Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Manzoor Ilahi is active.

Publication


Featured researches published by Manzoor Ilahi.


Computers in Human Behavior | 2015

Modeling mobility and psychological stress based human postural changes in wireless body area networks

Muhammad Moid Sandhu; Nadeem Javaid; Mohsin Jamil; Zahoor Ali Khan; Muhammad Imran; Manzoor Ilahi; Mahmood Ashraf Khan

Proposed model gives mobility behavior of human body in WBAN.5 different postures of human body (i.e. standing, walking, running, sitting and laying).Posture transition according to markov model.Proposed model shows different mobility behavior in each posture.Mobility model is implemented in 2 routing schemes and 9 performance parameters. Mobility models play a vital role on the performance accuracy of simulations in Wireless Body Area Networks (WBANs). In this article, we propose a mobility model for the movement of nodes according to the posture patterns formed either because of psychological stress or any kind of mobility. During routine activities, body exhibits different postures like, standing, sitting, laying, etc. We form a mathematical model for the movement of nodes according to the posture pattern. In walking and running postures, the nodes placed on the limbs move in a defined trajectory repeatedly. In these postures, the nodes placed on trunk of the body are minimally mobile. On the other hand, in sitting and laying positions, the movement of limbs is nondeterministic. However, we can locate an area in which the nodes presence is most probable. Postures change from one state to another depending upon probabilities. During movement, the distance between nodes and sink is changed. As energy consumption, delay, and path loss depend on distance, so they also change due to mobility. We implement the proposed mobility model in multi-hop and forwarder based routing techniques. In multi-hop routing technique, nodes send data to the sink using neighboring nodes. Whereas, in forwarders based scheme, two forwarders are selected in each round to transmit, alongwith their own data, the received data of neighboring nodes. Simulation results show that forwarder based routing schemes has increased stability period, network lifetime and throughput.


Journal of Sensors | 2016

SPARCO: Stochastic Performance Analysis with Reliability and Cooperation for Underwater Wireless Sensor Networks

Sheeraz Ahmed; Nadeem Javaid; Ashfaq Ahmad; Imran Ahmed; Mehr Yahya Durrani; Armughan Ali; Syed Bilal Haider; Manzoor Ilahi

Reliability is a key factor for application-oriented Underwater Sensor Networks (UWSNs) which are utilized for gaining certain objectives and a demand always exists for efficient data routing mechanisms. Cooperative routing is a promising technique which utilizes the broadcast feature of wireless medium and forwards data with cooperation using sensor nodes as relays. Here, we present a cooperation-based routing protocol for underwater networks to enhance their performance called Stochastic Performance Analysis with Reliability and Cooperation (SPARCO). Cooperative communication is explored in order to design an energy-efficient routing scheme for UWSNs. Each node of the network is assumed to be consisting of a single omnidirectional antenna and multiple nodes cooperatively forward their transmissions taking advantage of spatial diversity to reduce energy consumption. Both multihop and single-hop schemes are exploited which contribute to lowering of path-losses present in the channels connecting nodes and forwarding of data. Simulations demonstrate that SPARCO protocol functions better regarding end-to-end delay, network lifetime, and energy consumption comparative to noncooperative routing protocol—improved Adaptive Mobility of Courier nodes in Threshold-optimized Depth-based routing (iAMCTD). The performance is also compared with three cooperation-based routing protocols for UWSN: Cognitive Cooperation (Cog-Coop), Cooperative Depth-Based Routing (CoDBR), and Cooperative Partner Node Selection Criteria for Cooperative Routing (Coop Re and dth).


Journal of Medical Systems | 2015

A Fatigue Measuring Protocol for Wireless Body Area Sensor Networks

Sana Akram; Nadeem Javaid; Ashfaq Ahmad; Zahoor Ali Khan; Muhammad Imran; Mohsen Guizani; Amir Hayat; Manzoor Ilahi

As players and soldiers preform strenuous exercises and do difficult and tiring duties, they are usually the common victims of muscular fatigue. Keeping this in mind, we propose FAtigue MEasurement (FAME) protocol for soccer players and soldiers using in-vivo sensors for Wireless Body Area Sensor Networks (WBASNs). In FAME, we introduce a composite parameter for fatigue measurement by setting a threshold level for each sensor. Whenever, any sensed data exceeds its threshold level, the players or soldiers are declared to be in a state of fatigue. Moreover, we use a vibration pad for the relaxation of fatigued muscles, and then utilize the vibrational energy by means of vibration detection circuit to recharge the in-vivo sensors. The induction circuit achieves about 68 % link efficiency. Simulation results show better performance of the proposed FAME protocol, in the chosen scenarios, as compared to an existing Wireless Soccer Team Monitoring (WSTM) protocol in terms of the selected metrics.


