Tariq UmerCOMSATS Institute of Information Technology, Wah Cantt, Pakistan · Department of Computer Science
Tariq Umer
PhD Communication Systems
About
57
Publications
19,170
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,906
Citations
Introduction
Skills and Expertise
Publications
Publications (57)
Rapid development of wireless technologies, such as the Internet of Things (IoT) and widely deployed fifth generation (5G) networks, are proved to be the embarkment of envisioning, and planning for sixth generation (6G) mobile networks. It is believed that 6G will provide extremely high data rates, low latency, and improved edge intelligence for hu...
This chapter explores the transformative intersection of Federated Learning (FL) and the Internet of Underwater Things (IoUT), presenting a paradigm shift in how underwater things operate autonomously and efficiently. The unique challenges posed by the underwater environment necessitate innovative solutions, and FL emerges as a promising approach t...
In Mobile Edge Computing, the framework of federated learning can enable collaborative learning models across edge nodes, without necessitating the direct exchange of data from edge nodes. It addresses significant challenges encompassing access rights, privacy, security, and the utilization of heterogeneous data sources over mobile edge computing....
The approach of federated learning (FL) addresses significant challenges, including access rights, privacy, security, and the availability of diverse data. However, edge devices produce and collect data in a non-independent and identically distributed (non-IID) manner. Therefore, it is possible that the number of data samples may vary among the edg...
The major challenge faced by autonomous vehicles today is driving through busy roads without getting into an accident, especially with a pedestrian. To avoid collision with pedestrians, the vehicle requires the ability to communicate with a pedestrian to understand their actions. The most challenging task in research on computer vision is to detect...
Wireless Multimedia Sensor Network (WMSN) is a wirelessly connected sensor network featuring multimedia devices such as cameras and microphones that can retrieve video and audio streams, photographs, and scalar sensor data. Because of the low cost of cameras and microphones, in addition to significant advances in distributed signal processing and m...
Blockchain technology is based on a series of time-stamped and decentralized immutable records without third-party involvement. Since the infancy of the term, it has attained attention from academic researchers and industrial contributors, globally. The extensive characteristics of blockchain have created new investigation domains in multiple indus...
Technological advancements have always been influencing our lives. Recently, the Internet of Things (IoT) and Blockchain (BC) are emerging as potentially disruptive technologies. Whereby, the IoT is a system of inter-related devices with unique identifiers for data sharing and device management and control. IoT is based on the integration of tradit...
The federated learning technique (FL) supports the collaborative training of machine learning and deep learning models for edge network optimization. Although a complex edge network with heterogeneous devices having different constraints can affect its performance, this leads to a problem in this area. Therefore, some research can be seen to design...
Use of internet of things (IoT) in different fields including smart cities, health care, manufacturing, and surveillance is growing rapidly, which results in massive amount of data generated by IoT devices. Real-time processing of large-scale data streams is one of the main challenges of IoT systems. Analyzing IoT data can help in providing better...
Intention mining is a promising research area of data mining that aims to determine end-users’ intentions from their past activities stored in the logs, which note users’ interaction with the system. Search engines are a major source to infer users’ past searching activities to predict their intention, facilitating the vendors and manufacturers to...
By analyzing the essence and deficiency of the improved Otsu’s method, this paper proposes a noise adaptive angle threshold based Otsu’s method for gesture image segmentation. It first designs a two-dimensional histogram of gray value-neighborhood truncated gray mean to avoid the interference of extreme noise by discarding the extremes of the neigh...
Internet of connected vehicles (IoV) are expected to enable intelligent traffic management, intelligent dynamic information services, intelligent vehicle control, etc. However, vehicles’ data privacy is argued to be a major barrier toward the application and development of IoV, thus causing a wide range of attentions. Local differential privacy (LD...
The demand for real-time communication and high performance of the Internet of Vehicles (IoV) system has caused researches to investigate new techniques in edge computing (EC). With the rapid development of the fifth- generation (5G) network, the features of low delay, high reliability and superior communication efficiency can bring historic opport...
Non‐orthogonal multiple access (NOMA) has been considered a key technology to address the increasing traffic demands for fifth‐generation (5G) cellular wireless communication networks and internet of things. The NOMA technique offers efficient bandwidth utilisation, low latency, and support for the massive connectivity of devices in 5G networks. In...
This article is aimed at designing positioning system using visible light communication technology by incorporating three different diversity schemes, namely, transmit diversity (TD), receive diversity (RD), and angle diversity. For the TD, multiple transmitters with single receiver (MISO) is used to obtain the target location using frequency divis...
Reliable data transmission during communication in Internet of things (IoT)–based systems has gained much interest in last few years due to the current growth and huge investment in such systems. Message Queue Telemetry Transport (MQTT) is an open publish/subscribe–based messaging protocol that is widely used for device communication in IoT. For da...
The International Conference on Green and Human Information Technology (ICGHIT) is an international conference focusing on green and information technologies oriented toward humanity [...]
The study of Natural Language Generation (NLG), especially how human beings narrate the world, assists in understanding of the visual world for surveillance. Our research proposes an effective technique to axiomatically develop multi-line textual description of visual data by exploiting deep Convolution Neural Networks (CNN). Textual description of...
Now days, distribution system has experienced numerous significant changes due to the implementation of smart grid technology and integration of distributed and renewable energy resources. Optimal integration of distributed generators and reconfiguration of the radial network have overall positive impacts on the power system. In this paper our aim...
Efficient and fast segmentation of fruit symptoms is one of the major businesses nowadays in the agro-economy. Manual segmentation and recognition of fruit symptoms is a hard job because of many aspects such like time-consuming and waste of money. Lately, several scholars came up with image processing and pattern recognition based methods for segme...
Abstract One of the key applications for the Internet of Things (IoT) is the eHealth service that targets sustaining patient health information in digital environments, such as the Internet cloud with the help of advanced communication technologies. In eHealth systems, wireless networks, such as wireless local area networks (WLAN), wireless body se...
The Internet of connected vehicles (IoV) is employed to collect real-time traffic conditions for transportation control systems, and the computing tasks are available to be offloaded from the vehicles to the edge computing devices (ECDs) for implementation. Despite numerous benefits of IoV and ECDs, the wireless communication for computation offloa...
The future smart cities demand from researchers to come out with various smart solutions for health, communication, living, and transportation. For transportation, electric vehicles (EVs) are considered to be the smart solution for smart cities. However, the larger penetration of EVs can overload the smart grid. Therefore, it is demanded that the r...
Tactile Internet evolves communications to encompass sensory information such as smell and haptic sensations combining ultra-low latency with extremely high availability, reliability, and security. Tactile Internet is realized through underpinning technologies such as Multi-access Edge and Fog computing which facilitate decentralized infrastructure...
The hybrid Powerline Communication (PLC) and Visible Light Communication (VLC) systems can be effectively utilized for the efficient design of 5G communication setup. However, each of these integrated communication media is not primarily meant for the specific purpose of data communication, as PLC and VLC have historically served to transfer electr...
Introduction of electric vehicles (EVs) or plug-in electric vehicles (PEVs) in the road transportation can significantly reduce the carbon emission. Hence, the demand of EVs is likely to increase in the near future. Large penetration of EVs will also ultimately result into high loads on the existing power grids. The controlled charging of EVs can h...
Multi-tier cloud-radio access networks (C-RANs) have been suggested as a promising network model in fifth generation (5G) wireless networks to provide high data rate, high spectral efficiency and high energy efficiency at low cost. However, to achieve the potential benefits of multi-tier C-RANs, it is important to design efficient resource allocati...
Fast rerouting requires that a backup route is already available at each node so that traffic can immediately be shifted on it without new path discovery and convergence time delay. Handling multiple failures with least possible delay, high throughput and least overhead with regard to memory and battery is a real challenge in Wireless Sensor Networ...
Road safety through vehicular control is the prime interest of research in Vehicular Ad hoc Networks (VANETs). Diagnostic analysis of In-vehicle sensors is one of the core concerns for vehicular safety. There is a number of safety applications promising the features needed in vehicular safety. Therefore, this paper designed, developed, and implemen...
Network-on-Chip (NoC) has appeared to be an impending substitute for the communication paradigm in modern VLSI (Very Large Scale Integration) embedded systems. Apart from many design challenges, application mapping on the NoC system is one of the most intractable and challenging optimization problems. In this paper, we propose a hybrid, Branch & Bo...
The goal of vehicular ad hoc networks (VANETs) is to provide safety and comfort to travelers, drivers, and pedestrians during their journeys on the roads. To support vehicular communications under dynamic traffic conditions and diverse operating environments, different communications technologies have been implemented and tested. The availability o...
A novel indoor positioning algorithm with improved location accuracy is proposed for Visible Light Communication (VLC) system. The novelty of the positioning algorithm lies in a hybrid approach of making use of both frequency and variable phase of the transmitted signal. The algorithm has capability of estimating the position of an object with loca...
Industrial internet of unmanned aerial vehicles (IIoUAVs) which enable autonomous inspection and measurement of anything anytime anywhere have become an essential component of the future industrial internet of things (IIoT) ecosystem. In this paper, we investigate how to apply IIoUAVs for power line inspection in smart grid from an energy efficienc...
Vehicular ad-hoc network (VANET) is characterized as a highly dynamic wireless network due to the dynamic connectivity of the network nodes. To achieve better connectivity under such dynamic conditions, an optimal transmission strategy is required to direct the information flow between the nodes. Earlier studies on VANET’s overlook the characterist...
The evolution of high performance computing architectures has increased the essence of effective utilization of resources. The cloud computing paradigm also incorporates high performance computing architectures with costly resources to provide services to end users. Its pay per use model makes it beneficial for cloud service providers as well as en...
Network-on-Chip (NoC) is an emerging alternative to address the communication problem in embedded System-on-Chip (SoC) designs. One of the key and major issues is the optimized mapping of the embedded applications on the underlined NoC platform. In this paper, we propose the Bandwidth-Constrained Multi-Objective Segmented Brute-Force Mapping (SBMAP...
Wireless networks with their ubiquitous applications have become an indispensable part of our daily lives. Wireless networks demand more and more spectral resources to support the ever increasing numbers of users. According to network engineers, the current spectrum crunch can be addressed with the introduction of cognitive radio networks (CRNs). I...
Network coding is a data processing technique in which the flow of digital data is optimized in a network by transmitting a composite of two or more messages to make the network more robust. Network coding has been used in traditional and emerging wireless networks to overcome the communications issues of these networks. It also plays an important...
Wireless sensor networks (WSNs) have gained much attention in today’s research domain for supporting a wide variety of applications including the multimedia applications. Multimedia applications that are regarded as the quality-ofservice (QoS)-aware, delay sensitive, and bandwidth hungry applications, require enough energy and communication resourc...
The advancements in technology have transformed the vehicles moving around us into intelligent machines. These vehicles now have the capabilities to communicate and share useful information with each other under a communication network known as Vehicular Ad hoc Network (VANETs). The aim of this vehicular digitization was to enhance the standard, ea...
Wireless body area sensor networks (WBASNs) have gained much importance in current research domains and are implemented in real scenarios like hospitals for monitoring patients real-time data. Tiny sensing nodes in WBASNs have limited processing, storing capacity and battery life. The communication of sensing nodes is made energy efficient to conse...
Fairness means to maintain the property of equity or equivalence. It is the distribution, sharing, allocation, and supply of different working metrics fairly such as bandwidth, throughput, power, utilization, resources, frequency, rate, time slot, and spectrum in any wireless network. For every network including Cognitive Radio Networks (CRNs), fai...
A spatial domain optimal trade-off Maximum Average Correlation Height (SPOT-MACH) filter has been previously developed and shown to have advantages over frequency domain implementations in that it can be made locally adaptive to spatial variations in the input image background clutter and normalised for local intensity changes. The main concern for...
The availability of more realistic road conditions and dynamics provides sound ground to study the issues of Vehicular ad-hoc Network (VANET). In this chapter a new heterogeneous traffic flow based mathematical model is presented, to gain the time and space dynamics of vehicles. To achieve more accurate and realistic data about road conditions, mic...
Problem arising in CFG (Context Free Grammar) due to ambiguity can be trace to 1962. Even now there is no general method or procedure introduced to detect ambiguity in CFG. In parser generation and in language design, ambiguity in context free grammar, is a frequent problem as well as in application where it is used for the representation of physic...
Microscopic aspects of traffic codes for heterogeneous traffic flow are considered to be optimal for the performance of vehicular ad-hoc network. Within the scope of this concept, fluid dynamic model was applied for density estimation of heterogeneous traffic conditions. The effect of jamming density on velocity and density dynamics having influenc...
This paper purposes a new surveillance system for an organization using wireless sensor networks and RFID. The system authenticates the authorized person of the organization using RFID (Radio Frequency Identifier) tags embedded cards and also detects the unknown person using Motion sensors. The system also alarms the presence of unknown person. The...
Questions
Question (1)
i want to work on intrusion detection in cloud by using user profiling. but could any implementation of it, i m using cloudSim for simulation. i m new on cloudSim and it is difficult to understand how users and their profile is created in cloudSim
thankyou