Muhammad Sardaraz

ORCID: 0000-0002-7169-8683
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Genomics and Phylogenetic Studies
  • Algorithms and Data Compression
  • Cloud Computing and Resource Management
  • Gene expression and cancer classification
  • Distributed and Parallel Computing Systems
  • Machine Learning in Bioinformatics
  • Error Correcting Code Techniques
  • Advanced Data Storage Technologies
  • Advanced Malware Detection Techniques
  • Image Retrieval and Classification Techniques
  • Advanced Image and Video Retrieval Techniques
  • DNA and Biological Computing
  • Blockchain Technology Applications and Security
  • Security in Wireless Sensor Networks
  • Chaos-based Image/Signal Encryption
  • Network Security and Intrusion Detection
  • Energy Efficient Wireless Sensor Networks
  • Data Stream Mining Techniques
  • Anomaly Detection Techniques and Applications
  • Face recognition and analysis
  • Wireless Body Area Networks
  • Genetic diversity and population structure
  • Genetics, Bioinformatics, and Biomedical Research
  • Biometric Identification and Security

COMSATS University Islamabad
2017-2025

University of Wah
2015

Iqra University
2013-2014

Cloud computing facilitates the users with on-demand services over Internet. The are accessible from anywhere at any time. Despite valuable services, paradigm is, also, prone to security issues. A Distributed Denial of Service (DDoS) attack affects availability cloud and causes threats computing. Detection DDoS attacks is necessary for legitimate users. topic has been studied by many researchers, better accuracy different datasets. This article presents a method detection in primary...

10.3390/sym14061095 article EN Symmetry 2022-05-27

The numbers of diagnosed patients by melanoma are drastic and contribute more deaths annually among young peoples. An approximately 192,310 new cases skin cancer in 2019, which shows the importance automated systems for diagnosis process. Accordingly, this article presents an method lesions detection recognition using pixel-based seed segmented images fusion multilevel features reduction. proposed involves four key steps: (a) mean-based function is implemented fed input to top-hat bottom-hat...

10.1002/jemt.23429 article EN Microscopy Research and Technique 2020-01-03

Blockchain and IoT are being deployed at a large scale in various fields including healthcare for applications such as secure storage, transactions, process automation. devices resource-constrained, have no capability of security self-protection, can easily be hacked or compromised. Furthermore, is an emerging technology with immutability features which provide management, authentication, guaranteed access control to devices. cloud-based internet service processing collection user’s data...

10.3390/su12176960 article EN Sustainability 2020-08-26

Cloud computing has revolutionized the modes of computing. With huge success and diverse benefits, paradigm faces several challenges as well. Power consumption, dynamic resource scaling, over- under-provisioning issues are for cloud paradigm. The research been carried out in utilization prediction to overcome issues. Over-provisioning resources consumes more energy leads high costs. However, induces Service Level Agreement (SLA) violation Quality (QoS) degradation. Most existing mechanisms...

10.3390/app12042160 article EN cc-by Applied Sciences 2022-02-18

Cloud computing is a rapidly growing technology that has been implemented in various fields recent years, such as business, research, industry, and computing. provides different services over the internet, thus eliminating need for personalized hardware other resources. environments face some challenges terms of resource utilization, energy efficiency, heterogeneous resources, etc. Tasks scheduling virtual machines (VMs) are used consolidation techniques order to tackle these issues....

10.3390/app11135849 article EN Applied Sciences 2021-06-23

Cloud computing has become the main source for executing scientific experiments. It is an effective technique distributing and processing tasks on virtual machines. Scientific workflows are complex demand efficient utilization of cloud resources. Scheduling considered as NP-complete. The problem constrained by some parameters such Quality Service (QoS), dependencies between users' deadlines, etc. There exists a strong literature scheduling in environments. Solutions include standard...

10.1109/access.2019.2961106 article EN cc-by IEEE Access 2019-01-01

Recent developments in cloud computing have made it a powerful solution for executing large-scale scientific problems. The complexity of workflows demands efficient utilization resources to satisfy user requirements. Scheduling environment is challenge researchers. problem considered as NP-hard. Some constraints such heterogeneous environment, dependencies between tasks, quality service and deadlines make difficult the scheduler fully utilize available resources. has been extensively studied...

10.1177/1550147720949142 article EN cc-by International Journal of Distributed Sensor Networks 2020-08-01

The Internet of Things (IoT) has revolutionized many domains. Due to the growing interconnectivity IoT networks, several security challenges persist that need be addressed. This research presents application deep learning techniques for Distributed Denial-of-Service (DDoS) attack detection in networks. study assesses performance various models, including Latent Autoencoders, LSTM and convolutional neural networks (CNNs), DDoS environments. Furthermore, a novel hybrid model is proposed,...

10.3390/s25051346 article EN cc-by Sensors 2025-02-22

Advances in high throughput sequencing technologies and reduction cost of have led to exponential growth DNA sequence data. This has posed challenges such as storage, retrieval, transmission Data compression is used cope with these challenges. Various methods been developed compress genomic In this article, we present a comprehensive review for genome reads compression. Algorithms are categorized referential or reference free. Experimental results comparative analysis various data presented....

10.1142/s0219720016300021 article EN Journal of Bioinformatics and Computational Biology 2015-12-21

Cloud computing platform provides on-demand IT services to users and advanced the technology. The purpose of virtualization is improve utilization resources reduce power consumption. Energy consumption a major issue faced by data centers management. Virtual machine placement an effective technique used for this purpose. Different algorithms have been proposed virtual in cloud environments. These considered different parameters. It obvious that improving one parameter affects other There...

10.1371/journal.pone.0296399 article EN cc-by PLoS ONE 2024-01-02

Iris detection and tracking plays a vital role in human–computer interaction has become an emerging field for researchers the last two decades. Typical applications such as virtual reality, augmented gaze customer behavior, controlling computers, handheld embedded devices need accurate precise of iris landmarks. A significant improvement been made so far tracking. However, landmarks real-time with high accuracy is still challenge computationally expensive task. This also accompanied lack...

10.3390/app12115700 article EN cc-by Applied Sciences 2022-06-03

Cloud computing plays a vital role in healthcare as it can store large amount of data known big data. In the current emerging era technology, analysis and prediction is challenging task industry. Healthcare are very crucial for patient well respective services provider. Several industries adopted cloud storage analysis. Incredible progress has been achieved making combined health records available to scientists clinicians research. However, informatics demand more robust scalable solutions...

10.3390/app13042391 article EN cc-by Applied Sciences 2023-02-13

The development of high throughput sequencing technologies i.e. Next Generation Sequencing (NGS) is revolutionizing the exploration cancer. Though sequence datasets are highly complex, mutation can occur randomly in DNA or RNA sequences that make cells sicker less fit. unusual growth and behavior genes cause Cancer-driver gene grow when occurs. Identification cancer driver a critical challenging issue for researchers. In proposed work, initially, robust features extracted from dataset...

10.1109/access.2023.3259907 article EN cc-by IEEE Access 2023-01-01

Advances in genomics, proteomics, and bioinformatics have revolutionized the drug discovery development. Computational systems biology, computational bioinformatics, many biomedical applications are also growing at a rapid pace with an increasing demand for processing power. Hardware clusters grid computing solutions approached to fulfill high The approach proved success but introduced need of frameworks hide complexity parallel programming enable programmer focus on application logic. In...

10.1109/lisat.2013.6578221 article EN 2013-05-01

Next generation sequencing (NGS) technologies produce a huge amount of biological data, which poses various issues such as requirements high processing time and large memory. This research focuses on the detection single nucleotide polymorphism (SNP) in genome sequences. Currently, SNPs algorithms face several issues, e.g., computational overhead cost, accuracy, memory requirements. In this research, we propose fast scalable workflow that integrates Bowtie aligner with Hadoop based Heap SNP...

10.3390/genes11020166 article EN Genes 2020-02-05

An acoustic fingerprint is a condensed and powerful digital signature of an audio signal which used for sample identification. A the pattern voice or sample. large number algorithms have been developed generating such fingerprints. These facilitate systems that perform song searching, identification, duplication detection. In this study, comprehensive survey already conducted. Four major music fingerprinting are evaluated identifying analyzing potential hurdles can affect their results....

10.1109/cdma47397.2020.00010 article EN 2020-03-01
Coming Soon ...