- Usability and User Interface Design
- Network Security and Intrusion Detection
- Open Source Software Innovations
- Personal Information Management and User Behavior
- Knowledge Management and Sharing
- Advanced Malware Detection Techniques
- Innovative Human-Technology Interaction
- Information Systems Theories and Implementation
- IoT and Edge/Fog Computing
- Interactive and Immersive Displays
- ICT in Developing Communities
- Spreadsheets and End-User Computing
- Complex Network Analysis Techniques
- Traffic Prediction and Management Techniques
- Innovative Approaches in Technology and Social Development
- Context-Aware Activity Recognition Systems
- Virtual Reality Applications and Impacts
- Online Learning and Analytics
- Traffic control and management
- Peer-to-Peer Network Technologies
- Software Engineering Research
- Photovoltaic System Optimization Techniques
- IoT-based Smart Home Systems
- Smart Parking Systems Research
- Information and Cyber Security
Lahore Garrison University
2017-2024
Bahria University
2024
Chongqing University
2019-2024
Beijing University of Technology
2023-2024
Air University
2022
National University of Computer and Emerging Sciences
2014-2022
Shaikh Zayed Postgraduate Medical Institute
2020
University of Engineering and Technology Lahore
2018-2019
University of Lahore
2018-2019
National University of Science and Technology
2018
Brain tumors can be a major cause of psychiatric complications such as depression and panic attacks. Quick timely recognition brain tumor is more effective in healing. The processing medical images plays crucial role assisting humans identifying different diseases. classification significant part that depends on the expertise knowledge physician. An intelligent system for detecting classifying essential to help physicians. novel feature study division into glioma, meningioma, pituitary using...
column Free Access Share on Human-computer integration Authors: Umer Farooq Microsoft Corporation CorporationView Profile , Jonathan Grudin Research ResearchView Authors Info & Claims InteractionsVolume 23Issue 6November-December 2016 pp 26–32https://doi.org/10.1145/3001896Published:26 October 2016Publication History 80citation6,554DownloadsMetricsTotal Citations80Total Downloads6,554Last 12 Months1,567Last 6 weeks108 Get Citation AlertsNew Alert added!This alert has been successfully added...
The paper explores the utilization of RFID innovation for traffic congestion and find out blockage at any intersection street by utilizing reader labels as sensors. idea behind this is to make fixed preset activity signal dynamic. affords a unique method making timing proportional on roads time directly. Proposed intelligent system can maintain dynamic timings signals sensing density minimize with help IoT enabled sensors which provides advanced powerful communication technologies citizens.
Smart applications and intelligent systems are being developed that self-reliant, adaptive, knowledge-based in nature. Emergency disaster management, aerospace, healthcare, IoT, mobile applications, among them, revolutionize the world of computing. Applications with a large number growing devices have transformed current design centralized cloud impractical. Despite use 5G technology, delay-sensitive cannot go parallel due to exceeding threshold values certain parameters like latency,...
This article aims to identify some of the most significant security risks an organization may face if it does not consider inherent associated with personal devices in workplace. Also, mention measures, such as secure configurations (hardening) and tools, mitigate these strengthen current working environment's baseline. A review mobile raises awareness among employees employers so that sensitive information is handled securely for both parties.
As technology becomes more embedded in our daily lives, there is a great deal of hope about the use information to achieve positive community outcomes like increasing access local information, promoting civic engagement, and creating avenues for collaboration communication. While these technologies provide opportunities groups their own goals, most computing studies describe members fairly passive ways as users existing systems rather than meaningful contributors design process. The Civic...
Although there has been significant research into gender regarding educational and workplace practices, little investigation of differences pertaining to problem solving with programming tools environments. As a result, is evidence as what role plays in tools---and involved mainly novice end-user programmers academic studies. This paper therefore investigates how widespread such phenomena are industrial situations, considering three disparate populations involving almost 3000 people...
