- Indoor and Outdoor Localization Technologies
- Technology Adoption and User Behaviour
- Impact of Technology on Adolescents
- Digital Marketing and Social Media
- Robotics and Sensor-Based Localization
- Mobile Ad Hoc Networks
- Online and Blended Learning
- Opportunistic and Delay-Tolerant Networks
- Mobile Crowdsensing and Crowdsourcing
- Inertial Sensor and Navigation
- Smart Parking Systems Research
- Transportation and Mobility Innovations
- Vehicular Ad Hoc Networks (VANETs)
- Microfluidic and Capillary Electrophoresis Applications
- Advanced Malware Detection Techniques
- Chaos-based Image/Signal Encryption
- Caching and Content Delivery
- Advanced Image and Video Retrieval Techniques
- Pharmaceutical Economics and Policy
- Advanced Sensor and Energy Harvesting Materials
- Sharing Economy and Platforms
- Underwater Vehicles and Communication Systems
- Text and Document Classification Technologies
- Data Mining Algorithms and Applications
- User Authentication and Security Systems
University of Catania
2023-2024
University of Science and Technology of China
2019-2021
Information Technology University
2019
University of Sialkot
2019
University of Management and Technology
2019
COMSATS University Islamabad
2018
The exponential growth of technology in the e-learning sector has reshaped traditional way learning because its efficient and flexible nature. However, is still rudimentary phase progress developing countries at schools universities. It needs to investigate critical features behind embracing systems countries. This study targeted by investigating factors towards acceptance an system i.e., e-Learn Punjab (e-LP) Pakistan. Further, this provided empirical support for e-LP, with proposed model...
Abstract Acceptance and intention to use mobile applications in a library context is attracting great deal of interest education field. A sparse amount research was conducted (MLA) previously, investigating the influential factors MLA. Research here aims provide empirical support on acceptance MLA, access through applications, with model developed by taking technology (TAM) MLA adding perceived mobility value, system accessibility satisfaction for influence behavioural self-administrated...
The prevalence of smart devices in our day-to-day activities increases the potential threat to secret information. To counter these threats like unauthorized access and misuse phones, only authorized users should be able device. Authentication mechanism provide a secure way safeguard physical resources as well information that is processed. Text-based passwords are most common technique used for authentication devices, however, they vulnerable certain type attacks such brute force, smudge...
Traditional taxi services have now been transformed into e-hailing applications (EHA) such as Uber, Careem, Hailo, and Grab Car globally due to the proliferation of smartphone technology. On one hand, these provide transport facilities. other users are facing multiple issues in adoption EHAs. Despite problems, EHAs still widely adopted globally. However, a sparse amount research has conducted related EHAs, particular regards exploring significant factors intention behind using Therefore,...
Due to the ubiquity and lack of infrastructure, magnetic field-based (MF) indoor localization is garnering a lot attention. However, there are still issues with discernability, interference from ferromagnetic materials, heterogeneous devices for MF-based location signals. In this work, we investigate importance signal calibration fingerprint development, showing how particle filtering can be used in conjunction magnetometer predict remove irregularities MF With regard, also evaluate impact...
Vehicular delay tolerant network (VDTN) is a widely used communication standard for the scenarios where no end to path available between nodes. Data sent from one node another using routing protocols of VDTN. These use different decision metrics. Based on these metrics, it chosen whether send data connected or find suitable candidate. metrices are Time live (TTL), geographical information, destination utility, relay meeting prediction, total and remaining buffer size many other. Different...
Magnetic fingerprint-based indoor localization systems are a promising alternative to GPS in environments by using magnetic fields (MFs) determine accurate locations. However, the optimal number of MFs required for precise location prediction on client side (CS), i.e., mobile phone, remains critical yet unanswered question. Hence, resource-constrained devices face limitations terms computational power and energy supply. Therefore, this study aims optimize error time at CS with minimal MF...