This page has only limited features, please log in for full access.
Many algorithms use clustering to improve vehicular ad hoc network performance. The expected points of many of these approaches support multiple rounds of data to the roadside unit and constantly include clustering in every round of single-hop data transmission towards the road side unit; however, the clustering in every round maximizes the number of control messages and there could be the possibility of collision and decreases in network energy. Multi-hop transmission prolongs the cluster head node’s lifetime and boosts the network’s efficiency. Accordingly, this article proposes a new fuzzy-clustering-based routing algorithm to benefit from multi-hop transmission clustering simultaneously. This research has analyzed the limitation of clustering in each round, different algorithms were used to perform the clustering, and multi-hop routing was used to transfer the data of every cluster to the road side unit. The fuzzy logic was used to choose the head node of each cluster. Three parameters, (1) distance of each node, (2) remaining energy, and (3) number of neighbors of every node, were considered as fuzzy criteria. The results of this research were compared to various other algorithms in relation to parameters like dead node in every round, first node expire, half node expire, last node expire, and the network lifetime. The simulation results show that the proposed approach outperforms other methods. On the other hand, the vehicular ad hoc network (VANET) environment is vulnerable at the time of data transmission. The NS-2 software tool was used to simulate and evaluate the proposed fuzzy logic opportunistic routing’s performance results concerning end-to-end delay, packet delivery, and network throughput. We compare to the existing protocols, such as fuzzy Internet of Things (IoT), two fuzzy, and Fuzzy-Based Driver Monitoring System (FDMS). The performance comparison also emphasizes an effective utilization of the resources. Simulations on the highway environment show that the suggested protocol has an improved Quality of Service (QoS) efficiency compared to the above published methods in the literature.
Imran Memon; Mohammad Hasan; Riaz Shaikh; Jamel Nebhen; Khairul Bakar; Eklas Hossain; Muhammad Tunio. Energy-Efficient Fuzzy Management System for Internet of Things Connected Vehicular Ad Hoc Networks. Electronics 2021, 10, 1068 .
AMA StyleImran Memon, Mohammad Hasan, Riaz Shaikh, Jamel Nebhen, Khairul Bakar, Eklas Hossain, Muhammad Tunio. Energy-Efficient Fuzzy Management System for Internet of Things Connected Vehicular Ad Hoc Networks. Electronics. 2021; 10 (9):1068.
Chicago/Turabian StyleImran Memon; Mohammad Hasan; Riaz Shaikh; Jamel Nebhen; Khairul Bakar; Eklas Hossain; Muhammad Tunio. 2021. "Energy-Efficient Fuzzy Management System for Internet of Things Connected Vehicular Ad Hoc Networks." Electronics 10, no. 9: 1068.
The Industrial Internet of things (IIoT) helps several applications that require power control and low cost to achieve long life. The progress of IIoT communications, mainly based on cognitive radio (CR), has been guided to the robust network connectivity. The low power communication is achieved for IIoT sensors applying the Low Power Wide Area Network (LPWAN) with the Sigfox, NBIoT, and LoRaWAN technologies. This paper aims to review the various technologies and protocols for industrial IoT applications. A depth of assessment has been achieved by comparing various technologies considering the key terms such as frequency, data rate, power, coverage, mobility, costing, and QoS. This paper provides an assessment of 64 articles published on electricity control problems of IIoT between 2007 and 2020. That prepares a qualitative technique of answering the research questions (RQ): RQ1: “How cognitive radio engage with the industrial IoT?”, RQ2: “What are the Proposed architectures that Support Cognitive Radio LPWAN based IIOT?”, and RQ3: What key success factors need to comply for reliable CIIoT support in the industry?”. With the systematic literature assessment approach, the effects displayed on the cognitive radio in LPWAN can significantly revolute the commercial IIoT. Thus, researchers are more focused in this regard. The study suggests that the essential factors of design need to be considered to conquer the critical research gaps of the existing LPWAN cognitive-enabled IIoT. A cognitive low energy architecture is brought to ensure efficient and stable communications in a heterogeneous IIoT. It will protect the network layer from offering the customers an efficient platform to rent AI, and various LPWAN technology were explored and investigated.
Nahla Nurelmadina; Mohammad Hasan; Imran Memon; Rashid Saeed; Khairul Zainol Ariffin; Elmustafa Ali; Rania Mokhtar; Shayla Islam; Eklas Hossain; Arif Hassan. A Systematic Review on Cognitive Radio in Low Power Wide Area Network for Industrial IoT Applications. Sustainability 2021, 13, 338 .
AMA StyleNahla Nurelmadina, Mohammad Hasan, Imran Memon, Rashid Saeed, Khairul Zainol Ariffin, Elmustafa Ali, Rania Mokhtar, Shayla Islam, Eklas Hossain, Arif Hassan. A Systematic Review on Cognitive Radio in Low Power Wide Area Network for Industrial IoT Applications. Sustainability. 2021; 13 (1):338.
