Mushtaq Ahmad

Orcid: 0000-0003-2971-2848

According to our database1, Mushtaq Ahmad authored at least 32 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Low-Complexity 2D-DOD and 2D-DOA Estimation in Bistatic MIMO Radar Systems: A Reduced-Dimension MUSIC Algorithm Approach.
Sensors, May, 2024

Multi-Layer Filled Coprime Arrays for DOA Estimation With Extended Hole-Free Coarray.
IEEE Trans. Veh. Technol., 2024

2023
Radio resource management for device to device communication using S and V shaped transfer functions.
Telecommun. Syst., January, 2023

2022
Battering Review Spam Through Ensemble Learning in Imbalanced Datasets.
Comput. J., 2022

2021
Heat Transfer Analysis for Viscous Fluid Flow with the Newtonian Heating and Effect of Magnetic Force in a Rotating Regime.
Complex., 2021

2020
Device-centric communication in IoT: An energy efficiency perspective.
Trans. Emerg. Telecommun. Technol., 2020

2019
Estimation of Distribution Algorithm for Joint Resource Management in D2D Communication.
Wirel. Pers. Commun., 2019

Energy efficiency in cognitive radio assisted D2D communication networks.
Telecommun. Syst., 2019

Infrastructure-based vehicular congestion detection scheme for V2I.
Int. J. Commun. Syst., 2019

Enactment of Ensemble Learning for Review Spam Detection on Selected Features.
Int. J. Comput. Intell. Syst., 2019

A Novel Hybrid Contents Oriented Communication (COC) Technique Based on V2X Networks.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

Optimal Cluster Leader Selection Using MCDM Methods in MWSN: A Comparative Study.
Proceedings of the 14th IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2019

2018
A Novel Connectivity-Based LEACH-MEEC Routing Protocol for Mobile Wireless Sensor Network.
Sensors, 2018

Joint user selection, mode assignment, and power allocation in cognitive radio-assisted D2D networks.
IET Commun., 2018

Devices to Devices (Ds2Ds) Communication: Towards Energy Efficient IoT.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Resource management in D2D communication: An optimization perspective.
J. Netw. Comput. Appl., 2017

On the secure optimized link state routing (SOLSR) protocol for MANETs.
Proceedings of the 12th International Conference on Intelligent Systems and Knowledge Engineering, 2017

2016
Mesh adaptive direct search approach for D2D resource management.
Wirel. Commun. Mob. Comput., 2016

Joint Admission Control, Mode Selection, and Power Allocation in D2D Communication Systems.
IEEE Trans. Veh. Technol., 2016

Utility Based Resource Management in D2D Networks Using Mesh Adaptive Direct Search Method.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

2015
On the Performance Assessment of the OLSR Protocol in Mobile Ad hoc Networks Using TCP and UDP.
Proceedings of the Internet of Vehicles - Safe and Intelligent Mobility, 2015

2014
ASCII based GUI system for arabic scripted languages: a case of urdu.
Int. Arab J. Inf. Technol., 2014

2012
Computational Analysis of Medieval Manuscripts: A New Tool for Analysis and Mapping of Medieval Documents to Modern Orthography.
J. Univers. Comput. Sci., 2012

Self-Organized Disjoint Service Placement in Future Mobile Communication Networks.
Int. J. Commun. Networks Inf. Secur., 2012

2011
A Parallel Implementation of ALE Moving Mesh Technique for FSI Problems using OpenMP.
Int. J. Parallel Program., 2011

Reversible watermarking method based on adaptive thresholding and companding technique.
Int. J. Comput. Math., 2011

Hybrid watermarking of medical images for ROI authentication and recovery.
Int. J. Comput. Math., 2011

A phonetic approach to handling spelling variations in medieval documents.
Proceedings of the 2011 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2011

2010
Security Risks of Cloud Computing and Its Emergence as 5th Utility Service.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Wireless Network Security Vulnerabilities and Concerns.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

2009
Implementation of 2D parallel ALE mesh generation technique in FSI problems using OpenMP.
Proceedings of the FIT '09, 2009

The Computing Technology And John Von Neumann's Computer Architecture Giving Way To Optical Computing.
Proceedings of the 2009 International Conference on Computer Design, 2009


  Loading...