Over the past few years, cryptographic algorithms have become increasingly important. Advanced Encryption Standard (AES) algorithm was introduced in early 2000. It is widely adopted because of its easy implementation and robust security. In this work, AES implemented on FPGA using five different techniques. These techniques are based optimized by making efficient resource usage target device. Experimental results obtained quite varying nature. They range from smallest (suitable for area...
cellular computing is promising and exciting domain. As the field continues to evolve, several future facets are expected emerge. One potential facet development of more sophisticated efficient cellular-based systems that can perform complex calculations data processing tasks. This could lead creation new tools technologies in various fields, including medicine, biotechnology, environmental monitoring. Moreover, technology has changed way communication, sharing exchanging data. Mobile grown...
We are investigating how to empower nonprofit community organizations develop the information technology management practices required carry out their civic goals. highlight our methodology of working with through three case examples from field. These illustrate that able and can indeed sustain IT various methodological techniques. techniques---such as scenario development, inventory assessment, volunteer practices---emphasize importance long-term critical planning design skills. Based on...
To improve existing social bookmarking systems and to design new ones, researchers practitioners need understand how evaluate tagging behavior. In this paper, we analyze over two years of data from CiteULike, a system for academic papers. We propose six tag metrics-tag growth, reuse, non-obviousness, discrimination, frequency, patterns-to the characteristics system. Using these metrics, suggest possible heuristics implement CiteSeer, popular online scholarly digital library computer science....
Recently, there has been a growing awareness of the importance environmentalism and adoption various environmental management practices in business community. Based on assumptions Social Learning theory (SLT), this study unveiled Green HRM to green organizational culture voluntary workplace behavior. How influences Employees Organizations (Internal External) enhances existing cultural values behavior become role model for others organizations, society employees as well, especially Pakistani...
Mobile education or M-Education is a new conceptual paradigm in the use of mobile and wireless technologies for education. encourages distributed peer collaboration over devices desktop computers to create opportunities discovery field community. It project-oriented approach that will virtual community facilitate learning activities teachers, students, peers through environment. significantly different from existing systems it leverages its collaborative an desktop-based online (MOOsburg),...
Free Space Optical (FSO) communication systems are used to transmit high data rates over short distances through the atmosphere. However, performance of FSO links can be severely impacted by atmospheric conditions, such as fog, rain, and turbulence. These conditions cause temporary spatial changes in light intensity, which lead signal degradation disruption. To ensure reliable communication, it is important take into account meteorological location where link will deployed. This help...
Although a wide range of display devices is used in virtual environment (VE) systems, no guidelines exist to choose an appropriate for particular VE application. Our goal this research develop such on the basis empirical results. In paper, we present preliminary experiment comparing human behavior and performance between head-mounted (HMD) four-sided spatially immersive (SID). particular, studied users' preferences real vs. turns VE. The results indicate that subjects have significant...
Based on qualitative analysis of three groups collaborating a research task in distributed setting, we identify four breakdowns creativity: (1) Minority ideas were under-considered; (2) Novel easily lost; (3) There was lack critical evaluation perspectives; (4) Reflexivity weak during convergence. We propose two design strategies, illustrated with mock-ups, to support creativity awareness: Automatically summarize and recommend ideational activities from system logs; Allow collaborators enter...
API usability tests in the lab are time and resource intensive, thus allowing a relatively small percentage of namespace to be evaluated. We describe group-based inspection method -- Peer Reviews evaluate usability. Based on an analysis breakdowns from tests, results show that identified across several cognitive dimensions, some which were different than what was by tests. reflect adoption as collaborative practice organizations for evaluating
Cloud computing, with its staggering and on-demand services had revamped the technology so far. consumers are freely to use applications software on premises of Pay-as-you go concept. This concept decreased cost make less expensive more reliable. One th
Prosthetic arms are designed to assist amputated individuals in the performance of activities daily life. Brain machine interfaces currently employed enhance accuracy as well number control commands for upper limb prostheses. However, motion prediction prosthetic and rehabilitation amputees suffering from transhumeral amputations is limited. In this paper, functional near-infrared spectroscopy (fNIRS)-based approach recognition human intention six motions proposed. The data were extracted...