Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2023
Computational bipolar fuzzy soft matrices with applications in decision making problems
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 44, Issue 6Pages 10241–10253https://doi.org/10.3233/JIFS-221569A fuzzy soft matrix is a type of mathematical matrix that combines the principles of fuzzy set theory and soft set theory. It is used to handle uncertainty and vagueness in decision-making problems. Fuzzy soft matrix theory cannot handle negative ...
- research-articleJanuary 2023
Machine Learning Techniques for Antimicrobial Resistance Prediction of Pseudomonas Aeruginosa from Whole Genome Sequence Data
- Inam Ullah,
- Sohail M. Noman,
- Muhammad Zeeshan,
- Jehangir Arshad,
- Melkamu Deressa Amentie,
- Muhammad Shafiq,
- Yumeng Yuan,
- Mi Zeng,
- Xin Li,
- Qingdong Xie,
- Xiaoyang Jiao
Aim. Due to the growing availability of genomic datasets, machine learning models have shown impressive diagnostic potential in identifying emerging and reemerging pathogens. This study aims to use machine learning techniques to develop and compare a ...
- research-articleMay 2022
5G/SDR-Assisted Cognitive Communication in UAV Swarms: Architecture and Applications
IT Professional (IEEECS_ITPRO), Volume 24, Issue 3Pages 28–34https://doi.org/10.1109/MITP.2022.3161318Unmanned aerial vehicles (UAVs) are in general faster to deploy and easier to operate due to many off-the-shelf guidance, navigation, and control solutions. Such solutions usually support short-range line-of-sight operations. However, operating a swarm of ...
- research-articleMay 2022
A novel minimal set decode-amplify-forward (MS-DAF) relaying scheme for MIMO-NOMA
Telecommunications Systems (TESY), Volume 80, Issue 1Pages 141–152https://doi.org/10.1007/s11235-022-00894-2AbstractIn non-orthogonal multiple access (NOMA) scheme, the strong users, located near to base station, demodulate their data by considering the information of other users as interference. One of the crucial challenges in NOMA is the design of ...
-
- research-articleJanuary 2022
An algorithm for identifying reference signals under the environment of complex fuzzy sets
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 43, Issue 5Pages 6521–6548https://doi.org/10.3233/JIFS-220517In this paper, we have discussed some new operations and results of set theory for complex fuzzy sets (CFSs). Moreover, we developed the basic results of CFSs under the basic operations such as complex fuzzy simple difference, bounded sum, bounded ...
- research-articleJanuary 2022
Amplitude interval-valued complex Pythagorean fuzzy sets with applications in signals processing
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 43, Issue 1Pages 907–925https://doi.org/10.3233/JIFS-212615In this paper, we introduce the notion of amplitude interval-valued complex Pythagorean fuzzy sets (AIVCPFSs). The motivation for this extension is the utility of interval-valued complex fuzzy sets in membership and non-membership degree which can express ...
- research-articleJanuary 2022
Performance Evaluation of Simple K-Mean and Parallel K-Mean Clustering Algorithms: Big Data Business Process Management Concept
- Fazli Wahid,
- Islam Zada,
- Shaukat Ali,
- Inayat Khan,
- Myriam Hadjouni,
- Hela Elmannai,
- Muhammad Zeeshan,
- Ali Mohammad Serat,
- Abid Jameel
Data is the most valuable asset in any firm. As time passes, the data expands at a breakneck speed. A major research issue is the extraction of meaningful information from a complex and huge data source. Clustering is one of the data extraction methods. ...
- research-articleJanuary 2022
Dynamic link adaptation for filterband multicarrier in networks with diverse service quality and throughput requirements
- Amna Javed Tiwana,
- Muhammad Zeeshan,
- Tabinda Ashraf,
- Muhammad Umar Farooq,
- Kashif Shahzad,
- Adnan Akhunzada
Telecommunications Systems (TESY), Volume 79, Issue 1Pages 109–122https://doi.org/10.1007/s11235-021-00845-3AbstractThe fast evolution in wireless communication standards and enhancement in cellular applications has created an exponential rise in the data rate requirement over the past few decades. The next generation wireless standards, therefore, need not ...
- research-articleJanuary 2022
A Novel Cooperative Micro-Caching Algorithm Based on Fuzzy Inference Through NFV in Ultra-Dense IoT Networks
Journal of Network and Systems Management (JNSM), Volume 30, Issue 1https://doi.org/10.1007/s10922-021-09632-6AbstractMinimizing transaction latency and network traffic is pivotal in large-scale Internet of Things (IoT) applications. This paper investigates the fundamentals of distributed caching, cache coordination, network function virtualization, fog computing,...
- research-articleNovember 2021
A novel hybrid spreading and scrambling based multiple access (SSMA) technique for capacity improvement
Telecommunications Systems (TESY), Volume 78, Issue 3Pages 293–305https://doi.org/10.1007/s11235-021-00814-wAbstractFuture wireless networks and 5G communication technology aims to provide seamless connectivity for geographical areas having thousands of users within hundreds of meter radius. Emerging communication technologies, specifically, multiple access ...
- research-articleOctober 2021
A new hybrid CDMA–NOMA scheme with power allocation and user clustering for capacity improvement
Telecommunications Systems (TESY), Volume 78, Issue 2Pages 225–237https://doi.org/10.1007/s11235-021-00805-xAbstractNon-orthogonal multiple access (NOMA) is a prominent 5G wireless communication technique which ensures higher spectral efficiency, low latency and user fairness. As power-domain NOMA exploits different power levels assigned to each user for ...
- ArticleSeptember 2021
Two-Step Fine-Tuned Convolutional Neural Networks for Multi-label Classification of Children’s Drawings
Document Analysis and Recognition – ICDAR 2021Pages 321–334https://doi.org/10.1007/978-3-030-86331-9_21AbstractDevelopmental psychologists employ several drawing-based tasks to measure the cognitive maturity of a child. Manual scoring of such tests is time-consuming and prone to scorer bias. A computerized analysis of digitized samples can provide ...
- research-articleMarch 2021
Towards improved clustering and routing protocol for wireless sensor networks
EURASIP Journal on Wireless Communications and Networking (JWCN), Volume 2021, Issue 1https://doi.org/10.1186/s13638-021-01911-9AbstractWireless sensor network (WSN)-based Internet of Things (IoT) applications suffer from issues including limited battery capacity, frequent disconnections due to multi-hop communication and a shorter transmission range. Clustering and routing are ...
- research-articleJanuary 2021
Intrusion detection in internet of things using supervised machine learning based on application and transport layer features using UNSW-NB15 data-set
EURASIP Journal on Wireless Communications and Networking (JWCN), Volume 2021, Issue 1https://doi.org/10.1186/s13638-021-01893-8AbstractInternet of Things (IoT) devices are well-connected; they generate and consume data which involves transmission of data back and forth among various devices. Ensuring security of the data is a critical challenge as far as IoT is concerned. Since ...
- research-articleJanuary 2021
Classification and Prediction of Software Incidents Using Machine Learning Techniques
An incident, in the perception of information technology, is an event that is not part of a normal process and disrupts operational procedure. This research work particularly focuses on software failure incidents. In any operational environment, software ...
- research-articleJanuary 2021
Key Performance Indicators for the Integration of the Service-Oriented Architecture and Scrum Process Model for IOT
- Muhammad Arif Shah,
- Mengze Zheng,
- Islam Zada,
- Sara Shahzad,
- Javed Iqbal,
- Muhammad Shafiq,
- Muhammad Zeeshan,
- Amjad Ali
An important aspect in any business process lifecycle is management of the performance, where performance requirements on business processes are specified as Key Performance Indicators (KPIs) with target values which are to be achieved in a certain ...
- research-articleJanuary 2021
HEVC compatible perceptual multiple description video coding for reliable video transmission over packet networks
Telecommunications Systems (TESY), Volume 76, Issue 1Pages 63–83https://doi.org/10.1007/s11235-020-00702-9AbstractMultiple description coding (MDC) has been an effective scheme for reliable transmission of videos over error prone networks but requires higher data rates. Recently, perceptual video coding schemes are able to encode videos at a lower data rate, ...
- research-articleMarch 2020
A novel algorithm for frequency de-hopping in radars using agile bandpass sampling for electonic support measurement
Telecommunications Systems (TESY), Volume 73, Issue 3Pages 443–454https://doi.org/10.1007/s11235-019-00618-zAbstractModern radars use frequency hopping as an effective anti-jamming technique by changing their frequencies from pulse-to-pulse and thus making their blind estimation a challenging task for Electronic Warfare (EW) receivers. In this paper, a novel ...
- research-articleFebruary 2020
QoS-aware traffic scheduling framework in cognitive radio based smart grids using multi-objective optimization of latency and throughput
AbstractTo meet the diverse QoS requirements of future Smart Grid (SG) communication network, efficient traffic scheduling and optimization techniques to prioritize data from various SG applications are required. Recently, focus has only been ...