default search action
Aftab Ahmad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j20]Abdul Mannan, Mohammad S. Obaidat, Khalid Mahmood, Aftab Ahmad, Rodina Ahmad:
Classical versus reinforcement learning algorithms for unmanned aerial vehicle network communication and coverage path planning: A systematic literature review. Int. J. Commun. Syst. 36(5) (2023) - [j19]Adnan Khan, Jamal Uddin, Farman Ali, Harish Kumar, Wajdi Alghamdi, Aftab Ahmad:
AFP-SPTS: An Accurate Prediction of Antifreeze Proteins Using Sequential and Pseudo-Tri-Slicing Evolutionary Features with an Extremely Randomized Tree. J. Chem. Inf. Model. 63(3): 826-834 (2023) - 2021
- [j18]Saqib Fayyaz, Muhammad Kashif Sattar, Muhammad Waseem, Muhammad Usman Ashraf, Aftab Ahmad, Hafiz Ashiq Hussain, Khalid Alsubhi:
Solution of Combined Economic Emission Dispatch Problem Using Improved and Chaotic Population-Based Polar Bear Optimization Algorithm. IEEE Access 9: 56152-56167 (2021) - 2020
- [j17]Hafiz Abd Ul Muqeet, Aftab Ahmad:
Optimal Scheduling for Campus Prosumer Microgrid Considering Price Based Demand Response. IEEE Access 8: 71378-71394 (2020) - [c24]Nasif Raza Jaffri, Liu Shi, Usama Abrar, Aftab Ahmad, Jian Yang:
Electrical Resistance Tomographic Image Enhancement Using MRNSD and LSQR. ICMSSP 2020: 16-20
2010 – 2019
- 2019
- [c23]Aftab Ahmad, Amjad Hussain, Mohammad Pervez Mughal, Nadeem Ahmad Mufti, Muhammad Qaiser Saleem:
Path Analysis of the Antecedents and Occupational Stress Among the Managers of the Textile Industries: A Cross-Sectional Study from Pakistan Using PLS-SEM. AHFE (19) 2019: 480-490 - 2018
- [j16]Bhanoday Reddy Vemula, Björn Matthias, Aftab Ahmad:
A design metric for safety assessment of industrial robot design suitable for power- and force-limited collaborative operation. Int. J. Intell. Robotics Appl. 2(2): 226-234 (2018) - [c22]Aftab Ahmad, Jennifer Holst:
Hurst parameter as a correlation measure for brain signal. SpringSim (CNS) 2018: 13:1-13:7 - 2017
- [j15]Muslim Raza, Zahid Khan, Aftab Ahmad, Saleem Raza, Ajab Khan, Imdad Ullah Mohammadzai, Shah Zada:
In silico 3-D structure prediction and molecular docking studies of inosine monophosphate dehydrogenase from Plasmodium falciparum. Comput. Biol. Chem. 71: 10-19 (2017) - 2016
- [j14]Aftab Ahmad, Preeti Misra, Frank Ono, Cody Priest, Jessica Suarez, Alexander Urcioli:
The information privacy domain. Int. J. Inf. Priv. Secur. Integr. 2(4): 307-329 (2016) - [j13]Aftab Ahmad:
A Smart Grid Security Architecture for Wireless Advanced Metering Infrastructure (AMI). Int. J. Inf. Secur. Priv. 10(2): 1-10 (2016) - [c21]Karthik Navuluri, Ravi Mukkamala, Aftab Ahmad:
Privacy-Aware Big Data Warehouse Architecture. BigData Congress 2016: 341-344 - 2014
- [j12]Aftab Ahmad, Kjell Andersson, Ulf Sellgren, Suleman Khan:
A stiffness modeling methodology for simulation-driven design of haptic devices. Eng. Comput. 30(1): 125-141 (2014) - 2013
- [c20]Aftab Ahmad:
A Scalable Human Body Channel Modeling Technique for Networked Body Implants. BODYNETS 2013: 140-143 - [c19]Aftab Ahmad, Richard Wells:
Putting logic in modeling of biological neuron: a new framework. SpringSim (CNS) 2013: 17 - 2012
- [c18]Curtis Steward, Luay A. Wahsheh, Aftab Ahmad, Jonathan M. Graham, Cheryl V. Hinds, Aurelia T. Williams, Sandra J. DeLoatch:
Software Security: The Dangerous Afterthought. ITNG 2012: 815-818 - 2011
- [c17]Aftab Ahmad, Kjell Andersson, Ulf Sellgren:
An approach to stiffness analysis methodology for haptic devices. ICUMT 2011: 1-8 - [c16]Suleman Khan, Aftab Ahmad, Kjell Andersson:
Design optimization of the Tau haptic device. ICUMT 2011: 1-8 - [c15]Stanley L. Cebula, Aftab Ahmad, Luay A. Wahsheh, Jonathan M. Graham, Sandra J. DeLoatch, Aurelia T. Williams:
How secure is WiFi MAC layer in comparison with IPsec for classified environments? SpringSim (CNS) 2011: 109-116 - 2010
- [j11]Richard O. Afolabi, Aftab Ahmad, Kiseon Kim:
Security assessments of IEEE 802.15.4 standard based on X.805 framework. Int. J. Secur. Networks 5(2/3): 188-197 (2010) - [c14]Aftab Ahmad, Anton Riedl, W. Jason Naramore, Nee-Yin Chou, Matthew Scott Alley:
