Ghazanfar Ali Safdar
YOU?
Author Swipe
View article: Internet of Things to Internet of Humans: A Perception
Internet of Things to Internet of Humans: A Perception Open
The use of internet has grown significantly in the last three decades. Various technologies such as social media and networking, cloud systems, Blockchain technology etc., have been developed which have significantly improved the communica…
View article: Socio-Organisational Challenges and Impacts of IoT: A Review in Healthcare and Banking
Socio-Organisational Challenges and Impacts of IoT: A Review in Healthcare and Banking Open
The Internet of Things (IoT) is transforming how organisations and individuals connect and interact with digital ecosystems, especially in sectors like healthcare and banking. While technological benefits have been widely discussed, the so…
View article: Support Vector Machine (SVM) based Detection for Volumetric Bandwidth Distributed Denial of Service (DVB-DDOS) attack within gigabit Passive Optical Network
Support Vector Machine (SVM) based Detection for Volumetric Bandwidth Distributed Denial of Service (DVB-DDOS) attack within gigabit Passive Optical Network Open
The dynamic bandwidth allocation (DBA) algorithm is highly impactful in improving the network performance of gigabit passive optical networks (GPON). Network security is an important component of today’s networks to combat security attacks…
View article: Uplink Resource Shared Interference Mitigation Scheme for In-Band D2d Underlay 5g Networks
Uplink Resource Shared Interference Mitigation Scheme for In-Band D2d Underlay 5g Networks Open
View article: Energy Efficiency and Interoperability Through Oran Rapid Transition Protocol (Ortp)
Energy Efficiency and Interoperability Through Oran Rapid Transition Protocol (Ortp) Open
View article: Uplink Resource Shared Interference Mitigation Scheme for In-Band D2d Underlay 5g Networks
Uplink Resource Shared Interference Mitigation Scheme for In-Band D2d Underlay 5g Networks Open
View article: Heterogeneous Energy Harvesting Techniques for Smart Home IoT Acceleration
Heterogeneous Energy Harvesting Techniques for Smart Home IoT Acceleration Open
Energy harvesting and Internet of Things (IoT) technology is being integrated with home appliances. IoT devices could harvest energy from alternative energy sources to convert the available energy from home appliances into electrical energ…
View article: UE admittance and contention free resource allocation for interference mitigation in HetNet cognitive femtocells
UE admittance and contention free resource allocation for interference mitigation in HetNet cognitive femtocells Open
Femtocells are designed to co-exist alongside macrocells providing higher spectrum efficiency, spatial frequency reuse, to name a few. However, when deployed in the two-tier architecture with macrocells, interference is imminent thereby it…
View article: Uplink Resource Shared Interference Mitigation Scheme for In-Band D2d Underlay 5g Networks
Uplink Resource Shared Interference Mitigation Scheme for In-Band D2d Underlay 5g Networks Open
View article: V2x Application Server and Vehicle Centric Distribution of Commitments for V2v Message Authentication
V2x Application Server and Vehicle Centric Distribution of Commitments for V2v Message Authentication Open
View article: Uplink Resource Shared Interference Mitigation Scheme for In-Band D2d Underlay 5g Networks
Uplink Resource Shared Interference Mitigation Scheme for In-Band D2d Underlay 5g Networks Open
View article: Fuzzy Logic-Based Cluster Head Election-Led Energy Efficiency in History-Assisted Cognitive Radio Networks
Fuzzy Logic-Based Cluster Head Election-Led Energy Efficiency in History-Assisted Cognitive Radio Networks Open
The performance and the network lifetime of cooperative spectrum sensing (CSS) infrastructure-based cognitive radio (CR) networks are hugely affected by the energy consumption of the power-constrained CR nodes during spectrum sensing, foll…
View article: Improved Spectral Efficiency and Connectivity in RSMA based 5G V2X Systems
Improved Spectral Efficiency and Connectivity in RSMA based 5G V2X Systems Open
Vehicle to everything (V2X) faces several challenges including high data rate, low latency and stable connectivity requirements. Due to increased number of connected vehicles, Interference too appears to be a serious issue in V2X systems. …
View article: 5G-based V2V broadcast communications: A security perspective
5G-based V2V broadcast communications: A security perspective Open
View article: Comparative analysis of scheduling algorithms for radio resource allocation in future communication networks
Comparative analysis of scheduling algorithms for radio resource allocation in future communication networks Open
Background Wireless links are fast becoming the key communication mode. However, as compared to the wired link, their characteristics make the traffic prone to time- and location-dependent signal attenuation, noise, fading, and interferenc…
View article: Unlink the Link Between COVID-19 and 5G Networks: An NLP and SNA Based Approach
Unlink the Link Between COVID-19 and 5G Networks: An NLP and SNA Based Approach Open
Social media facilitates rapid dissemination of information for both factual and fictional information. The spread of non-scientific information through social media platforms such as Twitter has potential to cause damaging consequences. S…
View article: IoT for 5G/B5G Applications in Smart Homes, Smart Cities, Wearables and Connected Cars
IoT for 5G/B5G Applications in Smart Homes, Smart Cities, Wearables and Connected Cars Open
Internet of things (IoT) is referred to as smart devices connected to the internet. A smart device is an electronic device, which may connect to other devices or are part of a network such as Wi-Fi. The increase of IoT devices has helped w…
View article: IEEE Access Special Section: Advances in Interference Mitigation Techniques for Device-to-Device Communications
IEEE Access Special Section: Advances in Interference Mitigation Techniques for Device-to-Device Communications Open
The emergence of data-extensive applications such as online gaming and video sharing has resulted in an exponential increase in mobile data traffic. Advances in the Internet-of-Things (IoT) and 5G also require the fusion of multiple sensor…
View article: Survey on security and privacy issues in cyber physical systems
Survey on security and privacy issues in cyber physical systems Open
The notion of Cyber-Physical Systems (CPS) is proposed by the National Scientific Foundation to describe a type of systems which combine hardware and software components and being the next step in development of embedded systems. CPS inclu…
View article: Extremely low profile flexible antenna for medical body area networks
Extremely low profile flexible antenna for medical body area networks Open
Medical Body Area Networks (MBAN) are widely used in healthcare systems employing in- and on-body applications. An extremely low profile patch antenna for the MBANs is presented in this paper. The antenna consists of two flexible printed c…
View article: Energy Efficiency Led reduced CO2 Emission in Green LTE Networks
Energy Efficiency Led reduced CO2 Emission in Green LTE Networks Open
The technological advancements in smart phones and their applications have rapidly raised the number of users and their data demands. To fulfil enlarged user’s data requirements, Basestation (BS) engages their resources over prolong time i…
View article: Design and Study of a Circular Polarised Conical-Disc-Backed Spiral Antenna for X-Band Applications
Design and Study of a Circular Polarised Conical-Disc-Backed Spiral Antenna for X-Band Applications Open
Design of a conical-disc-backed circular-polarized Archimedean single-arm spiral antenna is presented in this paper. The antenna operation covers the X-band frequencies ranging from 8 to 12 GHz. The antenna makes use of a very simple struc…
View article: Energy Management in LTE Networks
Energy Management in LTE Networks Open
Wireless cellular networks have seen dramatic growth in number of mobile users. As a result, data requirements, and hence the base-station power consumption has increased significantly. It in turn adds to the operational expenditures and a…
View article: Performance analysis of a novel decentralised MAC protocol for cognitive radio networks
Performance analysis of a novel decentralised MAC protocol for cognitive radio networks Open
Due to the demand of emerging Cognitive Radio (CR) technology to permits using the unused licensed spectrum parts by cognitive users (CUs) to provide opportunistic and efficient utilisation of the white spaces. This requires deploying a CR…
View article: Fruit Fly Optimization Algorithm for Network-Aware Web Service Composition in the Cloud
Fruit Fly Optimization Algorithm for Network-Aware Web Service Composition in the Cloud Open
Service Oriented Computing (SOC) provides a framework for the realization of loosely coupled service oriented applications. Web services are central to the concept of SOC. Currently, research into how web services can be composed to yield …
View article: Interference Mitigation in D2D Communication Underlaying LTE-A Network
Interference Mitigation in D2D Communication Underlaying LTE-A Network Open
The mobile data traffic has risen exponentially in recent days due to the emergence of data intensive applications, such as online gaming and video sharing. It is driving the telecommunication industry as well as the research community to …
View article: Network Aware Composition for Internet of Thing Services
Network Aware Composition for Internet of Thing Services Open
To enhance the adoption of Internet of Things (IoT) philosophy for the internet, research into IoT service composition has gathered momentum. In a distributed IoT environment, identifying IoT service among a set of similar service offering…
View article: Towards Network-Aware Composition of Big Data Services in the Cloud
Towards Network-Aware Composition of Big Data Services in the Cloud Open
Several Big data services have been developed on the cloud to meet increasingly complex needs of users. Most times a single Big data service may not be capable in satisfying user requests. As a result, it has become necessary to aggregate …