default search action
Mushtaq Ahmad
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Mushtaq Ahmad, Xiaofei Zhang, Xin Lai, Farman Ali, Xinlei Shi:
Low-Complexity 2D-DOD and 2D-DOA Estimation in Bistatic MIMO Radar Systems: A Reduced-Dimension MUSIC Algorithm Approach. Sensors 24(9): 2801 (2024) - [j20]Xin Lai, Xiaofei Zhang, Shengxinlai Han, Mushtaq Ahmad:
Multi-Layer Filled Coprime Arrays for DOA Estimation With Extended Hole-Free Coarray. IEEE Trans. Veh. Technol. 73(2): 2621-2632 (2024) - 2023
- [j19]Mushtaq Ahmad, Muhammad Awais, Muhammad Naeem, Muhammad Altaf, Muhammad Iqbal, Muhammad Abrar:
Radio resource management for device to device communication using S and V shaped transfer functions. Telecommun. Syst. 82(1): 91-100 (2023) - 2022
- [j18]Faisal Khurshid, Yan Zhu, Jie Hu, Muqeet Ahmad, Mushtaq Ahmad:
Battering Review Spam Through Ensemble Learning in Imbalanced Datasets. Comput. J. 65(7): 1666-1678 (2022) - 2021
- [j17]Rashid Ayub, Shahzad Ahmad, Muhammad Imran Asjad, Mushtaq Ahmad:
Heat Transfer Analysis for Viscous Fluid Flow with the Newtonian Heating and Effect of Magnetic Force in a Rotating Regime. Complex. 2021: 9962732:1-9962732:11 (2021) - 2020
- [j16]Mushtaq Ahmad, Mudassar Ali, Muhammad Naeem, Ashfaq Ahmed, Muhammad Iqbal, Waleed Ejaz, Alagan Anpalagan:
Device-centric communication in IoT: An energy efficiency perspective. Trans. Emerg. Telecommun. Technol. 31(2) (2020)
2010 – 2019
- 2019
- [j15]Faisal Khurshid, Yan Zhu, Xu Zhuang, Mushtaq Ahmad, Muqeet Ahmad:
Enactment of Ensemble Learning for Review Spam Detection on Selected Features. Int. J. Comput. Intell. Syst. 12(1): 387-394 (2019) - [j14]Mushtaq Ahmad, Qingchun Chen, Zahid Khan, Muqeet Ahmad, Faisal Khurshid:
Infrastructure-based vehicular congestion detection scheme for V2I. Int. J. Commun. Syst. 32(3) (2019) - [j13]Mushtaq Ahmad, Farooq Alam Orakzai, Ashfaq Ahmed, Muhammad Naeem, Muhammad Iqbal, Tariq Umer:
Energy efficiency in cognitive radio assisted D2D communication networks. Telecommun. Syst. 71(2): 167-180 (2019) - [j12]Mushtaq Ahmad, Muhammad Naeem, Muhammad Iqbal:
Estimation of Distribution Algorithm for Joint Resource Management in D2D Communication. Wirel. Pers. Commun. 108(2): 1113-1129 (2019) - [c11]Muqeet Ahmad, Jie Hu, Mushtaq Ahmad, Zaid Al-Huda, Faisal Khurshid:
Optimal Cluster Leader Selection Using MCDM Methods in MWSN: A Comparative Study. ISKE 2019: 240-247 - [c10]Mushtaq Ahmad, Fakhar Abbas, Qingchun Chen, Muqeet Ahmad:
A Novel Hybrid Contents Oriented Communication (COC) Technique Based on V2X Networks. VTC Spring 2019: 1-5 - 2018
- [j11]Mushtaq Ahmad, Muhammad Naeem, Muhammad Iqbal, Waleed Ejaz, Alagan Anpalagan:
Joint user selection, mode assignment, and power allocation in cognitive radio-assisted D2D networks. IET Commun. 12(10): 1207-1214 (2018) - [j10]Muqeet Ahmad, Tianrui Li, Zahid Khan, Faisal Khurshid, Mushtaq Ahmad:
A Novel Connectivity-Based LEACH-MEEC Routing Protocol for Mobile Wireless Sensor Network. Sensors 18(12): 4278 (2018) - [c9]Mudassar Ali, Mushtaq Ahmad, Muhammad Naeem, Ashfaq Ahmed, Muhammad Iqbal, Waleed Ejaz, Alagan Anpalagan:
Devices to Devices (Ds2Ds) Communication: Towards Energy Efficient IoT. GLOBECOM 2018: 1-6 - 2017
- [j9]Mushtaq Ahmad, Muhammad Rizwan Azam, Muhammad Naeem, Muhammad Iqbal, Alagan Anpalagan, Muhammad Haneef:
