- Formal Methods in Verification
- Software Reliability and Analysis Research
- Logic, programming, and type systems
- Low-power high-performance VLSI design
- Embedded Systems Design Techniques
- Radiation Effects in Electronics
- Software Testing and Debugging Techniques
- Safety Systems Engineering in Autonomy
- VLSI and Analog Circuit Testing
- Physical Unclonable Functions (PUFs) and Hardware Security
- Smart Grid Security and Resilience
- Parallel Computing and Optimization Techniques
- Security and Verification in Computing
- Logic, Reasoning, and Knowledge
- Petri Nets in System Modeling
- Real-Time Systems Scheduling
- Robotic Path Planning Algorithms
- Risk and Safety Analysis
- Numerical Methods and Algorithms
- Semiconductor materials and devices
- Advancements in Semiconductor Devices and Circuit Design
- Surgical Simulation and Training
- Advanced Memory and Neural Computing
- Model-Driven Software Engineering Techniques
- Integrated Circuits and Semiconductor Failure Analysis
National University of Sciences and Technology
2016-2025
Kuwait University
2025
Kuwait Petroleum Corporation (Kuwait)
2025
Concordia University
2013-2024
Tun Hussein Onn University of Malaysia
2024
University of the Sciences
2012-2023
University of Nizwa
2022
College of Applied Sciences, Nizwa
2022
Qassim University
2022
ORCID
2020
Many sampling based algorithms have been introduced recently. Among them Rapidly Exploring Random Tree (RRT) is one of the quickest and most efficient obstacle free path finding algorithm. Although it ensures probabilistic completeness, cannot guarantee optimal path. Star (RRT*), a recently proposed extension RRT, claims to achieve convergence towards solution thus ensuring asymptotic optimality along with completeness. However, has proven take an infinite time do so slow rate. In this paper...
Rapidly Exploring Random Tree (RRT) is one of the quickest and most efficient obstacle free path finding algorithm. However, it cannot guarantee optimal path. A recently proposed extension RRT, known as Star (RRT*), claims to achieve convergence towards solution but has been proven take an infinite time do so with a slow rate. To overcome these limitations, we propose RRT*, called RRT*-Smart, which aims accelerate its rate reach optimum or near at much faster reduced execution time. Our...
Approximate adders are widely being advocated as a means to achieve performance gain in error resilient applications. In this paper, generic methodology for analytical modeling of probability occurrence and the Probability Mass Function (PMF) value selected class approximate is presented, which can serve metrics comparative analysis various their configurations. The proposed model applicable that comprise subadder units uniform well non-uniform lengths. Using systematic methodology, we...
Hand deformities often become a major obstacle in conducting everyday tasks for many people around the globe. Rehabilitation procedures are widely used strengthening hand muscles, which turn leads to restoration of functionality affected hand. This paper conducts survey various wearable technologies that can be accurately quantify rehabilitation progress terms fingers' joint angles. Based on data acquisition methods, these mainly divided into six categories: 1) Flex sensor based; 2)...
Abstract Background Chronic Kidney Disease (CKD), i.e., gradual decrease in the renal function spanning over a duration of several months to years without any major symptoms, is life-threatening disease. It progresses six stages according severity level. categorized into various based on Glomerular Filtration Rate (GFR), which turn utilizes attributes, like age, sex, race and Serum Creatinine. Among multiple available models for estimating GFR value, Epidemiology Collaboration (CKD-EPI),...
Sign language recognition (SLR) enables the deaf and speech-impaired community to integrate communicate effectively with rest of society. Word level or isolated SLR is a fundamental yet complex task main objective using models correctly recognize signed words. consists very fast hand, body, face movements, mouthing cues that make challenging. Several input modalities; RGB, optical Flow, RGB-D, pose/skeleton have been proposed for SLR. However, complexity these modalities state-of-the-art...
Users hesitate to submit negative feedback in reputation systems due the fear of retaliation from recipient user. A privacy preserving protocol protects users by hiding their individual and revealing only score. We present a for malicious adversarial model. The this model actively attempt learn private values honest as well disrupt protocol. Our does not require centralized entities, trusted third parties, or specialized platforms, such anonymous networks hardware. Moreover, our is...
