- Indoor and Outdoor Localization Technologies
- Galaxies: Formation, Evolution, Phenomena
- Video Analysis and Summarization
- Energy Efficient Wireless Sensor Networks
- Power Line Communications and Noise
- Data Visualization and Analytics
- Interactive and Immersive Displays
- Cosmology and Gravitation Theories
- Network Time Synchronization Technologies
- Computer Graphics and Visualization Techniques
- IoT-based Smart Home Systems
- Face recognition and analysis
- Network Security and Intrusion Detection
- Software System Performance and Reliability
- Non-Invasive Vital Sign Monitoring
- Advanced MIMO Systems Optimization
- Software Testing and Debugging Techniques
- Wireless Networks and Protocols
- Electromagnetic Compatibility and Noise Suppression
- Tactile and Sensory Interactions
- Stellar, planetary, and galactic studies
- Radio Astronomy Observations and Technology
- Video Surveillance and Tracking Methods
- Multimedia Communication and Technology
- Anomaly Detection Techniques and Applications
Sir Syed University of Engineering and Technology
2025
University of Wah
2024
Université des Sciences et de la Technologie d'Oran Mohamed Boudiaf
2024
General Motors (United States)
2020-2024
Smt. N.H.L. Municipal Medical College
2024
University College Dublin
2024
Karachi Medical and Dental College
2024
Dr. D. Y. Patil Medical College, Hospital and Research Centre
2024
People’s University
2024
Guthrie Robert Packer Hospital
2024
Background: The inability to test at scale has become humanity's Achille's heel in the ongoing war against COVID-19 pandemic. A scalable screening tool would be a game changer. Building on prior work cough-based diagnosis of respiratory diseases, we propose, develop and an Artificial Intelligence (AI)-powered solution for infection that is deployable via smartphone app. app, named AI4COVID-19 records sends three 3-second cough sounds AI engine running cloud, returns result within two...
Keystroke privacy is critical for ensuring the security of computer systems and human users as what being typed could be passwords or sensitive information. In this paper, we show first time that WiFi signals can also exploited to recognize keystrokes. The intuition while typing a certain key, hands fingers user move in unique formation direction thus generate pattern time-series Channel State Information (CSI) values, which call CSI-waveform key. propose signal based keystroke recognition...
Keystroke privacy is critical for ensuring the security of computer systems and human users as what being typed could be passwords or sensitive information. In this paper, we show first time that WiFi signals can also exploited to recognize keystrokes. The intuition while typing a certain key, hands fingers user move in unique formation direction thus generate pattern time-series channel state information (CSI) values, which call CSI-waveform key. propose signal-based keystroke recognition...
Every year, mining industry sees huge losses in terms of human lives and valuable infrastructure due to accidents disasters. Besides other measures, effective monitoring control can greatly reduce the risks such incidents. Wireless sensor networks (WSNs) are increasingly being used for applications. This paper proposes a WSN-based system, which is capable detecting identifying events interest (with 90% success rate) localization miners (2–4 m) roof falls (10–12 m). A comprehensive integrated...
The primordial deuterium abundance is an important tracer of the fundamental physics taking place during big bang nucleosynthesis. It can be determined from absorption features along line sight to distant quasars. quasar PKS 1937−1009 contains two absorptions systems that have been used measure abundance, lower redshift one being at zabs = 3.256. New observations this absorber are a substantially higher signal-to-noise ratio and thus permit significantly more robust estimate leading D i/H i...
The primordial deuterium abundance probes fundamental physics during the Big Bang Nucleosynthesis and can be used to infer cosmological parameters. Observationally, measured using absorbing clouds along lines of sight distant quasars. Observations quasar PKS1937--101 contain two absorbers for which has previously been determined. Here we focus on higher redshift one at $z_{abs} = 3.572$. We present new observations with significantly increased signal-to-noise ratio enable a far more precise...
WiFi channel state information (CSI) has emerged as a plausible modality for sensing different human vital signs, i.e., respiration and body motion, function of modulated wireless signals that travel between devices. Although remarkable proposition, most the existing research in this space struggles to withstand robust performance beyond experimental conditions. To end, we take careful look at dynamics under motions wild. We first characterize signal components—multipath subspace—that are by...
