Skip to main content

Showing 1–7 of 7 results for author: Pervaiz, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2301.03018  [pdf, other

    eess.SP cs.AI cs.LG

    Energy Disaggregation & Appliance Identification in a Smart Home: Transfer Learning enables Edge Computing

    Authors: M. Hashim Shahab, Hasan Mujtaba Buttar, Ahsan Mehmood, Waqas Aman, M. Mahboob Ur Rahman, M. Wasim Nawaz, Haris Pervaiz, Qammer H. Abbasi

    Abstract: Non-intrusive load monitoring (NILM) or energy disaggregation aims to extract the load profiles of individual consumer electronic appliances, given an aggregate load profile of the mains of a smart home. This work proposes a novel deep-learning and edge computing approach to solve the NILM problem and a few related problems as follows. 1) We build upon the reputed seq2-point convolutional neural n… ▽ More

    Submitted 14 March, 2024; v1 submitted 8 January, 2023; originally announced January 2023.

    Comments: 10 pages, 4 figures, 3 tables, under review with a journal

  2. arXiv:2107.05460  [pdf, other

    cs.IT eess.SP

    Reconfigurable Intelligent Surfaces: Potentials, Applications, and Challenges for 6G Wireless Networks

    Authors: Sarah Basharat, Syed Ali Hassan, Haris Pervaiz, Aamir Mahmood, Zhiguo Ding, Mikael Gidlund

    Abstract: Reconfigurable intelligent surfaces (RISs), with the potential to realize a smart radio environment, have emerged as an energy-efficient and a cost-effective technology to support the services and demands foreseen for coming decades. By leveraging a large number of low-cost passive reflecting elements, RISs introduce a phase-shift in the im**ing signal to create a favorable propagation channel b… ▽ More

    Submitted 12 July, 2021; originally announced July 2021.

    Comments: 7 pages, 6 figures, to appear in IEEE IEEE Wireless Communications Magazine

  3. Transformative effects of IoT, Blockchain and Artificial Intelligence on cloud computing: Evolution, vision, trends and open challenges

    Authors: Sukhpal Singh Gill, Shreshth Tuli, Minxian Xu, Inderpreet Singh, Karan Vijay Singh, Dominic Lindsay, Shikhar Tuli, Daria Smirnova, Manmeet Singh, Udit Jain, Haris Pervaiz, Bhanu Sehgal, Sukhwinder Singh Kaila, Sanjay Misra, Mohammad Sadegh Aslanpour, Harshit Mehta, Vlado Stankovski, Peter Garraghan

    Abstract: Cloud computing plays a critical role in modern society and enables a range of applications from infrastructure to social media. Such system must cope with varying load and evolving usage reflecting societies interaction and dependency on automated computing systems whilst satisfying Quality of Service (QoS) guarantees. Enabling these systems are a cohort of conceptual technologies, synthesized to… ▽ More

    Submitted 21 October, 2019; originally announced November 2019.

    Comments: 30 Pages, 4 Figures and Preprint version - Published in Elsevier's Internet of Things Journal

  4. arXiv:1903.03725  [pdf, other

    eess.SP cs.NI

    Control over Skies: Survivability, Coverage, and Mobility Laws for Hierarchical Aerial Base Stations

    Authors: Vishal Sharma, Navuday Sharma, Mubashir Husain Rehmani, Haris Pervaiz

    Abstract: Aerial Base Stations (ABSs) have gained significant importance in the next generation of wireless networks for accommodating mobile ground users and flash crowds with high convenience and quality. However, to achieve an efficient ABS network, many factors pertaining to ABS flight, governing laws and information transmissions must be studied. In this article, multi-drone communications are studied… ▽ More

    Submitted 16 April, 2021; v1 submitted 8 March, 2019; originally announced March 2019.

    Comments: 7 pages, 6 figures

  5. arXiv:1902.10998  [pdf, other

    cs.CR

    Shared Secret Key Generation via Carrier Frequency Offsets

    Authors: Waqas Aman, Aneeqa Ijaz, M. Mahboob Ur Rahman, Dushanta Nalin K. Jayakody, Haris Pervaiz

    Abstract: This work presents a novel method to generate secret keys shared between a legitimate node pair (Alice and Bob) to safeguard the communication between them from an unauthorized node (Eve). To this end, we exploit the {\it reciprocal carrier frequency offset} (CFO) between the legitimate node pair to extract common randomness out of it to generate shared secret keys. The proposed key generation alg… ▽ More

    Submitted 28 February, 2019; originally announced February 2019.

    Comments: 5 pages, 6 figures, IEEE VTC-2019 Spring

  6. Impersonation Detection in Line-of-Sight Underwater Acoustic Sensor Networks

    Authors: Waqas Aman, Muhammad Mahboob Ur Rahman, Junaid Qadir, Haris Pervaiz, Qiang Ni

    Abstract: This work considers a line-of-sight underwater acoustic sensor network (UWASN) consisting of $M$ underwater sensor nodes randomly deployed according to uniform distribution within a vertical half-disc (the so-called trusted zone). The sensor nodes report their sensed data to a sink node on water surface on a shared underwater acoustic (UWA) reporting channel in a time-division multiple-access (TDM… ▽ More

    Submitted 7 August, 2018; v1 submitted 31 May, 2018; originally announced May 2018.

    Comments: 13 pages and 13 figures. Accepted in IEEE Access 2018

    Journal ref: IEEE Access 2018

  7. arXiv:1705.04390  [pdf, other

    cs.IT

    Performance Analysis of Decoupled Cell Association in Multi-Tier Hybrid Networks using Real Blockage Environments

    Authors: Osama Waqar Bhatti, Haris Suhail, Uzair Akbar, Syed Ali Hassan, Haris Pervaiz, Leila Musavian, Qiang Ni

    Abstract: Millimeter wave (mmWave) links have the potential to offer high data rates and capacity needed in fifth generation (5G) networks, however they have very high penetration and path loss. A solution to this problem is to bring the base station closer to the end-user through heterogeneous networks (HetNets). HetNets could be designed to allow users to connect to different base stations (BSs) in the up… ▽ More

    Submitted 11 May, 2017; originally announced May 2017.

    Comments: 6 pages, 7 figures. Submitted to International Wireless Communications and Mobile Computing (IWCMC) Conference