scispace - formally typeset
N

Nadeem Javaid

Researcher at COMSATS Institute of Information Technology

Publications -  978
Citations -  18955

Nadeem Javaid is an academic researcher from COMSATS Institute of Information Technology. The author has contributed to research in topics: Smart grid & Routing protocol. The author has an hindex of 53, co-authored 940 publications receiving 13697 citations. Previous affiliations of Nadeem Javaid include Dalhousie University & University of Paris-Est.

Papers
More filters
Proceedings ArticleDOI

Bio-inspired Routing in Wireless Sensor Networks

TL;DR: The presented protocol efficiently utilized characteristics of ABC algorithm such as foraging principle and waggle dance of honey bees to find Routing Node (RN) that has maximum energy.
Book ChapterDOI

Leveraging Fine-Grained Access Control in Blockchain-Based Healthcare System

TL;DR: This paper designs a fine-grained access control mechanism using smart contract which provide a different level of access rights to the users in the network and implements it on Ethereum private blockchain and uses proof of authority for consensus mechanism.
Journal ArticleDOI

RFE Based Feature Selection and KNNOR Based Data Balancing for Electricity Theft Detection Using BiLSTM-LogitBoost Stacking Ensemble Model

TL;DR: In this article , the authors proposed a novel electricity theft detection (ETD) approach which comprises recursive feature elimination (RFE), k nearest neighbor oversampling (KNNOR), bidirectional long short term memory (BiLSTM), and logit boosting (LogitBoost) techniques.
Proceedings ArticleDOI

An Approach Towards Efficient Scheduling of Home Energy Management System Using Backtracking Search Optimization and Tabu Search

TL;DR: Results proved that the proposed hybrid technique outperforms the remaining two in terms of cost minimization.
Proceedings ArticleDOI

Performance Evaluation of Widely Used Portknoking Algorithms

TL;DR: In this paper, performance evaluation and analytical comparison of three widely used port-knocking algorithms, Aldaba, FWKNOP and SIG-2, are presented, based upon ten selected parameters; Platforms (Supported OS), Implementation (PK, SPA or both), Protocols (UDP, TCP, ICMP), Out of Order packet delivery, NAT (Network Address Translation), Encryption Algorithms, Root privileges (For installation and operation), Weak Passwords, Replay Attacks and IPv6 compatibility.