Ayaz Hussain, S.H. Kim and S.H. Chang, “On the Performance of Dual-hop Variable-Gain AF Relaying with Beamforming over Fading Channels”, IEICE Transaction on Communication, vol. E100-B, no. 4, pp. 619-626, 2016.
Ayaz Hussain, S.H. Kim and S.H. Chang, “Nonlinear Energy-Harvesting Relaying with Beamforming and Hardware Impairments in Shadowed Fading Environment”, Transactions on Emerging Telecommunications Technologies, vol. 29, no. 6, pp. 1-13, 2018.
Ali, H. Lee, Ayaz Hussain and S.H. Kim, “Protograph-Based Folded Spatially Coupled LDPC Codes for Burst Erasure Channels”, IEEE Wireless Communications Letters, DOI: 10.1109/LWC.2018.2878562, 2018.
Ayaz Hussain, I. Ali, Z.A. Baloch and S.-H. Kim, “Energy Harvesting Relaying Network in a Delay-Tolerant Transmission Mode over Shadowed Fading Channels”, International Journal of Computer Science and Network Security, vol. 18, no. 3, pp. 119-125, 2018.
Ayaz Hussain, Z.A. Baloch, U. Rajput, F. Abbas and I. Ali, “Energy Harvesting Relaying Network with Hardware Impairments in Fading Environment”, International Journal of Computer Science and Network Security, vol. 18, no. 4, pp. 63-68, 2018.
Ayaz Hussain, Z.A. Baloch, N.H. Phulpoto, S. Soomro and I. Ali, “Energy Harvesting in Opportunistic Relaying Network with Multiple Antennas”, International Journal of Computer Science and Network Security, vol. 18, no. 5, pp. 125-129, 2018.
Ayaz Hussain, N.H. Phulpoto, U. Rajput, F. Abbas and Z. A. Baloch, “Non-linear Energy Harvesting Dual-hop DF Relaying System over Fading Channels”, International Journal of Advanced Computer Science and Applications (IJACSA), vol. 9, no. 6, pp. 423-426, 2018.
Kumar, Ayaz Hussain, A. Aziz and I. Joe, “Wireless DF Relaying with Beamforming for an Unmanned Aircraft System over Fading Channels”, International Journal of Communication Networks and Information Security, vol. 9, no. 1, pp. 105-110, 2017.
Rajput, F. Abbas, Ayaz Hussain, D.M.S. Bhatti and M.S. Memon, “Privacy Preserving Authentication Approaches in VANET: Existing Challenges and Future Directions”, International Journal of Computer Science and Network Security, vol. 18, no. 4, pp. 47-53, 2018.
A. Dahar, F. Abbas, U. Rajput, Ayaz Hussain and F. Azhar, “An Efficient Sindhi Spelling Checker for Microsoft Word”, International Journal of Computer Science and Network Security (IJCSNS), vol. 18, no. 4, pp. 47-53, 2018.
A. Memon, I.A. Halepoto, N.H. Phulpoto, Ayaz Hussain, and M.S. Memon, “Investigation of Isotropic Laplacian Operators by Computer Simulation for A-B Diblock Copolymers”, International Journal of Computer Science and Network Security, vol. 18, no. 5, pp. 100-108, 2018.
Ali, H. Lee, Y.S. Kil, Ayaz Hussain, and S.H. Kim, “Spatially Coupled LDPC Codes for Power Line Communications with Impulsive Noise”, IEICE Electronics Express, vol. 15, no. 15, pp. 1-6, 2018.
H. Phulpoto, S.A. Memon, A. Manzoor, Ayaz Hussain and I. Halepoto, “Customer Behavior over Choice of Smartphones in Social Networks”, International Journal of Computer Science and Network Security, vol. 18, no. 5, pp. 139-143, 2018.
Abbas, U. Rajput, A. Manzoor, I.A. Halepoto and Ayaz Hussain, “Towards Privacy Preserving Commutative Encryption-Based Matchmaking in Mobile Social Network”, International Journal of Advanced Computer Science and Applications (IJACSA), vol. 9, no. 5, pp. 372-375, 2018.
M. Shaikh, I.A. Halepoto, N.H. Phulpoto, M.S. Memon, Ayaz Hussain and A.A. Laghari, “Data-driven Based Fault Diagnosis Using Principal Component Analysis”, International Journal of Advanced Computer Science and Applications (IJACSA), vol. 9, no. 7, pp. 175-180, 2018.
H. Phulpoto, I.A. Halepoto, Ayaz Hussain and S. Ahmed, “Analyzing the Mediating Role of Brand Association for Brand Awareness and Loyalty”, European Journal of Business Management, vol. 10, no. 21, 2018.
H. Phulpoto, Ayaz Hussain, Z. Anjum, S. A. Memon and M. Rehman, “Locus of Control and its Impact on Self-Efficacy of University Graduates”, International Journal of Computer Science and Network Security, vol. 18, no. 7, 2018.