Comparative Study of Security in IEEE 802.11-2007 and IEEE 802.15.4-2006 for Patient Monitoring Environments. ITNG 2010: 914-918 - [c13]Aftab Ahmad, Anton Riedl, W. Jason Naramore, Nee-Yin Chou, Matthew Alley:
Channel Access Comparison of IEEE 802.11-2007 and IEEE 802.15.4-2006. ITNG 2010: 1324-1325 - [c12]Aftab Ahmad:
A note on modeling, simulation and analysis of wireless LANs in classified environments. SpringSim 2010: 100 - [c11]Aftab Ahmad:
Simulation-based local train mobility model. SpringSim 2010: 113
2000 – 2009
- 2009
- [j10]Shahbaz Khan, Yufeng Luo, Aftab Ahmad:
Analysing complex behaviour of hydrological systems through a system dynamics approach. Environ. Model. Softw. 24(12): 1363-1372 (2009) - [j9]Naveen K. Chilamkurti, Aftab Ahmad, Lambros Lambrinos:
Guest Editors' Introduction. Int. J. Semantic Comput. 3(3): 289-290 (2009) - [c10]Aftab Ahmad, Anton Riedl, W. Jason Naramore, Nee-Yin Chou, Matthew Scott Alley:
Scenario-Based Traffic Modeling for Data Emanating from Medical Instruments in Clinical Environment. CSIE (1) 2009: 529-533 - [c9]Richard O. Afolabi, Kiseon Kim, Aftab Ahmad:
On Secure Spectrum Sensing in Cognitive Radio Networks Using Emitters Electromagnetic Signature. ICCCN 2009: 1-5 - 2006
- [c8]Tahir Nadeem Malik, Abdul Qudus Abbasi, Aftab Ahmad:
Computational framework for power economic dispatch using genetic algorithm. ICINCO-ICSO 2006: 191-194 - 2005
- [c7]Aftab Ahmad, Mona El-Kadi, Stephan Olariu:
Common data security network (CDSN). Q2SWinet 2005: 1-7 - 2004
- [j8]Aftab Ahmad, Giuseppe Bianchi, Larry Bernstein, Gábor Fodor, Guy Pujolle, Bu-Sung Lee, Yu-Dong Yao:
QoS support and service differentiation in wireless networks. Int. J. Commun. Syst. 17(6): 507-512 (2004) - 2003
- [j7]Suwon Lee, Kiseon Kim, Aftab Ahmad:
Delay and data rate decoupled fair queueing for multimedia services in wireless networks. Comput. Commun. 26(17): 1944-1956 (2003) - [j6]Insoo Koo, Jeongrok Yang, Aftab Ahmad, Kiseon Kim:
Improved Erlang capacity of combined carrier channel assignment for hybrid FDMA/CDMA systems supporting voice and data services. IEEE Commun. Lett. 7(2): 61-63 (2003) - [j5]Kanghee Kim, Aftab Ahmad, Kiseon Kim:
A wireless multimedia LAN architecture using DCF with shortened contention window for QoS provisioning. IEEE Commun. Lett. 7(2): 97-99 (2003) - [j4]Insoo Koo, Aftab Ahmad, Kiseon Kim:
Erlang Capacity of CDMA Systems Using Optimized Sectoring. Int. J. Wirel. Inf. Networks 10(2): 105-110 (2003) - [c6]Kanghee Kim, Aftab Ahmad, Kiseon Kim:
A wireless multimedia LAN architecture using DCF with shortened contention window for QoS provisioning. WCNC 2003: 1308-1311 - 2002
- [j3]Suwon Lee, Aftab Ahmad, Kiseon Kim:
QoS maintenance for fair queueing algorithms in wireless mobile networks. Int. J. Commun. Syst. 15(5): 359-374 (2002) - [j2]Insoo Koo, Jeongrok Yang, Aftab Ahmad, Kiseon Kim:
Erlang capacity analysis of hybrid FDMA/CDMA systems supporting multi-class services according to channel assignment methods. Int. J. Commun. Syst. 15(10): 867-880 (2002) - [j1]Aftab Ahmad:
A CDMA network architecture using optimized sectoring. IEEE Trans. Veh. Technol. 51(3): 404-410 (2002) - [c5]Aftab Ahmad, Muhammad Talha:
A Measurement Based Comparative Evaluation of Effectiveness of Object-Oriented Versus Conventional Procedural Programming Techniques and Languages. APSEC 2002: 517-526 - [c4]Suwon Lee, Kiseon Kim, Aftab Ahmad:
Delay and data rate decoupled fair queueing for wireless multimedia networks. GLOBECOM 2002: 946-950 - [c3]Suwon Lee, Kiseon Kim, Aftab Ahmad:
Channel error and handoff compensation scheme for fair queueing algorithms in wireless networks. ICC 2002: 3128-3132 - [c2]Insoo Koo, Kiseon Kim, Aftab Ahmad:
Erlang capacity of a CDMA system using optimized sectoring. MWCN 2002: 66-70 - [c1]Aftab Ahmad, Tobias Ruighaver:
A Top-Down Approach Towards Translating Organizational Security Policy Directives to System Audit Configuration. SEC 2002: 55-66
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint