Search Results - "Ghani, Anwar"

Refine Results
  1. 1

    Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography by Mansoor, Khwaja, Ghani, Anwar, Chaudhry, Shehzad, Shamshirband, Shahaboddin, Ghayyur, Shahbaz, Mosavi, Amir

    Published in Sensors (Basel, Switzerland) (01-11-2019)
    “…Despite the many conveniences of Radio Frequency Identification (RFID) systems, the underlying open architecture for communication between the RFID devices may…”
    Get full text
    Journal Article
  2. 2

    A deep learning framework for non-functional requirement classification by Rahman, Kiramat, Ghani, Anwar, Misra, Sanjay, Rahman, Arif Ur

    Published in Scientific reports (08-02-2024)
    “…Analyzing, identifying, and classifying nonfunctional requirements from requirement documents is time-consuming and challenging. Machine learning-based…”
    Get full text
    Journal Article
  3. 3

    Selfishness in Vehicular Delay-Tolerant Networks: A Review by Rehman, Ghani-Ur, Ghani, Anwar, Muhammad, Shad, Singh, Madhusudan, Singh, Dhananjay

    Published in Sensors (Basel, Switzerland) (25-05-2020)
    “…Various operational communication models are using Delay-Tolerant Network as a communication tool in recent times. In such a communication paradigm, sometimes…”
    Get full text
    Journal Article
  4. 4

    Improving network efficiency in wireless body area networks using dual forwarder selection technique by Rahman, Haseeb Ur, Ghani, Anwar, Khan, Imran, Ahmad, Naved, Vimal, S, Bilal, Muhammad

    Published in Personal and ubiquitous computing (01-02-2022)
    “…Wearable computing has a great prospect in smart healthcare applications. The emergence of the Internet of Things, Wireless Body Area Networks (WBANs), and big…”
    Get full text
    Journal Article
  5. 5

    Fog-assisted de-duplicated data exchange in distributed edge computing networks by Said, Ghawar, Ghani, Anwar, Ullah, Ata, Alzahrani, Abdulrahman, Azeem, Muhammad, Ahmad, Rashid, Kim, Do-Hyeun

    Published in Scientific reports (04-09-2024)
    “…The Internet of Things (IoT) generates substantial data through sensors for diverse applications, such as healthcare services. This article addresses the…”
    Get full text
    Journal Article
  6. 6

    A secure and improved multi server authentication protocol using fuzzy commitment by Rehman, Hafeez Ur, Ghani, Anwar, Chaudhry, Shehzad Ashraf, Alsharif, Mohammed H., Nabipour, Narjes

    Published in Multimedia tools and applications (01-05-2021)
    “…The advancement in communication and computation technologies has paved a way for connecting large number of heterogeneous devices to offer specified services…”
    Get full text
    Journal Article
  7. 7

    Finding rising stars in bibliometric networks by Daud, Ali, Song, Min, Hayat, Malik Khizar, Amjad, Tehmina, Abbasi, Rabeeh Ayaz, Dawood, Hassan, Ghani, Anwar

    Published in Scientometrics (01-07-2020)
    “…Finding rising stars (FRS) is a hot research topic investigated recently for diverse application domains. These days, people are more interested in finding…”
    Get full text
    Journal Article
  8. 8

    Light-Weight Secure Aggregated Data Sharing in IoT-Enabled Wireless Sensor Networks by Said, Ghawar, Ghani, Anwar, Ullah, Ata, Azeem, Muhammad, Bilal, Muhammad, Kwak, Kyung Sup

    Published in IEEE access (2022)
    “…Internet of Things (IoT) is a network of physical objects or things that can communicate and share information. In IoT-enabled Wireless Medical Sensor Network…”
    Get full text
    Journal Article
  9. 9

    Accurate Wheat Yield Prediction Using Machine Learning and Climate-NDVI Data Fusion by Ashfaq, Muhammad, Khan, Imran, Alzahrani, Abdulrahman, Tariq, Muhammad Usman, Khan, Humera, Ghani, Anwar

    Published in IEEE access (2024)
    “…Due to exponential population growth, climate change, and an increasing demand for food, there is an unprecedented need for a timely, precise, and dependable…”
    Get full text
    Journal Article
  10. 10

    MCDH-SLKAP: Modified Computational Diffie-Hellman-Based Secure and Lightweight Key Agreement Protocol for Decentralized Edge Computing Networks by Ghani, Anwar, Ullah Jan, Saeed, Ashraf Chaudhry, Shehzad, Ahmad, Rashid, Kim, Do-Hyeun

    Published in IEEE access (2024)
    “…Decentralized Edge Computing Networks (DECN) environments have emerged with the advent of the IoT to reduce delays, bringing data processing closer to where…”
    Get full text
    Journal Article
  11. 11

