- Advanced Authentication Protocols Security
- Genetics, Bioinformatics, and Biomedical Research
- RFID technology advancements
- Internet of Things and Social Network Interactions
- Impact of Light on Environment and Health
- Spam and Phishing Detection
- Gene expression and cancer classification
- Cryptography and Data Security
- Machine Learning in Bioinformatics
- Access Control and Trust
- Non-Invasive Vital Sign Monitoring
- IoT-based Smart Home Systems
- Sentiment Analysis and Opinion Mining
- Biometric Identification and Security
- Privacy-Preserving Technologies in Data
- Vehicular Ad Hoc Networks (VANETs)
- Adversarial Robustness in Machine Learning
- Network Security and Intrusion Detection
- User Authentication and Security Systems
- ECG Monitoring and Analysis
- Heart Rate Variability and Autonomic Control
- Enzyme Structure and Function
- Protein Structure and Dynamics
National Yunlin University of Science and Technology
2023-2025
COMSATS University Islamabad
2018-2020
Cyber Defense Agency (United States)
2019
The continuous revolution in Artificial Intelligence (AI) has played a significant role the development of key consumer applications, including Industry 5.0, autonomous decision-making, fault diagnosis, etc. In practice, and intelligent robots flying vehicles (i.e., drones) are also becoming integral part 5.0. These attaining importance nowadays because their applications electronics. However, there may be numerous privacy issues such an infrastructure. Nevertheless, neural computing-driven...
Vehicular network technology has made substantial advancements in recent years the field of Intelligent Transportation Systems. Cloud Computing (VCC) emerged as a novel paradigm with increase data exchange within ad-hoc networks (VANETs). VCC integrates cloud computing, vehicular networking, and Internet Things (IoT) technologies. It enables Infrastructure-to-Vehicle (I2V), Vehicle-to-Vehicle (V2V), Vehicle-to-Device (V2D) communication. optimizes vehicle, infrastructure, IoT resources while...
Acquiring sensitive information from the user in some malicious web pages which looks like legitimate webpage and they do a kind of criminal activity that is known as phishing electronic world. An attacker can use this or fraud by using such websites, severe risk to users for their personal confidential information. So, field e-banking e-commerce, act makes threat all users. In paper mainly discerning different features legitimate, suspicious websites. These are fed machine learning...
Patient wears a heartbeat sensor bracelet and set the settings accordingly. Doctors get notification via different use of technology if patient's is out range to given specific limits monitor heart rate very important for patients because it shows condition there any disease that will be identifiable. Although Electrocardiography (ECG) used check heartbeat, machine rare form. A method could which in sizes shapes are more natural way measure most them available smart straps, smartphone so on....
Due to the rapid growth of data in field big and bioinformatics, analysis management is a very difficult task for scientist researchers. Data exists many formats like form groups clusters. The that exist group have some repetition patterns called Motifs. A lot tools techniques are available literature detect motifs different fields neural networks, antigen/antibody protein, metabolic pathways, DNA/RNA sequences Protein-Protein Interactions (PPI). In this paper, motif detection done tumor...
In a smart city, the use of wireless sensor network is an emerging technology, and it provides many benefits in terms communication, energy, cost. We have focused on energy efficient lighting system. our proposed model we divided street lights usage into three categories: low, moderate high. The light low daylight, when average traffic roads high heavy roads. Street turn vehicle enters passage after sensing its entry within region. deployed system with facility solar panel so that devices...
The protein data bank (PDB) currently holds over 140,000 biomolecular structures and continues to release new every week. PDB is an essential resource the structural bioinformatics community develop software that mine, use, categorize, analyze such data. In this paper, comprehension streamlining of protein-ligand connections are instrumental in restorative scientists exploring potential medication competitors. An amazing independent apparatus for systems which helped structure. scholarly...
In a smart city, the use of wireless sensor network is an emerging technology, and it provides many benefits in terms communication, energy, cost. We have focused on energy efficient lighting system. our proposed model we divided street lights usage into three categories: low, moderate high. The light low daylight, when average traffic roads high heavy roads. Street turn vehicle enters passage after sensing its entry within region. deployed system with facility solar panel so that devices...