Muhammad Aslam

ORCID: 0000-0002-8977-9457
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Topic Modeling
  • Advanced Text Analysis Techniques
  • Usability and User Interface Design
  • IoT and Edge/Fog Computing
  • Tactile and Sensory Interactions
  • Online Learning and Analytics
  • Natural Language Processing Techniques
  • Cloud Computing and Resource Management
  • Text and Document Classification Technologies
  • Semantic Web and Ontologies
  • Service-Oriented Architecture and Web Services
  • Digital Accessibility for Disabilities
  • Hand Gesture Recognition Systems
  • Context-Aware Activity Recognition Systems
  • Spam and Phishing Detection
  • Web Data Mining and Analysis
  • Sentiment Analysis and Opinion Mining
  • Smart Parking Systems Research
  • Advanced Malware Detection Techniques
  • Caching and Content Delivery
  • Speech Recognition and Synthesis
  • Intelligent Tutoring Systems and Adaptive Learning
  • Artificial Intelligence in Healthcare
  • Personal Information Management and User Behavior
  • Rough Sets and Fuzzy Logic

University of Engineering and Technology Lahore
2016-2025

National College of Business Administration and Economics
2024

Universitas Putera Batam
2024

University of Faisalabad
2023

Superior University
2020

Islamia University of Bahawalpur
2020

University of Engineering and Technology Taxila
2016

Center for Research and Advanced Studies of the National Polytechnic Institute
2002-2016

There is a widespread increase of adoption e-learning platforms, there great need to develop effective methods for assessing students' cognitive abilities deal with that environments. Traditional assessment improve in terms analyzing the diverse range skills and knowledge students acquire during online learning. The current state research work considers different levels Bloom's Taxonomy, which are used evaluate performance based on given text analysis. For this purpose, Software Engineering...

10.1109/access.2024.3356613 article EN cc-by-nc-nd IEEE Access 2024-01-01

In an e-learning environment, question levels are based on Bloom’s Taxonomy (BT), which normally classifies a course’s learning objectives into diverse levels. As per the previous literature, assessment procedure lacks accuracy and results in redundant keywords when automatically assigning taxonomic categories using keyword-based approach. These assessments considered challenging as far e-learning-based students concerned, text feed is only instrumental testing part. Student limited to...

10.3390/info16020093 article EN cc-by Information 2025-01-26

Approximately 900 million individuals globally are said to have diseases associated with the skin, thus becoming one of prevalent in world. Common conditions southern Punjab acne, psoriasis, and fungal infections. Eczema has red tones is usually marked by dryness itchiness. Psoriasis creates reddish patches due scale formation occurrence thick patches. There common forms fungi infections known as ringworm jock itch mostly favored when a warm damp environment. Only through quick detection...

10.30537/sjcms.v8i2.1541 article EN cc-by-nc Sukkur IBA Journal of Computing and Mathematical Sciences 2025-02-28

A comparison of 10 most popular Multiple Sequence Alignment (MSA) tools, namely, MUSCLE, MAFFT(L-INS-i), MAFFT (FFT-NS-2), T-Coffee, ProbCons, SATe, Clustal Omega, Kalign, Multalin, and Dialign-TX is presented. We also focused on the significance some implementations embedded in algorithm each tool. Based simulated trees different number taxa generated by R, 400 known alignments sequence files were constructed using indel-Seq-Gen. total 4000 test to study effect length, indel size, deletion...

10.4137/ebo.s19199 article EN cc-by-nc Evolutionary Bioinformatics 2014-01-01

The performance of speaker identification systems has improved due to recent advances in speech processing techniques but there is still need improvement term text-independent and suitable modelling for voice feature vectors. It becomes difficult person recognize a when an uncontrollable noise adds it. In this paper, vectors from are extracted by using mel-frequency cepstral coefficients vector quantization technique implemented through Linde-Buzo-Gray algorithm. Two purposeful databases...

10.1109/iita.2009.420 article EN 2009-01-01

The rapidly increasing adaptation of Big data technologies in biomedicine, has introduced a revolution and medical research practice. Trending high-throughput analysis techniques, have converted the appearance biological system to acquire idolization methods for complicated diseases. Majority acquired Big-data models govern materialization illustrating medicine. This transformation aims at quantification period P4 medicine that will then progressively be more predictive, personalized,...

10.1109/hora49412.2020.9152842 article EN 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) 2020-06-01

Blockchain has been making some vital progress in these days because of its secure and amiable structure. It is a distributed decentralized database that deals with transactions. The blockchain also emerging the healthcare sector rapidly. Healthcare now become prestigious part our life as it life-changing innovations day by whether about artificial intelligence influence diagnostic system, expert patient's data storage, retrieval, security, any other smart services. Smart health most...

10.1109/hora49412.2020.9152846 article EN 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) 2020-06-01

In the internet of things (IoT) networks, machine learning (ML) is significantly used for malware and adversary detection. Recently, research has shown that adversarial attacks have put ML-based models at risk. This problem exacerbated in an IoT environment because absence adequate security measures. Consequently, it crucial to evaluate strength such detectors using powerful samples. The existing sample generation strategies either rely on high-level image features or unfiltered feature set,...

10.1109/access.2023.3334645 article EN cc-by-nc-nd IEEE Access 2023-01-01

In Islamic religion, mistakes in recitation of holy Quran (the sacred book Muslims) are forbidden. Mistakes can be missing words, verse, misreading Harakat (pronunciations, punctuations, and accents). Thus, a hafiz/reciter who memorizes the Quran, needs other hafiz/tutor listens points oral mistakes. Due to seriously commitment, availability expertise hafiz also questionable. A listener make while hearing imputable environmental interruptions like noise, attention. order tackle this issue,...

10.1109/micai.2010.11 article EN 2010-11-01

It is often uncomfortable for disabled individuals, especially those with vision impairment, to conduct educational activities in collaboration people that have perfect vision. This can be because of the former’s lack confidence, capability, and acceptance. Information communications technology (ICT) has played a vital role giving support visual impairments so they overcome their issues. study proposes innovative solutions address challenges faced by partially or completely visually impaired...

10.3390/sym11020238 article EN Symmetry 2019-02-15

The prevalence of cloud computing has resulted in an increased number services developed for the Web. Selecting appropriate service from amongst a lot commonly featured available become very difficult particularly non-IT users i.e. it is cumbersome to select that best suited their requirements. Quality (QOS) considered as one main criterion selection process. This paper focuses on method allowing specify perception quality criteria. Our approach based data mining technique clustering which...

10.1109/iceee.2014.6978334 article EN 2021 18th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE) 2014-09-01

The Mobile ad-hoc networks are auto configured systems where hubs can travel towards any direction. It doesn’t rely on other frame to build the framework. Because of its versatility, black hole is a real security issue be settled. occurs once malignant hub referred as goes into Black center point exhibits fake lead among methodology after all disclosure. Currently, varied strategies made arrangements for networks. Regardless, at interims seeing or hubs, entire frameworks exposed various...

10.5755/j01.itc.49.3.25265 article EN cc-by Information Technology And Control 2020-09-24

Electronic Learning (e-Learning) is used to educate people in these days. Using e-Learning, a number of world ranking universities are starting different courses for high school level degree and even at post graduate through distance learning. This paper describes the best-known machine learning techniques boost up e-Learning education standard model. Comprehensively supervised unsupervised described here paradigm auto reply students' questions. Web bot incorporated students who taking by...

10.1109/micai.2012.18 article EN 2012-10-01

As the trend to shop online is increasing day by and more people are interested in buying products of their need from stores. This type shopping does not take a lot time customer. Customer goes store, search item his/her place order. But, thing which face difficulty store bad quality product. order only looking at rating reading reviews related particular Such comments other source satisfaction for new product buyer. Here, it may be possible that single negative review changes angle customer...

10.1109/iceee.2019.8884529 article EN 2021 18th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE) 2019-09-01

This paper emphasizes importance and solution of big data problems through cloud computing. Knowledge embedded in generated by sensors, personal computers mobile devices is compelling many companies to spend millions dollars solve information knowledge extraction make intelligent decisions time for the growth their businesses. Google BigQuery, Rackspace Big Data Cloud, Amazon Web Services are some platforms that providing limited solutions infrastructures deal with problems. However, our...

10.1109/honet.2014.7029370 article EN 2014-12-01
Coming Soon ...