- Advanced Neural Network Applications
- Blockchain Technology Applications and Security
- Currency Recognition and Detection
- Mobile and Web Applications
- Advanced MEMS and NEMS Technologies
- Modular Robots and Swarm Intelligence
- Indoor and Outdoor Localization Technologies
- Technology Adoption and User Behaviour
- Cyberloafing and Workplace Behavior
- Advanced Text Analysis Techniques
- Spam and Phishing Detection
- IoT and Edge/Fog Computing
- Knowledge Management and Sharing
- Bacillus and Francisella bacterial research
- Industrial Vision Systems and Defect Detection
- Internet of Things and AI
- Topic Modeling
- Multimodal Machine Learning Applications
- Advanced Wireless Communication Technologies
- Zoonotic diseases and public health
- Robotics and Sensor-Based Localization
- Advanced Malware Detection Techniques
- Animal Disease Management and Epidemiology
- Advanced MIMO Systems Optimization
- Digital Transformation in Industry
NED University of Engineering and Technology
2018-2024
Jinnah University for Women
2024
National University of Medical Sciences
2023
The Internet of Things (IoT) has been implemented by multiple manufacturing companies into their production chain as this technology is the main source digitalization in a plant. It improves data assembling, productivity operation, communication efficiency, and overall performance. IoT also serves to be good means for improved efficient warehouse automation. makes delivery products more calculating least routes reduces time that consumed during management inventory. basic objective Industry...
Text summarization is a technique for shortening down or exacting long text document. It becomes critical when someone needs quick and accurate summary of very content. Manual can be expensive time-consuming. While summarizing, some important content, such as information, concepts, features the document, lost; therefore, retention ratio, which contains informative sentences, lost, if more information added, then lengthy texts produced, increasing compression ratio. Therefore, there tradeoff...
Internet of Things (IoT) is a system interconnected devices and networks that provides autonomous functioning capability. Increasing expansion rate IoT in diverse set domains has resulted inclination associated risks as well. This research paper presents classification assets which are part system, identify platform-independent threats, consolidate potential solutions to secure the from threats. Various researchers have conducted studies focused on specific industry/domain. Therefore, there...
Domain adaptation (DA) is essential for developing robust machine learning models capable of operating across different domains with minimal retraining. This study explores the application domain techniques to 3D datasets industrial object detection, a focus on short-range and long-range scenarios. While data provide superior spatial information detecting parts, challenges arise due shifts between training (often clean or synthetic) real-world conditions (noisy occluded environments). Using...
This review article comprehensively delves into the rapidly evolving field of domain adaptation in computer and robotic vision. It offers a detailed technical analysis opportunities challenges associated with this topic. Domain methods play pivotal role facilitating seamless knowledge transfer enhancing generalization capabilities vision systems. Our methodology involves systematic data collection preparation, followed by application diverse assessment metrics to evaluate efficacy...
Previous literature presents a gap to study the mediating mechanism in relationship between use of social media perform job and employees’ productivity. Based on transactional stress coping model, we conducted present research assess serial mediation information overload ambiguity intolerance for this relationship. Using adapted questionnaires, used an online data collection technique collect from sample 232 employees working with Pakistan International Airlines (PIA). Results obtained...
Quadrupedal robots are confronted with the intricate challenge of navigating dynamic environments fraught diverse and unpredictable scenarios. Effectively identifying responding to obstacles is paramount for ensuring safe reliable navigation. This paper introduces a pioneering method 3D object detection, termed viewpoint feature histograms, which leverages established paradigm 2D detection in projection. By translating bounding boxes into proposals, this approach not only enables reuse...
To fortify Android devices against evolving threats, the project unfolds with a commitment to contribute security endeavors significantly. The core purpose is leverage machine-learning techniques, particularly deep-learning architectures, construct robust mechanisms for identifying and classifying malware. A hybrid deep learning model combining Long Short-Term Memory (LSTM) networks Convolutional Neural Networks (CNN) employed classify applications as benign or malicious. LSTM-CNN designed...
IoT (Internet of Things) is the next generation Internet. The main goal to connect each and every physical object Internet Cloud. This concept introduced by bringing technology laboratories, making expensive laboratory equipment available on-cloud for real-time experimentation. In this paper, an on CLP (Cloud Laboratory Platform) presented employing academic experimentation environment. allows a rapid deployment online system enabling students researchers perform actual experiments on-Cloud...
As 5G networks become more widely accepted and executed all through the world, academics have begun to investigate 6G interconnections.1upon be founded on pervasive AI give information ML arrangements in dissimilar enormous scopes domains. Customary draws near, then again, need incorporated assembling preparing by a server, which is turning into boundary for scope application daily existence because of rising security concerns. broadly carried out scholastic started take gander at...