Chicago/Turabian StyleNahla Nurelmadina; Mohammad Hasan; Imran Memon; Rashid Saeed; Khairul Zainol Ariffin; Elmustafa Ali; Rania Mokhtar; Shayla Islam; Eklas Hossain; Arif Hassan. 2021. "A Systematic Review on Cognitive Radio in Low Power Wide Area Network for Industrial IoT Applications." Sustainability 13, no. 1: 338.
The Internet of things (IoT) and advancements of wireless technology have evolved intelligent transport systems to integrate billion of smart objects ready to connect to the Internet. The modern era of the Internet of things (IoT) has brought significant development in vehicular ad hoc networks (VANETs) which transformed the conventional VANET into the Internet of Vehicle (IoV) to improve road safety and diminished road congestion. However, security threats are increasing due to dependency on infrastructure, computing, dynamic nature, and control technologies of VANET. The security threats of VANETs could be addressed comprehensively by increasing trustworthiness on the message received and transmitting node. Conversely, the presence of dishonest vehicles, for instance, Man in the Middle (MiTM) attackers, in the network sharing malicious content could be posed as a severe threat to VANET. Thus, increasing trustworthiness among nodes can lead to increased authenticity, privacy, accuracy, security, and trusted information sharing in the VANET. In this paper, a lightweight trust model is proposed, presented model identifying dishonest nodes and revoking its credential in the MiTM attack scenario. Furthermore, addressing the privacy and security requirement, the pseudonym scheme is used. All nodes in the VANET established trust provided by initially RSU, which is a trusted source in the network. Extensive experiments are conducted based on a variety of network scenarios to evaluate the accuracy and performance of the presented lightweight trust model. In terms of recall, precision, and F-score, our presented model significantly outperformed compared to MARINE. The simulation results have validated that the proposed lightweight model realized a high trust level with 40% of MiTM attackers and in terms of F-score 95%, whereas the MARINE model has 90%, which leads to the model to attain high detection accuracy.
Muhammad Haleem Junejo; Ab Al-Hadi Ab Rahman; Riaz Ahmed Shaikh; Kamaludin Mohamad Yusof; Imran Memon; Hadiqua Fazal; Dileep Kumar. A Privacy-Preserving Attack-Resistant Trust Model for Internet of Vehicles Ad Hoc Networks. Scientific Programming 2020, 2020, 1 -21.
AMA StyleMuhammad Haleem Junejo, Ab Al-Hadi Ab Rahman, Riaz Ahmed Shaikh, Kamaludin Mohamad Yusof, Imran Memon, Hadiqua Fazal, Dileep Kumar. A Privacy-Preserving Attack-Resistant Trust Model for Internet of Vehicles Ad Hoc Networks. Scientific Programming. 2020; 2020 ():1-21.
Chicago/Turabian StyleMuhammad Haleem Junejo; Ab Al-Hadi Ab Rahman; Riaz Ahmed Shaikh; Kamaludin Mohamad Yusof; Imran Memon; Hadiqua Fazal; Dileep Kumar. 2020. "A Privacy-Preserving Attack-Resistant Trust Model for Internet of Vehicles Ad Hoc Networks." Scientific Programming 2020, no. : 1-21.
A great advancement has been made in intelligent transportation system and communication technologies in order to exchange secure information between automobiles, facilities provider have led an frame over road network. The intelligent transportation system provides an efficient traffic system for drivers, so that there must be less risk to users. In order to design a secure communication protocol among V & V and V & I is a challenging problem. In order to reduce the chance of attacks and increase privacy level, crypto graphic tools provides the feasible solution. In this paper, we proposed pseudonym changing strategy with mix zones (1) Anonymous authentication: the message should be authenticated by issuer due to mix zone and cryptographic tools secure message without any attack. (2) Privacy: Communication contents are confidential due to encrypted messages during communications also improving the scalability through address configuration scheme to reduce computational cost. (3) Efficiency: low storage requirements, The velocity and distance factors may also consider secure measurement, message delivery, overhead and coverage,packet delivery rate, reduce latency and overhead not only by computation cost and time but also compared our scheme, fast delivery rate, low latency and maximum coverage in order to enhance privacy against malicious attacks.
Imran Memon; Hina Memon; Qasim Ali Arain. Pseudonym Changing Strategy with Mix Zones Based Authentication Protocol for Location Privacy in Road Networks. Wireless Personal Communications 2020, 116, 3309 -3329.
AMA StyleImran Memon, Hina Memon, Qasim Ali Arain. Pseudonym Changing Strategy with Mix Zones Based Authentication Protocol for Location Privacy in Road Networks. Wireless Personal Communications. 2020; 116 (4):3309-3329.
Chicago/Turabian StyleImran Memon; Hina Memon; Qasim Ali Arain. 2020. "Pseudonym Changing Strategy with Mix Zones Based Authentication Protocol for Location Privacy in Road Networks." Wireless Personal Communications 116, no. 4: 3309-3329.
