Dil Muhammad Akbar Hussain
Aalborg University – Esbjerg
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Dil Muhammad Akbar Hussain.
availability, reliability and security | 2007
Dil Muhammad Akbar Hussain
Social network analysis has been used for quite some time to analyze and understand the behavior of nodes in the network. Theses nodes could be individuals or group of persons, events or organizations, etc. In fact these nodes could be any thing, importantly, these nodes propagate or do some thing and obviously these nodes have attributes. Social network analysis (SNA) is a multi-model multi-link problem and one can imagine the challenge posed by such multidimensional task. Typically, models represent various processes and their organization including the interaction between processes. Such types of models are intellective simulation models, explaining one particular aspect of the model abstracting other factors present in the model. The standard or normal representation of a typical social network model is through a graph data structure. The dynamics of larger social networks is so complex some time it becomes difficult to understand the various levels of interactions and dependencies just by mere representation through a graph. However, to overcome this limitation many analytical methods provide relationship dependencies, role of different nodes and their importance in the social networks. Since the start of the new century many terrorism events have occurred around the globe. These events have provided a new impetus for the analysis, investigation, studying the behavior and tracking terrorist networks (individuals). In this paper we are presenting a very novel and absolutely new approach to SNA for locating important key players in the network. The system also predicts a path through these nodes which shows the vulnerability of the network and if the path along with these nodes is removed it can reduce/destabilize or even destroy the structure of the network
computer, information, and systems sciences, and engineering | 2010
Dil Muhammad Akbar Hussain; Zaki Ahmed
Typical terrorist cells/networks have dynamical structure as they evolve or adapt to changes which may occur due to capturing or killing of a member of the cell/network. Analytical measures in graph theory like degree centrality, betweenness and closeness centralities are very common and have long history of their successful use in revealing the importance of various members of the network. However, modeling of covert, terrorist or criminal networks through social graph dose not really provide the hierarchical structure which exist in these networks as these networks are composed of leaders and followers etc. In this research we analyze and predict the most likely role a particular node can adapt once a member of the network is either killed or caught. The adaptation is based on computing Bayes posteriori probability of each node and the level of the said node in the network structure.
2016 SICE International Symposium on Control Systems (ISCS) | 2016
Yunlong Wang; Mohsen Soltani; Dil Muhammad Akbar Hussain
In this paper, a nonlinear attitude estimator is designed for an Attitude Heading and Reference System (AHRS) based on Micro Electro-Mechanical Systems (MEMS) sensors. The design process of the attitude estimator is stated with detail, and the equilibrium point of the estimator error model is proved to be asymptotically stable using LaSalles invariance set theorem through limitation of the range of scalar element of quaternion without affecting practical use. Also, a new Lyapunov candidate function, satisfying continuously differentiable positive definite requirement, is presented to avoid the problems in previous research works. Moreover, the estimation of MEMS gyroscope bias is also inclueded in this estimator. The designed nonlinear attitude estimator is firstly tested in simulation environment and then implemented in an AHRS hardware for further experiments. Finally, the attitude estimation results from the designed AHRS are compared with a high-precision commercial AHRS to validate its estimation performance.
international conference on ultra modern telecommunications | 2014
Sheeraz Niaz Lighari; Birgitte Bak Jensen; Dil Muhammad Akbar Hussain; Asad Shaikh
The smart grid is the digitized, modernized, updated version of archaic traditional electric grid. Advanced Metering Infrastructure (AMI) is an imperative part of the smart grid. It has replaced legacy metering, as it reports the energy consumption to the utility automatically through communication channels. AMI is also featuring to communicate control functions from utility to the smart meters. So, both the consumption data and control data needs to be securely transmitted to their ends. Any leak and tempering may produce the dire effects to both utility and consumers. Hence security of AMI is a very important concern to take real advantage of this technology. In this paper, first we analyze the security threats faced by AMI components and then propose the countermeasures to tackle them. The aim is to visualize the possible threats in the context of confidentiality, integrity and availability (CIA Triad) context and propose countermeasure.
international multiconference of engineers and computer scientists | 2011
Daniele Anzelmi; Domenico Carlone; Fabio Rizzello; Robert Thomsen; Dil Muhammad Akbar Hussain
Archive | 2010
Dil Muhammad Akbar Hussain
international conference on computational intelligence and communication networks | 2017
Sheeraz Niaz Lighari; Dil Muhammad Akbar Hussain
international conference on communication systems and network technologies | 2017
Sheeraz Niaz Lighari; Dil Muhammad Akbar Hussain
international multiconference of engineers and computer scientists | 2012
M. Z. Khan; M. M. Hussain; M Mohsin Naveed; Dil Muhammad Akbar Hussain
international multiconference of engineers and computer scientists | 2011
Dil Muhammad Akbar Hussain; Zaki Ahmed; M. Z. Khan; Andrea Valente