Husnain Mansoor Ali
Husnain Mansoor Ali
Associate Professor, SZABIST
Verified email at
Cited by
Cited by
UAV communication networks issues: A review
H Nawaz, HM Ali, AA Laghari
Archives of Computational Methods in Engineering 28 (3), 1349-1369, 2021
Applications of unmanned aerial vehicles: a review
H Nawaz, HM Ali, S Massan
Tecnol. Glosas InnovaciÓN Apl. Pyme. Spec 2019, 85-105, 2019
Performance Analysis of DiffServ based Quality of Service in a Multimedia Wired Network and VPN effect using OPNET
M Aamir, M Zaidi, H Mansoor
arXiv preprint arXiv:1206.5469, 2012
An efficient link management algorithm for high mobility mesh networks
HM Ali, AM Naimi, A Busson, V Vèque
Proceedings of the 5th ACM international workshop on Mobility management and …, 2007
Anti-biofilm potential of menthol purified from Mentha piperita L.(Mint)
R Ejaz, S Malik, M Ahmad, H Ali, S Choudhry
Biological and Clinical Sciences Research Journal 2020 (1), 2020
Usefulness of collision warning inter-vehicular system
A Lambert, D Gruyer, A Busson, H Mansoor Ali
International Journal of Vehicle Safety 5 (1), 60-74, 2010
Multiscale principal component analysis-signed directed graph based process monitoring and fault diagnosis
H Ali, AS Maulud, H Zabiri, M Nawaz, H Suleman, SAA Taqvi
ACS omega 7 (11), 9496-9512, 2022
Channel assignment algorithms: a comparison of graph based heuristics
HM Ali, A Busson, V Vèque
Proceedings of the 4th ACM workshop on Performance monitoring and …, 2009
A study of mobility models for UAV communication networks
H Nawaz, HM Ali
3c Tecnología: glosas de innovación aplicadas a la pyme 8 (1), 276-297, 2019
Signal strength based link sensing for mobile ad-hoc networks
HM Ali, AM Naimi, A Busson, V Veque
Telecommunication Systems 42, 201-212, 2009
Implementation of cross layer design for efficient power and routing in UAV communication networks
H Nawaz, HM Ali
Stud. Informat. Control 29 (1), 111-120, 2020
Simulation based analysis of reactive protocols metrics in manet using opnet
H Nawaz, HM Ali, G Nabi
Sindh University Research Journal, 2014
Adversarial Training Against Adversarial Attacks for Machine Learning-Based Intrusion Detection Systems.
MS Haroon, HM Ali
Computers, Materials & Continua 73 (2), 2022
Fault diagnosis by using multi-scale signed directed graph
H Ali, AS Maulud, H Zabiri, M Nawaz, L Ismail
AIP Conference Proceedings 2472 (1), 2022
Network layer link management using signal strength for ad-hoc networks
HM Ali, A Busson, V Veque
2009 IEEE Symposium on Computers and Communications, 141-146, 2009
A semantic sequence similarity based approach for extracting medical entities from clinical conversations
FA Satti, M Hussain, SI Ali, M Saleem, H Ali, TC Chung, S Lee
Information Processing & Management 60 (2), 103213, 2023
Emulsion droplet pair coalescence under a direct current electric field
MS Abbasi, H Ali, AH Kazim, TN Chaudhary, S Afzaal, M Usman, D Abalo
Mathematical Problems in Engineering 2022, 2022
Opinion mining in roman urdu using baseline classifiers
Z Sharf, HA Mansoor
International Journal Of Computer Science And Network Security 18 (9), 156-164, 2018
Analysis of routing protocol metrics in MANET
H Nawaz, HM Ali
Journal of Independent Studies and Research 12 (1), 75, 2014
Multiscale monitoring of industrial chemical process using wavelet-entropy aided machine learning approach
H Ali, Z Zhang, F Gao
Process Safety and Environmental Protection 180, 1053-1075, 2023
The system can't perform the operation now. Try again later.
Articles 1–20