The Internet of Things (IoT) is susceptible to several identities, primarily based on attacks. However, these attacks are controlling for IoT due to extraordinary growth in consumers’ density and slight analysis with low power access nodes. In this work, we explore the possible flaws associated with security for IoT environment insensitively meant for transfer conditions. We proposed a novel design aimed at detecting a spoofing attack that inspects the probability distributions of received power founded for the regions designed for mobile (moving) users. Additionally, we examine the influence on the Confidentiality Scope of targeted consumers in the absence and presence of observer. Our approaches were done through simulation results used for three diverse regions. Grounded on outcomes, we suggest an algorithm called MTFLA, which will guarantee detection and protection techniques intended to protect vastly sensitive areas, i.e., wherever the chance of an attack is maximized. We provide a comparison among various security algorithms prepared for the energy consumption of different patterns. Simulation results revealed that the proposed algorithm for protection (MTFL) is verified to be energy-proficient (secure garnering). It decreases the energy prerequisite for encrypting the data. We evaluated our techniques over simulation results for sensitive region information built on fuzzy logic.
Imran Memon; Riaz Ahmed Shaikh; Mohammad Kamrul Hasan; Rosilah Hassan; Amin Ul Haq; Khairul Akram Zainol. Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology. Security and Communication Networks 2020, 2020, 1 -12.
AMA StyleImran Memon, Riaz Ahmed Shaikh, Mohammad Kamrul Hasan, Rosilah Hassan, Amin Ul Haq, Khairul Akram Zainol. Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology. Security and Communication Networks. 2020; 2020 ():1-12.
Chicago/Turabian StyleImran Memon; Riaz Ahmed Shaikh; Mohammad Kamrul Hasan; Rosilah Hassan; Amin Ul Haq; Khairul Akram Zainol. 2020. "Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology." Security and Communication Networks 2020, no. : 1-12.
The heart of the current wireless communication systems (including 5G) is the Fourier transform-based orthogonal frequency division multiplex (OFDM). Over time, a lot of research has proposed the wavelet transform-based OFDM as a better replacement of Fourier in the physical layer solutions because of its performance and ability to support network-intensive applications such as the Internet of Things (IoT). In this paper, we weigh the wavelet transform performances against the future wireless application system requirements and propose guidelines and approaches for wavelet applications in 5G waveform design. This is followed by a detailed impact on healthcare. Using an image as the test data, a comprehensive performance comparison between Fourier transform and various wavelet transforms has been done considering the following 5G key performance indicators (KPIs): energy efficiency, modulation and demodulation complexity, reliability, latency, spectral efficiency, effect of transmission/reception under asynchronous transmission, and robustness to time-/frequency-selective channels. Finally, the guidelines for wavelet transform use are presented. The guidelines are sufficient to serve as approaches for tradeoffs and also as the guide for further developments.
Mordecai F. Raji; Jianping Li; Amin Ul Haq; Victor Ejianya; Jalaluddin Khan; Asif Khan; Mudassir Khalil; Amjad Ali; Ghufran A. Khan; Mohammad Shahid; Bilal Ahamad; Amit Yadav; Imran Memon. A New Approach for Enhancing the Services of the 5G Mobile Network and IOT-Related Communication Devices Using Wavelet-OFDM and Its Applications in Healthcare. Scientific Programming 2020, 2020, 1 -13.
AMA StyleMordecai F. Raji, Jianping Li, Amin Ul Haq, Victor Ejianya, Jalaluddin Khan, Asif Khan, Mudassir Khalil, Amjad Ali, Ghufran A. Khan, Mohammad Shahid, Bilal Ahamad, Amit Yadav, Imran Memon. A New Approach for Enhancing the Services of the 5G Mobile Network and IOT-Related Communication Devices Using Wavelet-OFDM and Its Applications in Healthcare. Scientific Programming. 2020; 2020 ():1-13.
Chicago/Turabian StyleMordecai F. Raji; Jianping Li; Amin Ul Haq; Victor Ejianya; Jalaluddin Khan; Asif Khan; Mudassir Khalil; Amjad Ali; Ghufran A. Khan; Mohammad Shahid; Bilal Ahamad; Amit Yadav; Imran Memon. 2020. "A New Approach for Enhancing the Services of the 5G Mobile Network and IOT-Related Communication Devices Using Wavelet-OFDM and Its Applications in Healthcare." Scientific Programming 2020, no. : 1-13.
One of the most ubiquitous cause of worldwide deforestation and devastation of wildlife is fire. To control fire and reach the forest area in time is not always possible. Consequently, the level of destruction is often high. Therefore, predicting fires well in time and taking immediate action is of utmost importance. However, traditional fire prediction approaches often fail to detect fire in time. Therefore, a more reliable approach like the Internet of Things (IoT) needs to be adopted. IoT sensors can not only observe the real-time conditions of an area, but it can also predict fire when combined with Machine learning. This paper provides an insight into the use of Machine Learning models towards the occurrence of forest fires. In this context, eight Machine Learning algorithms: Boosted Decision Trees, Decision Forest Classifier, Decision Jungle Classifier, Averaged Perceptron, 2-Class Bayes Point Machine, Local Deep Support Vector Machine (SVM), Logistic Regression and Binary Neural Network model have been implemented. Results suggest that the Boosted decision tree model with the Area Under Curve (AUC) value of 0.78 is the most suitable candidate for a fire prediction model. Based on the results, we propose a novel IoT-based smart Fire prediction system that would consider both meteorological data and images for early fire prediction.
