Nadeem Ahmed

ORCID: 0000-0003-3943-604X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Context-Aware Activity Recognition Systems
  • Advanced Malware Detection Techniques
  • Non-Invasive Vital Sign Monitoring
  • Data Mining Algorithms and Applications
  • IoT and Edge/Fog Computing
  • Artificial Intelligence in Healthcare
  • Sentiment Analysis and Opinion Mining
  • Data Stream Mining Techniques
  • Cybercrime and Law Enforcement Studies
  • Job Satisfaction and Organizational Behavior
  • ECG Monitoring and Analysis
  • Data Management and Algorithms
  • Spam and Phishing Detection
  • Rough Sets and Fuzzy Logic
  • Internet Traffic Analysis and Secure E-voting
  • Energy Efficient Wireless Sensor Networks
  • Biometric Identification and Security
  • Text and Document Classification Technologies
  • Currency Recognition and Detection
  • Morinda citrifolia extract uses
  • Gaze Tracking and Assistive Technology
  • Fish Biology and Ecology Studies
  • Blind Source Separation Techniques
  • Genetic Associations and Epidemiology

Presidency University
2023-2024

University of Maryland, Baltimore County
2023

Vellore Institute of Technology University
2016-2021

Shah Abdul Latif University
2021

Shaheed Benazir Bhutto University
2021

Wuhan University
2021

University of Karachi
2012-2020

Bangladesh University of Professionals
2020

Bangladesh University
2020

University of Asia Pacific
2015-2019

Human activity recognition (HAR) techniques are playing a significant role in monitoring the daily activities of human life such as elderly care, investigation activities, healthcare, sports, and smart homes. Smartphones incorporated with varieties motion sensors like accelerometers gyroscopes widely used inertial that can identify different physical conditions human. In recent research, many works have been done regarding recognition. Sensor data smartphone produces high dimensional feature...

10.3390/s20010317 article EN cc-by Sensors 2020-01-06

Human Activity Recognition (HAR) using embedded sensors in smartphones and smartwatch has gained popularity extensive applications health care monitoring of elderly people, security purpose, robotics, employees the industry, others. However, human behavior analysis accelerometer gyroscope data are typically grounded on supervised classification techniques, where models showing sub-optimal performance for qualitative quantitative features. Considering this factor, paper proposes an efficient...

10.3390/s20236990 article EN cc-by Sensors 2020-12-07

In modern era digital devices are the part and parcel in everyday life. Easy access to internet across globe has totally changed pattern of Web become main source acquiring knowledge information. Email is replacing postal mail system. Use computer a mandatory from primary education sector government level enterprise. Facebook, twitter, whatsapp, viber becoming way social communication. All these developments made life people easier comfortable but at same time crimes associated with...

10.1109/r10-htc.2017.8289074 article EN 2017-12-01

A controlled study was conducted to determine the efficiency of a topical ointment prepared from stem extract Morinda citrifolia against cutaneous leishmaniasis. Similarly, in vitro antileishmanial activity morindicone and morinthone isolated were investigated Leishmania major. These compounds displayed good activity. Out 40 patients, 50% showed an excellent response 30% exhibited improvement.

10.1177/1934578x1200700218 article EN Natural Product Communications 2012-02-01

Customer retention has been identified as one of the most crucial difficulties in every Business particularly grocery retail industry. In this context, an accurate forecast whether a client will leave organisation, also known churn prediction, is critical for businesses to undertake successful strategies. High rates result massive losses corporations because keeping existing customers more profitable than getting new ones and customer costs five times much old one. As result, firms should be...

10.30574/wjaets.2024.12.2.0310 article EN World Journal of Advanced Engineering Technology and Sciences 2024-07-26

Data processing means manipulating the input raw data using application program to get desired output. The main target behind is convert unusable into a usable form. Relational database management system (RDBMS) playing role for in most of organizations. MySQL, SQL Server, Oracle, SQLite are some well-known systems. Moving forward big technology becoming more admired towards many organizations as nature and size sets grow rapidly. Big particularly apt extreme large volume where conventional...

