default search action
Niamat Ullah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Muhammad Farooq Siddique, Zahoor Ahmad, Niamat Ullah, Saif Ullah, Jong-Myon Kim:
Pipeline Leak Detection: A Comprehensive Deep Learning Model Using CWT Image Analysis and an Optimized DBN-GA-LSSVM Framework. Sensors 24(12): 4009 (2024) - 2023
- [j30]Rahat Zarin, Niamat Ullah, Amir Khan, Usa Wannasingha Humphries:
A numerical study of a new non-linear fractal fractional mathematical model of malicious codes propagation in wireless sensor networks. Comput. Secur. 135: 103484 (2023) - [j29]Niamat Ullah, Zahoor Ahmed, Jong-Myon Kim:
Pipeline Leakage Detection Using Acoustic Emission and Machine Learning Algorithms. Sensors 23(6): 3226 (2023) - [j28]Wasim Zaman, Zahoor Ahmad, Muhammad Farooq Siddique, Niamat Ullah, Jong-Myon Kim:
Centrifugal Pump Fault Diagnosis Based on a Novel SobelEdge Scalogram and CNN. Sensors 23(11): 5255 (2023) - [j27]Muhammad Farooq Siddique, Zahoor Ahmad, Niamat Ullah, Jongmyon Kim:
A Hybrid Deep Learning Approach: Integrating Short-Time Fourier Transform and Continuous Wavelet Transform for Improved Pipeline Leak Detection. Sensors 23(19): 8079 (2023) - [j26]Niamat Ullah, Zahoor Ahmad, Muhammad Farooq Siddique, Kichang Im, Dongkoo Shon, Tae Hyun Yoon, Dae-Seung Yoo, Jong-Myon Kim:
An Intelligent Framework for Fault Diagnosis of Centrifugal Pump Leveraging Wavelet Coherence Analysis and Deep Learning. Sensors 23(21): 8850 (2023) - [j25]Ikram Ali, Yong Chen, Jianqiang Li, Abdul Wakeel, Chengwei Pan, Niamat Ullah:
Efficient Offline/Online Heterogeneous-Aggregated Signcryption Protocol for Edge Computing-Based Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 24(12): 14506-14519 (2023) - [c10]Zahoor Ahmad, Niamat Ullah, Wasim Zaman, Muhammad Farooq Siddique, Jaeyoung Kim, Jong-Myon Kim:
A Framework for Centrifugal Pump Diagnosis Using Health Sensitivity Ratio Based Feature Selection and KNN. ACPR (2) 2023: 170-179 - [c9]Muhammad Farooq Siddique, Niamat Ullah, Jong-Myon Kim:
Comprehensive Pipeline Leak Detection Using Induced-Leak Enhanced Scalogram Analysis and Deep Learning. HPCC/DSS/SmartCity/DependSys 2023: 877-883 - [c8]Niamat Ullah, Muhammad Farooq Siddique, Jong-Myon Kim:
A Hybrid Classification Framework of Centrifugal Pumps Using Wavelet Coherence Visuals and Principal Component Analysis. HPCC/DSS/SmartCity/DependSys 2023: 906-911 - [c7]Zahoor Ahmad, Muhammad Farooq Siddique, Niamat Ullah, Jaeyoung Kim, Jong-Myon Kim:
Centrifugal Pump Health Condition Identification Based on Novel Multi-filter Processed Scalograms and CNN. IHCI (2) 2023: 162-170 - 2021
- [j24]Malik Daler Ali Awan, Sikandar Ali, Ali Samad, Nadeem Iqbal, Malik Muhammad Saad Missen, Niamat Ullah:
Sentence Classification Using N-Grams in Urdu Language Text. Sci. Program. 2021: 1296076:1-1296076:11 (2021) - [j23]Mujtaba Awan, Niamat Ullah, Sikandar Ali, Irshad Ahmed Abbasi, Muhammad Shabbir Hassan, Hizbullah Khattak, Jiwei Huang:
An Empirical Investigation of the Challenges of Cloud-Based ERP Adoption in Pakistani SMEs. Sci. Program. 2021: 5547237:1-5547237:8 (2021) - [j22]Ikram Ali, Yong Chen, Niamat Ullah, Rajesh Kumar, Wen He:
