• Publications
  • Influence
Optimal design of water distribution network using shu2ed complex evolution
TLDR
The findings of this study show that SCE is computationally much faster when compared with other also widely used algorithms such as GAs, Simulated Annealing, GLOBE and Shuffled Frog Leaping Algorithms is a potential alternative optimization algorithm to solve water distribution network problems.
Interoperability in Internet of Things: Taxonomies and Open Challenges
TLDR
A comprehensive survey on the state-of-the-art solutions for facilitating interoperability between different IoT platforms is performed and the key challenges in this topic is presented.
Multiresolution Hough Transform-An Efficient Method of Detecting Patterns in Images
  • Mohammed Atiquzzaman
  • Computer Science, Mathematics
    IEEE Trans. Pattern Anal. Mach. Intell.
  • 1 November 1992
TLDR
A new multiresolution coarse-to-fine search algorithm for efficient computation of the Hough transform (MHT) using a simple peak detection algorithm that can be generalized for patterns with any number of parameters.
On the routing in Flying Ad Hoc Networks
TLDR
The existing routing protocols for FANETs are classified into six major categories which are critically analyzed and compared based on various performance criteria to help network engineers in choosing appropriate routing protocols based on the specific scenario where the FANet will be deployed.
SCTP: state of the art in research, products, and technical challenges
TLDR
The main features of SCTP are introduced, and the state of the art in S CTP research and development activities are discussed, and a survey of the available products that use SCTp is provided.
Internet telephony: services, technical challenges, and products
TLDR
New services the authors can expect from Internet telephony, the technical challenges and solutions, and the emerging products that promise to support Internettelephony are discussed.
Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices—A Review
TLDR
Security vulnerabilities present in state-of-the-art medical devices are studied by studying security tests and the attacks demonstrated by the researchers on more than a hundred devices to assist researchers to get an overview of loopholes present in medical devices and existing countermeasures.
Error modeling schemes for fading channels in wireless communications: A survey
TLDR
This article surveys the error modeling methods of fading channels in wireless communications, and provides a novel user-requirement (researchers and designers) based approach to classify the existing wireless error models.
VLSI Architectures for Layered Decoding for Irregular LDPC Codes of WiMax
TLDR
A new multi-rate architecture for decoding irregular LDPC codes in IEEE 802.16e WiMax standard that utilizes the value-reuse property of offset min-sum, block-serial scheduling of computations and turbo decoding message passing algorithm is presented.
...
1
2
3
4
5
...