- Advanced Software Engineering Methodologies
- Smart Grid Energy Management
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Information and Cyber Security
- Digital and Cyber Forensics
- Robotic Path Planning Algorithms
- Software Engineering Techniques and Practices
- Software Engineering Research
- Cloud Computing and Resource Management
- Web Application Security Vulnerabilities
- Model-Driven Software Engineering Techniques
- IoT and Edge/Fog Computing
- IoT-based Smart Home Systems
- Robotics and Sensor-Based Localization
- Service-Oriented Architecture and Web Services
- Crafts, Textile, and Design
- QR Code Applications and Technologies
- Face recognition and analysis
- Vehicular Ad Hoc Networks (VANETs)
- Caching and Content Delivery
- Artificial Intelligence in Games
- Emotion and Mood Recognition
- Anomaly Detection Techniques and Applications
- Security in Wireless Sensor Networks
University of Swat
2021-2024
King Abdulaziz University
2017-2022
University of Kuala Lumpur
2017-2019
Every so often, a confluence of novel technologies emerges that radically transforms every aspect the industry, global economy, and finally, way we live. These sharp leaps human ingenuity are known as industrial revolutions, currently in midst fourth such revolution, coined Industry 4.0 by World Economic Forum. Building on their guideline set encompass 4.0, present full pillar which project portfolio management rests well foundation support these pillars. A complete model an factory relies...
This paper looks into the emerging trends of makerspaces and outsourced 3D printing services, examines natural progression between them. Also, by presenting survey empirical data, it investigates reasons why individual users enterprises have started to choose such services benefits acquired from this choice, that lead promotion creativity, innovation, competition. Fundamental working principles both for are being analyzed. Through conduction a among two different makerspaces' users, authors...
Aerial Robot Arms (ARAs) enable aerial drones to interact and influence objects in various environments. Traditional ARA controllers need the availability of a high-precision model avoid high control chattering. Furthermore, practical applications object manipulation, payloads that ARAs can handle vary, depending on nature task. The uncertainties due modeling errors an unknown payload are inversely proportional stability ARAs. To address issue stability, new adaptive robust controller, based...
The autonomous navigation of an Unmanned Aerial Vehicle (UAV) relies heavily on the sensors. UAV's level autonomy depends upon various systems, such as state measurement, mapping, and obstacle avoidance. Selecting correct components is a critical part design process. However, this can be particularly difficult task, especially for novices there are several technologies available market, each with their own individual advantages disadvantages. For example, satellite-based should avoided when...
Steganography aims to hide the messages from unauthorized persons for various purposes, e.g., military correspondence, financial transaction data. Securing data during transmission is of utmost importance these days. The confidentiality, integrity, and availability are at risk because emerging technologies complexity in software applications, therefore, there a need secure such systems There methodologies deal with security issues when utilizing an open system like Internet. This research...
Olfaction can enhance the experience of music, films, computer games and virtual reality applications. However, this area is less explored than other areas such as graphics audio. Most advanced olfactory displays are designed for a specific experiment, they hard to modify extend, expensive, and/or deliver very limited number scents. Additionally, current-generation make no decisions on if when scent should be released. This paper proposes low-cost, easy build, powerful smart display, that...
Computing students face the problem with time and quality of work while managing their graduation/senior projects. Rapid Application Development (RAD) model is based on continual user involvement for process requirement gathering via prototyping. After each iteration, developers can validate requirements that are completed in iteration. Managing a project RAD easier but not flexible. On other hand, Agile management techniques focus flexibility, agility, teamwork stories. Continual avoided,...
Over the last decade, a significant increase has been observed in use of web-based Information systems that process sensitive information, e.g., personal, financial, medical. With this increased use, security such became crucial aspect to ensure safety, integrity and authenticity data. To achieve objectives data testing is performed. However, with growth diversity information systems, it challenging apply for each every system. Therefore, important classify assets based on their required...
Robotic manipulators are widely used in applications that require fast and precise motion. Such devices, however, prompt to nonlinear control issues due the flexibility joints friction motors within dynamics of their rigid part. To address these issues, Linear Matrix Inequalities (LMIs) Parallel Distributed Compensation (PDC) approaches implemented Takagy-Sugeno Fuzzy Model (T-SFM). We propose following methodology; initially, state space equations manipulator model derived. Next, a (T-SFM)...
Monitoring what application or type of applications running on a computer cluster without violating the privacy users can be challenging, especially when we may not have operator access to these devices, specialized software. Smart grids and Internet things (IoT) devices provide power consumption data connected individual groups. This research will attempt insides are based machines clusters. It is therefore assumed that there correlation between electric software running. Additionally, it...
Ransomware is a type of malicious software that blocks access to computer by encrypting user's files until ransom paid the attacker. There have been several reported high-profile ransomware attacks including WannaCry, Petya, and Bad Rabbit resulting in losses over billion dollars various individuals businesses world. The analysis often carried out via sandbox environments; however, initial setup configuration such environments challenging task. Also, it difficult for an ordinary user...
Software Product Lines (SPLs) can aid modern ecosystems by rapidly developing large-scale software applications. SPLs produce new products combining existing components that are considered as features. Selection of features is challenging due to the large number competing candidate choose from, with different properties, contributing towards objectives. It also a critical part they have direct impact on properties product. There been attempts automate selection However, offer limited...
A typical higher education institute classically has all the five major constituents, i.e. current students, alumni, faculty members, employers and industrial advisory board. Expectations of rest constituents are fully dependent on as they play a pivotal backbone role in building up an educational institute, to high repute. Faculty members provide knowledge skills necessary address market needs. Letting go skilled, professional enthusiastic can have huge impact any institution’s reputation...
Computer-controlled virtual characters are essential parts of most environments and especially computer games. Interaction between these agents human players has a direct impact on the believability immersion in application. The facial animations key part interactions. player expects elements world to act similar manner real world. For example, board game, if wins, he/she would expect computer-controlled character be sad. However, reactions, more specifically, expressions games not linked...
Over the last decade, there has been a significant increase in development of mobile applications. The performance developed applications depends largely on approaches. There are two widely used approaches: (1) native, where application is targeted and for specific platform, (2) crossplatform, runs multiple platforms. This paper aims to address question which approach should be various scenarios. We have performed detailed comparison approaches by developing app using both Experiments...
Algorithms for measuring semantic similarity between Gene Ontology (GO) terms has become a popular area of research in bioinformatics as it can help to detect functional associations genes and potential impact the health well-being humans, animals, plants. While focus is on design improvement GO algorithms, there still need implementation such algorithms before they be used solve actual biological problems. This challenging given that users usually come from biology background are not...
Summary Web scraping is the process of extracting data from web pages and it an essential part for generation datasets. Currently field dominated by capable commercial applications, however, there always a need crawling applications custom projects. Developing fit purpose tools retrieving structuring services, cloud systems, big challenging task. Based on empirical studies, some challenges include structural issues, formatting/ presentation, availability, denial service, size, information...