An Efficient and Provably Secure ECC-Based Conditional Privacy-Preserving Authentication for Vehicle-to-Vehicle Communication in VANETs. IEEE Trans. Veh. Technol. 70(2): 1278-1291 (2021) - [j21]Ikram Ali, Yong Chen, Niamat Ullah, Muhammad Afzal, Wen He:
Bilinear Pairing-Based Hybrid Signcryption for Secure Heterogeneous Vehicular Communications. IEEE Trans. Veh. Technol. 70(6): 5974-5989 (2021) - 2020
- [j20]Inayat Khan, Shah Khusro, Niamat Ullah, Shaukat Ali:
AutoLog: Toward the Design of a Vehicular Lifelogging Framework for Capturing, Storing, and Visualizing LifeBits. IEEE Access 8: 136546-136559 (2020) - [j19]Sikandar Ali, Niamat Ullah, Muhammad Faisal Abrar, Zhongguo Yang, Jiwei Huang:
Fuzzy Multicriteria Decision-Making Approach for Measuring the Possibility of Cloud Adoption for Software Testing. Sci. Program. 2020: 6597316:1-6597316:24 (2020)
2010 – 2019
- 2019
- [j18]Sikandar Ali, Niamat Ullah, Muhammad Faisal Abrar, Muhammad Faran Majeed, Muhammad Atif Umar, Jiwei Huang:
Barriers to Software Outsourcing Partnership Formation: An Exploratory Analysis. IEEE Access 7: 164556-164594 (2019) - [j17]Ahmad Khan, Zia ur Rehman, Muhammad Arfan Jaffar, Javid Ullah, Ahmad Din, Akbar Ali, Niamat Ullah:
Color image segmentation using genetic algorithm with aggregation-based clustering validity index (CVI). Signal Image Video Process. 13(5): 833-841 (2019) - 2018
- [j16]Farman Ali, S. M. Riazul Islam, Daehan Kwak, Pervez Khan, Niamat Ullah, Sangjo Yoo, Kyung Sup Kwak:
Type-2 fuzzy ontology-aided recommendation systems for IoT-based healthcare. Comput. Commun. 119: 138-155 (2018) - 2017
- [j15]Pervez Khan, Niamat Ullah, Hoon Kim:
WBAN MAC Protocols - Non-Saturation Modeling and Performance Analysis. KSII Trans. Internet Inf. Syst. 11(3): 1462-1476 (2017) - [j14]Pervez Khan, Niamat Ullah, Farman Ali, Sana Ullah, Youn-Sik Hong, Ki-Young Lee, Hoon Kim:
Performance Analysis of Different Backoff Algorithms for WBAN-Based Emerging Sensor Networks. Sensors 17(3): 492 (2017) - 2015
- [j13]Pervez Khan, Niamat Ullah, Md. Nasre Alam, Kyung Sup Kwak:
Performance Analysis of WBAN MAC Protocol under Different Access Periods. Int. J. Distributed Sens. Networks 11: 102052:1-102052:12 (2015) - [j12]Niamat Ullah, Kifayat Ullah, S. M. Riazul Islam, Pervaiz Khan, Sana Ullah, Kyung Sup Kwak:
Modeling MAC Protocol Based on Frame Slotted Aloha for Low Energy Critical Infrastructure Sensor Networks. Int. J. Distributed Sens. Networks 11: 701418:1-701418:11 (2015) - 2014
- [j11]M. Sanaullah Chowdhury, Niamat Ullah, Moshaddique Al Ameen, Kyung Sup Kwak:
Framed slotted aloha based MAC protocol for low energy critical infrastructure monitoring networks. Int. J. Commun. Syst. 27(10): 1783-1797 (2014) - [j10]Niamat Ullah, M. Sanaullah Chowdhury, Pervez Khan, Kyung Sup Kwak:
Multi-hop medium access control protocol for low energy critical infrastructure monitoring networks using wake-up radio. Int. J. Commun. Syst. 27(11): 2536-2554 (2014) - [c6]Pervez Khan, Niamat Ullah, Sana Ullah, Kyung Sup Kwak:
Analytical modeling of IEEE 802.15.6 CSMA/CA protocol under different access periods. ISCIT 2014: 151-155 - 2012
