Atif Ishtiaq's research while affiliated with Iqra National University and other places

Publications (20)

Article
Full-text available
Real-time object detection using machine learning techniques has improved algorithm performance, but issues like blurring, noise, and rotating jitter in real-world images impact detection methods. You Only Look Once (YOLO) is a faster and more accurate real-time object detection algorithm that can detect multiple objects in a single image, unlike o...
Article
Full-text available
Smart cities have gained popularity because they promise to address some of the biggest challenges facing urban areas today, such as: traffic congestion, air pollution, energy consumption, waste management, and public safety. A comprehensive study is conducted to enhance the malware detection performance in smart cities by integrating machine learn...
Article
Full-text available
Pakistan holds a huge mobile telecommunication market base, consisting of nearly 185 million cellular customers as of August 2021 out of which 103 million are 3G & 4G users. Having a population of 220 million the demand for better and faster services is always there to be digested by the data ravening customers. At the moment broadband data users p...
Article
Full-text available
Coronary Artery Disease is the type of cardiovascular disease (CVD) that happens when the blood vessels which stream the blood toward the heart, either become tapered or blocked. Of this, the heart is incapable to push sufficient blood to encounter its requirements. This would lead to angina (chest pain). CVDs are the leading cause of mortality wor...
Conference Paper
Full-text available
Abstract—Skin cancer is one of the most common and dangerous diseases due to a lack of awareness of its signs and methods for prevention. Skin cancer can be counted as a fourth burden worldwide, with the rate of deaths dramatically growing globally. Therefore, early detection at an early stage is necessary to stop the spread of cancer. In this pape...
Article
Full-text available
Micro inverters are power electronics devices integrated close to photovoltaic (PV) panels. PVs produced today could make 92% of its rated power. With the passage of time, the reliability and performance of micro inverter needs to be redesigned that operate under harsh temperature conditions. This paper presents the distribution of electrical and t...
Article
Full-text available
The dynamic network topology of Flying Ad hoc Networks (FANETs) leads to challenges during communications. This becomes complicated when dealing with multiple transmission paths and relays. Conventional routing protocols proposed fail to address the dynamic issues inherent in FANETs. This work addresses it by diversifying the selection of relay in...
Article
Full-text available
The era of smart farming has already begun, and its consequences for society and environment are expected to be massive. In this situation, Internet of Things (IoT) technologies have become a key route towards new agricultural practices. IoT nodes detect and track physical or environmental conditions and transmit data through multihop routing to th...
Article
Full-text available
Due to the development of computer controlled tools and expansion of integrated computing applications, more and more controller functions are turning to software implementations. A novel controlling algorithm is designed for continuous optimization tasks. However, they are used to thoroughly optimize and apply in different areas. This article give...
Article
Full-text available
Vehicular ad hoc networks consist of access points for communication, transmission, and collecting information of nodes and environment for managing traffic loads. Clustering can be performed in the vehicular ad hoc networks for achieving the desired goals. Due to the random range of vehicular ad hoc networks, stability is the major issue on which...
Article
Full-text available
PSO plays an important role in formation control of underwater swarm robots that is based on Assisting Mechanism Theory (AMT) of underwater autonomous vehicles (UAVs) in group surveillance. This article enables formation stabilization of underwater swarm robots, obstacles and collision avoidance in between and outside the group. It is also ensuring...
Article
Full-text available
VANET is an application and subclass of MANETs, a quickly maturing, promising, and emerging technology these days. VANETs establish communication among vehicles (V2V) and roadside infrastructure (V2I). As vehicles move with high speed, hence environment and topology change with time. There is no optimum routing protocol which ensures full-pledge on...
Article
Full-text available
One of the real issues in UWSN is congestion control. The need is to plan an optimized congestion control scheme which enhances the network life time and in addition limits the usage of energy in data transmission from source to destination. In this paper, we propose a routing protocol called Dist-Coop in UWSN. Dist-Coop is a distributed cooperatio...

Citations

... Saba et.al, reviewed Internet of Things (IoT) aims to improve lives by offering intelligent devices and applications, but security risks remain a major concern. Deep learning model-based anomaly-based intrusion detection systems can improve IoT security by identifying patterns and facilitating smooth detection based on anomalies [15] [17]. Challenge 2 Adaptability to Changing Threats: As a result of the ongoing evolution of cyber threats, intrusion detection systems must update and modify their detection techniques. ...
... Early Warning Systems for Public Health Emergencies. Predictive analytics will evolve to create more robust early warning systems for public health emergencies (Khan et al., 2023, Ukoba et al., 2023. By analyzing a combination of clinical, environmental, and social data, these systems can provide timely alerts and recommendations for rapid response. ...
... On the work done on a grid system by (Vokas, Gazis, Katsimardou, & Kaldelis, 2013) is to research on the study of micro inverter technology to discover what the result will bring up if the inverter is placed on each photovoltaic module and to get the output of the two inverter technologies. In the work of (Tahir et al., 2022), distribution and thermal stresses is proposed which occurs in semiconductor devices of micro inverters and likewise, the performance of the micro inverter evaluated on the basis of conduction and switching losses in basic micro inverters. In the work of (Bezerra et al., 2017), the author present the development of a single -phase inverter with high efficiency and high power density to be applied on photovoltaic panel's applications. ...
... In [85], the protocol incorporates the Gray Wolf Optimizer (GWO) algorithm, which mimics the cooperative behavior and social structure of gray wolves in order to optimize the routing process. The GWO algorithm is adapted to meet the specific requirements of mobile nodes in the network. ...
... Challenge 2 Adaptability to Changing Threats: As a result of the ongoing evolution of cyber threats, intrusion detection systems must update and modify their detection techniques. This necessitates quick updates to IDS rules and signatures as well as ongoing monitoring of newly developing threats [18]. ...
... AMONET enhances cluster stability by exploring more proficient search spaces using transverse orientation, resulting in optimized clusters. Other MFO variants, ICMFO and CAMONET, are proposed by different authors in [28,29], respectively. These variants aim to establish efficient clusters to improve communication reliability and stability. ...
... The evolution of such power generating and wireless charging capabilities has shown how energy constrained devices work for a longer period in a more controlled and reliable way. Various Researchers have surveys and proposed energy charging to the sensor nodes deployed in the area [47][48][49][50]. This is a new and unique way to explore more, as it creates an environment in which sensor nodes can share energy between neighbors. ...
... In a sensor network, a limited and irreplaceable battery is the most important constraint for WSN. Sensor nodes can be powered continuously when the energy harvesting technique source is abundant [9]. For efficient performance, the network can optimize the utilization of energy. ...
... The meta-heuristic PSO algorithm is used in conjunction with the least-squares moving (MLS) in [20] [21]. The PSO method is used to set parameters in the MLS method, which significantly affects the accuracy of the fit. ...
... Ahmed et al., proposed a new secure algorithm for VANET in [24]. The proposed approach is more resistant to many types of assaults and thwarts attempts by bad nodes to penetrate the entire network. ...