Zahid Rashid

ORCID: 0000-0003-4057-3455
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Ergonomics and Musculoskeletal Disorders
  • Information and Cyber Security
  • Spam and Phishing Detection
  • Web Data Mining and Analysis
  • Effects of Vibration on Health
  • Access Control and Trust
  • Musculoskeletal pain and rehabilitation
  • Digital Platforms and Economics
  • Liver Disease Diagnosis and Treatment
  • Neonatal and Maternal Infections
  • Pediatric health and respiratory diseases
  • Security and Verification in Computing
  • Abdominal Trauma and Injuries
  • Infant Nutrition and Health
  • Oil, Gas, and Environmental Issues
  • Ergonomics and Human Factors
  • Human-Automation Interaction and Safety
  • Global Energy Security and Policy
  • Quality and Management Systems
  • Biliary and Gastrointestinal Fistulas
  • PI3K/AKT/mTOR signaling in cancer
  • Data Visualization and Analytics
  • Data Mining Algorithms and Applications

University of Engineering and Technology Taxila
2017-2024

Seoul National University
2019-2024

Allama Iqbal Medical College
2023

National University of Sciences and Technology
2010-2016

Geisinger Medical Center
2003-2004

Silvio Danese Remo Panaccione Brian G. Feagan Anita Afzali David T. Rubin and 95 more Bruce E. Sands Walter Reinisch Julián Panés Aparna Sahoo Natalie A. Terry Daphne Chan Chenglong Han Mary Ellen Frustaci Zijiang Yang William J. Sandborn Tadakazu Hisamatsu Jane M. Andrews Geert R. DʼHaens Oleksandr Oliinyk Leonid Bilіanskyi Jadwiga Gniady-Jastrzebska Robert Petryka Tomasz Arłukowicz Piotr Gietka Marcin Zmudziński Syed Mumtaz Douglas C. Wolf Katarzyna Wójcik‐Pszczoła George Duvall Monika Augustyn Rafał Filip Dino Tarabar Tkachev Av Ursula Seidler Eran Zittan Juris Pokrotnieks О. Б. Щукина Andro Machavariani Laura Loy Niazy Abu-farsakh Pesegova Marina S Sreckovic Martin Laclav Shu‐Chen Wei Daniel Suiter A Borsuk Xavier Hébuterne Carsten Büning Adi Lahat-Zok Wit Danilkiewicz Bernadetta Frysna Ivana Jovicic Olena Datsenko Maninder Guram Animesh Jain Zahid Rashid Sonja Heeren Natallia Shulga Ivan Timkin Srdjan Gornjakovic Milan Lukáš Romain Altwegg Ariadne Desjeux Jean‐Marie Reimund Manana Giorgadze Christoph Jochum Hiroaki Ito Katsuhiko Nakai Tomohisa Takagi Osamu Zaha Chang‐Hwan Choi Taeoh Kim Jong Hun Lee Ieva Stundienė Ida Hilmi Rosaida Hj Md Said Jarosław Leszczyszyn Д. И. Абдулганиева Yu. A. Fominykh Svetlana V Maksyashina Jozef Baláž Manuel Van Domselaar Taylan Kav Patrick Dennis Patricia Henry Robert Holmes Christopher M. Johnson Matthew J. McBride H Sarles Gregory Moore R. E. Yakubtsevich Vinciane Muls Stevan Trbojević Waqqas Afif Çharles N. Bernstein Ivo Klarin Zuzana Šerclová Miroslava Volfová Pierre Desreumaux Cyrielle Gilletta

10.1016/s2468-1253(23)00318-7 article EN ˜The œLancet. Gastroenterology & hepatology 2023-12-15

Based on a comprehensive literature survey, the constructs of cybersecurity information sharing ecosystem have been defined in detail. Using this ecosystem, interrelationships among stakeholders with respect to are analyzed, value parameters determined, functions defined, and values obtained by through simulation calculated. Furthermore, it is investigated whether involved can create sufficient sustain market. The outcome research includes an economic model for evaluating creation...

10.1016/j.future.2021.05.033 article EN cc-by Future Generation Computer Systems 2021-05-31

To devise vision of the next generation web, deep web technologies have gained larger attention in a last few years.An eminent feature is automation tasks.A large part Deep comprises online structured domain specific databases that are accessed using query interfaces.The information contained these related to particular domain.This highly relevant more suitable for satisfying needs users and scale integration.In order make this extraction integration process easier, it necessary classify...

10.5120/2362-3099 article EN International Journal of Computer Applications 2011-04-30

Quality Management System (QMS) is expressed as the systematic set of operational procedures, policies and objectives which are documented, maintained controlled by company to achieve its quality continuous improvement in overall system organization. This study aims explore role QMS implementation improving customers’ satisfaction. The perception customers about products manufactured organization with without ISO 9001 have been explored. A modified SERVQUAL model has used covering six major...

10.1016/j.ifacol.2019.11.504 article EN IFAC-PapersOnLine 2019-01-01

10.1016/j.elerap.2020.100976 article EN Electronic Commerce Research and Applications 2020-04-25

Connected To idamsp.idamspJob Log for System Administration Tool DataDictionaryPublisher-------------------------------------------------------------- This job log consists of three distinct parts: 1) All print statements from the execution 2) The report tool which is saved as a separate document in Docbase /System/Sysadmin/Reports. 3) trace file results API, if job's level > 0. Note: and are also maintained under Documentum location in: $DOCUMENTUM/dba/log/ <docbase hex="" id=""...

