Mudassir Khan

ORCID: 0000-0002-1117-7819
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • COVID-19 diagnosis using AI
  • Artificial Intelligence in Healthcare
  • Data Stream Mining Techniques
  • Anomaly Detection Techniques and Applications
  • IoT and Edge/Fog Computing
  • Spam and Phishing Detection
  • Energy Efficient Wireless Sensor Networks
  • Radiomics and Machine Learning in Medical Imaging
  • IoT-based Smart Home Systems
  • Blockchain Technology Applications and Security
  • Big Data and Business Intelligence
  • Currency Recognition and Detection
  • Heat Transfer and Optimization
  • Advanced Computing and Algorithms
  • Face and Expression Recognition
  • Imbalanced Data Classification Techniques
  • Refrigeration and Air Conditioning Technologies
  • Network Security and Intrusion Detection
  • Brain Tumor Detection and Classification
  • Privacy-Preserving Technologies in Data
  • ECG Monitoring and Analysis
  • Big Data Technologies and Applications
  • Emotion and Mood Recognition
  • Data Quality and Management
  • Machine Learning and Data Classification

King Khalid University
2019-2025

King Khaled Hospital
2024

Noida International University
2020

Laboratoire d'Informatique de Paris-Nord
2019

University of Sussex
2007

Healthcare comprises the largest revenue and data boom markets. Sharing knowledge about healthcare is crucial for research that can help providers patients. Several cloud-based applications have been suggested sharing in healthcare. However, trustworthiness of third-party cloud remains unclear. The dependency problem was resolved using blockchain technology. primary objective this growth to replace distributed system with a centralized one. Therefore, security critical requirement protecting...

10.3390/app13063970 article EN cc-by Applied Sciences 2023-03-21

Abstract An intelligent climate and watering agriculture system is presented that controlled with Android application for smart water consumption considering small medium ruler agricultural fields. Data privacy security as a big challenge in current Internet of Things (IoT) applications, the increase number connecting devices, these devices are now more vulnerable to threats. fuzzy logic blockchain technology implemented timely analysis securing network. The proposed design consists various...

10.1515/jisys-2022-0012 article EN cc-by Journal of Intelligent Systems 2022-01-01

Recommender system (RS) is a unique type of information clarification that anticipates the user's evaluation items from large pool based on expectations single stakeholder. The proposed highly useful for getting expected meaning suggestions and guidance choosing proper product using artificial intelligence IoT (Internet Things) such as chatbot. current technique makes it easier stakeholders to make context-based decisions are optimal rather than reactive, which buy, news classification high...

10.1155/2022/2854741 article EN Mobile Information Systems 2022-07-11

Sentiment analysis acquired a great area of attention in the microblogging websites and sentiment is practice categorization identification opinions that are articulated as speech, text, database sources tweets to detect if opinion negative, positive or neutral. The challenge lies determining from due unique characteristics Twitter data. This paper presents an approach for by adapting Hadoop framework deep learning classifier. cluster used distribution data extracting features. Then,...

10.1109/ic-etite47903.2020.201 article EN 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE) 2020-02-01

Wireless sensor networks (WSNs) are used for recording the information from physical surroundings and transmitting gathered records to a principal location via extensively disbursed nodes. The proliferation of devices advances in size, deployment costs, user-friendly interfaces have spawned numerous WSN applications. should use routing protocol send sink over low-cost link. One foremost vital problems is restricted energy sensing element and, therefore, high consumed throughout time. An...

10.3390/app13052801 article EN cc-by Applied Sciences 2023-02-22

This article examines the trend around adoption of machine learning in hotel business light significance new technologies. According to previous research, hospitality industry uses a variety chemicals for cleaning. Cleaning supplies are housekeeping department's primary tool their daily routine keep rooms and common areas clean tidy. Guest staff don't know harmfulness these chemicals. Providing that meets needs guests requires not only positive attitude, but also high-quality excellent...

10.56294/dm2023161 article EN cc-by Data & Metadata 2023-12-30

Presenting the network architecture EMOTE-Net is a method of enhancing face emotion recognition and classification in video data for this work. The suggested model merges use DenseNet to extract features with SVM (support vector machine) categorize by specifying here. This feature highly outstanding because are combined thus capable sophisticated effective extraction. first process come methodology preprocessing data. Bounding Box detection able regions that interests (ROIs) Densenet great...

10.54216/fpa.190102 article EN Fusion Practice and Applications 2025-01-01

<title>Abstract</title> Financial predictive modeling plays a crucial role in decision-making, risk management, and strategic planning within financial markets institutions. Ensuring the veracity accuracy of synthetic data is major challenge when it comes to developing forecasting models. Otherwise, inaccurate model predictions flawed decisions are likely result if artificial created does not look like real-world patterns. A research study has tended apply generative techniques on...

10.21203/rs.3.rs-6178330/v1 preprint EN cc-by Research Square (Research Square) 2025-03-26

Due to advancement of modern computing technology, software and its products have played an important role in the success failure any business. Nowadays, numerous researchers focused their work on development new quality models scopes. Evaluating based several attributes is essential complex multi-criteria decision making problem (MCDM). To tackle this issue, studies been presented for evaluation by utilizing idea fuzzy sets (FSs). Present research develops intuitionistic (IF) improved score...

10.3233/jifs-191153 article EN Journal of Intelligent & Fuzzy Systems 2020-01-21

In this study, shell and heat exchangers are optimized using an integrated optimization framework. research, A structured Design of Experiments (DOE) comprising 16 trials was first conducted to systematically determine the essential parameters, including mass flow rates (mh, mc), temperatures (T1, t1, T2, t2), transfer coefficients (€, TR, U). By identifying four principal components, PCA able 87.7% variance, thereby reducing dimensionality problem. Performance-related aspects system focus...

10.1371/journal.pone.0304097 article EN cc-by PLoS ONE 2024-06-10

Double-pipe counter-flow heat exchangers are considered more suitable for recovery in the transfer industry. Numerous studies have been conducted to develop static tools optimizing operating parameters of exchangers. Using this study, an improved exchanger system will be developed. This is frequently used solve optimization problems and find optimal solutions. The Taguchi method determines critical factor affecting a specific performance parameter by identifying significant level that...

10.3390/pr11061674 article EN Processes 2023-05-31

Abstract To optimize the weak robustness of traditional face recognition algorithms, classification accuracy rate is not high, operation speed slower, so a algorithm based on local binary pattern (LBP) and stacked autoencoder (AE) proposed. The advantage LBP texture structure feature image as initial sparse (SAE) learning, use unified mode operator to extract histogram blocked image, connect form features entire image. It used input AE, extraction done, realize images. Experimental results...

10.1515/jisys-2022-0011 article EN cc-by Journal of Intelligent Systems 2022-01-01

Abstract In this work, advanced facial emotions are recognized using Neural network‐based (NN) PCA methodology. The earlier models cannot detect with moving conditions but the CCTV and other applications mostly depending on object‐based emotion recognition. blurring, mask, image applied to training process, at testing condition, real‐time images applied. is extracting features pre‐processing NN deep learning process. proposed recognition model most useful for applications. design finally...

10.1111/phor.12426 article EN The Photogrammetric Record 2022-11-21

Continuous data stream analysis primarily focuses on the unanticipated changes in transmission of distribution over time. Conceptual change is defined as signal continuous streams. A drift detection scenario set forth to develop methods and strategies for detecting, interpreting, adapting conceptual Machine learning approaches can produce poor outcomes environment if sudden not addressed. Furthermore, due developments concept drift, methodologies have been significantly systematic recent...

10.3390/app13148004 article EN cc-by Applied Sciences 2023-07-08

As technology advances, electronic circuits are more vulnerable to errors. Soft errors one among them that causes the degradation of a circuit’s reliability. In many applications, protecting critical modules is main concern. One such module Fast Fourier Transform (FFT). Real FFT (RFFT) memory-based architecture. RFFT architecture can be optimized by its processing element through employing several types adder and multipliers an memory usage. It has been seen various blocks operate...

10.3390/pr11082389 article EN Processes 2023-08-08

This research paper, discusses, how the implementations of a planned algorithm will be processed. The data set is collected from one engineering colleges in India. Datasets are different sources and raw preprocessor. analyzed by using Map Reducing Technique that should carry out naive byes KNN algorithm. Map-Reduce technique parallel to computation key/value pair. Thus, system helps analyze information which give potential clients, such as, login time, credit value, lot more at least...

10.1109/iciem48762.2020.9160236 article EN 2020-06-01
Coming Soon ...