default search action
Muhammad Najam-ul-Islam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j34]Muhammad Hasan Danish Khan, Junaid Imtiaz, Muhammad Najam-ul-Islam:
A Blockchain Based Secure Decentralized Transaction System for Energy Trading in Microgrids. IEEE Access 11: 47236-47257 (2023) - [j33]Abid Ali Minhas, Sohail Jabbar, Muhammad Farhan, Muhammad Najam-ul-Islam:
Smart methodology for safe life on roads with active drivers based on real-time risk and behavioral monitoring. J. Ambient Intell. Humaniz. Comput. 14(11): 15361-15373 (2023) - [c9]Umar Mujahid Khokhar, Madiha Khalid, Muhammad Najam-ul-Islam:
FPGA Based Emulation Of B92 QKD Protocol. CISS 2023: 1-5 - [c8]Muhammad Najam-ul-Islam, Madiha Khalid, Umar Mujahid Khokhar:
Formal Security Analysis of Generalized Ultralightweight Mutual Authentication Protocol. FTC (2) 2023: 566-573 - 2022
- [j32]Muhammad Najam-ul-Islam, Fatima Tu Zahra, Atif Raza Jafri, Roman Shah, Masood ul Hassan, Muhammad Rashid:
Auto implementation of parallel hardware architecture for Aho-Corasick algorithm. Des. Autom. Embed. Syst. 26(1): 29-53 (2022) - [j31]Talha Naqash, Sajjad Hussain Shah, Muhammad Najam-ul-Islam:
Statistical Analysis Based Intrusion Detection System for Ultra-High-Speed Software Defined Network. Int. J. Parallel Program. 50(1): 89-114 (2022) - [j30]Abid Ali Minhas, Sohail Jabbar, Muhammad Farhan, Muhammad Najam-ul-Islam:
A smart analysis of driver fatigue and drowsiness detection using convolutional neural networks. Multim. Tools Appl. 81(19): 26969-26986 (2022) - 2021
- [j29]Ali Mustafa, Muhammad Najam-ul-Islam, Salman Ahmed:
Dynamic Spectrum Sensing Under Crash and Byzantine Failure Environments for Distributed Convergence in Cognitive Radio Networks. IEEE Access 9: 23153-23167 (2021) - [j28]Nadia Sultan, Muhammad Najam-ul-Islam, Asif Mahmood Mughal:
Nonlinear postural control paradigm for larger perturbations in the presence of neural delays. Biol. Cybern. 115(4): 397-414 (2021) - [j27]Junaid Shabbir Abbasi, Faisal Bashir, Kashif Naseer Qureshi, Muhammad Najam-ul-Islam, Gwanggil Jeon:
Deep learning-based feature extraction and optimizing pattern matching for intrusion detection using finite state machine. Comput. Electr. Eng. 92: 107094 (2021) - [j26]Malik Imran, Faisal Bashir, Atif Raza Jafri, Muhammad Rashid, Muhammad Najam-ul-Islam:
A systematic review of scalable hardware architectures for pattern matching in network security. Comput. Electr. Eng. 92: 107169 (2021) - [j25]Ali Mustafa, Muhammad Najam-ul-Islam, Salman Ahmed:
Average Convergence for Directed & Undirected Graphs in Distributed Systems. Comput. Syst. Sci. Eng. 37(3): 399-413 (2021) - [j24]Kashif Naseer Qureshi, Sundus Qayyum, Muhammad Najam-ul-Islam, Gwanggil Jeon:
A secure data parallel processing based embedded system for internet of things computer vision using field programmable gate array devices. Int. J. Circuit Theory Appl. 49(5): 1450-1469 (2021) - [j23]Rosheen Qazi, Kashif Naseer Qureshi, Faisal Bashir, Muhammad Najam-ul-Islam, Saleem Iqbal, Arsalan Arshad:
