- Context-Aware Activity Recognition Systems
- Imbalanced Data Classification Techniques
- IoT and Edge/Fog Computing
- Anomaly Detection Techniques and Applications
- Financial Distress and Bankruptcy Prediction
- AI in cancer detection
- Image Enhancement Techniques
- Nanoparticles: synthesis and applications
- Image and Signal Denoising Methods
- Artificial Intelligence in Healthcare
- Electrical Fault Detection and Protection
- COVID-19 diagnosis using AI
- Machine Learning in Bioinformatics
- Digital Imaging for Blood Diseases
- Nitrogen and Sulfur Effects on Brassica
- Neural Networks and Applications
- Retinal Imaging and Analysis
- Handwritten Text Recognition Techniques
- Cassava research and cyanide
- Global Trade and Competitiveness
- Advanced Image Fusion Techniques
- Text and Document Classification Technologies
- Advanced Data Storage Technologies
- Fractal and DNA sequence analysis
- Soft Robotics and Applications
Quaid-i-Azam University
2022-2024
Bahria University
2023-2024
Sindh Madressatul Islam University
2018-2023
University of Agriculture
2023
Federal Urdu University
2022
HITEC University
2021
Pakistan Telecommunication Company (Pakistan)
2008
Summary With the arrival of Internet Things (IoT) many devices such as sensors, nowadays can communicate with each other and share data easily. However, IoT paradigm is prone to security concerns attackers try hit network make it vulnerable. In this scenario, are most important address them various models have been designed overcome these issues, but still there exist emerging variants botnet attacks Mirai, Persirai, Bashlite that exploits breaches. This research article aims investigate...
Online transactions are still the backbone of financial industry worldwide today. Millions consumers use credit cards for their daily transactions, which has led to an exponential rise in card fraud. Over time, many variations and schemes fraudulent have been reported. Nevertheless, it remains a difficult task detect fraud real-time. It can be assumed that each person unique transaction pattern may change over time. The work this article aims (1) understand how deep reinforcement learning...
Today the field of wireless sensors have dominance in almost every person’s daily life. Therefore researchers are exasperating to make these more dynamic, accurate and high performance computational devices as well small size, also application area sensors. The wearable one type which used acquire a behavioral characteristics. applications healthcare, entertainment, fitness, security military etc. Human activity recognition (HAR) is example, where data received from further processed...
During the past few years, deep learning (DL) architectures are being employed in many potential areas such as object detection, face recognition, natural language processing, medical image analysis and other related applications. In these applications, DL has achieved remarkable results matching performance of human experts. This paper presents a novel convolutional neural networks (CNN)-based approach for detection breast cancer invasive ductal carcinoma tissue regions using whole slide...
This paper proposes an efficient and cost effective deep learning architecture to detect the diabetic retinopathy in real time. Diabetes is a leading root cause of eye disease patients. It illuminates vessels, releases blood form vessels. Early detection useful reduce risk blindness or any hazard. In this paper, after some preprocessing data augmentation, Inception V3 used as pre-trained model extract initial features set. Convolutional neural network has been with attention layers. These...
<title>Abstract</title> Online transactions are the backbone of financial industry globally. Millions people using credit cards daily, which has led to an exponential rise in their daily life that card frauds. With passage time, many variations and schemes fraudulent have been occurring. Real-time fraud detection is still a challenging task. Every person unique transaction pattern. This pattern may vary over period time. Sometimes, frauds no constant paper aims 1) understand how deep...
INTRODUCTION: In these days, the usage of smart-phones and wearable sensors have increased at an exceptional rate. These smart devices are equipped with different such as gyroscope, accelerometer GPS. By using to analyze activity end-user, behavioural characteristics user can be captured.OBJECTIVES: Although smart-phone provide a platform for conducting social, psychological physical studies, they still several limitations challenges.METHODS: This paper provides comparative analysis...
Reinforcement learning (RL) has emerged as a powerful tool for creating artificial intelligence systems (AIS) and solving problems which require sequential decision-making. achieved some impressive achievements in recent years, surpassing humans variety of areas. According to research, deep (DL) techniques are used with reinforcement recognize meaningful identification problem regarding high dimensional raw data input & enough solve general (AGI). In addition the main concepts, this...
Artificially intelligent advances such as tech gloves allow handicapped wearers to handle daily matters normal. A wearable hand-rehabilitation system, i.e., a robotic arm, is engineered with controlled programming control disabled hand features movement of fingers and holding items. life-threatening disease (stroke) caused when brain cells start die, causing around 50–70% patients face paralysis disability. People may after-effects reduced use the limb or paralyzed hand. Many methods have...
Deep learning, big data, and the internet of things (IoT) have changed world entirely. As an embedded computer, Raspberry Pi is playing a dynamic prominent role in era ubiquitous computing. In computing, performance real-time throughput are still area focus for Pi. Indeed, process scheduling, page swapping, synchronization techniques essential crucial parameters operating system The key study objectives were; (i) explore recent trend applications (ii) comparison swapping with different...
Many lives have been lost due to genetic diseases and the inbility identify them. The disorder is mainly because of alteration in common DNA nucleotide sequence, where benign pathogenic are examples these variants. Deliberate changes for gene mutation may cause unexpected results; at times, required results occur though it highly likely get outcomes too. In this paper, two unsupervised deep learning classification methods proposed classify changes. For work, Self-Organizing Map (SOM)...
There is a considerable gap between demand and supply of edible oil in Pakistan. The Government fills the by importing oils from other countries, costing billions dollars. Efforts to boost oilseed crop yields at federal provincial levels have remained largely unsuccessful. This study compares profitability crops with its competing find out factors that will aid sustainable adoption crops. Primary Data were collected 120 randomly selected farmers. Among farmers, 60 those growing crops, rest...
Browsing history is an eminent tool for internet users to keep track of the daily and specially visited webpages without bookmarking them. Traditional tools have become insufficient satisfy their purpose addressing complex browsing patterns. Graphical interfaces are critical solutions these complexities. Therefore, visualising histories interactively can be helpful in this case. There many built-in basic visualisation icons ease different browsers, which help user quickly access pages. But...
A remote point simplex data acquisition system has been proposed to monitor a distribution from its grid station. Data is concentrated at the end then transmitted central receiver for processing. facility incorporated record currents of all transformers associated system. received can be used on-line monitoring system, analysis losses and planning decrease line losses. This further optimal expansion. provide improvement in performance significant benefits utility. The token networking...