- Chaos-based Image/Signal Encryption
- Cellular Automata and Applications
- IoT and Edge/Fog Computing
- DNA and Biological Computing
- Advanced Steganography and Watermarking Techniques
- Blockchain Technology Applications and Security
- Mobile Ad Hoc Networks
- IoT Networks and Protocols
- Context-Aware Activity Recognition Systems
- IPv6, Mobility, Handover, Networks, Security
- Internet of Things and AI
- Advanced Malware Detection Techniques
- Water Quality Monitoring Technologies
- Network Security and Intrusion Detection
- Smart Agriculture and AI
- Opportunistic and Delay-Tolerant Networks
- Mobile Crowdsensing and Crowdsourcing
- Cutaneous Melanoma Detection and Management
- Radiomics and Machine Learning in Medical Imaging
- Moringa oleifera research and applications
- Expert finding and Q&A systems
- Handwritten Text Recognition Techniques
- Hydrological Forecasting Using AI
- Digital Imaging for Blood Diseases
- Security in Wireless Sensor Networks
COMSATS University Islamabad
2015-2024
The Abdus Salam International Centre for Theoretical Physics (ICTP)
2024
Sir Syed University of Engineering and Technology
2020-2023
Hamdard University
2016-2022
Institute of Engineering
2016-2022
Lahore Garrison University
2022
Southwest University
2017-2021
Chongqing University
2011-2014
In the field of medical, each and every analysis is decisive as study links to life subject under observation. One most vital area in medical healthcare expecting women low income countries. High mortality rate due increased number caesarean section evident because poor infrastructure region, misunderstood religious teachings, education lack proper decision making at right time. The root cause situations demanding a tough job, however presence historical data, one may extract useful...
Internet of Things (IoT) is a global network physical and virtual ‘things’ connected to the internet. Each object has unique ID which used for identification. IoT emerging technology will change way we interact with devices. In future almost every electronic device be smart can compute communicate hand-held other infrastructure As most devices may battery operated, due less processing power security privacy major issue in IoT. Authentication, Identification heterogeneity are concerns Major...
An innovative method proposed for encrypting color images is comprised of one-time keys and chaos theory using a distinctive concept rotor machine. The novelty this scheme that the rows columns 2-dimensional are converted into circular object called can be rotated at 360 degrees in clockwise or anti direction. rotation will change existing new one used substitution process plain image. This repeated β times each time created just by simple rotation. performed terms pixels so degree angle...
Accurate estimation of Reference Evapotranspiration (ET<sub>0</sub>) is important for efficient management and conservation irrigation water. Existing methods ET<sub>0</sub> rate determination are complex application at the farmer level. Apart from standard determination, many data-driven soft computing approaches were also proposed to determine with limited data set. We a temperature humidity-based ML approach on directly sensed environmental conditions crop field. Crop field by Internet...
In this article, an innovative encryption technique is developed by getting the inspiration from natural up-down water wave's phenomena that changes a reflection on pond's surface.The plain image considered as pond and stones are throwing to diffuse pixels.The direction of diffusion follows pattern waves in 360 degrees.The distance traveled depend upon weight stone i.e. heavier stone, longer will be distance.Each layer pixels represents Crest (Up) Troughs (Down) around hitting point...
Internet of Things (IoT) is a global network physical and virtual ‘things’ connected to the internet. Each object has unique ID which used for identification. IoT emerging technology will change way we interact with devices. In future almost every electronic device be smart can compute communicate hand-held other infrastructure As most devices may battery operated, due less processing power security privacy major issue in IoT. Authentication, Identification heterogeneity are concerns Major...
As Internet of Things (IoT) is evolving very rapidly which producing massive amount data and normally all this shifted towards the cloud for further execution puts burden on doesn't fulfill QoS requirements. In order to overcome problem computing facility were extended edge network concept known as Fog computing. Due heterogeneity fog nodes dynamic user requirements, task scheduling in has become big challenge. This paper covers literature review classify algorithm terms approaches, it...
An innovative approach of selective encryption for color images is proposed that utilizes SHA-512 hash plain image to modify initial conditions and control parameters 1-Dimensional (1D) chaotic maps. The three channels (red, green blue) a are combined into 1D array permute using sorted index pseudo-random sequence. permuted split sub-arrays, DNA encoding applied on every pixel each channel chaotically then separate encoded its Least Significant Bits (LSB) Most (MSB). substitution carried out...
Generating intuitions from data using mining and machine learning algorithms to predict outcomes is useful area of computing. The application techniques wide ranging including industries, healthcare, organizations, academics etc. A continuous improvement witnessed due an ongoing research, as seen particularly in healthcare. Several researchers have applied develop decision support systems, perform analysis dominant clinical factors, extraction information hideous patterns historical data,...
In this paper we have present the architecture and module for internet firewall. The central component is fuzzy controller while properties of packets are fuzzified as inputs. On basis proposed security algorithm, figured out level each packet adjust according to dynamic states. Internet firewall can respond these dynamics take respective actions accordingly. Therefore, proactive solves conflict between speed by providing high performance security. Simulation shows that if response value in...
Presently employed Internet Protocol (IP) stack possesses number of architectural problems. The issues like Dual/Overriding role IP addresses, mobility, multi-homing etc are the limitations for infrastructure oriented networks which even have support Dynamic Host Configuration (DHCP), Domain Name System (DNS), Network Address Translation (NAT) servers, etc. Such extremely complex to handle in case multi-hop wireless ad hoc lack any component. contemporary research direction improvement...
Cancer is a disease that threatens majority of the world’s survival rate. Lung cancer one most deadly malignancies, having high rate morbidity and death compared to other cancers. The goal this paper identify lung from CT scan by employing image processing, segmentation, feature extraction classification with stage detection find reliable results. Artificial Neural Network has been used for staging cancerous nodule. This concept built on Android smartphone technology, it aims make diagnosis...
Diseases and pesticides are the most common problems of wheat being faced by farmers. These commonly formed due to improper land preparation, unconditional rains, variable climate conditions, irregular watering. The impact these factors on crop could ultimately affect economy country. Timely detection diseases avoid many financial time-based losses help in applying relevant disease management methods. old manual methods detecting based personal observations. have not much contributed to: a)...