Login / Signup
Zaheer Ahmad
Publication Activity (10 Years)
Years Active: 2008-2023
Publications (10 Years): 5
Top Topics
Energy Efficiency
Node Selection
Wireless Sensor Networks
Theoretical Underpinnings
Top Venues
UIC/ATC
CoRR
BWCCA
AINA
</>
Publications
</>
Muhammad Shazib Hameed
,
Esmail Hassan Abdullatif Al-Sabri
,
Zaheer Ahmad
,
Shahbaz Ali
,
Muhammad Usman Ghani
Some Results on Submodules Using (μ, ν, ω)-Single-Valued Neutrosophic Environment.
Symmetry
15 (1) (2023)
Zaheer Ahmad
,
Jawad Mirza
,
Abdulah Jeza Aljohani
,
Ahmad Salman
,
Salman Ghafoor
A Mach-Zehnder modulator based novel regenerator for employment in relays used in free space optical communication.
Trans. Emerg. Telecommun. Technol.
33 (4) (2022)
Nadeem Javaid
,
Zaheer Ahmad
,
Arshad Sher
,
Zahid Wadud
,
Zahoor Ali Khan
,
Syed Hassan Ahmed
Fair energy management with void hole avoidance in intelligent heterogeneous underwater WSNs.
J. Ambient Intell. Humaniz. Comput.
10 (11) (2019)
Zaheer Ahmad
,
Arshad Sher
,
Saba Gull
,
Farwa Ahmed
,
Umar Qasim
,
Zahoor Ali Khan
,
Nadeem Javaid
Single Hop Selection Based Forwarding in WDFAD-DBR for Under Water Wireless Sensor Networks.
CISIS
(2017)
Zia ur Rahman
,
Zaheer Ahmad
,
Amir Murad
,
Tanveer Khan
,
Zahoor Ali Khan
,
Umar Qasim
,
Nadeem Javaid
On Utilizing Static Courier Nodes to Achieve Energy Efficiency with Depth Based Routing for Underwater Wireless Sensor Networks.
AINA
(2016)
Mohsin Raza Jafri
,
S. Ahmed
,
Nadeem Javaid
,
Zaheer Ahmad
,
R. J. Qureshi
AMCTD: Adaptive Mobility of Courier Nodes in Threshold-Optimized DBR Protocol for Underwater Wireless Sensor Networks.
BWCCA
(2013)
Zaheer Ahmad
,
Lishoy Francis
,
Tansir Ahmed
,
Christopher Lobodzinski
,
Dev Audsin
,
Peng Jiang
Enhancing the Security of Mobile Applications by Using TEE and (U)SIM.
UIC/ATC
(2013)
Mohsin Raza Jafri
,
S. Ahmed
,
Nadeem Javaid
,
Zaheer Ahmad
,
R. J. Qureshi
AMCTD: Adaptive Mobility of Courier nodes in Threshold-optimized DBR Protocol for Underwater Wireless Sensor Networks.
CoRR
(2013)
Zaheer Ahmad
,
Keith Mayes
,
Song Dong
,
Konstantinos Markantonakis
Considerations for mobile authentication in the Cloud.
Inf. Secur. Tech. Rep.
16 (3-4) (2011)
Chaminda T. E. R. Hewage
,
Zaheer Ahmad
,
Stewart Worrall
,
Safak Dogan
,
Warnakulasuriya Anil Chandana Fernando
,
Ahmet M. Kondoz
Unequal Error Protection for Backward Compatible 3-D Video Transmission over WiMAX.
ISCAS
(2009)
Zaheer Ahmad
,
Stewart Worrall
,
Ahmet M. Kondoz
Unequal power allocation for scalable video transmission over WiMAX.
ICME
(2008)