autonomous vehicles today is driving through busy roads without getting into an accident, especially with a pedestrian. To avoid collision with pedestrians, the vehicle requires the ability to communicate with a pedestrian to understand their actions. The most challenging task in research on computer vision is to detect...
Article
Full-text available
Wireless Multimedia Sensor Network (WMSN) is a wirelessly connected sensor network featuring multimedia devices such as cameras and microphones that can retrieve video and audio streams, photographs, and scalar sensor data. Because of the low cost of cameras and microphones, in addition to significant advances in distributed signal processing and m...
Article
Blockchain technology is based on a series of time-stamped and decentralized immutable records without third-party involvement. Since the infancy of the term, it has attained attention from academic researchers and industrial contributors, globally. The extensive characteristics of blockchain have created new investigation domains in multiple indus...
Article
Technological advancements have always been influencing our lives. Recently, the Internet of Things (IoT) and Blockchain (BC) are emerging as potentially disruptive technologies. Whereby, the IoT is a system of inter-related devices with unique identifiers for data sharing and device management and control. IoT is based on the integration of tradit...
Article
Full-text available
The federated learning technique (FL) supports the collaborative training of machine learning and deep learning models for edge network optimization. Although a complex edge network with heterogeneous devices having different constraints can affect its performance, this leads to a problem in this area. Therefore, some research can be seen to design...
Article
Full-text available
Use of internet of things (IoT) in different fields including smart cities, health care, manufacturing, and surveillance is growing rapidly, which results in massive amount of data generated by IoT devices. Real-time processing of large-scale data streams is one of the main challenges of IoT systems. Analyzing IoT data can help in providing better...
Article
Full-text available
Intention mining is a promising research area of data mining that aims to determine end-users’ intentions from their past activities stored in the logs, which note users’ interaction with the system. Search engines are a major source to infer users’ past searching activities to predict their intention, facilitating the vendors and manufacturers to...
Article
Full-text available
By analyzing the essence and deficiency of the improved Otsu’s method, this paper proposes a noise adaptive angle threshold based Otsu’s method for gesture image segmentation. It first designs a two-dimensional histogram of gray value-neighborhood truncated gray mean to avoid the interference of extreme noise by discarding the extremes of the neigh...
Article
Full-text available
Internet of connected vehicles (IoV) are expected to enable intelligent traffic management, intelligent dynamic information services, intelligent vehicle control, etc. However, vehicles’ data privacy is argued to be a major barrier toward the application and development of IoV, thus causing a wide range of attentions. Local differential privacy (LD...
Article
The demand for real-time communication and high performance of the Internet of Vehicles (IoV) system has caused researches to investigate new techniques in edge computing (EC). With the rapid development of the fifth- generation (5G) network, the features of low delay, high reliability and superior communication efficiency can bring historic opport...
Article
Full-text available
Non‐orthogonal multiple access (NOMA) has been considered a key technology to address the increasing traffic demands for fifth‐generation (5G) cellular wireless communication networks and internet of things. The NOMA technique offers efficient bandwidth utilisation, low latency, and support for the massive connectivity of devices in 5G networks. In...
Article
This article is aimed at designing positioning system using visible light communication technology by incorporating three different diversity schemes, namely, transmit diversity (TD), receive diversity (RD), and angle diversity. For the TD, multiple transmitters with single receiver (MISO) is used to obtain the target location using frequency divis...
Article
Full-text available
Reliable data transmission during communication in Internet of things (IoT)–based systems has gained much interest in last few years due to the current growth and huge investment in such systems. Message Queue Telemetry Transport (MQTT) is an open publish/subscribe–based messaging protocol that is widely used for device communication in IoT. For da...
Article
Full-text available
The International Conference on Green and Human Information Technology (ICGHIT) is an international conference focusing on green and information technologies oriented toward humanity [...]
Article
The study of Natural Language Generation (NLG), especially how human beings narrate the world, assists in understanding of the visual world for surveillance. Our research proposes an effective technique to axiomatically develop multi-line textual description of visual data by exploiting deep Convolution Neural Networks (CNN). Textual description of...
Article
Now days, distribution system has experienced numerous significant changes due to the implementation of smart grid technology and integration of distributed and renewable energy resources. Optimal integration of distributed generators and reconfiguration of the radial network have overall positive impacts on the power system. In this paper our aim...
Article
Efficient and fast segmentation of fruit symptoms is one of the major businesses nowadays in the agro-economy. Manual segmentation and recognition of fruit symptoms is a hard job because of many aspects such like time-consuming and waste of money. Lately, several scholars came up with image processing and pattern recognition based methods for segme...
Article
Full-text available
Abstract One of the key applications for the Internet of Things (IoT) is the eHealth service that targets sustaining patient health information in digital environments, such as the Internet cloud with the help of advanced communication technologies. In eHealth systems, wireless networks, such as wireless local area networks (WLAN), wireless body se...
Article
The Internet of connected vehicles (IoV) is employed to collect real-time traffic conditions for transportation control systems, and the computing tasks are available to be offloaded from the vehicles to the edge computing devices (ECDs) for implementation. Despite numerous benefits of IoV and ECDs, the wireless communication for computation offloa...
Chapter
The future smart cities demand from researchers to come out with various smart solutions for health, communication, living, and transportation. For transportation, electric vehicles (EVs) are considered to be the smart solution for smart cities. However, the larger penetration of EVs can overload the smart grid. Therefore, it is demanded that the r...
Article
Tactile Internet evolves communications to encompass sensory information such as smell and haptic sensations combining ultra-low latency with extremely high availability, reliability, and security. Tactile Internet is realized through underpinning technologies such as Multi-access Edge and Fog computing which facilitate decentralized infrastructure...
Article
Full-text available
The hybrid Powerline Communication (PLC) and Visible Light Communication (VLC) systems can be effectively utilized for the efficient design of 5G communication setup. However, each of these integrated communication media is not primarily meant for the specific purpose of data communication, as PLC and VLC have historically served to transfer electr...
Article
Introduction of electric vehicles (EVs) or plug-in electric vehicles (PEVs) in the road transportation can significantly reduce the carbon emission. Hence, the demand of EVs is likely to increase in the near future. Large penetration of EVs will also ultimately result into high loads on the existing power grids. The controlled charging of EVs can h...
Article
Full-text available
Multi-tier cloud-radio access networks (C-RANs) have been suggested as a promising network model in fifth generation (5G) wireless networks to provide high data rate, high spectral efficiency and high energy efficiency at low cost. However, to achieve the potential benefits of multi-tier C-RANs, it is important to design efficient resource allocati...
Article
Fast rerouting requires that a backup route is already available at each node so that traffic can immediately be shifted on it without new path discovery and convergence time delay. Handling multiple failures with least possible delay, high throughput and least overhead with regard to memory and battery is a real challenge in Wireless Sensor Networ...
Article
Road safety through vehicular control is the prime interest of research in Vehicular Ad hoc Networks (VANETs). Diagnostic analysis of In-vehicle sensors is one of the core concerns for vehicular safety. There is a number of safety applications promising the features needed in vehicular safety. Therefore, this paper designed, developed, and implemen...
Article
Full-text available
Network-on-Chip (NoC) has appeared to be an impending substitute for the communication paradigm in modern VLSI (Very Large Scale Integration) embedded systems. Apart from many design challenges, application mapping on the NoC system is one of the most intractable and challenging optimization problems. In this paper, we propose a hybrid, Branch & Bo...
Article
The goal of vehicular ad hoc networks (VANETs) is to provide safety and comfort to travelers, drivers, and pedestrians during their journeys on the roads. To support vehicular communications under dynamic traffic conditions and diverse operating environments, different communications technologies have been implemented and tested. The availability o...
Article
Full-text available
A novel indoor positioning algorithm with improved location accuracy is proposed for Visible Light Communication (VLC) system. The novelty of the positioning algorithm lies in a hybrid approach of making use of both frequency and variable phase of the transmitted signal. The algorithm has capability of estimating the position of an object with loca...
Article
Industrial internet of unmanned aerial vehicles (IIoUAVs) which enable autonomous inspection and measurement of anything anytime anywhere have become an essential component of the future industrial internet of things (IIoT) ecosystem. In this paper, we investigate how to apply IIoUAVs for power line inspection in smart grid from an energy efficienc...
Article
Full-text available
Vehicular ad-hoc network (VANET) is characterized as a highly dynamic wireless network due to the dynamic connectivity of the network nodes. To achieve better connectivity under such dynamic conditions, an optimal transmission strategy is required to direct the information flow between the nodes. Earlier studies on VANET’s overlook the characterist...
Article
Full-text available
The evolution of high performance computing architectures has increased the essence of effective utilization of resources. The cloud computing paradigm also incorporates high performance computing architectures with costly resources to provide services to end users. Its pay per use model makes it beneficial for cloud service providers as well as en...
Article
Full-text available
Network-on-Chip (NoC) is an emerging alternative to address the communication problem in embedded System-on-Chip (SoC) designs. One of the key and major issues is the optimized mapping of the embedded applications on the underlined NoC platform. In this paper, we propose the Bandwidth-Constrained Multi-Objective Segmented Brute-Force Mapping (SBMAP...
Article
Wireless networks with their ubiquitous applications have become an indispensable part of our daily lives. Wireless networks demand more and more spectral resources to support the ever increasing numbers of users. According to network engineers, the current spectrum crunch can be addressed with the introduction of cognitive radio networks (CRNs). I...
Article
Full-text available
Network coding is a data processing technique in which the flow of digital data is optimized in a network by transmitting a composite of two or more messages to make the network more robust. Network coding has been used in traditional and emerging wireless networks to overcome the communications issues of these networks. It also plays an important...
Article
Full-text available
Wireless sensor networks (WSNs) have gained much attention in today’s research domain for supporting a wide variety of applications including the multimedia applications. Multimedia applications that are regarded as the quality-ofservice (QoS)-aware, delay sensitive, and bandwidth hungry applications, require enough energy and communication resourc...
Article
Full-text available
The advancements in technology have transformed the vehicles moving around us into intelligent machines. These vehicles now have the capabilities to communicate and share useful information with each other under a communication network known as Vehicular Ad hoc Network (VANETs). The aim of this vehicular digitization was to enhance the standard, ea...
Conference Paper
Wireless body area sensor networks (WBASNs) have gained much importance in current research domains and are implemented in real scenarios like hospitals for monitoring patients real-time data. Tiny sensing nodes in WBASNs have limited processing, storing capacity and battery life. The communication of sensing nodes is made energy efficient to conse...
Article
Full-text available
Fairness means to maintain the property of equity or equivalence. It is the distribution, sharing, allocation, and supply of different working metrics fairly such as bandwidth, throughput, power, utilization, resources, frequency, rate, time slot, and spectrum in any wireless network. For every network including Cognitive Radio Networks (CRNs), fai...
Conference Paper
Full-text available
A spatial domain optimal trade-off Maximum Average Correlation Height (SPOT-MACH) filter has been previously developed and shown to have advantages over frequency domain implementations in that it can be made locally adaptive to spatial variations in the input image background clutter and normalised for local intensity changes. The main concern for...
Chapter
The availability of more realistic road conditions and dynamics provides sound ground to study the issues of Vehicular ad-hoc Network (VANET). In this chapter a new heterogeneous traffic flow based mathematical model is presented, to gain the time and space dynamics of vehicles. To achieve more accurate and realistic data about road conditions, mic...
Article
Full-text available
Problem arising in CFG (Context Free Grammar) due to ambiguity can be trace to 1962. Even now there is no general method or procedure introduced to detect ambiguity in CFG. In parser generation and in language design, ambiguity in context free grammar, is a frequent problem as well as in application where it is used for the representation of physic...
Conference Paper
Microscopic aspects of traffic codes for heterogeneous traffic flow are considered to be optimal for the performance of vehicular ad-hoc network. Within the scope of this concept, fluid dynamic model was applied for density estimation of heterogeneous traffic conditions. The effect of jamming density on velocity and density dynamics having influenc...
Article
Full-text available
This paper purposes a new surveillance system for an organization using wireless sensor networks and RFID. The system authenticates the authorized person of the organization using RFID (Radio Frequency Identifier) tags embedded cards and also detects the unknown person using Motion sensors. The system also alarms the presence of unknown person. The...

Questions

Question (1)
Question
i want to work on intrusion detection in cloud by using user profiling. but could any implementation of it, i m using cloudSim for simulation. i m new on cloudSim and it is difficult to understand how users and their profile is created in cloudSim
thankyou

Network

Cited By