Umair Saeed

ORCID: 0000-0003-4580-8524
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Context-Aware Activity Recognition Systems
  • Imbalanced Data Classification Techniques
  • IoT and Edge/Fog Computing
  • Anomaly Detection Techniques and Applications
  • Financial Distress and Bankruptcy Prediction
  • AI in cancer detection
  • Image Enhancement Techniques
  • Nanoparticles: synthesis and applications
  • Image and Signal Denoising Methods
  • Artificial Intelligence in Healthcare
  • Electrical Fault Detection and Protection
  • COVID-19 diagnosis using AI
  • Machine Learning in Bioinformatics
  • Digital Imaging for Blood Diseases
  • Nitrogen and Sulfur Effects on Brassica
  • Neural Networks and Applications
  • Retinal Imaging and Analysis
  • Handwritten Text Recognition Techniques
  • Cassava research and cyanide
  • Global Trade and Competitiveness
  • Advanced Image Fusion Techniques
  • Text and Document Classification Technologies
  • Advanced Data Storage Technologies
  • Fractal and DNA sequence analysis
  • Soft Robotics and Applications

Quaid-i-Azam University
2022-2024

Bahria University
2023-2024

Sindh Madressatul Islam University
2018-2023

University of Agriculture
2023

Federal Urdu University
2022

HITEC University
2021

Pakistan Telecommunication Company (Pakistan)
2008

Summary With the arrival of Internet Things (IoT) many devices such as sensors, nowadays can communicate with each other and share data easily. However, IoT paradigm is prone to security concerns attackers try hit network make it vulnerable. In this scenario, are most important address them various models have been designed overcome these issues, but still there exist emerging variants botnet attacks Mirai, Persirai, Bashlite that exploits breaches. This research article aims investigate...

10.1002/cpe.6662 article EN Concurrency and Computation Practice and Experience 2021-10-13

Online transactions are still the backbone of financial industry worldwide today. Millions consumers use credit cards for their daily transactions, which has led to an exponential rise in card fraud. Over time, many variations and schemes fraudulent have been reported. Nevertheless, it remains a difficult task detect fraud real-time. It can be assumed that each person unique transaction pattern may change over time. The work this article aims (1) understand how deep reinforcement learning...

10.7717/peerj-cs.1998 article EN cc-by PeerJ Computer Science 2024-04-29

Today the field of wireless sensors have dominance in almost every person’s daily life. Therefore researchers are exasperating to make these more dynamic, accurate and high performance computational devices as well small size, also application area sensors. The wearable one type which used acquire a behavioral characteristics. applications healthcare, entertainment, fitness, security military etc. Human activity recognition (HAR) is example, where data received from further processed...

10.17762/ijcnis.v8i2.1793 article EN International Journal of Communication Networks and Information Security (IJCNIS) 2022-04-17

During the past few years, deep learning (DL) architectures are being employed in many potential areas such as object detection, face recognition, natural language processing, medical image analysis and other related applications. In these applications, DL has achieved remarkable results matching performance of human experts. This paper presents a novel convolutional neural networks (CNN)-based approach for detection breast cancer invasive ductal carcinoma tissue regions using whole slide...

10.1142/s2424922x20410028 article EN Advances in Data Science and Adaptive Analysis 2020-04-01

This paper proposes an efficient and cost effective deep learning architecture to detect the diabetic retinopathy in real time. Diabetes is a leading root cause of eye disease patients. It illuminates vessels, releases blood form vessels. Early detection useful reduce risk blindness or any hazard. In this paper, after some preprocessing data augmentation, Inception V3 used as pre-trained model extract initial features set. Convolutional neural network has been with attention layers. These...

10.1109/ictcs.2019.8923097 article EN 2019-10-01

<title>Abstract</title> Online transactions are the backbone of financial industry globally. Millions people using credit cards daily, which has led to an exponential rise in their daily life that card frauds. With passage time, many variations and schemes fraudulent have been occurring. Real-time fraud detection is still a challenging task. Every person unique transaction pattern. This pattern may vary over period time. Sometimes, frauds no constant paper aims 1) understand how deep...