Security protocol using elliptic curve cryptography algorithm for wireless sensor networks. J. Ambient Intell. Humaniz. Comput. 12(1): 547-566 (2021) - [j22]Kashif Naseer Qureshi, Muhammad Najam-ul-Islam, Gwanggil Jeon:
A trust evaluation model for secure data aggregation in smart grids infrastructures for smart cities. J. Ambient Intell. Smart Environ. 13(3): 235-252 (2021) - [j21]Muhammad Najam-ul-Islam, Muhammad Nauman, Atif Raza Jafri, Jérémy Nadal, Charbel Abdel Nour, Amer Baghdadi:
Hardware Implementation of Overlap-Save-Based Fading Channel Emulator. IEEE Trans. Circuits Syst. II Express Briefs 68(3): 918-922 (2021)
2010 – 2019
- 2019
- [j20]Madiha Khalid, Umar Mujahid Khokhar, Muhammad Najam-ul-Islam:
Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags. Secur. Commun. Networks 2019: 3295616:1-3295616:25 (2019) - 2018
- [j19]Malik Imran, Muhammad Rashid, Atif Raza Jafri, Muhammad Najam-ul-Islam:
ACryp-Proc: Flexible Asymmetric Crypto Processor for Point Multiplication. IEEE Access 6: 22778-22793 (2018) - [j18]Ali Mustafa, Muhammad Najam-ul-Islam, Salman Ahmed, Muhammad Ahsan Tufail:
Unreliable communication in high-performance distributed multi-agent systems: A ingenious scheme in high computing. Int. J. Distributed Sens. Networks 14(2) (2018) - [j17]Madiha Khalid, Umar Mujahid Khokhar, Muhammad Najam-ul-Islam:
Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks. Int. J. Distributed Sens. Networks 14(8) (2018) - [j16]Umar Mujahid Khokhar, Muhammad Najam-ul-Islam, Madiha Khalid:
Efficient Hardware Implementation of KMAP+: An Ultralightweight Mutual Authentication Protocol. J. Circuits Syst. Comput. 27(2): 1850033:1-1850033:16 (2018) - [j15]Moneeb Gohar, Naveed Khan, Awais Ahmad, Muhammad Najam-ul-Islam, Shahzad Sarwar, Seok Joo Koh:
Cluster-Based Device Mobility Management in Named Data Networking for Vehicular Networks. Mob. Inf. Syst. 2018: 1710591:1-1710591:7 (2018) - [j14]Atif Raza Jafri, Javaria Majid, Lei Zhang, Muhammad Ali Imran, Muhammad Najam-ul-Islam:
FPGA Implementation of UFMC Based Baseband Transmitter: Case Study for LTE 10MHz Channelization. Wirel. Commun. Mob. Comput. 2018: 2139794:1-2139794:12 (2018) - [j13]Ali Mustafa, Muhammad Najam-ul-Islam, Salman Ahmed, Muhammad Ahsan Tufail:
A Novel Approach for Fast Average Consensus Under Unreliable Communication in Distributed Multi Agent Networks. Wirel. Pers. Commun. 99(4): 1423-1441 (2018) - [c7]Muhammad Waqas, Atif Raza Jafri, Amer Baghdadi, Muhammad Najam-ul-Islam:
Rapid Prototyping of Parameterized Rotated and Cyclic Q Delayed Constellations Demapper. RSP 2018: 29-35 - 2017
- [j12]Atif Raza Jafri, Amer Baghdadi, Muhammad Waqas, Muhammad Najam-ul-Islam:
High-Throughput and Area-Efficient Rotated and Cyclic Q Delayed Constellations Demapper for Future Wireless Standards. IEEE Access 5: 3077-3084 (2017) - [j11]Atif Raza Jafri, Javaria Majid, Muhammad Ali Shami, Muhammad Ali Imran, Muhammad Najam-ul-Islam:
Hardware Complexity Reduction in Universal Filtered Multicarrier Transmitter Implementation. IEEE Access 5: 13401-13408 (2017) - [j10]Atif Raza Jafri, Muhammad Najam-ul-Islam, Malik Imran, Muhammad Rashid:
Towards an Optimized Architecture for Unified Binary Huff Curves. J. Circuits Syst. Comput. 26(11): 1750178:1-1750178:14 (2017) - [j9]Atif Raza Jafri, Amer Baghdadi, Muhammad Najam-ul-Islam, Michel Jézéquel:
Heterogeneous Multi-ASIP and NoC-Based Architecture for Adaptive Parallel TBICM-ID-SSD. IEEE Trans. Circuits Syst. II Express Briefs 64-II(3): 259-263 (2017) - [j8]Umar Mujahid Khokhar, Muhammad Najam-ul-Islam, Shahzad Sarwar:
A New Ultralightweight RFID Authentication Protocol for Passive Low Cost Tags: KMAP. Wirel. Pers. Commun. 94(3): 725-744 (2017) - [c6]Mushtaq Ahmad, Qingchun Chen, Muhammad Najam-ul-Islam, Muhammad Azhar Iqbal, Sajjad Hussain:
On the secure optimized link state routing (SOLSR) protocol for MANETs. ISKE 2017: 1-8 - 2016
- [j7]Umar Mujahid Khokhar, Muhammad Najam-ul-Islam, Atif Raza Jafri, Qurat Ul Qurat-ul-Ain, Muhammad Ali Shami:
A New Ultralightweight RFID Mutual Authentication Protocol: SASI Using Recursive Hash. Int. J. Distributed Sens. Networks 12(2): 9648971:1-9648971:14 (2016) - [j6]Umar Mujahid Khokhar, Atif Raza Jafri, Muhammad Najam-ul-Islam:
Efficient Hardware Implementation of Ultralightweight RFID Mutual Authentication Protocol. J. Circuits Syst. Comput. 25(7): 1650078:1-1650078:19 (2016) - [c5]Ali Mustafa, Salman Ahmed, Muhammad Najam-ul-Islam, Muhammad Ahsan Tufail:
An Efficient Agent Scheming in Distributed Time Varying Networks. IntelliSys (2) 2016: 308-320 - 2015
- [j5]Umar Mujahid Khokhar, Muhammad Najam-ul-Islam:
Pitfalls in Ultralightweight RFID Authentication Protocol. Int. J. Commun. Networks Inf. Secur. 7(3) (2015) - [j4]Umar Mujahid Khokhar, Muhammad Najam-ul-Islam, Muhammad Ali Shami:
RCIA: A New Ultralightweight RFID Authentication Protocol Using Recursive Hash. Int. J. Distributed Sens. Networks 11: 642180:1-642180:8 (2015) - [j3]Ahsan Saadat, Muhammad Salman, Muhammad Asim Ajaz, Muhammad Najam-ul-Islam:
Matched Filter Based Timing and Frequency Synchronization for Multiple Input Multiple Output Orthogonal Frequency Division Multiplexing Systems. Wirel. Pers. Commun. 82(1): 245-266 (2015) - [c4]Mushtaq Ahmad, Zahid Khan, Qingchun Chen, Muhammad Najam-ul-Islam:
On the Performance Assessment of the OLSR Protocol in Mobile Ad hoc Networks Using TCP and UDP. IOV 2015: 294-306 - 2014
- [j2]Umar Mujahid Khokhar, Muhammad Najam-ul-Islam:
Ultralightweight Cryptography for passive RFID systems. Int. J. Commun. Networks Inf. Secur. 6(3) (2014) - 2013
- [j1]Rizwan Akbar, Emanuel Radoi, Stéphane Azou, Muhammad Najam-ul-Islam:
Low-complexity synchronization algorithms for orthogonally modulated IR-UWB systems. EURASIP J. Wirel. Commun. Netw. 2013: 199 (2013) - 2012
- [c3]Rao Naveed Bin Rais, Muhammad Musaddiq, Mayyda Mukhtar, Anees Shafiq, Hafiz Muhammad Imran, Muhammad Najam-ul-Islam:
Analysis of TCP under Wireless Circumstances: A Performance Evaluation. FIT 2012: 371-376
2000 – 2009
- 2008
- [c2]Muhammad Najam-ul-Islam, Rizwan Rasheed, Renaud Pacalet, Raymond Knopp, Karim Khalfallah:
Flexible Baseband Architectures for Future Wireless Systems. DSD 2008: 39-46 - 2007
- [c1]Muhammad Najam-ul-Islam, Karim Khalfallah, Raymond Knopp, Renaud Pacalet:
Reconfigurable DSP Architectures for SDR Applications. ICECS 2007: 971-974
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint