Author pages are created from data sourced from our academic publisher partnerships and public sources.
Share This Author
Optimal design of water distribution network using shu2ed complex evolution
The findings of this study show that SCE is computationally much faster when compared with other also widely used algorithms such as GAs, Simulated Annealing, GLOBE and Shuffled Frog Leaping Algorithms is a potential alternative optimization algorithm to solve water distribution network problems.
Interoperability in Internet of Things: Taxonomies and Open Challenges
A comprehensive survey on the state-of-the-art solutions for facilitating interoperability between different IoT platforms is performed and the key challenges in this topic is presented.
Multiresolution Hough Transform-An Efficient Method of Detecting Patterns in Images
- Mohammed Atiquzzaman
- Computer Science, MathematicsIEEE Trans. Pattern Anal. Mach. Intell.
- 1 November 1992
A new multiresolution coarse-to-fine search algorithm for efficient computation of the Hough transform (MHT) using a simple peak detection algorithm that can be generalized for patterns with any number of parameters.
On the routing in Flying Ad Hoc Networks
- Md. Hasan Tareque, Md. Shohrab Hossain, Mohammed Atiquzzaman
- Computer ScienceFederated Conference on Computer Science and…
- 9 November 2015
The existing routing protocols for FANETs are classified into six major categories which are critically analyzed and compared based on various performance criteria to help network engineers in choosing appropriate routing protocols based on the specific scenario where the FANet will be deployed.
SCTP: state of the art in research, products, and technical challenges
The main features of SCTP are introduced, and the state of the art in S CTP research and development activities are discussed, and a survey of the available products that use SCTp is provided.
Internet telephony: services, technical challenges, and products
New services the authors can expect from Internet telephony, the technical challenges and solutions, and the emerging products that promise to support Internettelephony are discussed.
Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices—A Review
- Tahreem Yaqoob, Haider Abbas, Mohammed Atiquzzaman
- Computer ScienceIEEE Communications Surveys & Tutorials
- 30 April 2019
Security vulnerabilities present in state-of-the-art medical devices are studied by studying security tests and the attacks demonstrated by the researchers on more than a hundred devices to assist researchers to get an overview of loopholes present in medical devices and existing countermeasures.
Bandwidth-adaptive partitioning for distributed execution optimization of mobile applications
Error modeling schemes for fading channels in wireless communications: A survey
This article surveys the error modeling methods of fading channels in wireless communications, and provides a novel user-requirement (researchers and designers) based approach to classify the existing wireless error models.
VLSI Architectures for Layered Decoding for Irregular LDPC Codes of WiMax
- K. Gunnam, G. Choi, M. Yeary, Mohammed Atiquzzaman
- Computer ScienceIEEE International Conference on Communications
- 24 June 2007
A new multi-rate architecture for decoding irregular LDPC codes in IEEE 802.16e WiMax standard that utilizes the value-reuse property of offset min-sum, block-serial scheduling of computations and turbo decoding message passing algorithm is presented.