- Anomaly Detection Techniques and Applications
- Advanced Text Analysis Techniques
- Image Retrieval and Classification Techniques
- Topic Modeling
- IoT and Edge/Fog Computing
- Time Series Analysis and Forecasting
- Handwritten Text Recognition Techniques
- EEG and Brain-Computer Interfaces
- Retinal Imaging and Analysis
- Text and Document Classification Technologies
- Cutaneous Melanoma Detection and Management
- Sentiment Analysis and Opinion Mining
- Natural Language Processing Techniques
- Video Surveillance and Tracking Methods
- Advanced Image and Video Retrieval Techniques
- Video Analysis and Summarization
- Image Processing and 3D Reconstruction
- Optical Coherence Tomography Applications
- Digital Imaging for Blood Diseases
- ECG Monitoring and Analysis
- Energy Harvesting in Wireless Networks
- AI in cancer detection
- Radiomics and Machine Learning in Medical Imaging
- Advanced Malware Detection Techniques
- Vehicle License Plate Recognition
Bahria University
2016-2025
University of Peshawar
2022
St. George's University
2017-2020
Western University
2020
Jiangsu University of Science and Technology
2019
Seattle Foundation
2017
Seattle University
2017
Penn State Milton S. Hershey Medical Center
2017
University of Chile
2016
University of the Punjab
2016
Due to the monumental growth of Internet applications in last decade, need for security information network has increased manifolds. As a primary defense infrastructure, an intrusion detection system is expected adapt dynamically changing threat landscape. Many supervised and unsupervised techniques have been devised by researchers from discipline machine learning data mining achieve reliable anomalies. Deep area which applies neuron-like structure tasks. profoundly changed way we approach...
The IoT (Internet of Things) connect systems, applications, data storage, and services that may be a new gateway for cyber-attacks as they continuously offer in the organization. Currently, software piracy malware attacks are high risks to compromise security IoT. These threats steal important information causes economic reputational damages. In this paper, we have proposed combined deep learning approach detect pirated malware-infected files across network. TensorFlow neural network is...
Epilepsy is a very common neurological disease that has affected more than 65 million people worldwide. In 30 % of the cases, by this cannot be cured with medicines or surgery. However, predicting seizure before it actually occurs can help in its prevention; through therapeutic intervention. Studies have observed abnormal activity inside brain begins few minutes start seizure, which known as preictal state. Many researchers tried to find way for state but an effective prediction terms high...
Interoperability remains a significant burden to the developers of Internet Things’ Systems. This is due fact that IoT devices are highly heterogeneous in terms underlying communication protocols, data formats, and technologies. Secondly lack worldwide acceptable standards, interoperability tools remain limited. In this paper, we proposed an based Semantic Model (IoT-SIM) provide among healthcare domain. Physicians communicate their patients with monitor current health status. Information...
With the evolution of fog computing, processing takes place locally in a virtual platform rather than centralized cloud server. Fog computing combined with is more efficient as alone does not serve purpose. Inefficient resource management and load balancing leads to degradation quality service well energy losses. Traffic overhead increased because all requests are sent main server causing delays which cannot be tolerated healthcare scenarios. To overcome this problem, authors consolidating...
Abstract There is huge amount of content produced online by amateur authors, covering a large variety topics. Sentiment analysis (SA) extracts and aggregates users’ sentiments towards target entity. Machine learning (ML) techniques are frequently used as the natural language data in abundance has definite patterns. ML adapt to domain specific solution at high accuracy depending upon feature set used. The lexicon-based techniques, using external dictionary, independent prevent overfitting but...
Context: Recently, research community of certain domain showing their eagerness towards the use social media networks to gain constructive knowledge in decision making and automation, such as aid perform software development activities, crypto-currencies usage, network detection recommendation so on. besides other domains eHealth, big data analytics has become hot topic predict patient mental illness involved either depression, schizophrenia, eating disorders, anxiety or addictive behaviors....
In the current era, information security is on its top priority for all organizations. The individuals, government officials, and military with rapid development of Internet technologies like Things (IoT), big data, cloud computing facing data problems. As massive rate growth, it a challenging task researchers, that how to manage vast amount safely effectively while designing smart cities. It has been quite easy produce an illegal copy digital contents. verification content one major issues...
Epilepsy is a common brain disorder that causes patients to face multiple seizures in single day. Around 65 million people are affected by epilepsy worldwide. Patients with focal can be treated surgery, whereas generalized epileptic managed medications. It has been noted more than 30% of cases, these medications fail control seizures, resulting accidents and limiting the patient’s life. Predicting such prior commencement an oncoming seizure critical so preventive medicines before it occurs....