Labels effectively convey co-referential relations between textual and visual elements are a powerful tool to support learning tasks. Therefore, almost all illustrations in scientific or technical documents employ large number of labels. This paper introduces novel approach integrate internal external labels into projections complex 3D models the fashion hand-made illustrations. The real-time label layout algorithms proposed balance conflicting requirements such as unambiguity, readability,...
every day, hour, minute, second trillion of bytes data is being generated by enterprises especially in telecom sector. To achieve level best decisions for business profits, access to that a well-situated and interactive way always dream executives managers. Data warehouse the only viable solution can bring into reality. The enhancement future endeavors make depends on availability correct information based quality underlying. be produced cleaning prior loading warehouse. So correctness...
In this paper, we propose to use commercial off-the-shelf (COTS) <i>monostatic</i> RFID devices (i.e. which a single antenna at time for both transmitting and receiving signals from the tags) monitor browsing activity of customers in front display items places such as retail stores. To end, <i>TagSee</i> , multi-person imaging system based on monostatic imaging. TagSee is insight that when are shelf, they stand between tags deployed along boundaries shelf reader, changes multi-paths travel...
Distributed clustering based techniques have been increasingly employed for outlier detection in Wireless Sensor Networks (WSNs). But despite its numerous advantages such as online and efficient computations incorporation of spatiotemporal & attribute correlations, has not studied event identification, which is essential smooth reliable operations large scale WSNs. This paper introduces the significance identification to research community. Further, it presents an technique joint that...
Most statistical inference from cosmic large-scale structure relies on two-point statistics, i.e. the galaxy–galaxy correlation function (2PCF) or power spectrum. These statistics capture full information encoded in Fourier amplitudes of galaxy density field but do not describe phases field. Here, we quantify contained line (LCF), a three-point phase function. Using cosmological simulations, estimate Fisher (at redshift |$z$| = 0) 2PCF, LCF, and their combination, regarding parameters...
Redshift-space distortions are a sensitive probe of the growth large-scale structure. In linear regime, redshift-space fully described by multipoles two-point correlation function. nonlinear however, higher-order statistics needed to capture full information galaxy density field. this paper, we show that line function--which is measure Fourier phase correlations--is and velocity fields mapping between real redshift space. We expand function in multipoles, almost all encoded monopole,...
In this paper, we propose an on-line technique for in-network, distributed and composite event detection identification streaming sensor data in resource constrained Wireless Sensor Networks (WSNs). We use General Hebbian Algorithm (GHA) to find out principal components of a multi-attribute input which has linear complexity as opposed quadratic with eigen value decomposition (EVD). This allows computation percentage contributions individual attributes towards detected event. Comparison other...
Recognizing surfaces based on their vibration signatures is useful as it can enable tagging of different locations without requiring any additional hardware, such near field communication (NFC) tags. However, previous surface recognition schemes either use custom hardware for creating and sensing vibration, which makes them difficult to adopt, or intertial (IMU) sensors in commercial off-the-shelf (COTS) smartphones sense movements produced due vibrations, coarse-grained because the low...
Powerline communication (PLC) provides inexpensive, secure and high speed network connectivity, by leveraging the existing power distribution networks inside buildings. While PLC technology has potential to improve connectivity is considered a key enabler for sensing, control, automation applications in enterprises, it been mainly deployed improving homes. Deploying PLCs enterprises more challenging since complex as compared Moreover, technologies such HomePlug AV have not designed evaluated...
Textual annotations are important elements in all but the simplest visual interfaces. In order to integrate textual smoothly into dynamic graphical content of interactive information systems, fast yet high-quality label layout algorithms required. With ongoing pervasion mobile applications these requirements shifted from workstations comparatively low-performance devices. Fortunately, ubiquitous network access is also on advance, so that can employ remote services external workstations. This...
The N-Queen is one of the prominent toy problems for performance assessment in domain Computational Intelligence. problem can examine diverse aspects solving techniques, counting potential obtaining feasible solution and time & space complexity. well-defined set constraint sketches out overall problem. Queen has various attacking options over chessboard. In point fact, it walk off across column, row two diagonal. N-Queens demands non-attacking placements This research inspects...