no code implementations • 8 Aug 2023 • S. Anas Ali, M. Saqib Niaz, Mubashir Rehman, Ahsan Mehmood, M. Mahboob Ur Rahman, Kashif Riaz, Qammer H. Abbasi
For the binary classification problem that aims to differentiate between a smoker and a non-smoker, XGBoost method stands out with an accuracy of 96. 5%.
no code implementations • 16 Jun 2023 • Hasan Mujtaba Buttar, Kawish Pervez, M. Mahboob Ur Rahman, Kashif Riaz, Qammer H. Abbasi
Compared to prior work where the reported accuracy is 97. 83%, our proposed non-contact method is slightly inferior (as we report a maximum accuracy of 96. 15%); nevertheless, the advantages of our non-contact dehydration method speak for themselves.
no code implementations • 21 May 2023 • Ahsan Mehmood, Asma Sarauji, M. Mahboob Ur Rahman, Tareq Y. Al-Naffouri
The proposed methods include the following core steps: subject records a small video of his/her fingertip by placing his/her finger on the rear camera of the smartphone, and the recorded video is pre-processed to extract the filtered and/or detrended video-photoplethysmography (vPPG) signal, which is then fed to custom-built convolutional neural networks (CNN), which eventually spit-out the vitals (PR, SpO2, and RR) as well as a single-lead ECG of the subject.
no code implementations • 8 Jan 2023 • M. Hashim Shahab, Hasan Mujtaba Buttar, Ahsan Mehmood, Waqas Aman, M. Mahboob Ur Rahman, M. Wasim Nawaz, Haris Pervaiz, Qammer H. Abbasi
Non-intrusive load monitoring (NILM) or energy disaggregation aims to extract the load profiles of individual consumer electronic appliances, given an aggregate load profile of the mains of a smart home.
no code implementations • 12 Dec 2022 • Kawish Pervez, Waqas Aman, M. Mahboob Ur Rahman, M. Wasim Nawaz, Qammer H. Abbasi
In post-covid19 world, radio frequency (RF)-based non-contact methods, e. g., software-defined radios (SDR)-based methods have emerged as promising candidates for intelligent remote sensing of human vitals, and could help in containment of contagious viruses like covid19.
no code implementations • 2 Apr 2022 • Hasan Mujtaba Buttar, Waqas Aman, M. Mahboob Ur Rahman, Qammer H. Abbasi
When the IoT network is under the jamming attack, we utilize the stochastic geometry tool to derive the closed-form expressions for the coverage probabilities for both uplink and downlink IoT transmissions.
no code implementations • 1 Sep 2020 • Ahsan Mehmood, Waqas Aman, M. Mahboob Ur Rahman, M. A. Imran, Qammer H. Abbasi
This work considers identity attack on a radio-frequency identification (RFID)-based backscatter communication system.
no code implementations • 14 Jul 2020 • Waqas Aman, M. Mahboob Ur Rahman, Hassan T. Abbas, Muhammad Arslan Khalid, Muhammad A. Imran, Akram Alomainy, Qammer H. Abbasi
Nanoscale communication systems operating in Ter-ahertz (THz) band are anticipated to revolutionise the healthcaresystems of the future.
no code implementations • 29 Aug 2016 • Sahar Imtiaz, Hadi Ghauch, M. Mahboob Ur Rahman, George Koudouridis, James Gross
Since, the trajectory of movement for high-mobility users is predictable; therefore, fairly accurate position estimates for those users can be obtained, and can be used for resource allocation to serve the considered users.