Muhammad Bilal Qureshi

ORCID: 0000-0003-2985-6120
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • Distributed and Parallel Computing Systems
  • Parallel Computing and Optimization Techniques
  • EEG and Brain-Computer Interfaces
  • Brain Tumor Detection and Classification
  • IoT and Edge/Fog Computing
  • Cryptography and Data Security
  • Distributed systems and fault tolerance
  • Real-Time Systems Scheduling
  • Advanced Computing and Algorithms
  • Artificial Intelligence in Healthcare
  • Blind Source Separation Techniques
  • Embedded Systems Design Techniques
  • Machine Learning and ELM
  • Coding theory and cryptography
  • Electric Vehicles and Infrastructure
  • ECG Monitoring and Analysis
  • Machine Learning in Healthcare
  • Security in Wireless Sensor Networks
  • Functional Brain Connectivity Studies
  • Network Security and Intrusion Detection
  • Handwritten Text Recognition Techniques
  • Peer-to-Peer Network Technologies
  • Autism Spectrum Disorder Research
  • Vehicle License Plate Recognition

University of Management and Technology
2021-2025

COMSATS University Islamabad
2011-2023

Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology
2018-2021

Government of Khyber Pakhtunkhwa
2021

Autism spectrum disorder is a severe, life‐prolonged neurodevelopmental disease typified by disabilities that are chronic or limited in the development of socio‐communication skills, thinking abilities, activities, and behavior. In children aged two to three years, symptoms autism more evident easier recognize. The major part existing literature on covered prediction system based traditional machine learning algorithms such as support vector machine, random forest, multiple layer perceptron,...

10.1155/2023/4853800 article EN cc-by Journal of Healthcare Engineering 2023-01-01

In this paper, a model based on discrete wavelet transform and convolutional neural network for brain MR image classification has been proposed. The proposed is comprised of three main stages, namely preprocessing, feature extraction, classification. the median filter applied to remove salt-and-pepper noise from MRI images. transform, Harr used. model, 3-level decomposition images low-level detail reduce size Next, used classifying into normal abnormal. also prevalent method widely in...

10.3390/s21227480 article EN cc-by Sensors 2021-11-10

With technological advancement, cloud computing paradigms are gaining massive popularity in the ever-changing advancement. The main objective of system is to provide on-demand storage and resources users on pay-per-use policy. It allows small businesses use top-notch infrastructure at low expense. However, due resource sharing property, data privacy security significant concerns barriers for smart systems constantly transfer generated resources, which a third-party provider manages. Many...

10.3390/sym14040695 article EN Symmetry 2022-03-28

Conventional RSA algorithm, being a basis for several proposed cryptosystems, has remarkable security laps with respect to confidentiality and integrity over the internet which can be compromised by state-of-the-art attacks, especially, different types of data generation, transmission, analysis IoT applications. This threat hindrance is considered hard problem solve on classical computers. However, bringing quantum mechanics into account, concept no longer holds true. So, this calls out...

10.1109/access.2020.2995801 article EN cc-by IEEE Access 2020-01-01

Vaccine acceptance is a crucial component of viable immunization program in healthcare system, yet the disparities new and existing vaccination adoption rates prevail across regions. Disparities rate vaccine result low coverage slow uptake newly introduced vaccines. This research presents an innovative AI-driven predictive model, designed to accurately forecast within programs, while providing high interpretability. Primarily, contribution this study classify acceptability into Low, Medium,...

10.1038/s41598-024-76891-z article EN cc-by-nc-nd Scientific Reports 2024-11-04

An efficient resource allocation scheme plays a vital role in scheduling applications on high-performance computing resources order to achieve desired level of service. The major part the existing literature is covered by real-time services having timing constraints as primary parameter. Resource schemes for have been designed with various architectures (static, dynamic, centralized, or distributed) and quality service criteria (cost efficiency, completion time minimization, energy memory...

10.1177/1550147720932750 article EN cc-by International Journal of Distributed Sensor Networks 2020-08-01

Detection of epileptic seizures on the basis Electroencephalogram (EEG) recordings is a challenging task due to complex, non-stationary and non-linear nature these biomedical signals. In existing literature, number automatic seizure detection methods have been proposed that extract useful features from EEG segments classify them using machine learning algorithms. Some characterizing non-epileptic signals overlap; therefore, it requires analysis must be performed diverse perspectives. Few...

10.32604/cmc.2022.020348 article EN Computers, materials & continua/Computers, materials & continua (Print) 2021-10-11

Grid resource allocation mechanism maps tasks to the available grid resources according some predefined criterion, such as minimizing makespan or execution cost, load balancing, energy efficiency, maintaining user-defined task deadlines, and efficiently using memory. The minimization of is a dominant criterion more challenging when computationally intensive have realtime deadlines data requirements. Such require files for processing that are transferred from storage computing resources,...

10.1109/access.2017.2760801 article EN cc-by-nc-nd IEEE Access 2017-01-01

Datacentres provide the foundations for cloud computing, but require large amounts of electricity their operation. Approaches that promise to reduce power use by minimizing execution time, example using different scheduling and resource management techniques, are discussed in literature. This paper summarizes some most important techniques clouds focusing on consumption, covering VM-level, host-level task-level where promising approach is task level scheduling, with energy savings means load...

10.1109/access.2020.3020843 article EN cc-by IEEE Access 2020-01-01

Brain MRI classification is one of the key areas research. The brain can help radiologists in different disease diagnostics without invasive measures. a difficult task due to variance and complexity diseases. We have proposed novel efficient binary model for images. includes discrete wavelet transform (DWT) used features extraction, statistical diminishing number features, blended artificial neural network classification. with less challenging task. In this paper, we technique statical...

10.1109/access.2021.3132159 article EN cc-by IEEE Access 2021-01-01

In this paper, we have proposed a novel methodology based on statistical features and different machine learning algorithms. The model can be divided into three main stages, namely, preprocessing, feature extraction, classification. the preprocessing stage, median filter has been used in order to remove salt-and-pepper noise because MRI images are normally affected by type of noise, grayscale also converted RGB stage. histogram equalization enhance quality each channel. extraction channels,...

10.1155/2021/8608305 article EN Computational and Mathematical Methods in Medicine 2021-12-07

Abstract When there is a mismatch between the cardinality of periodic task set and priority levels supported by underlying hardware systems, multiple tasks are grouped into one class so as to maintain specific level confidence in their accuracy. However, such transformation achieved at expense loss schedulability original set. We further investigate aforementioned problem report following contributions: (i) novel technique for mapping unlimited reduced number classes that do not violate (ii)...

10.1515/amcs-2015-0051 article EN cc-by-nc-nd International Journal of Applied Mathematics and Computer Science 2015-12-01

The mobility of user equipment (UE) in cellular network is a challenging issue terms its management. Current traditional handover Long-Term Evolution (LTE) managed by evolved Node B or eNodeB (eNB) which decentralized solution. In contrast to existing technology, software defined (SDN) has the capability serving packets switching without involving SDN controller except for first one. We have proposed an SDN-based centralized solution management LTE network. Based on our solution, being keeps...

10.1155/2022/7387737 article EN Wireless Communications and Mobile Computing 2022-04-14

Among several approaches to privacy-preserving cryptographic schemes, we have concentrated on noise-free homomorphic encryption. It is a symmetric key encryption that supports operations encrypted data. We present fully (FHE) scheme based sedenion algebra over finite ℤ <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">n</sub> rings. The innovation of the compression 16-dimensional vector for application Frobenius automorphism. For sedenion, p <sup...

10.1109/access.2020.3007717 article EN cc-by IEEE Access 2020-01-01

Cloud computing is the de facto platform for deploying resource- and data-intensive real-time applications due to collaboration of large scale resources operating in cross-administrative domains. For example, systems are generated by smart devices (e.g., sensors homes that monitor surroundings real-time, security cameras produce video streams cloud gaming, social media streams, etc.). Such low-end form a microgrid which has low computational storage capacity hence offload data unto...

10.3390/en13215706 article EN cc-by Energies 2020-10-31

Wireless Sensor Networks (WSNs) provide noteworthy advantages over conventional methods for various real-time applications, i.e., healthcare, temperature sensing, smart homes, homeland security, and environmental monitoring. However, limited resources, short life-time network constraints, security vulnerabilities are the challenging issues in era of WSNs. Besides, WSNs performance is susceptible to anomalies, particularly misdirection attacks. The above-mentioned pose our attentions produce...

10.1109/iwcmc48107.2020.9148445 article EN 2022 International Wireless Communications and Mobile Computing (IWCMC) 2020-06-01

Load balancing among cores or systems plays a vital role in overall performance of High Performance Computing (HPC). Efficient results may not be obtained unless specific load is properly balanced HPC. The main focus this research multi-core environment by using task shifting (migration) and splitting mechanism. In mechanism having minimum all the tasks on high utilized core fully shifted migrated to low for balancing. mechanism, from shared core, loads cores. It concludes given that balance...

10.1109/icdim.2013.6694040 article EN 2013-09-01
Coming Soon ...