International Journal of Distributed Sensor Networks | 2015

Energy hole minimization with field division for energy efficient routing in WSNs

K. Latif; Nadeem Javaid; Malik Najmus Saqib; Zahoor Ali Khan; Umar Qasim; Basharat Mahmood; Manzoor Ilahi

We analyze performance of famous cluster based routing protocols and identify the factors affecting energy consumption in wireless sensor networks (WSNs). From theoretical and experimental analysis, it is observed that communication distance and cluster node density are the major sources in the formation of energy and coverage holes. To overcome these deficiencies, we propose a new hybrid approach of static clustering and dynamic selection of cluster heads. We also conduct a comprehensive energy consumption analysis of our technique with selected existing ones. Simulation results show that the proposed technique is relatively better in terms of energy holes minimization and network lifetime prolongation.


Mobile Information Systems | 2017

A Localization Based Cooperative Routing Protocol for Underwater Wireless Sensor Networks

Nadeem Javaid; Hammad Maqsood; Abdul Wadood; Iftikhar Azim Niaz; Ahmad Almogren; Atif Alamri; Manzoor Ilahi

Localization is one of the major aspects in underwater wireless sensor networks (UWSNs). Therefore, it is important to know the accurate position of the sensor node in large scale applications like disaster prevention, tactical surveillance, and monitoring. Due to the inefficiency of the global positioning system (GPS) in UWSN, it is very difficult to localize a node in underwater environment compared to terrestrial networks. To minimize the localization error and enhance the localization coverage of the network, two routing protocols are proposed; the first one is mobile autonomous underwater vehicle (MobiL-AUV) and the second one is cooperative MobiL (CO-MobiL). In MobiL-AUV, AUVs are deployed and equipped with GPS and act as reference nodes. These reference nodes are used to localize all the nonlocalized ordinary sensor nodes in order to reduce the localization error and maximize the network coverage. CO-MobiL is presented in order to improve the network throughput by using the maximal ratio combining (MRC) as diversity technique which combines both signals, received from the source and received from the relay at the destination. It uses amplify-and-forward (AF) mechanism to improve the signal between the source and the destination. To support our claims, extensive simulations are performed.


ubiquitous computing | 2015

COME: cost optimisation with multi-chaining for energy efficient communication in wireless sensor networks

Ashfaq Ahmad; Nadeem Javaid; Syed Hassan Ahmed; Safdar Hussain Bouk; Manzoor Ilahi; Dongkyun Kim

In this paper, we present two new chain formation techniques, namely, multi-chain energy efficient routing ME and cost optimisation with multi-chaining for energy efficient communication COME for wireless sensor networks supported by linear programming based mathematical models. ME protocol divides network area into subareas of equal size, which contain equal number of randomly deployed nodes. Furthermore, minimum distance based next hop for data transmission is used and the sojourn locations are adjusted in a way that, at a time when data reaches to the last node of the chain terminator node, BS moves to the possible nearest location of that node sojourn location. ME uses shorter routes for communication. COME protocol closely inspects the energy costs and selects route with minimum energy cost. Simulations show improved results for our proposed protocols as compared to PEGASIS in terms of the stability period, network lifetime, dropped packets and throughput.


PLOS ONE | 2018

A novel association rule mining approach using TID intermediate itemset

Iyad Aqra; Tutut Herawan; Norjihan Abdul Ghani; Adnan Akhunzada; Akhtar Ali; Ramdan Bin Razali; Manzoor Ilahi; Kim-Kwang Raymond Choo

Designing an efficient association rule mining (ARM) algorithm for multilevel knowledge-based transactional databases that is appropriate for real-world deployments is of paramount concern. However, dynamic decision making that needs to modify the threshold either to minimize or maximize the output knowledge certainly necessitates the extant state-of-the-art algorithms to rescan the entire database. Subsequently, the process incurs heavy computation cost and is not feasible for real-time applications. The paper addresses efficiently the problem of threshold dynamic updation for a given purpose. The paper contributes by presenting a novel ARM approach that creates an intermediate itemset and applies a threshold to extract categorical frequent itemsets with diverse threshold values. Thus, improving the overall efficiency as we no longer needs to scan the whole database. After the entire itemset is built, we are able to obtain real support without the need of rebuilding the itemset (e.g. Itemset list is intersected to obtain the actual support). Moreover, the algorithm supports to extract many frequent itemsets according to a pre-determined minimum support with an independent purpose. Additionally, the experimental results of our proposed approach demonstrate the capability to be deployed in any mining system in a fully parallel mode; consequently, increasing the efficiency of the real-time association rules discovery process. The proposed approach outperforms the extant state-of-the-art and shows promising results that reduce computation cost, increase accuracy, and produce all possible itemsets.


Sensors | 2017

Two Hop Adaptive Vector Based Quality Forwarding for Void Hole Avoidance in Underwater WSNs

Nadeem Javaid; Farwa Ahmed; Zahid Wadud; Nabil Ali Alrajeh; Mohamad Souheil Alabed; Manzoor Ilahi

Underwater wireless sensor networks (UWSNs) facilitate a wide range of aquatic applications in various domains. However, the harsh underwater environment poses challenges like low bandwidth, long propagation delay, high bit error rate, high deployment cost, irregular topological structure, etc. Node mobility and the uneven distribution of sensor nodes create void holes in UWSNs. Void hole creation has become a critical issue in UWSNs, as it severely affects the network performance. Avoiding void hole creation benefits better coverage over an area, less energy consumption in the network and high throughput. For this purpose, minimization of void hole probability particularly in local sparse regions is focused on in this paper. The two-hop adaptive hop by hop vector-based forwarding (2hop-AHH-VBF) protocol aims to avoid the void hole with the help of two-hop neighbor node information. The other protocol, quality forwarding adaptive hop by hop vector-based forwarding (QF-AHH-VBF), selects an optimal forwarder based on the composite priority function. QF-AHH-VBF improves network good-put because of optimal forwarder selection. QF-AHH-VBF aims to reduce void hole probability by optimally selecting next hop forwarders. To attain better network performance, mathematical problem formulation based on linear programming is performed. Simulation results show that by opting these mechanisms, significant reduction in end-to-end delay and better throughput are achieved in the network.


PLOS ONE | 2018

Correction: A novel association rule mining approach using TID intermediate itemset

Iyad Aqra; Tutut Herawan; Norjihan Abdul Ghani; Adnan Akhunzada; Akhtar Ali; Ramdan Bin Razali; Manzoor Ilahi; Kim-Kwang Raymond Choo

[This corrects the article DOI: 10.1371/journal.pone.0179703.].


Journal of Sensors | 2017

Balanced Transmissions Based Trajectories of Mobile Sink in Homogeneous Wireless Sensor Networks

M. Akbar; Nadeem Javaid; Wadood Abdul; Sanaa Ghouzali; Abid Khan; Iftikhar Azim Niaz; Manzoor Ilahi

Mobile Sink (MS) based routing strategies have been widely investigated to prolong the lifetime of Wireless Sensor Networks (WSNs). In this paper, we propose two schemes for data gathering in WSNs: (i) MS moves on random paths in the network (RMS) and (ii) the trajectory of MS is defined (DMS). In both the schemes, the network field is logically divided into small squares. The center point of each partitioned area is the sojourn location of the MS. We present three linear programming based models: (i) to maximize network lifetime, (ii) to minimize path loss, and (iii) to minimize end to end delay. Moreover, a geometric model is proposed to avoid redundancy while collecting information from the network nodes. Simulation results show that our proposed schemes perform better than the selected existing schemes in terms of the selected performance metrics.

Collaboration


Dive into the Manzoor Ilahi's collaboration.

Top Co-Authors

Avatar

Nadeem Javaid

COMSATS Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

R. D. Khan

COMSATS Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Zahoor Ali Khan

Higher Colleges of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Adnan Akhunzada

COMSATS Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Ashfaq Ahmad

COMSATS Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

M. Akbar

COMSATS Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge