- Blockchain Technology Applications and Security
- IoT and Edge/Fog Computing
- Internet of Things and AI
- Cloud Computing and Resource Management
- Cloud Data Security Solutions
- Coding theory and cryptography
- Artificial Intelligence in Healthcare
- Cryptographic Implementations and Security
- Network Security and Intrusion Detection
- FinTech, Crowdfunding, Digital Finance
- Chaos-based Image/Signal Encryption
- Organizational and Employee Performance
- IoT Networks and Protocols
- Brain Tumor Detection and Classification
- Energy Efficient Wireless Sensor Networks
- Sentiment Analysis and Opinion Mining
- Imbalanced Data Classification Techniques
- Machine Learning in Healthcare
- Advanced Malware Detection Techniques
- Advanced Steganography and Watermarking Techniques
- COVID-19 diagnosis using AI
- Advanced Data and IoT Technologies
- Machine Learning and ELM
- Privacy-Preserving Technologies in Data
- Anomaly Detection Techniques and Applications
Jazan University
2018-2025
Begum Rokeya University
2023-2024
Rajendra Institute of Medical Sciences
2023
Mahatma Gandhi Medical College and Research Institute
2023
Computer Algorithms for Medicine
2023
Aligarh Muslim University
2011-2021
Baba Farid University of Health Sciences
2021
University of Kashmir
2019
Ambedkar University Delhi
2019
The number of individuals who use credit cards has increased dramatically in recent decades, as the volume card fraud transactions. Consequently, banks and companies must be able to classify fraudulent transactions so that clients do not have pay for products they did purchase. Data Science can easily tackle such challenges, value Machine Learning methodologies cannot emphasized. study demonstrates how model utilizing multiple classifiers data balance using machine learning approaches about...
Major problems and issues in Internet of Things (IoT) systems include load balancing, lowering operational expenses, power usage. IoT devices typically run on batteries because they lack direct access to a source. Geographical conditions that make it difficult the electrical network are common cause. Finding ways ensure consume least amount energy possible is essential. When experiencing high traffic, locating interacting with next hop critical. best route balance by switching less crowded...
Brain tumors occur due to the expansion of abnormal cell tissues and can be malignant (cancerous) or benign (not cancerous). Numerous factors such as position, size, progression rate are considered while detecting diagnosing brain tumors. Detecting in their initial phases is vital for diagnosis where MRI (magnetic resonance imaging) scans play an important role. Over years, deep learning models have been extensively used medical image processing. The current study primarily investigates...
Alzheimer’s disease (AD) is a growing public health crisis, very global concern, and an irreversible progressive neurodegenerative disorder of the brain for which there still no cure. Globally, it accounts 60–80% dementia cases, thereby raising need accurate effective early classification. The proposed work used healthy aging dataset from USA focused on three transfer learning approaches: VGG16, VGG19, Alex Net. This leveraged how convolutional model pooling layers to improve reduce...
The land registry system is one of the very important department in any governance that stores records ownership. There are various issues and loopholes existing give rise to corruption disputes. This requires a significant chunk valuable government resources from judiciary law enforcement agencies settling these issues. Blockchain technology has potential counter sort out related with like tempering records, trading same piece more than buyer. In this paper, secure reliable framework for...
Providing an identity solution is essential for a reliable blockchain-based land registry system. A secure, privacy-preserving, and efficient but challenging. This paper examines the current literature provides systematic review in three stages based on research questions (RQ) that show assessment interpretation process step by step. Based parameters RQ specified methodology section, total of 43 primary articles have been selected from 251 extracted various scientific databases. The majority...
The Internet of Things (IoT) has radically transformed how patient information and healthcare monitoring are monitored recorded revolutionized the area by ensuring regular 24 × 7 tracking without costly restricted human resources with a low mistake probability. Medical (IoMT) is subsection things that uses medical equipment as or nodes to enable cost-effective efficient recording. IoMT can cope wide range problems, including observing patients in hospitals, their homes, assisting consulting...
The Internet of Things (IoT) and blockchain (BC) are reliable technologies widely employed in various contexts. IoT devices have a lot potential for data sensing recording without human intervention, but they also processing security issues. Due to their limited computing power, cannot use specialized cryptographic mechanisms. There challenges when using traditional techniques transport store medical records securely. general public’s health depends on having an electronic record (EHR)...
Dementias that develop in older people test the limits of modern medicine. As far as dementia goes, Alzheimer’s disease (AD) is by most prevalent form. For over fifty years, medical and exclusion criteria were used to diagnose AD, with an accuracy only 85 per cent. This did not allow for a correct diagnosis, which could be validated through postmortem examination. Diagnosis AD can sped up, course predicted applying machine learning (ML) techniques Magnetic Resonance Imaging (MRI) techniques....
Attributed networks are prevalent in the current information infrastructure, where node attributes enhance knowledge discovery. Anomaly detection attributed is gaining attention for its potential uses cybersecurity, finance, and healthcare. Recognizing complicated relationship between network topology crucial embedding anomaly detection. Nevertheless, there few approaches available to directly represent these two perspectives of property topology. Approaches utilizing reconstruction error...
The large COVID-19 disease outbreak had a devastating impact on the entire world, with Bangladesh being one of worst-affected nations. epidemic worsened situation small and medium-sized companies (SMEs) in Bangladesh. goal this study is to examine possibilities difficulties faced by SMEs Bangladesh's Rangpur district during transition new normal. research methodology combines an exploratory technique quantitative methodology. designed both primary secondary data. Researchers collected data...
This research addresses the pressing challenge of intrusion detection and prevention in Wireless Sensor Networks (WSNs), offering an innovative comprehensive approach. The leverages Support Vector Regression (SVR) models to predict number barriers necessary for effective while optimising their strategic placement. paper employs Ant Colony Optimization (ACO) algorithm enhance precision barrier placement resource allocation. integrated approach combines SVR predictive modelling with ACO-based...
The land registry system is one of the essential components any governance model required to ascertain ownership records uniquely. This paper reviews existing literature and provides a detailed review consisting 3 stages based on three research questions (RQ) that highlight step by evaluation analysis. We selected 48 primary articles out 477 extracted from different scientific databases criteria RQ defined in method section. majority these papers focus assessing identity issues related...
Providing a system user with unique and secure identity is prerequisite for authentication authorization aspects of security system. It generally understood that the existing digital systems store details in centralized databases, users databases which do not have any control over them. These vulnerabilities traditional identities make them susceptible to various malicious assaults modifications. Users’ personally identifiable information (PII) may leak through these solutions can...
Energy demand is increasing rapidly due to rapid growth and industrialization. It becoming more complex manage generation distribution the diversification of energy sources minimize carbon emissions. Smart grids reliable power efficiently cater a large geographical area population, but their centralized structure makes them vulnerable. Cybersecurity threats have become significant concern with these systems’ complexity connectivity. Further transmission losses its vulnerability single point...
The spectacular concept of integrating OCR with the Internet Things (IoT) and Wireless Sensor Networks (WSN), presented in this study, intends to increase autonomy social inclusion people visual impairments deaf-blindness. This application converts text from photographs into real-time Braille representations by utilizing capabilities Optical Character Recognition (OCR) technology, displays, IoT. is a tactile form writing which assists visually impaired representing letters numbers raised...