Fazal Qudus Khan

ORCID: 0000-0002-4388-9650
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Software Engineering Methodologies
  • Smart Grid Energy Management
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Digital and Cyber Forensics
  • Robotic Path Planning Algorithms
  • Software Engineering Techniques and Practices
  • Software Engineering Research
  • Cloud Computing and Resource Management
  • Web Application Security Vulnerabilities
  • Model-Driven Software Engineering Techniques
  • IoT and Edge/Fog Computing
  • IoT-based Smart Home Systems
  • Robotics and Sensor-Based Localization
  • Service-Oriented Architecture and Web Services
  • Crafts, Textile, and Design
  • QR Code Applications and Technologies
  • Face recognition and analysis
  • Vehicular Ad Hoc Networks (VANETs)
  • Caching and Content Delivery
  • Artificial Intelligence in Games
  • Emotion and Mood Recognition
  • Anomaly Detection Techniques and Applications
  • Security in Wireless Sensor Networks

University of Swat
2021-2024

King Abdulaziz University
2017-2022

University of Kuala Lumpur
2017-2019

Every so often, a confluence of novel technologies emerges that radically transforms every aspect the industry, global economy, and finally, way we live. These sharp leaps human ingenuity are known as industrial revolutions, currently in midst fourth such revolution, coined Industry 4.0 by World Economic Forum. Building on their guideline set encompass 4.0, present full pillar which project portfolio management rests well foundation support these pillars. A complete model an factory relies...

10.1155/2022/5023011 article EN cc-by Journal of Sensors 2022-06-15

This paper looks into the emerging trends of makerspaces and outsourced 3D printing services, examines natural progression between them. Also, by presenting survey empirical data, it investigates reasons why individual users enterprises have started to choose such services benefits acquired from this choice, that lead promotion creativity, innovation, competition. Fundamental working principles both for are being analyzed. Through conduction a among two different makerspaces' users, authors...

10.1016/j.matpr.2021.09.074 article EN cc-by Materials Today Proceedings 2021-09-21

Aerial Robot Arms (ARAs) enable aerial drones to interact and influence objects in various environments. Traditional ARA controllers need the availability of a high-precision model avoid high control chattering. Furthermore, practical applications object manipulation, payloads that ARAs can handle vary, depending on nature task. The uncertainties due modeling errors an unknown payload are inversely proportional stability ARAs. To address issue stability, new adaptive robust controller, based...

10.3390/electronics10070831 article EN Electronics 2021-03-31

The autonomous navigation of an Unmanned Aerial Vehicle (UAV) relies heavily on the sensors. UAV's level autonomy depends upon various systems, such as state measurement, mapping, and obstacle avoidance. Selecting correct components is a critical part design process. However, this can be particularly difficult task, especially for novices there are several technologies available market, each with their own individual advantages disadvantages. For example, satellite-based should avoided when...

10.32604/cmc.2021.017236 article EN Computers, materials & continua/Computers, materials & continua (Print) 2021-01-01

Steganography aims to hide the messages from unauthorized persons for various purposes, e.g., military correspondence, financial transaction data. Securing data during transmission is of utmost importance these days. The confidentiality, integrity, and availability are at risk because emerging technologies complexity in software applications, therefore, there a need secure such systems There methodologies deal with security issues when utilizing an open system like Internet. This research...

10.32604/cmc.2020.09186 article EN Computers, materials & continua/Computers, materials & continua (Print) 2020-01-01

Olfaction can enhance the experience of music, films, computer games and virtual reality applications. However, this area is less explored than other areas such as graphics audio. Most advanced olfactory displays are designed for a specific experiment, they hard to modify extend, expensive, and/or deliver very limited number scents. Additionally, current-generation make no decisions on if when scent should be released. This paper proposes low-cost, easy build, powerful smart display, that...

10.3390/s20041002 article EN cc-by Sensors 2020-02-13

Computing students face the problem with time and quality of work while managing their graduation/senior projects. Rapid Application Development (RAD) model is based on continual user involvement for process requirement gathering via prototyping. After each iteration, developers can validate requirements that are completed in iteration. Managing a project RAD easier but not flexible. On other hand, Agile management techniques focus flexibility, agility, teamwork stories. Continual avoided,...

10.32604/cmc.2020.010959 article EN Computers, materials & continua/Computers, materials & continua (Print) 2020-01-01

Over the last decade, a significant increase has been observed in use of web-based Information systems that process sensitive information, e.g., personal, financial, medical. With this increased use, security such became crucial aspect to ensure safety, integrity and authenticity data. To achieve objectives data testing is performed. However, with growth diversity information systems, it challenging apply for each every system. Therefore, important classify assets based on their required...

10.32604/cmc.2020.012831 article EN Computers, materials & continua/Computers, materials & continua (Print) 2020-01-01

Robotic manipulators are widely used in applications that require fast and precise motion. Such devices, however, prompt to nonlinear control issues due the flexibility joints friction motors within dynamics of their rigid part. To address these issues, Linear Matrix Inequalities (LMIs) Parallel Distributed Compensation (PDC) approaches implemented Takagy-Sugeno Fuzzy Model (T-SFM). We propose following methodology; initially, state space equations manipulator model derived. Next, a (T-SFM)...

10.32604/cmc.2022.022451 article EN Computers, materials & continua/Computers, materials & continua (Print) 2021-11-03

Monitoring what application or type of applications running on a computer cluster without violating the privacy users can be challenging, especially when we may not have operator access to these devices, specialized software. Smart grids and Internet things (IoT) devices provide power consumption data connected individual groups. This research will attempt insides are based machines clusters. It is therefore assumed that there correlation between electric software running. Additionally, it...

10.3390/s20185075 article EN cc-by Sensors 2020-09-07

Ransomware is a type of malicious software that blocks access to computer by encrypting user's files until ransom paid the attacker. There have been several reported high-profile ransomware attacks including WannaCry, Petya, and Bad Rabbit resulting in losses over billion dollars various individuals businesses world. The analysis often carried out via sandbox environments; however, initial setup configuration such environments challenging task. Also, it difficult for an ordinary user...

10.32604/cmc.2021.015941 article EN Computers, materials & continua/Computers, materials & continua (Print) 2021-01-01

Software Product Lines (SPLs) can aid modern ecosystems by rapidly developing large-scale software applications. SPLs produce new products combining existing components that are considered as features. Selection of features is challenging due to the large number competing candidate choose from, with different properties, contributing towards objectives. It also a critical part they have direct impact on properties product. There been attempts automate selection However, offer limited...

10.3390/app9112212 article EN cc-by Applied Sciences 2019-05-29

A typical higher education institute classically has all the five major constituents, i.e. current students, alumni, faculty members, employers and industrial advisory board. Expectations of rest constituents are fully dependent on as they play a pivotal backbone role in building up an educational institute, to high repute. Faculty members provide knowledge skills necessary address market needs. Letting go skilled, professional enthusiastic can have huge impact any institution’s reputation...

10.3389/feduc.2021.678018 article EN cc-by Frontiers in Education 2021-12-09

Computer-controlled virtual characters are essential parts of most environments and especially computer games. Interaction between these agents human players has a direct impact on the believability immersion in application. The facial animations key part interactions. player expects elements world to act similar manner real world. For example, board game, if wins, he/she would expect computer-controlled character be sad. However, reactions, more specifically, expressions games not linked...

10.3390/app10165636 article EN cc-by Applied Sciences 2020-08-14

Over the last decade, there has been a significant increase in development of mobile applications. The performance developed applications depends largely on approaches. There are two widely used approaches: (1) native, where application is targeted and for specific platform, (2) crossplatform, runs multiple platforms. This paper aims to address question which approach should be various scenarios. We have performed detailed comparison approaches by developing app using both Experiments...

10.53560/ppasa(58-1)717 article EN Proceedings of Pakistan Academy of Sciences A Physical and Computational Sciences 2021-08-31

Algorithms for measuring semantic similarity between Gene Ontology (GO) terms has become a popular area of research in bioinformatics as it can help to detect functional associations genes and potential impact the health well-being humans, animals, plants. While focus is on design improvement GO algorithms, there still need implementation such algorithms before they be used solve actual biological problems. This challenging given that users usually come from biology background are not...

10.3390/ijerph17010267 article EN International Journal of Environmental Research and Public Health 2019-12-30

Summary Web scraping is the process of extracting data from web pages and it an essential part for generation datasets. Currently field dominated by capable commercial applications, however, there always a need crawling applications custom projects. Developing fit purpose tools retrieving structuring services, cloud systems, big challenging task. Based on empirical studies, some challenges include structural issues, formatting/ presentation, availability, denial service, size, information...

10.1002/cpe.6042 article EN Concurrency and Computation Practice and Experience 2020-10-07
Coming Soon ...