10.21203/rs.3.rs-3092096/v1 preprint EN cc-by Research Square (Research Square) 2023-06-29

INTRODUCTION: In these days, the usage of smart-phones and wearable sensors have increased at an exceptional rate. These smart devices are equipped with different such as gyroscope, accelerometer GPS. By using to analyze activity end-user, behavioural characteristics user can be captured.OBJECTIVES: Although smart-phone provide a platform for conducting social, psychological physical studies, they still several limitations challenges.METHODS: This paper provides comparative analysis...

10.4108/eai.2-11-2021.171752 article EN cc-by EAI Endorsed Transactions on Pervasive Health and Technology 2021-11-02

Reinforcement learning (RL) has emerged as a powerful tool for creating artificial intelligence systems (AIS) and solving problems which require sequential decision-making. achieved some impressive achievements in recent years, surpassing humans variety of areas. According to research, deep (DL) techniques are used with reinforcement recognize meaningful identification problem regarding high dimensional raw data input &amp; enough solve general (AGI). In addition the main concepts, this...

10.33317/ssurj.638 article EN cc-by Sir Syed University Research Journal of Engineering & Technology 2024-12-27

Artificially intelligent advances such as tech gloves allow handicapped wearers to handle daily matters normal. A wearable hand-rehabilitation system, i.e., a robotic arm, is engineered with controlled programming control disabled hand features movement of fingers and holding items. life-threatening disease (stroke) caused when brain cells start die, causing around 50–70% patients face paralysis disability. People may after-effects reduced use the limb or paralyzed hand. Many methods have...

10.3390/engproc2021012056 article EN cc-by 2021-12-30

Deep learning, big data, and the internet of things (IoT) have changed world entirely. As an embedded computer, Raspberry Pi is playing a dynamic prominent role in era ubiquitous computing. In computing, performance real-time throughput are still area focus for Pi. Indeed, process scheduling, page swapping, synchronization techniques essential crucial parameters operating system The key study objectives were; (i) explore recent trend applications (ii) comparison swapping with different...

10.22581/muet1982.2203.11 article EN cc-by Mehran University Research Journal of Engineering and Technology 2022-07-01

Many lives have been lost due to genetic diseases and the inbility identify them. The disorder is mainly because of alteration in common DNA nucleotide sequence, where benign pathogenic are examples these variants. Deliberate changes for gene mutation may cause unexpected results; at times, required results occur though it highly likely get outcomes too. In this paper, two unsupervised deep learning classification methods proposed classify changes. For work, Self-Organizing Map (SOM)...

10.51846/vol5iss1pp16-22 article EN Pakistan Journal of Engineering and Technology 2022-03-09

There is a considerable gap between demand and supply of edible oil in Pakistan. The Government fills the by importing oils from other countries, costing billions dollars. Efforts to boost oilseed crop yields at federal provincial levels have remained largely unsuccessful. This study compares profitability crops with its competing find out factors that will aid sustainable adoption crops. Primary Data were collected 120 randomly selected farmers. Among farmers, 60 those growing crops, rest...

10.56520/asj.v5i2.261 article EN cc-by-nc Agricultural Sciences Journal 2023-08-31

Browsing history is an eminent tool for internet users to keep track of the daily and specially visited webpages without bookmarking them. Traditional tools have become insufficient satisfy their purpose addressing complex browsing patterns. Graphical interfaces are critical solutions these complexities. Therefore, visualising histories interactively can be helpful in this case. There many built-in basic visualisation icons ease different browsers, which help user quickly access pages. But...

10.62019/abbdm.v3i1.59 article EN cc-by-nc-nd Deleted Journal 2023-12-31

A remote point simplex data acquisition system has been proposed to monitor a distribution from its grid station. Data is concentrated at the end then transmitted central receiver for processing. facility incorporated record currents of all transformers associated system. received can be used on-line monitoring system, analysis losses and planning decrease line losses. This further optimal expansion. provide improvement in performance significant benefits utility. The token networking...

10.1109/icee.2008.4553910 article EN 2008 Second International Conference on Electrical Engineering 2008-03-01

10.14299/ijser.2018.10.12 article EN International Journal of Scientific and Engineering Research 2018-10-25

10.14299/ijser.2018.10.11 article EN International Journal of Scientific and Engineering Research 2018-10-25
Coming Soon ...