Abstract Background Stunting is a major public health issue in most of developing countries. Although, its worldwide prevalence decreasing slowly but the number stunted children still rising Pakistan. highly associated with several long-term consequences, including higher rate mortality and morbidity, deficient cognitive growth, school performance, learning capacity, work capacity productivity. To prevent stunting, we proposed Diagnostic Education app. This app includes detailed knowledge...
The risk of sustaining heavy injuries through accidental falls creates a major medical problem for elderly people. This paper conducts survey the various automatic techniques and methods proposed to detect anomalies in movements elderly, monitoring their daily life activities. These can be broadly divided into three main categories: 1) Video Analysis Based; 2) Acoustic Ambience Sensor 3) Kinematic Based. critically analyzes methodologies, comparing strengths weaknesses. We further propose...
Despite its great importance, modern network infrastructure is remarkable for the lack of rigor in engineering. The Internet which began as a research experiment was never designed to handle users and applications it hosts today. formalization architecture meant limited abstractions modularity, especially control management planes, thus requiring every new need protocol built from scratch. This led an unwieldy ossified resistant any attempts at formal verification, culture where expediency...
The Internet of Things (IoT) is being deployed for a plethora use-case scenarios. In any deployment, number configuration choices are available that achieve the mission goal. However, IoT security incidents have demonstrated different configurations vulnerable to varied risk levels. We propose IoTRiskAnalyzer framework formally and quantitatively analyze these risks using probabilistic model checking. takes vulnerability scores, candidate configurations, attacker's capabilities as inputs. It...
Approximate multipliers are gaining importance in energy-efficient computing and require careful error analysis. In this paper, we present the probability analysis for recursive approximate with partial products. Since these constructed from smaller multiplier building blocks, propose to derive an arbitrary bit-width probabilistic model of basic block distributions inputs. The is based on common features identified by carefully studying behavioral state-of-the-art designs. By further upon...
Globalization trends in integrated circuit (IC) design are leading to increased vulnerability of ICs against hardware Trojans (HT). Recently, several side channel parameters based techniques have been developed detect these that require golden as a reference model, but due the widespread usage IPs, most system-on-chip (SoC) do not reference. Hardware intellectual property (IP)-based SoC designs considered major concern for future circuits. Most state-of-the-art runtime Trojan detection...
Approximate circuits exploit error resilience property of applications to tradeoff computation quality (accuracy) for gaining advantage in terms performance, power, and/or area. While state-of-the-art low-latency approximate adders provide an accuracy-area-latency configurable design space, the selection a particular configuration from space is still manually done. In this paper, we analytically analyze different structural properties formulate new adder model, Quality-area optimal...
The Multiply-Accumulate Unit (MAC) is an integral computational component of all digital signal processing (DSP) architectures and thus has a significant impact on their speed power dissipation. Due to extraordinary explosion in the number battery-powered “Internet Things” (IoT) devices, need for reducing consumption DSP tremendously increased. Approximate computing (AxC) been proposed as potential solution this problem targeting error-resilient applications. In paper, we present novel FPGA...
Approximate multipliers are widely being advocated for energy-efficient computing in applications that exhibit an inherent tolerance to inaccuracy. In this paper, we identify three decisions design and evaluation of approximate multiplier circuits: (1) the type full adder (FA) used construct multiplier, (2) architecture, i.e., array or tree, (3) placement sub-modules exact target module. Based on FA cells implemented at transistor level (TSMC65nm), developed several building blocks 8x8...
Globalization trends in integrated circuit (IC) design using deep submicron (DSM) technologies are leading to increased vulnerability of ICs against malicious intrusions. These intrusions referred as hardware Trojans. One way address this threat is utilize unique electrical signatures ICs. However, technique requires analyzing extensive sensor data detect the intruded circuits. In order overcome limitation, we propose combine signature extraction mechanism with machine learning algorithms...
Low-power approximate adders provide basic building blocks for computing hardware that have shown remarkable energy efficiency error-resilient applications (like image/video processing, computer vision, etc.), especially battery-driven portable systems. In this paper, we present a novel scalable, fast yet accurate analytical method to evaluate the output error probability of multi-bit low power predetermined input bits. Our recursively computes by considering cases only, which are...