- [j9]Moshaddique Al Ameen, Niamat Ullah, M. Sanaullah Chowdhury, S. M. Riazul Islam, Kyungsup Kwak:
A power efficient MAC protocol for wireless body area networks. EURASIP J. Wirel. Commun. Netw. 2012: 33 (2012) - [j8]Niamat Ullah, M. Sanaullah Chowdhury, Pervez Khan, Sana Ullah, Kyung Sup Kwak:
Throughput and delay limits of chirp spread spectrum-based IEEE 802.15.4a. Int. J. Commun. Syst. 25(1): 1-15 (2012) - [j7]Niamat Ullah, M. Sanaullah Chowdhury, Moshaddique Al Ameen, Kyung Sup Kwak:
Energy Efficient MAC Protocol for Low-Energy Critical Infrastructure Monitoring Networks Using Wakeup Radio. Int. J. Distributed Sens. Networks 8 (2012) - 2011
- [j6]Pervez Khan, Niamat Ullah, Sana Ullah, Kyung Sup Kwak:
Seamless Interworking Architecture for WBAN in Heterogeneous Wireless Networks with QoS Guarantees. J. Medical Syst. 35(5): 1313-1321 (2011) - [j5]Niamat Ullah, Pervez Khan, Kyung Sup Kwak:
A Very Low Power MAC (VLPM) Protocol for Wireless Body Area Networks. Sensors 11(4): 3717-3737 (2011) - [c5]Moshaddique Al Ameen, Niamat Ullah, M. Sanaullah Chowdhury, Kyungsup Kwak:
A MAC Protocol for Body Area Networks using Out-of-Band Radio. EW 2011 - [c4]Moshaddique Al Ameen, Niamat Ullah, Kyungsup Kwak:
Design and analysis of a MAC protocol for wireless body area network using wakeup radio. ISCIT 2011: 148-153 - [i2]Kyung Sup Kwak, Sana Ullah, Niamat Ullah:
An Overview of IEEE 802.15.6 Standard. CoRR abs/1102.4106 (2011) - 2010
- [j4]Sana Ullah, Shahnaz Saleem, Henry Higgins, Niamat Ullah, Yingji Zhong, Kyung Sup Kwak:
Evaluation of Implant Communication with Polarisation and Unslotted CSMA/CA Protocol in Wireless Body Area Networks. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j3]Sana Ullah, Pervez Khan, Niamat Ullah, Kyung Sup Kwak:
MAC-Bridging for Multi-PHYs Communication in BAN. Sensors 10(11): 9919-9934 (2010) - [c3]M. Sanaullah Chowdhury, Niamat Ullah, Md. Humaun Kabir, Pervez Khan, Kyung Sup Kwak:
Throughput, delay and bandwidth efficiency of IEEE 802.15.4a using CSS PHY. ICTC 2010: 158-163 - [c2]Niamat Ullah, M. Sanaullah Chowdhury, Pervez Khan, Kyung Sup Kwak:
Throughput limits of UWB based 802.15.4a. ICTC 2010: 166-167 - [i1]Sana Ullah, Pervez Khan, Niamat Ullah, Shahnaz Saleem, Henry Higgins, Kyung Sup Kwak:
A Review of Wireless Body Area Networks for Medical Applications. CoRR abs/1001.0831 (2010)
2000 – 2009
- 2009
- [j2]Sana Ullah, Pervez Khan, Niamat Ullah, Shahnaz Saleem, Henry Higgins, Kyung Sup Kwak:
A Review of Wireless Body Area Networks for Medical Applications. Int. J. Commun. Netw. Syst. Sci. 2(8): 797-803 (2009) - [j1]Niamat Ullah, Pervez Khan, Mst. Najnin Sultana, Kyung Sup Kwak:
A Telemedicine Network Model for Health Applications in Pakistan - Current Status and Future Prospects. J. Digit. Content Technol. its Appl. 3(3): 149-155 (2009) - [c1]Saurabh Mehta, Niamat Ullah, Humaun Kabir, Mst. Najnin Sultana, Kyung Sup Kwak:
A Case Study of Networks Simulation Tools for Wireless Networks. Asia International Conference on Modelling and Simulation 2009: 661-666
Coauthor Index
aka: Kyungsup Kwak
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint