- Plant Virus Research Studies
- Internet Traffic Analysis and Secure E-voting
- Caching and Content Delivery
- Plant Disease Management Techniques
- Privacy-Preserving Technologies in Data
- IoT and Edge/Fog Computing
- Nematode management and characterization studies
- Neural Networks and Applications
- Plant Parasitism and Resistance
- Crop Yield and Soil Fertility
- Insect-Plant Interactions and Control
- Cloud Data Security Solutions
- Legume Nitrogen Fixing Symbiosis
- Genetic and Environmental Crop Studies
- Smart Agriculture and AI
- Privacy, Security, and Data Protection
- Plant Pathogens and Fungal Diseases
- Plant Pathogenic Bacteria Studies
- Vehicular Ad Hoc Networks (VANETs)
- Genetics and Plant Breeding
- Plant Pathogens and Resistance
- Cryptography and Data Security
- Opportunistic and Delay-Tolerant Networks
- Phytoplasmas and Hemiptera pathogens
- Advanced Authentication Protocols Security
Marshall University
2024-2025
Khushal Khan Khattak University Karak
2019-2024
Pir Mehr Ali Shah Arid Agriculture University
2011-2024
Shifa International Hospital
2023
Karakoram International University
2022-2023
University of Kara
2021
The University of Agriculture, Peshawar
2021
Southend University Hospital NHS Foundation Trust
2020
University of Engineering and Technology Taxila
2020
Laboratoire Hubert Curien
2013
In this paper, we present a predictive analytics framework for risk assessment and mitigation in software development projects, aimed at enhancing project quality success rates. Software projects often face challenges due to their dynamic complex nature, making early detection crucial. To address this, collected data from developers, managers, QA engineers using targeted sampling techniques. The dataset underwent preprocessing, including extensive cleaning transformation, before being...
Although deep learning has progressed the field of artificial intelligence (AI), traditional digital computing architectures are still limited by von Neumann bottleneck. The continuous fetching and loading information results in high latency excessive energy consumption, making AI optimization difficult. To address these issues, this paper proposes a solution that utilizes hybrid analog-digital neural network processor incorporating analog in-memory (AIMC) with computation for efficient...
New generation of embedded systems with superior intelligence, energy efficiency, and performance have emerged as a result the merging deep learning Very-Large-Scale Integration (VLSI) technology. Methodologies for design, optimisation strategies, practical uses next-generation are foci this study, which investigates ways in VLSI might work together. These potential to transform several industries, such transportation, medicine, robotics, IoT, by harnessing processing power neural networks...
Radiology reports are the primary medium through which physicians communicate with patients and share diagnoses from medical scans. Examples include radiology for chest X-Rays CT Chest X-Ray images frequently employed in clinical screening diagnosis. However, writing is tedious, error-prone, time-consuming, even experienced radiologists. The modern world of practice demands that a radiologist specialized training manually evaluate report findings. Therefore, this paper explores ability...
<b><i>Background:</i></b> Acute stroke patients are usually transported to the nearest hospital regardless of their required level care. This can lead increased pressure on emergency departments and treatment delay. <b><i>Objective:</i></b> The aim study was explore benefit a mobile unit (MSU) in UK National Health Service (NHS) for reduction admissions. <b><i>Methods:</i></b> Prospective cohort audit observation with...
Early detection of plant diseases is crucial before growth affected. Plant have been detected and classified using a variety machine learning (ML) models in the past. Deep Learning (DL) appears to great potential terms increased accuracy; however, agricultural applications Convolutional Neural Networks (CNN) has widely utilised by researchers. CNNs are so effective at identifying species, managing yields, detecting weeds, soil, water, counting fruits, pests, evaluating nutrient status. A...
Abstract Smart and connected communities (SCC) is a new area of the Internet Things with potential to improve people's lives. The goal developing SCC for community encourage people focus on present, consider future, reflect past. In SCC, nodes (vehicles) can use their mobility collect data from interconnected devices send it variety delay‐tolerant applications. Vehicular delay tolerant networks are an ideal fit such services. However, problem that (vehicles), having limited resources, may...
The Web Search Engine (WSE) is a software system used to retrieve data from the web successfully. WSE uses user's search queries build profile and provide personalized results. Users' hold identifiable information that could compromise privacy of respective user. This work proposes multi-group distributed privacy-preserving protocol (MG-OSLo) tries investigate state-of-the-art protocols for computing privacy. MG-OSLo comprises multiple groups in which each group has fixed number users....
Underwater wireless sensor networks (UWSNs) gained the attention of researchers due to their substantial applications in various fields. The major application areas UWSN are environmental monitoring, underwater oil and gas extraction military surveillance, smart farming, communication, others. However, UWSNs also prone significant issues, such as limited network lifetime, low processing capability nodes, high energy consumption run routing protocols, difficult node replacement. Therefore,...
Web search querying is an inevitable activity of any Internet user. The web engine (WSE) the easiest way to and retrieve data from Internet. WSE stores user’s queries personalized result in a form query log. A user often leaves digital traces sensitive information known sell log third party generate revenue. However, release can compromise security privacy In this work, we propose Profile Aware ObScure Logging (PaOSLo) privacy-preserving protocol that mitigates searching. PaOSLo...
A Vehicular Ad Hoc Network (VANET) is a subset of the Mobile (MANET) that allows vehicles to communicate with each other and roadside stations offer efficient safe transportation. Furthermore, when VANET used in connection Internet Things (IoT) devices sensors, it can help traffic management road safety by allowing interact one another at any time from location. Since VANET’s event-driven communications are carried out via an open wireless channel, there significant security concerns. In...
Isolation of F. oxysporum, solani and M
Sugarcane (Saccharum hybrids), the second largest cash crop of Pakistan, is planted on 1.029 million ha with an annual production 50 tons. During a survey sugarcane in Faisalabad, Sargodha, and Dera Ghazi Khan Division Punjab Province Pakistan from 2007 to 2010, symptoms consistent ratoon stunting, including stunted growth reddening vascular bundles at nodal regions (1), was observed cvs. CP77-400, SPF-241, CP72-2086, NCo-310. CP72-2086 NCo-310 showed severely both cycles. A chemical test...
Globally, breast carcinoma is the most prevalent type of cancer, causing almost nine hundred thousand deaths yearly. It possible to reduce fatality rate if disease detected at an early stage and appropriately diagnosed. Early diagnosis may prevent it from dissemination premature casualties contracting it. Breast cancer (BC) researchers encounter several challenges when trying distinguish benign malignant tumours draw conclusions about mild advanced cancer. Through use machine learning...
The deaf-mutes population is constantly feeling helpless when others do not understand them and vice versa. To fill this gap, study implements a CNN-based neural network, Convolutional Based Attention Module (CBAM), to recognise Malaysian Sign Language (MSL) in videos recognition. This has created 2071 for 19 dynamic signs. Two different experiments were conducted signs, using CBAM-3DResNet implementing 'Within Blocks' 'Before Classifier' methods. Various metrics such as the accuracy, loss,...
In the background subtraction method one of core issue is; how to setup threshold value precisely at run time, which can ultimately overcome several bugs this approach in foreground detection. proposed algorithm key feature any detection algorithm; motion is used however getting from original histogram not possible, so for said purpose smooth a systematic way obtain value. main focus get better estimation that dynamic value, time. If intelligently terms magnitude and direction it distinguish...