10.1109/icetss.2017.8324202 article EN 2017-08-01

Efficient Human Robot Interaction (HRI) interface is very much demandable for controlling the semi-autonomous robots. Hand gesture recognition an effective form of non-touch instruction. Thus, human hand mostly used technique HRI. However, in most research, some sensor devices or marker are incorporate with a large number image and sequence stored process machine learning techniques, which costly demand complex computation. From this point view, efficient dynamic movement trajectory system...

10.1109/ecice47484.2019.8942691 article EN 2019 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE) 2019-10-01

Floods are highly destructive natural disasters that result in significant economic losses and endanger human wildlife lives. Efficiently monitoring Flooded areas through the utilization of deep learning models can contribute to mitigating these risks. This study focuses on deployment specifically designed for classifying flooded non-flooded UAV images. In consideration computational costs, we propose modified version ResNet50 called Flood-ResNet50. By incorporating additional layers...

10.1109/icmla58977.2023.00077 article EN 2023-12-15

Convergence of information and communication on technology changed the life a common man over last few years. At same time it increases threats to man. In order overcome these situations lots research is carried out in direction network internet security. addition identification various attacks great challenge before taking any security measures. Identification phishing such as fake e-mails or websites one critical attack internetworking. It an illegal trick game that collects personal from...

10.1504/ijcnds.2017.082105 article EN International Journal of Communication Networks and Distributed Systems 2017-01-01

Convergence of information and communication on technology changed the life a common man over last few years. At same time it increases threats to man. In order overcome these situations lots research is carried out in direction network internet security. addition identification various attacks great challenge before taking any security measures. Identification phishing such as fake e-mails or websites one critical attack internetworking. It an illegal trick game that collects personal from...

10.1504/ijcnds.2017.10002738 article EN International Journal of Communication Networks and Distributed Systems 2017-01-01

The growing rate of cybercrime has turned into a crucial concern that makes people more afraid cyberwar than nuclear weapon and climate change. An alarming awareness level been observed in this study which is not satisfactory. A significant percentage the population unaware cybersecurity policies practices. Even relevant organizations, as well government, are concerned about issues cybercrime. variation essential to enrich Furthermore, it needs be monitored restructured with pace time. This...

10.1109/icaee48663.2019.8975603 article EN 2019-09-01

Activity identification based on machine learning for human computing aims to understand or capture the state of behavior, its environment, and integrate user by exploiting distinct types sensors give adjustment exogenous system. The ascent universal systems requires our environment a solid requirement novel methodologies Human Computer Interaction (HCI). recognition activities, commonly known as HAR can play vital task in this regard. has an appealing use health-care system monitoring Daily...

10.1109/ickii50300.2020.9318786 article EN 2020-08-21

Software cost estimation (SCE) of a project is pivotal to the acceptance or rejection development software project. Various SCE techniques have been in practice with their own strengths and limitations. The latest these object-oriented one. Currently approach for based on Line Code (LOC), function points, functions classes etc. Relatively less attention has paid component-based engineering (CBSE). So there pressing need search parameters/variables that vital role using CBSE which taken up...

10.48550/arxiv.1202.2511 preprint EN other-oa arXiv (Cornell University) 2012-01-01

This research is focussed on the security threats in Neighbour Discovery Protocol that an integral part of IPv6 Stateful Address Auto-configuration. Unreachability Detection one processes can be subject to issues due lack built-in authentication mechanism. We show it trivial for attacker node manipulate neighbour unreachability message exchanges poison cache entries other nodes malicious purposes. makes network vulnerable different types attacks. propose a distributed and lightweight process...

10.1109/trustcom/bigdatase/icess.2017.225 article EN 2017-08-01

An arrhythmia is a fluctuation in the continuous beat of heart (i.e., anomalous rhythm). Arrhythmia considered hazardous disease causing genuine medical problems patients, when left untreated. For saving lives, early diagnosis arrhythmias would be very conducive. The P-QRS-T wave Electrocardiogram (ECG) signal illustrates cardiac function. However, it tough task to extract discriminant information from large number data ECG signal. In this perspective, study exhibits novel approach for...

10.1109/hnicem.2018.8666331 article EN 2021 IEEE 13th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment, and Management (HNICEM) 2018-11-01
Coming Soon ...