Richa Sharma; Shalli Rani; Imran Memon. A smart approach for fire prediction under uncertain conditions using machine learning. Multimedia Tools and Applications 2020, 79, 28155 -28168.
AMA StyleRicha Sharma, Shalli Rani, Imran Memon. A smart approach for fire prediction under uncertain conditions using machine learning. Multimedia Tools and Applications. 2020; 79 (37-38):28155-28168.
Chicago/Turabian StyleRicha Sharma; Shalli Rani; Imran Memon. 2020. "A smart approach for fire prediction under uncertain conditions using machine learning." Multimedia Tools and Applications 79, no. 37-38: 28155-28168.
In this paper, a three stage hierarchical image retrieval scheme using a color, texture and shape visual contents (or descriptors) is proposed, since single visual content is not produce an adequate retrieval results effectively. This scheme has reduced the searching space during the image retrieval process at a certain extent due to the hierarchical mode. In initial stage, the shape feature descriptor has been computed by simple fusion of histograms of gradients and invariant moments of segmented image planes. The shape based retrieval process has reduced the search space by discarding the non-relevant images from the universal dataset (or original dataset) effectively and kept the retrieved images into the intermediate dataset. In the second stage, the texture feature descriptors have been computed from the intermediate sub-image dataset by applying the adaptive tetrolet transform on image plane of preprocessed HSV color image. This transform provides the multi-resolution images with finer details by employing the tetrominoes and the proper arrangement of tetrominoes contributes the effective local geometry of image plane. The gray level co-occurrence matrix based texture feature descriptor is obtained by computing second order statistical parameters from each decomposed sub-image. At this stage, the most of the irrelevant images are discarded by retrieving the images from intermediate dataset but still some undesired images are left, those will be handled at the last stage. At this stage, fused color information is captured by applying the color autocorrelogram on both the non-uniform quantized color components of the preprocessed HSV color image. Finally, the color feature descriptor produces the desired retrieval results by discarding the irrelevant images from the texture based sub-image dataset. The proposed scheme has also low computational overhead due to the use of three descriptors at different stages separately. The retrieved results show the better accuracy as compared to the other related visual contents based image retrieval schemes.
Naushad Varish; Arup Kumar Pal; Rosilah Hassan; Mohammad Kamrul Hasan; Asif Khan; Nikhat Parveen; Debrup Banerjee; Vidyullatha Pellakuri; Amin Ul Haqis; Imran Memon. Image Retrieval Scheme Using Quantized Bins of Color Image Components and Adaptive Tetrolet Transform. IEEE Access 2020, 8, 117639 -117665.
AMA StyleNaushad Varish, Arup Kumar Pal, Rosilah Hassan, Mohammad Kamrul Hasan, Asif Khan, Nikhat Parveen, Debrup Banerjee, Vidyullatha Pellakuri, Amin Ul Haqis, Imran Memon. Image Retrieval Scheme Using Quantized Bins of Color Image Components and Adaptive Tetrolet Transform. IEEE Access. 2020; 8 ():117639-117665.
Chicago/Turabian StyleNaushad Varish; Arup Kumar Pal; Rosilah Hassan; Mohammad Kamrul Hasan; Asif Khan; Nikhat Parveen; Debrup Banerjee; Vidyullatha Pellakuri; Amin Ul Haqis; Imran Memon. 2020. "Image Retrieval Scheme Using Quantized Bins of Color Image Components and Adaptive Tetrolet Transform." IEEE Access 8, no. : 117639-117665.
Mobile ad hoc networks are the “spontaneous networks” which create a temporary network in any place and any time without using any extra fixed radio device of a full infrastructure network. Each device in this network works as a router to develop end-to-end communication connections and move independently in any direction. Mostly, mobile ad hoc networks use the IEEE 802.11b protocol with carrier-sense multiple access with collision avoidance medium access control layer protocol for sharing a common medium among the nodes simultaneously. Due to this distributed medium, the routing and medium access control layer of the mobile ad hoc network are prone to attacks. Among several attackers, blackhole attacker is the dangerous one which causes the loss of all data packets of devices in the network. Efficient medium access control protocol designs in this respect play a key role in determining channel utilization, network delay, and, more importantly, network security. In the proposed work, preamble information is used with time-division multiple access medium access control. The preamble time-division multiple access uses time synchronization for each time slot and does not assign much time to the blackhole attacker due to a fixed time slot. As a result, blackhole is not stable in all communications and such an attack is effectively defended. Simulation results show that, in the presence of the blackhole attacker, carrier-sense multiple access with collision avoidance has a high packet loss ratio and low network throughput as compared to the proposed preamble time-division multiple access.
Khalid Mohammadani; Kamran Ali Memon; Imran Memon; Nazish Nawaz Hussaini; Hadiqua Fazal. Preamble time-division multiple access fixed slot assignment protocol for secure mobile ad hoc networks. International Journal of Distributed Sensor Networks 2020, 16, 1 .
AMA StyleKhalid Mohammadani, Kamran Ali Memon, Imran Memon, Nazish Nawaz Hussaini, Hadiqua Fazal. Preamble time-division multiple access fixed slot assignment protocol for secure mobile ad hoc networks. International Journal of Distributed Sensor Networks. 2020; 16 (5):1.
Chicago/Turabian StyleKhalid Mohammadani; Kamran Ali Memon; Imran Memon; Nazish Nawaz Hussaini; Hadiqua Fazal. 2020. "Preamble time-division multiple access fixed slot assignment protocol for secure mobile ad hoc networks." International Journal of Distributed Sensor Networks 16, no. 5: 1.
An internet of thing (IoT) is vulnerable to many identity-based attacks. However, due to the substantial increase in the density of users and nodes mobile travelers are more vulnerable to such attacks in IoT Communication Technology. In this paper, we have tried to explore the potential weaknesses related to security for mobile traveler’s Smart Intelligent System environment in nodes mainly for handover conditions. We propose a novel scheme to protect against spoofing that utilizes probability distributions of Received Power based on the regions for mobile (moving) user. We further investigate the impact on secrecy rate of the targeted user in the absence and presence of an eavesdropper. Also, we evaluated our methods through simulation results for sensitive regions information based on fuzzy logic.
Imran Memon; Hadiqua Fazal; Riaz Ahmed Shaikh; Ghulam Ali Mallah; Rafaqat Hussain Arain; Ghulam Muhammad. Smart Intelligent System for Mobile Travelers Based on Fuzzy Logic in IoT Communication Technology. Communications in Computer and Information Science 2020, 22 -31.
AMA StyleImran Memon, Hadiqua Fazal, Riaz Ahmed Shaikh, Ghulam Ali Mallah, Rafaqat Hussain Arain, Ghulam Muhammad. Smart Intelligent System for Mobile Travelers Based on Fuzzy Logic in IoT Communication Technology. Communications in Computer and Information Science. 2020; ():22-31.
Chicago/Turabian StyleImran Memon; Hadiqua Fazal; Riaz Ahmed Shaikh; Ghulam Ali Mallah; Rafaqat Hussain Arain; Ghulam Muhammad. 2020. "Smart Intelligent System for Mobile Travelers Based on Fuzzy Logic in IoT Communication Technology." Communications in Computer and Information Science , no. : 22-31.
Online reviews regarding different products or services have become the main source to determine public opinions. Consequently, manufacturers and sellers are extremely concerned with customer reviews as these have a direct impact on their businesses. Unfortunately, to gain profits or fame, spam reviews are written to promote or demote targeted products or services. This practice is known as review spamming. In recent years, the spam review detection problem has gained much attention from communities and researchers, but still there is a need to perform experiments on real-world large-scale review datasets. This can help to analyze the impact of widespread opinion spam in online reviews. In this work, two different spam review detection methods have been proposed: (1) Spam Review Detection using Behavioral Method (SRD-BM) utilizes thirteen different spammer’s behavioral features to calculate the review spam score which is then used to identify spammers and spam reviews, and (2) Spam Review Detection using Linguistic Method (SRD-LM) works on the content of the reviews and utilizes transformation, feature selection and classification to identify the spam reviews. Experimental evaluations are conducted on a real-world Amazon review dataset which analyze 26.7 million reviews and 15.4 million reviewers. The evaluations show that both proposed models have significantly improved the detection process of spam reviews. Specifically, SRD-BM achieved 93.1% accuracy whereas SRD-LM achieved 88.5% accuracy in spam review detection. Comparatively, SRD-BM achieved better accuracy because it works on utilizing rich set of spammers behavioral features of review dataset which provides in-depth analysis of spammer behaviour. Moreover, both proposed models outperformed existing approaches when compared in terms of accurate identification of spam reviews. To the best of our knowledge, this is the first study of its kind which uses large-scale review dataset to analyze different spammers' behavioral features and linguistic method utilizing different available classifiers.
Naveed Hussain; Hamid Turab Mirza; Ibrar Hussain; Faiza Iqbal; Imran Memon. Spam Review Detection Using the Linguistic and Spammer Behavioral Methods. IEEE Access 2020, 8, 53801 -53816.
AMA StyleNaveed Hussain, Hamid Turab Mirza, Ibrar Hussain, Faiza Iqbal, Imran Memon. Spam Review Detection Using the Linguistic and Spammer Behavioral Methods. IEEE Access. 2020; 8 (99):53801-53816.
Chicago/Turabian StyleNaveed Hussain; Hamid Turab Mirza; Ibrar Hussain; Faiza Iqbal; Imran Memon. 2020. "Spam Review Detection Using the Linguistic and Spammer Behavioral Methods." IEEE Access 8, no. 99: 53801-53816.
Qasim Ali Arain; Zhongliang Deng; Imran Memon; Asma Zubedi; Farman Ali Mangi. Retraction Note to: Location Privacy with Dynamic Pseudonym-Based Multiple Mix-Zones Generation over Road Networks. Wireless Personal Communications 2019, 107, 707 -707.