    Location Centric Energy Harvesting Aware Routing Protocol for IoT in Smart Cities by Zeb, Hassan, Ghani, Anwar, Gohar, Moneeb, Alzahrani, Abdulrahman, Bilal, Muhammad, Kwak, Daehan

    Published in IEEE access (2023)
    “…Battery technology revolutionized power storage for various purposes, including uninterrupted IoT-based Wireless Sensor Networks (WSNs) operations. However,…”
    Get full text
    Journal Article
  12. 12

    Pre-Trained Model-Based NFR Classification: Overcoming Limited Data Challenges by Rahman, Kiramat, Ghani, Anwar, Alzahrani, Abdulrahman, Tariq, Muhammad Usman, Rahman, Arif Ur

    Published in IEEE access (2023)
    “…Machine learning techniques have shown promising results in classifying non-functional requirements (NFR). However, the lack of annotated training data in the…”
    Get full text
    Journal Article
  13. 13

    Bandwidth and power efficient lightweight authentication scheme for healthcare system by Jan, Saeed Ullah, Ghani, Anwar, Alzahrani, Abdulrahman, Saqlain, Syed Muhammad, Yahya, Khalid, Sajjad, Haseeb

    “…This article works on profit maximization, in which customer satisfaction and efficient scheduling are considered to optimize the underlying resource…”
    Get full text
    Journal Article
  14. 14

    PSDS-Proficient Security Over Distributed Storage: A Method for Data Transmission in Cloud by Shahid, Fizza, Ashraf, Humaira, Ghani, Anwar, Ghayyur, Shahbaz Ahmed Khan, Shamshirband, Shahaboddin, Salwana, Ely

    Published in IEEE access (2020)
    “…Cloud Computing facilitates business by storing an enormous amount of data in the cloud transmitted over the Internet with seamless access to the data and no…”
    Get full text
    Journal Article
  15. 15

    Authentication and Secure Key Management in E-Health Services: A Robust and Efficient Protocol Using Biometrics by Mehmood, Zahid, Ghani, Anwar, Chen, Gongliang, Alghamdi, Ahmed S.

    Published in IEEE access (2019)
    “…The use of modern technology for the Goodwell of human beings especially in medical science is a hot research area. Telecare Medicine Information System (TMIS)…”
    Get full text
    Journal Article
  16. 16

    Spread Spectrum Based Energy Efficient Collaborative Communication in Wireless Sensor Networks by Ghani, Anwar, Naqvi, Husnain, Sher, Muhammad, Khan, Muazzam Ali, Khan, Imran, Irshad, Azeem

    Published in PloS one (22-07-2016)
    “…Wireless sensor networks consist of resource limited devices. Most crucial of these resources is battery life, as in most applications like battle field or…”
    Get full text
    Journal Article
  17. 17

    Beyond the Illusion: Ensemble Learning for Effective Voice Deepfake Detection by Ali, Ghulam, Rashid, Javed, Rameez Ul Hussnain, Muhammad, Usman Tariq, Muhammad, Ghani, Anwar, Kwak, Daehan

    Published in IEEE access (2024)
    “…Deepfake synthetic media, manipulated using artificial intelligence to mimic authenticity, has become more dangerous in the modern digital era. Despite…”
    Get full text
    Journal Article
  18. 18

    IPS: Incentive and Punishment Scheme for Omitting Selfishness in the Internet of Vehicles (Iov) by Rehman, Ghani-Ur, Ghani, Anwar, Zubair, Muhammad, Naqvi, Syed Husnain A., Singh, Dhananjay, Muhammad, Shad

    Published in IEEE access (2019)
    “…Internet of Vehicles (IoV) is a new emerging concept and is an extended notion of Vehicular Ad-hoc networks (VANETs). In IoV the vehicles (nodes) are connected…”
    Get full text
    Journal Article
  19. 19

    Reputation-Based Approach Toward Web Content Credibility Analysis by Mahmood, Saba, Ghani, Anwar, Daud, Ali, Shamshirband, Shahaboddin

    Published in IEEE access (2019)
    “…Web content credibility implies finding credible and correct information on the web. Recent studies have shown there is an increasing trend of users turning…”
    Get full text
    Journal Article
  20. 20

    Transforming Educational Institutions: Harnessing the Power of Internet of Things, Cloud, and Fog Computing by Badshah, Afzal, Rehman, Ghani Ur, Farman, Haleem, Ghani, Anwar, Sultan, Shahid, Zubair, Muhammad, Nasralla, Moustafa M.

    Published in Future internet (01-11-2023)
    “…The Internet of Things (IoT), cloud, and fog computing are now a reality and have become the vision of the smart world. Self-directed learning approaches,…”
    Get full text
    Journal Article