10.1109/icet.2010.5638465 article EN 2010-10-01

Sui Northern Gas Pipelines Limited (SNGPL) is a natural-gas distribution company facing huge loss every year due to unaccounted for gas (UFG). In this research, mathematical model has been developed identify and control UFG losses in SNGPL. A survey of hundred consumers carried out factors contributing UFG. The significance each factor determined using Hypothesis Testing. results show that more emphasis should be on reducing leakage (17%). After necessary rectification anomalies which were...

10.1016/j.ifacol.2018.08.284 article EN IFAC-PapersOnLine 2018-01-01

Abstract In an advanced and dynamic cyber threat environment, organizations need to yield more proactive methods handle their defenses. Cyber data known as Threat Intelligence (CTI) of previous incidents plays important role by helping security analysts understand recent threats mitigations. The mass CTI is exponentially increasing, most the content textual which makes it difficult analyze. current visualization tools do not provide effective visualizations. To address this issue,...

10.2478/cait-2022-0019 article EN cc-by-nc-nd Cybernetics and Information Technologies 2022-06-01

Tactics Techniques and Procedures (TTPs) in cyber domain is an important threat information that describes the behavior attack patterns of adversary. Timely identification associations between TTPs can lead to effective strategy for diagnosing Cyber Threat Actors (CTAs) their vectors. This study profiles prevalence regularities CTAs. We developed a machine learning-based framework takes as input Intelligence (CTI) documents, selects most prevalent with high gain features based on them mine...

10.1109/icscee.2018.8538379 article EN 2018-07-01

Cyber threat attribution is the process of identifying actor an attack incident in cyberspace. An accurate and timely plays important role deterring future attacks by applying appropriate defense mechanisms. Manual analysis patterns gathered honeypot deployments, intrusion detection systems, firewalls, via trace-back procedures still preferred method security analysts for cyber attribution. Such are low-level Indicators Compromise (IOC). They represent Tactics, Techniques, Procedures (TTP),...

10.48550/arxiv.2307.10252 preprint EN cc-by arXiv (Cornell University) 2023-01-01

The development of simulation models for improving performances is trendy in manufacturing industries. This paper presents model evaluating and a utensils plant. Internal benchmarking employed comparison under exactly similar conditions. data all input variables collected statistical each process developed using Arena analyzer. then SIMIO to optimize throughput, work-in-process, cycle time. experiments have been performed various scenarios i.e. at different values the parameters. areas...

10.36909/jer.v8i1.6088 article EN cc-by-nc-nd Journal of Engineering Research 2020-03-05

Manual material handling and occupational tasks demanding physical push-pull activities are very common in various industrial settings regardless of automation. These may become the cause fatigue, accidents and/or different hazards if not properly focused to balance workload as per strength stamina worker. This cross-sectional study was conducted assess isometric pull apparel cart/trolley pullers muscular activity upper limbs. Jackson evaluation system used measure strengths while IXTA Data...

10.1016/j.promfg.2020.01.307 article EN Procedia Manufacturing 2019-01-01

Today, deep web comprises of a large part contents. Because this volume data, the technologies related to have gained larger attention in recent years. Deep mostly online domain specific databases, which are accessed by using query interfaces. These highly relevant databases more suitable for satisfying information needs users. In order make extraction easier, there is need classify into subject-specific self-descriptive categories. paper we present novel training-less classification...

10.1145/2095536.2095569 article EN 2011-12-05

A variety of traumatic and iatrogenic injuries can lead to bile duct leaks or fistula. These are commonly managed by transpapillary biliary stent placement, which reduces in traductal pressure facilitates closures. small percentage these lesions resistant this technique, however. We propose a novel endoscopic approach for that uses commercially available cryoprecipitate/thrombin, simultaneously administered during retrograde cholangiopancreatography (ERCP), creating fibrin plug within the...

10.21649/akemu.v10i2.1208 article EN Annals of King Edward Medical University 2016-05-11

Semantic web is the future realization of current web, in which resources are annotated with machine understandable meta-data, allowing automation tasks by employing these their correct contexts. Several notable technologies have been specified World Wide Web Consortium (W3C) for application development lifecycle semantic web. The worldwide adoption requires secure applications. Therefore research community has proposed to define and integrate security standards all phases development. For...

10.1109/cse-euc-dcabes.2016.263 article EN 2016-08-01

Background and Aim: Globally, community-acquired pneumonia (CAP) is the most common source of mortality among children. Early diagnosis effective management need identification risk factors. The purpose this study was to characterize clinical symptoms investigation various factors for severe CAP in Patients Methods: A retrospective conducted on 186 children Pediatric Department Niazi Welfare Teaching Hospital, Sargodha from March 2022 November 2022. Children with who had radiological...

10.53350/pjmhs2023171616 article EN 2023-01-31

Background and Aim: The most common pediatric infection is urinary tract (UTI). Neonates who suffer from neonatal sepsis remain among the vulnerable to death morbidity, especially in developing countries. present study aimed determine prevalence, etiology, susceptible antimicrobial agents of UTIs neonates with clinical sepsis. Patients Methods: This cross-sectional was carried out on 128 diagnosed admitted Department Pediatrics, Microbiology Infectious Diseases, Niazi Welfare Teaching...

10.53350/pjmhs2023171687 article EN 2023-01-31
Coming Soon ...