- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Ergonomics and Musculoskeletal Disorders
- Information and Cyber Security
- Spam and Phishing Detection
- Web Data Mining and Analysis
- Effects of Vibration on Health
- Access Control and Trust
- Musculoskeletal pain and rehabilitation
- Digital Platforms and Economics
- Liver Disease Diagnosis and Treatment
- Neonatal and Maternal Infections
- Pediatric health and respiratory diseases
- Security and Verification in Computing
- Abdominal Trauma and Injuries
- Infant Nutrition and Health
- Oil, Gas, and Environmental Issues
- Ergonomics and Human Factors
- Human-Automation Interaction and Safety
- Global Energy Security and Policy
- Quality and Management Systems
- Biliary and Gastrointestinal Fistulas
- PI3K/AKT/mTOR signaling in cancer
- Data Visualization and Analytics
- Data Mining Algorithms and Applications
University of Engineering and Technology Taxila
2017-2024
Seoul National University
2019-2024
Allama Iqbal Medical College
2023
National University of Sciences and Technology
2010-2016
Geisinger Medical Center
2003-2004
Based on a comprehensive literature survey, the constructs of cybersecurity information sharing ecosystem have been defined in detail. Using this ecosystem, interrelationships among stakeholders with respect to are analyzed, value parameters determined, functions defined, and values obtained by through simulation calculated. Furthermore, it is investigated whether involved can create sufficient sustain market. The outcome research includes an economic model for evaluating creation...
To devise vision of the next generation web, deep web technologies have gained larger attention in a last few years.An eminent feature is automation tasks.A large part Deep comprises online structured domain specific databases that are accessed using query interfaces.The information contained these related to particular domain.This highly relevant more suitable for satisfying needs users and scale integration.In order make this extraction integration process easier, it necessary classify...
Quality Management System (QMS) is expressed as the systematic set of operational procedures, policies and objectives which are documented, maintained controlled by company to achieve its quality continuous improvement in overall system organization. This study aims explore role QMS implementation improving customers’ satisfaction. The perception customers about products manufactured organization with without ISO 9001 have been explored. A modified SERVQUAL model has used covering six major...
Connected To idamsp.idamspJob Log for System Administration Tool DataDictionaryPublisher-------------------------------------------------------------- This job log consists of three distinct parts: 1) All print statements from the execution 2) The report tool which is saved as a separate document in Docbase /System/Sysadmin/Reports. 3) trace file results API, if job's level > 0. Note: and are also maintained under Documentum location in: $DOCUMENTUM/dba/log/ <docbase hex="" id=""...
Sui Northern Gas Pipelines Limited (SNGPL) is a natural-gas distribution company facing huge loss every year due to unaccounted for gas (UFG). In this research, mathematical model has been developed identify and control UFG losses in SNGPL. A survey of hundred consumers carried out factors contributing UFG. The significance each factor determined using Hypothesis Testing. results show that more emphasis should be on reducing leakage (17%). After necessary rectification anomalies which were...
Abstract In an advanced and dynamic cyber threat environment, organizations need to yield more proactive methods handle their defenses. Cyber data known as Threat Intelligence (CTI) of previous incidents plays important role by helping security analysts understand recent threats mitigations. The mass CTI is exponentially increasing, most the content textual which makes it difficult analyze. current visualization tools do not provide effective visualizations. To address this issue,...
Tactics Techniques and Procedures (TTPs) in cyber domain is an important threat information that describes the behavior attack patterns of adversary. Timely identification associations between TTPs can lead to effective strategy for diagnosing Cyber Threat Actors (CTAs) their vectors. This study profiles prevalence regularities CTAs. We developed a machine learning-based framework takes as input Intelligence (CTI) documents, selects most prevalent with high gain features based on them mine...
Cyber threat attribution is the process of identifying actor an attack incident in cyberspace. An accurate and timely plays important role deterring future attacks by applying appropriate defense mechanisms. Manual analysis patterns gathered honeypot deployments, intrusion detection systems, firewalls, via trace-back procedures still preferred method security analysts for cyber attribution. Such are low-level Indicators Compromise (IOC). They represent Tactics, Techniques, Procedures (TTP),...
The development of simulation models for improving performances is trendy in manufacturing industries. This paper presents model evaluating and a utensils plant. Internal benchmarking employed comparison under exactly similar conditions. data all input variables collected statistical each process developed using Arena analyzer. then SIMIO to optimize throughput, work-in-process, cycle time. experiments have been performed various scenarios i.e. at different values the parameters. areas...
Manual material handling and occupational tasks demanding physical push-pull activities are very common in various industrial settings regardless of automation. These may become the cause fatigue, accidents and/or different hazards if not properly focused to balance workload as per strength stamina worker. This cross-sectional study was conducted assess isometric pull apparel cart/trolley pullers muscular activity upper limbs. Jackson evaluation system used measure strengths while IXTA Data...
Today, deep web comprises of a large part contents. Because this volume data, the technologies related to have gained larger attention in recent years. Deep mostly online domain specific databases, which are accessed by using query interfaces. These highly relevant databases more suitable for satisfying information needs users. In order make extraction easier, there is need classify into subject-specific self-descriptive categories. paper we present novel training-less classification...
A variety of traumatic and iatrogenic injuries can lead to bile duct leaks or fistula. These are commonly managed by transpapillary biliary stent placement, which reduces in traductal pressure facilitates closures. small percentage these lesions resistant this technique, however. We propose a novel endoscopic approach for that uses commercially available cryoprecipitate/thrombin, simultaneously administered during retrograde cholangiopancreatography (ERCP), creating fibrin plug within the...
Semantic web is the future realization of current web, in which resources are annotated with machine understandable meta-data, allowing automation tasks by employing these their correct contexts. Several notable technologies have been specified World Wide Web Consortium (W3C) for application development lifecycle semantic web. The worldwide adoption requires secure applications. Therefore research community has proposed to define and integrate security standards all phases development. For...
Background and Aim: Globally, community-acquired pneumonia (CAP) is the most common source of mortality among children. Early diagnosis effective management need identification risk factors. The purpose this study was to characterize clinical symptoms investigation various factors for severe CAP in Patients Methods: A retrospective conducted on 186 children Pediatric Department Niazi Welfare Teaching Hospital, Sargodha from March 2022 November 2022. Children with who had radiological...
Background and Aim: The most common pediatric infection is urinary tract (UTI). Neonates who suffer from neonatal sepsis remain among the vulnerable to death morbidity, especially in developing countries. present study aimed determine prevalence, etiology, susceptible antimicrobial agents of UTIs neonates with clinical sepsis. Patients Methods: This cross-sectional was carried out on 128 diagnosed admitted Department Pediatrics, Microbiology Infectious Diseases, Niazi Welfare Teaching...