W. Kang, Ayaz Hussain and S.H. Kim, “Link Scheduling Schemes with On-Off Interference Map for Device-to-Device Communications”, IET Communications, vol. 9, no. 3, pp. 359-366, 2015.
Ayaz Hussain, Inayat Ali, Ramesh Kumar, Zahoor Ahmed, “Non-Linear EH Relaying in Delay-Transmission Mode over η−µ Fading Channels”, International Journal of Advanced Computer Science and Applications (IJACSA), vol. 10, no. 3, pp. 551-555, 2019.
Bhutto, Ayaz Hussain, M.Z. Tunio, Jalal Shah, Inayat Ali, “Scaling of Color Fusion in Stitching Images”, International Journal of Computer Science and Network Security, vol. 19, no. 4, pp. 61-64, 2019.
Ayaz Hussain, Z. Bhutto and R. Haider, “BER Performance of Opportunistic Relaying with Direct Link Using Antenna Selection”, UACEE International Journal of Computer Science and its Applications, vol. 2, no. 3, pp. 197-200, 2012.
Mahar, S.S. Azhar and Ayaz Hussain, “Design of Fixed Order Controller by Using Particle Swarm Optimization and System Simulation”, International Journal of Computer Information Systems and Industrial Management Applications, vol. 4, pp. 459-466, 2012.
Mahar and Ayaz Hussain, “A Robust Hash Scheme for Image Authentication System via Singular Value Decomposition”, Mathematics and Computers in Science and Industry, ISBN: 978-1-61804-247-7, pp. 348~354, 2013.
Mahar, Ayaz Hussain and Z. Bhutto, “EOTs Based Fixed Order Robust Controller Design and Performance Analysis”, International Journal of Machine Learning and Computing, vol. 2, no. 3, pp. 345-350, 2012.
Ayaz Hussain, S.H. Kim and S.H. Chang, “Dual-hop Variable-Gain AF Relaying with Beamforming over κ − μ Shadowed Fading Channels”, GLOBECOM Conference 2016, Washington DC, USA, December 04~08, 2016.
Ayaz Hussain, Z. Ahmed and Z. Bhutto, “BER Performance of Opportunistic Relaying Scheme Using Antenna Selection”, IEEE 6th joint IFIP Mobile Wireless and Networking Conference (WMNC 2013), Dubai, UAE, April 23~25, 2013.
Ayaz Hussain, Z. Bhutto and Z. Ahmed, “SER Performance of Opportunistic Relaying with Direct Link Using Antenna Selection”, Third IEEE International Conference on Information Science and Technology (ICIST 2013), Yangzhou, Jiangsu, China, March 23~25, 2013.
Ayaz Hussain, Z. Bhutto and R. Haider, “BER Performance of Opportunistic Relaying with Direct Link Using Antenna Selection”, International Conference on Information Technology (AIT-2012), Bangkok, Thailand, June 23~24, 2012.
Ayaz Hussain, M. Mushtaque and Z. Bhutto, “Outage Performance of Opportunistic Relaying Without Direct Link Using Antenna Selection”, IEEE International Conference on Communication Technology; Chengdu, China, November, 09~11, 2012.
Ayaz Hussain, R. Kumar and Z. Bhutto, “Proportional QoS Adjustment in the Network in Case of Overload”, IEEE SCONEST Conference, Jamshoro, Pakistan, July 27~28, 2011.
Mahar, S. S. Azhar, Ayaz Hussain and Z. Bhutto, “Ant Colony Optimization Based Fixed Order Controller Design and System Simulation”, International Conference on Control Automation and System (ICCAS), Seoul, South Korea, October 26~29, 2011.
Leghari, A. Mengal and Ayaz Hussain, “Optimization and Analysis of Heat Recovery from Domestic Cooking System”, International Conference on Automotive, Mechanical and Materials Engineering (ICAMME’2012), Penang, Malaysia, May 19~20, 2012.
Ashraf, Ayaz Hussain and Z. Bhutto,” Proportional Degradation of QoS in the Network”, International Conference on Artificial Intelligence and Image Processing (ICAIIP 2012), Dubai, UAE, October 6~7, 2012.
A. Baloch, Ayaz Hussain and N. Hussain, “Performance Analysis of LDPC Convolutional Codes”, International Conference on ICT Convergence (ICTC), Jeju, South Korea, October 14~16, 2013.
Mahar, Z. Bhutto and Ayaz Hussain, “Design of Robust Controller Design Using h∞ Loop Shaping and Immune Algorithm for Pneumatic System”, International Conference on Advance in Information Technology 2013 (ICAIT 2013), Jeju, South Korea, December 27~28, 2013.
PhD-Thesis: Performance Analysis of Dual-hop Relaying Systems with Beamforming over Generalized Fading Channels.
M.E-Thesis: Performance Analysis of Opportunistic Relaying with Antenna Selection.
B.E-Thesis: Multi-user Detection in Cellular Networks.