Resource management in D2D communication: An optimization perspective. J. Netw. Comput. Appl. 93: 51-75 (2017) - [c8]Mushtaq Ahmad, Qingchun Chen, Muhammad Najam-ul-Islam, Muhammad Azhar Iqbal, Sajjad Hussain:
On the secure optimized link state routing (SOLSR) protocol for MANETs. ISKE 2017: 1-8 - 2016
- [j8]Muhammad Rizwan Azam, Mushtaq Ahmad, Muhammad Naeem, Muhammad Iqbal, Ahmed Shaharyar Khwaja, Alagan Anpalagan, Saad Bin Qaisar:
Joint Admission Control, Mode Selection, and Power Allocation in D2D Communication Systems. IEEE Trans. Veh. Technol. 65(9): 7322-7333 (2016) - [j7]Mushtaq Ahmad, Muhammad Naeem, Ashfaq Ahmed, Muhammad Iqbal, Alagan Anpalagan:
Mesh adaptive direct search approach for D2D resource management. Wirel. Commun. Mob. Comput. 16(15): 2329-2339 (2016) - [c7]Mushtaq Ahmad, Muhammad Naeem, Ashfaq Ahmed, Muhammad Iqbal, Alagan Anpalagan, Waleed Ejaz:
Utility Based Resource Management in D2D Networks Using Mesh Adaptive Direct Search Method. VTC Fall 2016: 1-5 - 2015
- [c6]Mushtaq Ahmad, Zahid Khan, Qingchun Chen, Muhammad Najam-ul-Islam:
On the Performance Assessment of the OLSR Protocol in Mobile Ad hoc Networks Using TCP and UDP. IOV 2015: 294-306 - 2014
- [j6]Bacha Rehman, Zahid Halim, Mushtaq Ahmad:
ASCII based GUI system for arabic scripted languages: a case of urdu. Int. Arab J. Inf. Technol. 11(4): 329-337 (2014) - 2012
- [j5]Shah Nawaz Khan, Ali Diab, Christian Brosch, Mushtaq Ahmad:
Self-Organized Disjoint Service Placement in Future Mobile Communication Networks. Int. J. Commun. Networks Inf. Secur. 4(2) (2012) - [j4]Mushtaq Ahmad, Stefan Gruner, Muhammad Tanvir Afzal:
Computational Analysis of Medieval Manuscripts: A New Tool for Analysis and Mapping of Medieval Documents to Modern Orthography. J. Univers. Comput. Sci. 18(20): 2750-2770 (2012) - 2011
- [j3]Nisar Ahmed Memon, Asifullah Khan, S. A. M. Gilani, Mushtaq Ahmad:
Reversible watermarking method based on adaptive thresholding and companding technique. Int. J. Comput. Math. 88(8): 1573-1594 (2011) - [j2]Nisar Ahmed Memon, Asmatullah Chaudhry, Mushtaq Ahmad, Zulfiqar Ali Keerio:
Hybrid watermarking of medical images for ROI authentication and recovery. Int. J. Comput. Math. 88(10): 2057-2071 (2011) - [j1]Masroor Hussain, Muhammad Abid, Mushtaq Ahmad, Ashfaq A. Khokhar, Arif Masud:
A Parallel Implementation of ALE Moving Mesh Technique for FSI Problems using OpenMP. Int. J. Parallel Program. 39(6): 717-745 (2011) - [c5]Mushtaq Ahmad, Nazim Rahman, Stefan Gruner:
A phonetic approach to handling spelling variations in medieval documents. SAICSIT 2011: 263-266 - 2010
- [c4]Mushtaq Ahmad:
Wireless Network Security Vulnerabilities and Concerns. FGIT-SecTech/DRBC 2010: 207-219 - [c3]Mushtaq Ahmad:
Security Risks of Cloud Computing and Its Emergence as 5th Utility Service. ISA 2010: 209-219
2000 – 2009
- 2009
- [c2]Mushtaq Ahmad:
The Computing Technology And John Von Neumann's Computer Architecture Giving Way To Optical Computing. CDES 2009: 200-206 - [c1]Masroor Hussain, Mushtaq Ahmad, Muhammad Abid, Ashfaq A. Khokhar:
Implementation of 2D parallel ALE mesh generation technique in FSI problems using OpenMP. FIT 2009: 18:1-18:6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 21:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint