- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Recommender Systems and Techniques
- Image and Video Quality Assessment
- Expert finding and Q&A systems
- Cryptography and Data Security
- Handwritten Text Recognition Techniques
- Education and Islamic Studies
- Image Retrieval and Classification Techniques
- Sentiment Analysis and Opinion Mining
- Topic Modeling
- Solar Radiation and Photovoltaics
- Misinformation and Its Impacts
- Advanced Text Analysis Techniques
- Families in Therapy and Culture
- scientometrics and bibliometrics research
- ERP Systems Implementation and Impact
- Artificial Intelligence in Healthcare
- Non-Invasive Vital Sign Monitoring
- Web Data Mining and Analysis
- EEG and Brain-Computer Interfaces
- Technology Adoption and User Behaviour
- Mobile Crowdsensing and Crowdsourcing
- Spam and Phishing Detection
- Image Processing and 3D Reconstruction
Mehran University of Engineering and Technology
2023
COMSATS University Islamabad
2017-2023
Universitas Internasional Semen Indonesia
2023
International Islamic University, Islamabad
2013-2021
The spreading of accidental or malicious misinformation on social media, specifically in critical situations, such as real-world emergencies, can have negative consequences for society. This facilitates the spread rumors media. On users share and exchange latest information with many readers, including a large volume new every second. However, updated news sharing media is not always true.In this study, we focus challenges numerous breaking-news propagating networks rather than long-lasting...
ABSTRACT Session initiation protocol (SIP) provides the basis for establishing voice over internet sessions after authentication and exchanging signaling messages. SIP is one of significant extensively used protocols in multimedia stack. Since RFC2617 was put forth, numerous schemes have been presented to overcome flaws. Recently, 2012, Tang Liu proposed based claimed eliminating threats Arshad Ikram protocol. However scheme can be made more robust by making further improvements, as former...
Summary Multiserver authentication complies with the up‐to‐date requirements of Internet services and latest applications. The multiserver architecture enables expedient subscribers on an insecure channel for delivery services. users rely a single registration trusted third party procurement from various servers. Recently, Chen Lee, Moon et al, Wang al presented key agreement schemes that are found to be vulnerable many attacks according our analysis. Lee scheme was susceptible impersonation...
The intrinsic and liveness detection behavior of electrocardiogram (ECG) signals has made it an emerging biometric modality for the researcher with several applications including forensic, surveillance security. main challenge is low recognition performance datasets large populations, healthy heart-disease patients, a short interval ECG signal. This research proposes novel method feature-level fusion discrete wavelet transform one-dimensional convolutional recurrent neural network (1D-CRNN)....
Play Store reviews play an important role in demonstrating that decisions are made from the user's perspective, and contain a wealth of knowledge can be used to understand quality issues help developers build higher-quality mobile applications. Even for very information, it ensure authenticity user-generated content. In Store, wearable applications were recently launched, always open easy use, gradually being welcomed by users. Driven popularity self-interest, profit-incentive developing...
The Enterprise Resource Planning (ERP) system is a software solution that facilitates the integration of company's business processes to enhance its efficiency.The utilization licensed ERP systems, which entail significant costs, excludes Small and Medium Enterprises (SMEs) from accessing such systems.Consequently, SMEs require open-source systems.This study aims identify essential criteria sub-criteria must be prioritized in selection also determine ideal alternatives for by incorporating...
Renewable energy, with its abundant and sustainable potential, has emerged as a critical component of the global energy landscape. The need for accurate power forecasting is evident due to demands integrating renewable into existing grids, increasing load management, managing resources efficiently, reducing environmental impact. To address this introduce new era even more solar predictions, research paper presents comprehensive investigation. In pursuit, we an innovative Deep Neural Network...
This paper presents the research results on contribution of user-centered data mining based standard principles, focusing analysis survival and mortality lung cancer cases. Researchers used anonymized from previously diagnosed instances in health database to predict condition new patients who have not had their yet. Medical professionals specializing this field provided feedback usefulness software, which was constructed using WEKA tools Naive Bayes method. The article provide elements...
Information retrieval from huge social web data is a challenging task for conventional search engines.Recently, information filtering recommender systems may help to find movies, however, their services are limited because of not considering movie quality aspects in detail.Prediction movies can be improved by using the characteristics content about such as social-quality, tag quality, and temporal aspect.In this paper, we have proposed utilize several features user reputation predict popular...
With the increase in users of social media websites such as IMDb, a movie website, and rise publicly available data, opinion mining is more accessible than ever. In research field language understanding, categorization reviews can be challenging because human complex, leading to scenarios where connotation words exist. Connotation have different meaning their literal meanings. While representing word, context which word used changes semantics words. this work, categorizing with good...
In academia, choosing a research area is always too important because it determines the future of researchers. However, in current scenario, not possible for new researcher to identify attractive areas their interest based on published papers due huge amount data availability. Therefore, right great potential. If chosen by researcher, can help getting more citations and better outcome terms acceptability work. this paper, our focus was find scholar. The work done very limited therefore,...
The concept of cohesion is not only a semantics one that exists within the meaning text; it refers to grammatical relations Text exist surface structure text, and define as text. That why study important in text linguistics, especially holy Qur‘ān. Therefore ancient researchers have chosen different ways Qur‘ānic textual analysis. Arab started Cohesion prove “Mojza” “ijaaz” because its organization arrangement according “Nazem” “Insijaam” “Ittisaaq” “Iltehaam” many others. English term...
نظرية التماسك و قصة نوح عليه السلام: دراسة مقارنة لبداية والنهاية وملك جيم بائبل نموذجا The Textual grammar has become a separate field of modern linguistics. It is combination different lingual rules, methods and curriculums to analyze literary texts, religious Scriptures, human speeches/discourses in the criticism both languages literatures. However these studies became distinct area for research scientific advancement academic world general, especially Arab Muslim world. Many scholars...