Machine Learning-based Smart Assistance System for the Visually Impaired PA Shah, HARA Alhefeiti, RHMA Alrayssi 2023 9th International Conference on Information Technology Trends (ITT …, 2023 | 2 | 2023 |
An Artificially Intelligent Marine Life Surveillance and Protection System (MLSPS) PA Shah, EAOS Alyammahi, MAMQ Alnaqbi, KMMA Alzaabi, ... Proceedings of International Conference on Information Technology and …, 2022 | 1 | 2022 |
A Seamless Handoff Scheme for Mobility Management in MPLS based Wireless Network Z Hussain, PA Shah, S Abid 2021 International Conference on Innovative Computing (ICIC), 1-8, 2021 | | 2021 |
Fuzzy Logic‐based Efficient Interest Forwarding (FLEIF) in Named Data Networking Z Qureshi, PA Shah, N Hassan, S Yasmin, F Aadil, MF Khan, Y Nam, ... Transactions on Emerging Telecommunications Technologies 30 (9), https://doi …, 2019 | 2 | 2019 |
Computationally efficient generic adaptive filter (CEGAF) M Abid, M Ishtiaq, FA Khan, S Khan, R Ahmad, PA Shah Cluster Computing 22, 7111-7121, 2019 | 3 | 2019 |
Traffic load balancing using software defined networking (SDN) controller as virtualized network function S Ejaz, Z Iqbal, PA Shah, BH Bukhari, A Ali, F Aadil IEEE Access 7, 46646-46658, 2019 | 61 | 2019 |
Application of Fog and Cloud Computing for Patient’s Data in the Internet of Things S Waheed, PA Shah Advances in Internet, Data and Web Technologies: The 7th International …, 2019 | 3 | 2019 |
Underwater wireless sensor networks: A review of recent issues and challenges KM Awan, PA Shah, K Iqbal, S Gillani, W Ahmad, Y Nam Wireless communications and mobile computing 2019 (1), 6470359, 2019 | 312 | 2019 |
A dynamic caching strategy for CCN-based MANETs S Naz, RNB Rais, PA Shah, S Yasmin, A Qayyum, S Rho, Y Nam Computer Networks 142, 93-107, 2018 | 21 | 2018 |
Clustering algorithm for internet of vehicles (IoV) based on dragonfly optimizer (CAVDO) F Aadil, W Ahsan, ZU Rehman, PA Shah, S Rho, I Mehmood The Journal of Supercomputing 74, 4542-4567, 2018 | 112 | 2018 |
Grey wolf optimization based clustering algorithm for vehicular ad-hoc networks M Fahad, F Aadil, S Khan, PA Shah, K Muhammad, J Lloret, H Wang, ... Computers & Electrical Engineering 70, 853-870, 2018 | 203 | 2018 |
Machine learning-assisted signature and heuristic-based detection of malwares in Android devices ZU Rehman, SN Khan, K Muhammad, JW Lee, Z Lv, SW Baik, PA Shah, ... Computers & Electrical Engineering 69, 828-841, 2018 | 103 | 2018 |
Crumbling Walls Log Quorum System-based Name Resolution Routing for CCN based IoT. PI Shah, PA Shah, S Yasmin, ZU Rehman, A Ahmad, Y Nam, S Rho J. Univers. Comput. Sci. 24 (9), 1282-1305, 2018 | 1 | 2018 |
Optimum bandwidth allocation in wireless networks using differential evolution Z Afzal, PA Shah, KM Awan Journal of Ambient Intelligence and Humanized Computing, 1-12, 2018 | 10 | 2018 |
A Route Optimized Distributed IP-Based Mobility Management Protocol for Seamless Handoff across Wireless Mesh Networks PA Shah, KM Awan, K Iqbal, F Aadil, K Muhammad, I Mehmood, SW Baik Mobile Networks and Applications, 1-23, 2018 | 11 | 2018 |
Implementation of information security techniques on modern android based Kiosk ATM/remittance machines KM Awan, Z ur Rehman, MM Yamin, PA Shah 2017 International Conference on Information and Communication Technologies …, 2017 | 2 | 2017 |
Cluster based handoff management technique in vanet using backup node N Mazhar, K Awan, PA Shah Gomal University Journal of Research 33 (1), 113-124, 2017 | 2 | 2017 |
Technical Papers Parallel Session-II: Implementation of information security techniques on modern android based Kiosk ATM/remittance machines KM Awan, MM Yamin, PA Shah | | 2017 |
Fuzzy logic based enhanced AOMDV with link status classification for efficient multi-path routing in multi-hop wireless networks G Aldabbagh, PA Shah, HB Hasbullah, F Aadil, KM Awan, F Marwat Journal of Computational and Theoretical Nanoscience 14 (1), 620-630, 2017 | 5 | 2017 |
Review spam detection using sentiments and novel features S Mushtaq, C Faisal, K Iqbal, P Shah, I Mehmood, ABU Akram Int J Comput Sci Inf Secur (IJCSIS) 14 (10), 324-328, 2016 | 2 | 2016 |