Manzoor Ilahi's research while affiliated with COMSATS University Islamabad and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (41)
Stemming is an essential step in varied Natural Language Processing (NLP) applications. It is used to reduce different variants of the query words to a standard form to avoid the vocabulary mismatch issue in Information Retrieval (IR) systems. There are a lot of stemming algorithms in English language, but Urdu NLP still in its infancy. A stemmer d...
Stemming is an essential step in varied Natural Language Processing (NLP) applications. It is used to reduce different variants of the query words to a standard form to avoid the vocabulary mismatch issue in Information Retrieval (IR) systems. There are a lot of stemming algorithms in English language, but Urdu NLP still in its infancy. A stemmer d...
Several software design patterns have cataloged either with canonical or as variants to solve a recurring design problem. However, novice designers mostly adopt patterns without considering their ground reality and relevance to design problems, which causes to increase the development and maintenance efforts. The existing automated systems to selec...
The imbalance energy consumption and high data traffic at intermediate nodes degrade the network performance. In this paper, we propose: energy grade and balance load distribution (EGBLOAD) corona, EG without corona and DA without corona based schemes to distribute data traffic across the network nodes for efficient energy consumption. The dynamic...
As an emerging and promising approach, crowdsourcing-based software development has become popular in many domains due to the participation of talented pool of developers in the contests, and to promote the ability of requesters (or customers) to choose the ‘wining’ solution with respect to their desired quality levels. However, due to lack of a ce...
Demand side management (DSM) in smart grid authorizes consumers to make informed decisions regarding their energy consumption pattern and helps the utility in reducing the peak load demand during an energy stress time. This results in reduced carbon emission, consumer electricity cost, and increased grid sustainability. Most of the existing DSM tec...
Cloud computing offers various services. Numerous cloud data centers are used to provide these services to the users in the whole world. A cloud data center is a house of physical machines (PMs). Millions of virtual machines (VMs) are used to minimize the utilization rate of PMs. There is a chance of unbalanced network due to the rapid growth of In...
This paper focuses on analytics of an extremely large dataset of smart grid electricity price and load, which is difficult to process with conventional computational models. These data are known as energy big data. The analysis of big data divulges the deeper insights that help experts in the improvement of smart grid’s (SG) operations. Processing...
Short-Term Electricity Load Forecasting (STELF) through Data Analytics (DA) is an emerging and active research area. Forecasting about electricity load and price provides future trends and patterns of consumption. There is a loss in generation and use of electricity. So, multiple strategies are used to solve the aforementioned problems. Day-ahead e...
The emergence of the Demand Response (DR) program optimizes the energy consumption pattern of customers and improves the efficacy of energy supply. The pricing infra-structure of the DR program is dynamic (time-based). It has rather complex features including marginal costs, demand and seasonal parameters. There is variation in DR price rate. Somet...
The latency issue of cloud based system can degrade smart grid's real-time applications. This paper introduces a fog computing layer between the cloud and clients to provide energy management service in near real-time with optimised computing cost. In a region, in proposed system model, two clusters of residential buildings have access to two fogs...
Demand Response Management (DRM) is considered one of the crucial aspects of the smart grid as it helps to lessen the production cost of electricity and utility bills. DRM becomes a fascinating research area when numerous utility companies are involved and their announced prices reflect consumer’s behavior. This paper discusses a Stackelberg game p...
With the increasing size of cloud data centers, the number of users and virtual machines (VMs) increases rapidly. The requests of users are entertained by VMs residing on physical servers. The dramatic growth of internet services results in unbalanced network resources. Resource management is an important factor for the performance of a cloud. Vari...
[This corrects the article DOI: 10.1371/journal.pone.0179703.].
Designing an efficient association rule mining (ARM) algorithm for multilevel knowledge-based transactional databases that is appropriate for real-world deployments is of paramount concern. However, dynamic decision making that needs to modify the threshold either to minimize or maximize the output knowledge certainly necessitates the extant state-...
IIn this paper, we propose a home energy management system which employs load shifting strategy of demand side management to optimize the energy consumption patterns of a smart home. It aims to manage the load demand in an efficient way to minimize electricity cost and peak to average ratio while maintaining user comfort through coordination among...
Underwater wireless sensor networks (UWSNs) facilitate a wide range of aquatic applications in various domains. However, the harsh underwater environment poses challenges like low bandwidth, long propagation delay, high bit error rate, high deployment cost, irregular topological structure, etc. Node mobility and the uneven distribution of sensor no...
Localization is one of the major aspects in underwater wireless sensor networks (UWSNs). Therefore, it is important to know the accurate position of the sensor node in large scale applications like disaster prevention, tactical surveillance and monitoring. Due to the inefficiency of the global positioning system (GPS) in UWSN, it is very difficult...
There are a number of research challenges associated with Internet of Things (IoT) security, and one of these challenges is to design novel frameworks to mine malicious frequent patterns for identifying misuse and detecting anomalies without incurring high computational costs (e.g. due to generation and analysis of unnecessary patterns and gap crea...
Mobile Sink (MS) based routing strategies have been widely investigated to prolongs the lifetime of Wireless Sensor Networks (WSNs). In this paper, we propose two schemes for data gathering in WSNs: (i) MS moves on Random paths in the network (RMS), and (ii) the trajectory of MS is Defined (DMS). In both the schemes, the network field is logically...
Smart grids can be regarded as the revolution in traditional power grids due to integration of Information and Communication Technologies (ICT), Distributed systems and Computational Intelligence (CI) algorithms in existing infras- tructure. Such advancements make it possible to monitor real time power patterns, articulate numerous Demand Response...
In this work, we propose a Realistic Scheduling Mechanism (RSM) to reduce user frustration and enhance appliance utility by classifying appliances with respective constraints and their time of use effectively. Algorithms are proposed regarding functioning of home appliances. A 24 hour time slot is divided into four logical sub-time slots, each comp...
Reliability is a key factor for application-oriented Underwater Sensor Networks (UWSNs) which are utilized for gaining certain objectives and a demand always exists for efficient data routing mechanisms. Cooperative routing is a promising technique which utilizes the broadcast feature of wireless medium and forwards data with cooperation using sens...
As players and soldiers preform strenuous exercises and do difficult and tiring duties, they are usually the common victims of muscular fatigue. Keeping this in mind, we propose FAtigue MEasurement (FAME) protocol for soccer players and soldiers using in-vivo sensors for Wireless Body Area Sensor Networks (WBASNs). In FAME, we introduce a composite...
In this paper, we analyze performance of famous cluster based routing protocols and identify the factors affecting energy consumption in wireless sensor networks. From theoretical and experimental analysis, it is observed that communication distance and cluster node density are the major sources in the formation of energy and coverage holes. To ove...
Wireless Sensor Networks (WSNs) were envisaged to become the fabric of our environment and society. However, they are yet unable to surmount many operational challenges such as limited network lifetime, which strangle their widespread deployment. To prolong WSN lifetime, most of the existing clustering schemes are geared towards homogeneous WSN. Th...
Mobility models play a vital role on the performance accuracy of simulations in Wireless Body Area Networks (WBANs). In this article, we propose a mobility model for the movement of nodes according to the posture patterns formed either because of psychological stress or any kind of mobility. During routine activities, body exhibits different postur...
In this paper, we present two new chain formation techniques, namely, multi-chain energy-efficient routing (ME) and cost optimisation with multi-chaining for energy efficient communication (COME) for wireless sensor networks supported by linear programming based mathematical models. ME protocol divides network area into subareas of equal size, whic...
Wireless Sensors Networks (WSNs) have a big application in heterogeneous networks. In this paper, we propose and evaluate Advanced Low-Energy Adaptive Clustering Hierarchy (Ad-LEACH) which is static clustering based heterogeneous routing protocol. The complete network field is first divided into static clusters and then in each cluster separate Ad-...
Underwater Wireless Sensor Networks are significantly different from
terrestrial sensor networks due to peculiar characteristics of low bandwidth,
high latency, limited energy, node float mobility and high error probability.
These features bring many challenges to the network protocol design of UWSNs.
Several routing protocols have been developed i...
In this work, we present a survey of residential load controlling techniques
to implement demand side management in future smart grid. Power generation
sector facing important challenges both in quality and quantity to meet the
increasing requirements of consumers. Energy efficiency, reliability, economics
and integration of new energy resources ar...
We present a detailed review of various Home Energy Management Schemes
(HEM,s). HEM,s will increase savings, reduce peak demand and Pto Average Ratio
(PAR). Among various applications of smart grid technologies, home energy
management is probably the most important one to be addressed. Various steps
have been taken by utilities for efficient energy...
Obstacle avoidance is an important task in the field of robotics, since the
goal of autonomous robot is to reach the destination without collision. Several
algorithms have been proposed for obstacle avoidance, having drawbacks and
benefits. In this survey paper, we mainly discussed different algorithms for
robot navigation with obstacle avoidance....
In this paper, we present path loss model for VANETs and simulate three
routing protocols; Destination Sequenced Distance Vector (DSDV), Optimized Link
State Routing (OLSR) and Dynamic MANET On-demand (DYMO) to evaluate and compare
their performance using NS-2. The main contribution of this work is enhancement
of existing techniques to achieve high...
In Wireless Ad-hoc Networks, nodes are free to move randomly and organize
themselves arbitrarily, thus topology may change quickly and capriciously. In
Mobile Ad-hoc NETworks, specially Wireless Multi-hop Networks provide users
with facility of quick communication. In Wireless Multi-hop Networks, routing
protocols with energy efficient and delay re...
This paper presents a framework for node distribution with respect to
density, network connectivity and communication time. Using NS2, we evaluate
and compare performance of three routing protocols; Ad-hoc On-demand Distance
Vector (AODV), Dynamic Source Routing (DSR) and Fisheye State Routing (FSR)
both in MANETs (IEEE 802.11) and VANETs (IEEE 802...
Wireless Multi-hop Networks (WMhNs) provide users with the facility to
communicate while moving with whatever the node speed, the node density and the
number of traffic flows they want, without any unwanted delay and/or
disruption. This paper contributes Linear Programming models (LP_models) for
WMhNs. In WMhNs, different routing protocols are used...
Citations
... This review demonstrates that statistical techniques for stemming are insufficient. The book contains a complete study of stemming techniques used in Urdu, Persian, and Arabic [45]. ...
... Li et al. [19] proposed the "Energy-Efficient Computation Offloading and Resource Allocation (ECORA)" techniques to reduce the overall cost of the system. Authors in [20,21,22] proposed suitable resource allocation techniques for residential buildings, consumers' power requests, and time-sensitive IoT-fog applications in a fog computing environment, respectively. ...
... Previous work has applied learning-to-rank to software engineering tasks. For example, on fault localization [40,[70][71][72], bug-finding process [73][74][75], code search [76], defects prediction [77,78], rule-specification mining [79], recommendation system to classify and select design patterns [80], third-party libraries [81]. Differently from these works, our work is the first to apply learning-to-rank to suggest file-level migrations. ...
... What sets GWO apart from other metaheuristic algorithms is its use of four types of wolvesalpha (α), beta (β), delta (δ), and omega (ω) -to simulate the social hierarchy within a wolf pack (Figure 4). The alpha wolf is the leader of the pack and makes the major decisions, while the beta, delta, and omega wolves support the alpha and help to execute the hunt (Fatima et al., 2019). The leaders of the pack are the alpha male and alpha female. ...
... Although the mean average error (MAE) metric of the model was 11.75 USD/MWh, it has a huge computation burden. In [26], the authors proposed a deep LSTM (D-LSTM) network to estimate short-and medium-term demand as well as the LMP. The D-LSTM network turned out to have a flat trend without the validation set. ...
... However, weather data sets are not utilized to enhance the prediction model of the price spikes. The enhanced convolutional neural networks are also used in [28] to predict electricity load and prices. Here, feature selection is carried out using the Random Forest model, and the extracted features are passed to the convolutional layer, which later is filtered using the max pooling layer. ...
... The values of δ depend on additional expenses. When electricity prices are higher during periods of high energy demand (on-peak hours) and lower during periods of low power demand (off-peak hours), the utilities establish market-specific prices [88]. ...
... Efficient energy management is define as it is a process of monitoring, controlling, conserving energy, collecting data, and metering energy consumption data [17,18]. In efficient energy management system, load forecasting is divided into three types; short term load forecasting, medium term load forecasting, and long term forecasting [19,20,21,22,23,24,25]. In price forecasting, prediction of on spot price and onwards further prices based on their daily consumption. ...
... In the literature, several works address solutions for the resource allocation challenge [9][10][11]. For example, many studies have applied solutions based on evolutionary algorithms, such as Particle Swarm Optimization (PSO) [12][13][14] and Genetic Algorithms (GA) [15,16]. However, they were developed for specific domain areas, hindering the solution's portability to an interdisciplinary scenario. ...
... A node broadcasts the data packet to a forwarding set of nodes. Moreover, hidden terminal problem is solved by the involvement of multiple nodes that can overhear each other's transmissions in opportunistic routing Khan et al. (2019). Furthermore, in the case of bad link quality, the availability of multiple nodes in the forwarding set ensures successful data delivery and reduces energy consumption caused by retransmissions , Khan et al. (2022). ...