AMA StyleQasim Ali Arain, Zhongliang Deng, Imran Memon, Asma Zubedi, Farman Ali Mangi. Retraction Note to: Location Privacy with Dynamic Pseudonym-Based Multiple Mix-Zones Generation over Road Networks. Wireless Personal Communications. 2019; 107 (1):707-707.
Chicago/Turabian StyleQasim Ali Arain; Zhongliang Deng; Imran Memon; Asma Zubedi; Farman Ali Mangi. 2019. "Retraction Note to: Location Privacy with Dynamic Pseudonym-Based Multiple Mix-Zones Generation over Road Networks." Wireless Personal Communications 107, no. 1: 707-707.
The insightful effort of this paper to make an impulsive and unhampered an interface between the physical and virtual world. In general, objects tracked and recognized while objects placed on surface display. Spatial relation or position of object help to detect the target objects in the complex scene. In this paper, our approach to getting the valuable solution of spatial moments with respect to features like texture, shape and color for object recognition. However, a spatial position with other low- level features’ layout and the chance of probability can be defined according to situation the environment. The contemporary complex databases included occluded and unstructured random natural scenes. According to this paper proposed a new method to integrate the spatial layout with primitive features for object recognition and measure accuracy rate. Our method achieved 78% mean average precision image matching algorithms on Flickr dataset. The present experimental analysis gives low computing cost, medium descriptive power and high image matching features as compared to other existing objects recognition approaches.
Riaz Ahmed Shaikh; Imran Memon; Rafaqat Hussain; Abdullah Maitlo; Hidayatullah Shaikh. A contemporary approach for object recognition based on spatial layout and low level features’ integration. Multimedia Tools and Applications 2018, 1 -24.
AMA StyleRiaz Ahmed Shaikh, Imran Memon, Rafaqat Hussain, Abdullah Maitlo, Hidayatullah Shaikh. A contemporary approach for object recognition based on spatial layout and low level features’ integration. Multimedia Tools and Applications. 2018; ():1-24.
Chicago/Turabian StyleRiaz Ahmed Shaikh; Imran Memon; Rafaqat Hussain; Abdullah Maitlo; Hidayatullah Shaikh. 2018. "A contemporary approach for object recognition based on spatial layout and low level features’ integration." Multimedia Tools and Applications , no. : 1-24.
In power utility service outsourcing, some time-sensitive computations (e.g., dynamic prices prediction) are outsourced to a third-party service provider. This brings in new privacy threats to customers. Although some existing works focus on achieving privacy-preserving temporal and spatial aggregation for one center, they basically cannot be directly applied to the scenario of service outsourcing with multiple centers (e.g., with power utility and service providers). We thus propose a privacy-preserving service outsourcing scheme, called PPSO, for real-time pricing demand response in smart grid with fault tolerance and flexible customers’ enrollment and revocation. In our proposed PPSO, power utility can outsource the dynamic pricing prediction to a service provider, while still preserving customers’ privacy. Extensive experiment results demonstrate that PPSO has less computation overhead and lower transmission delay compared with existing schemes.
Kaiping Xue; QingYou Yang; Shaohua Li; David S. L. Wei; Min Peng; Imran Memon; Peilin Hong. PPSO: A Privacy-Preserving Service Outsourcing Scheme for Real-Time Pricing Demand Response in Smart Grid. IEEE Internet of Things Journal 2018, 6, 2486 -2496.
AMA StyleKaiping Xue, QingYou Yang, Shaohua Li, David S. L. Wei, Min Peng, Imran Memon, Peilin Hong. PPSO: A Privacy-Preserving Service Outsourcing Scheme for Real-Time Pricing Demand Response in Smart Grid. IEEE Internet of Things Journal. 2018; 6 (2):2486-2496.
Chicago/Turabian StyleKaiping Xue; QingYou Yang; Shaohua Li; David S. L. Wei; Min Peng; Imran Memon; Peilin Hong. 2018. "PPSO: A Privacy-Preserving Service Outsourcing Scheme for Real-Time Pricing Demand Response in Smart Grid." IEEE Internet of Things Journal 6, no. 2: 2486-2496.
In intelligent transportation systems, the messages transmitted and received from one vehicle to another vehicle may enhance location privacy scheme; falsification message forwarding collusion attack, timing, and transition attacks all are serious issues and must be addressed in event trust management. Without which, decision making on event message may endanger the whole transportation system and may even threat the human life. In addition, pseudonym expiry is another critical issue of location privacy. The time interval of decision waiting even has been the critical accident response time. In this paper, we proposed a new novel mix zones and dynamic pseudonym trust management system, called MADPTM, which aims to prevent against attackers under privacy‐enhanced road networks. On shortening the pseudonym expiry, we propose dynamic pseudonym trust management system, with the assistance of reported server. We performed a set of simulations under many trust attack models to evaluate the performance and efficiency of the proposed system. Our proposed MADPTM method proved to be highly resilient to various attacks, and simulation results verified that our method outperforms other existing methods.
Imran Memon; Hamid Turab Mirza. MADPTM: Mix zones and dynamic pseudonym trust management system for location privacy. International Journal of Communication Systems 2018, 31, e3795 .
AMA StyleImran Memon, Hamid Turab Mirza. MADPTM: Mix zones and dynamic pseudonym trust management system for location privacy. International Journal of Communication Systems. 2018; 31 (17):e3795.
Chicago/Turabian StyleImran Memon; Hamid Turab Mirza. 2018. "MADPTM: Mix zones and dynamic pseudonym trust management system for location privacy." International Journal of Communication Systems 31, no. 17: e3795.
This paper presents a technique for content-based image retrieval (CBIR) by selecting the regions on the basis of their contribution to image contents. We have analyzed the problems associated with matching regions among the pair of images over the large set of overlapping regions. It is being studied that matching images by using regions having unstructured association can be a serious problem. In this research, we propose a linear formulation technique, which involves simultaneous matching, so that the matched area can have color-similarity histogram, shape and having little overlapping region. It is also analyzed that the selected region can have a small number and overall concavity is low, and tried to cover both the images. It has been studied that CBIR has attracted many researchers and most of the previous CBIR systems have shown the searching procedure of the digital image on the basic features such as texture, color, size, and shape of a certain query image in a large database. According to this research, we are going to present a region-based image repossession system that is going to exhibit a model that would help specify multiple regions of interest inside the query image. In this research, we have presented a novel visual feature that might contain color size of the region query and its moments, however, to combine color and region-size information of the watershed region. Moreover, a technique has been modeled for region filtering that might depend upon the color size of the given query image and that would stimulate the process of screening out the most nonrelated region and images for pre-processing of the recovery of image. Therefore, the technique presented would help shorten the consequence of image background on image-matching decision; however, an object's color would receive much more focus. Apart from that, amendment to region-based similarity measurement has also been presented. It has been proved with the help of simulation results that the given descriptor with the similarity measure amendments outperforms the existing descriptor that would be considered in content-based image-retrieval applications. Moreover, the given approach has performed better than the previous approaches. Our method would be based upon a simple and reliable metrics, which is being used to calculate similarities. We have performed numerous simulations and verified that the given approach has outperformed the current techniques in localization, and is going to have vigorous object discovery in the existing mixed-class dataset.
Muhammad Hammad Memon; Imran Memon; Jian-Ping Li; Qasim Ali Arain. IMRBS: image matching for location determination through a region-based similarity technique for CBIR. International Journal of Computers and Applications 2018, 1 -14.
AMA StyleMuhammad Hammad Memon, Imran Memon, Jian-Ping Li, Qasim Ali Arain. IMRBS: image matching for location determination through a region-based similarity technique for CBIR. International Journal of Computers and Applications. 2018; ():1-14.
Chicago/Turabian StyleMuhammad Hammad Memon; Imran Memon; Jian-Ping Li; Qasim Ali Arain. 2018. "IMRBS: image matching for location determination through a region-based similarity technique for CBIR." International Journal of Computers and Applications , no. : 1-14.
In remote system security, 2‐factor authentication is one of the security approaches and provides fundamental protection to the system. Recently, numerous 2‐factor authentication schemes are proposed. In 2014, Troung et al proposed an enhanced dynamic authentication scheme using smart card mainly to provide anonymity, secure mutual authentication, and session key security. By the analysis of Troung et al's scheme, we observed that Troung et al' s scheme does not provide user anonymity, perfect forward secrecy, server's secret key security and does not allow the user to choose his/her password. We also identified that Troung et al's scheme is vulnerable to replay attack. To fix these security weaknesses, a robust authentication scheme is proposed and analyzed using the formal verification tool for measuring the robustness. From the observation of computational efficiency of the proposed scheme, we conclude that the scheme is more secure and easy to implement practically.
Madhusudhan R; Manjunath Hegde; Imran Memon. A secure and enhanced elliptic curve cryptography-based dynamic authentication scheme using smart card. International Journal of Communication Systems 2018, 31, e3701 .
AMA StyleMadhusudhan R, Manjunath Hegde, Imran Memon. A secure and enhanced elliptic curve cryptography-based dynamic authentication scheme using smart card. International Journal of Communication Systems. 2018; 31 (11):e3701.
Chicago/Turabian StyleMadhusudhan R; Manjunath Hegde; Imran Memon. 2018. "A secure and enhanced elliptic curve cryptography-based dynamic authentication scheme using smart card." International Journal of Communication Systems 31, no. 11: e3701.
Multiuser multiple input multiple output (MU-MIMO) wireless communication system provides substantial downlink throughput in millimeter wave (mmWave) communication by allowing multiple users to communicate at the same frequency and time slots. However, the design of the optimum beam-vector for each user to minimise interference from other users is challenging. In this paper, based on the concept of signal-to-leakage plus noise ratio (SLNR), we analyze the ergodic sum-rate capacity using statistical Eigen-mode (SE) and zero-forcing (ZF) models with Ricean fading channel. In the analysis, the orthogonality of channel vectors between users is assumed to guarantee interference cancelation from other cochannel users. The impact of the number of antenna elements on the achievable sum-rate capacity obtained by dirty paper coding (DPC) method considered as a nonlinear scheme for approximating average system capacity is studied. A power iterative precoding scheme that iteratively finds the most dominant eigenvector (optimum weight vector) for minimising cochannel interference (CCI), that is, maximising the SLNR for all users simultaneously, is designed resulting in enhancement of average system capacity. The average system capacities achieved by the proposed power iterative technique in this study compared with the singular value decomposition (SVD) method are in the ranges of 5–11 bps/Hz and 1–6 bps/Hz, respectively. Therefore, the proposed power iterative method achieves higher performance than the SVD regarding achievable sum-rate capacity.
Adam Mohamed Ahmed Abdo; Xiongwen Zhao; Rui Zhang; Zhenyu Zhou; Jianhua Zhang; Yu Zhang; Imran Memon. MU-MIMO Downlink Capacity Analysis and Optimum Code Weight Vector Design for 5G Big Data Massive Antenna Millimeter Wave Communication. Wireless Communications and Mobile Computing 2018, 2018, 1 -12.
AMA StyleAdam Mohamed Ahmed Abdo, Xiongwen Zhao, Rui Zhang, Zhenyu Zhou, Jianhua Zhang, Yu Zhang, Imran Memon. MU-MIMO Downlink Capacity Analysis and Optimum Code Weight Vector Design for 5G Big Data Massive Antenna Millimeter Wave Communication. Wireless Communications and Mobile Computing. 2018; 2018 ():1-12.
Chicago/Turabian StyleAdam Mohamed Ahmed Abdo; Xiongwen Zhao; Rui Zhang; Zhenyu Zhou; Jianhua Zhang; Yu Zhang; Imran Memon. 2018. "MU-MIMO Downlink Capacity Analysis and Optimum Code Weight Vector Design for 5G Big Data Massive Antenna Millimeter Wave Communication." Wireless Communications and Mobile Computing 2018, no. : 1-12.
To improve the fairness, the energy consumption changing pseudonyms needs to be taken into account. Existing works focus on changing velocity‐based pseudonyms changing strategy and short changes interval with limited coverage, but due to similar velocity and short changes, internal attacker guesses easily known communication and location information due to location information of vehicle on tracking, which may expose adversary private information, and frequently, pseudonyms changing occurs due to movement of vehicles' similar velocity and short coverage, which may cause serious attack of vehicle. To overcome this problem, distance and cluster can be performed. In this work, we proposed distance and cluster‐based energy pseudonyms changing method for road network. We proposed distance and energy‐based clustering routing service over road network, the cluster head elected to depend on random number of distance and energy to change pseudonyms of vehicles. An each interval to be establish cluster head vehicle deployed while selects the operation mode and informs the cluster members of the selected mode through beacon signal. The cluster head vehicle node performs the pseudonyms changing based on the predicted distance and energy of the cluster member to use clustering optimization. The data of whole network send to report server through these nodes while near the RSU, and the vehicles in this area will use less energy to change the pseudonyms. The simulation results show that the proposed method enhances pseudonyms changing strategy less consumption and delays sufficient privacy level each vehicle also our method has outperform compare with existing methods than we use Sumo simulation and Matlab tools to verify our proposed method. Our proposed method outperformed in terms of pseudonym changing energy efficiency to careful attention during the cluster formation process, stable and balanced clusters that prolong the network lifetime, increases distances to more CH vehicles connectivity to makes clustering group and changing their pseudonyms in terms of high level privacy and finally, CH nodes use Dijkstra's algorithm use MST among the vehicles nodes depend on existing road networks to follow shortest path selection roads in terms of high connectivity probability of CH and stable structure of the network decreases the topology changes and thus,the clustering overhead is reduced.
Imran Memon. Distance and clustering-based energy-efficient pseudonyms changing strategy over road network. International Journal of Communication Systems 2018, 31, e3704 .
AMA StyleImran Memon. Distance and clustering-based energy-efficient pseudonyms changing strategy over road network. International Journal of Communication Systems. 2018; 31 (11):e3704.
Chicago/Turabian StyleImran Memon. 2018. "Distance and clustering-based energy-efficient pseudonyms changing strategy over road network." International Journal of Communication Systems 31, no. 11: e3704.
Imran Memon; Qasim Ali Arain; Nasrullah Pirzada; Department of Software Engineering Mehran University of Engineering and Technology. A Novel Technique for Region-Based Features Similarity for Content-Based Image Retrieval. July 2021 2018, 37, 383 -396.
AMA StyleImran Memon, Qasim Ali Arain, Nasrullah Pirzada, Department of Software Engineering Mehran University of Engineering and Technology. A Novel Technique for Region-Based Features Similarity for Content-Based Image Retrieval. July 2021. 2018; 37 (2):383-396.
Chicago/Turabian StyleImran Memon; Qasim Ali Arain; Nasrullah Pirzada; Department of Software Engineering Mehran University of Engineering and Technology. 2018. "A Novel Technique for Region-Based Features Similarity for Content-Based Image Retrieval." July 2021 37, no. 2: 383-396.