Follow
Atiq Ur Rahman
Atiq Ur Rahman
University Teknologi PETRONAS, Malaysia
Verified email at nbu.edu.sa
Title
Cited by
Cited by
Year
Routing protocols for underwater wireless sensor networks: Taxonomy, research challenges, routing strategies and future directions
A Khan, I Ali, A Ghani, N Khan, M Alsaqer, AU Rahman, H Mahmood
Sensors 18 (5), 1619, 2018
972018
Co-EEORS: Cooperative energy efficient optimal relay selection protocol for underwater wireless sensor networks
A Khan, I Ali, AU Rahman, M Imran, H Mahmood
IEEE Access 6, 28777-28789, 2018
692018
Smart energy optimization using heuristic algorithm in smart grid with integration of solar energy sources
U Asgher, M Babar Rasheed, AS Al-Sumaiti, A Ur-Rahman, I Ali, A Alzaidi, ...
Energies 11 (12), 3494, 2018
672018
Corona based deployment strategies in wireless sensor network: a survey
AU Rahman, A Alharby, H Hasbullah, K Almuzaini
Journal of Network and Computer applications 64, 176-193, 2016
562016
Movie tags prediction and segmentation using deep learning
UA Khan, MA Martinez-Del-Amor, SM Altowaijri, A Ahmed, AU Rahman, ...
IEEE access 8, 6071-6086, 2020
262020
An energy efficient interference-aware routing protocol for underwater WSNs
A Khan, N Javaid, I Ali, MH Anisi, AU Rahman, N Bhatti, M Zia, ...
KSII transactions on internet and information systems 11 (10), 4844-4864, 2017
252017
Energy-aware scalable reliable and void-hole mitigation routing for sparsely deployed underwater acoustic networks
A Khan, K Aurangzeb, EH Qazi, A Ur Rahman
Applied Sciences 10 (1), 177, 2019
172019
Energy efficient least edge computation LEACH in wireless sensor network
NU Sama, KB Zen, AU Rahman, B BiBi, AU Rahman, IA Chesti
2020 2nd International Conference on Computer and Information Sciences …, 2020
152020
Cooperative and delay minimization routing schemes for dense underwater wireless sensor networks
U Ullah, A Khan, SM Altowaijri, I Ali, AU Rahman, V Kumar V, M Ali, ...
Symmetry 11 (2), 195, 2019
142019
LCSS-based algorithm for computing multivariate data set similarity: A case study of real-time WSN data
R Khan, I Ali, SM Altowaijri, M Zakarya, A Ur Rahman, I Ahmedy, A Khan, ...
Sensors 19 (1), 166, 2019
132019
Impact of Gaussian deployment strategies on the performance of wireless sensor network
Atiq-Ur-Rahman, H Halabi
Computer & Information Science (ICCIS), 2012 International Conference on 2 …, 2012
13*2012
Reliability-aware cooperative routing with adaptive amplification for underwater acoustic wireless sensor networks
A Khan, S M. Altowaijri, I Ali, AU Rahman
Symmetry 11 (3), 421, 2019
112019
Developing and qualifying computing programs for ABET accreditation: a practical approach
AU Rahman, HM Alfawareh, SM Altowaijri
Int J Comput Sci Netw Secur 19, 29-45, 2019
72019
Efficient energy utilization through optimum number of sensor node distribution in engineered corona-based (ONSD-EC) wireless sensor network
AU Rahman, H Hasbullah, NU Sama
Wireless personal communications 73, 1227-1243, 2013
62013
Security in wireless body sensor network: A multivocal literature study
NU Sama, K Zen, M Humayun, NZ Jhanjhi, AU Rahman
Applied System Innovation 5 (4), 79, 2022
52022
QoS enabled layered based clustering for reactive flooding in the Internet of Things
FA Khan, RM Noor, ML Mat Kiah, NM Noor, SM Altowaijri, AU Rahman
Symmetry 11 (5), 634, 2019
52019
Energy-aware routing hole detection algorithm in the hierarchical wireless sensor network
NU Sama, KB Zen, AU Rahman, AU Din
International Journal of Advanced Computer Science and Applications 10 (3), 2019
52019
An extensive survey on performance comparison of routing protocols in wireless sensor network
K Zen, A Ur-Rahman
Journal of Applied Sciences 17 (5), 238-245, 2017
52017
Short-term traffic prediction using deep learning long short-term memory: taxonomy, applications, challenges, and future trends
A Khan, MM Fouda, DT Do, A Almaleh, AU Rahman
IEEE Access, 2023
42023
Routing hole mitigation by edge based multi-hop cluster-based routing protocol in wireless sensor network
NU Sama, K Zen, AU Rahman, B Bibi
International Journal of Computer Science and Network Security 19 (1), 253-260, 2019
42019
The system can't perform the operation now. Try again later.
Articles 1–20