- Advanced Malware Detection Techniques
- Image Processing and 3D Reconstruction
- Network Security and Intrusion Detection
- Vehicle License Plate Recognition
- Handwritten Text Recognition Techniques
- Digital and Cyber Forensics
- Organometallic Compounds Synthesis and Characterization
- Crystal structures of chemical compounds
- Metal complexes synthesis and properties
- Security and Verification in Computing
- Distributed systems and fault tolerance
- IoT and Edge/Fog Computing
- UAV Applications and Optimization
- Vehicular Ad Hoc Networks (VANETs)
- Technology Adoption and User Behaviour
- Real-Time Systems Scheduling
- Digital Media Forensic Detection
- Online Learning and Analytics
- Intelligent Tutoring Systems and Adaptive Learning
- Innovative Teaching and Learning Methods
Shaheed Benazir Bhutto University
2020-2024
Quaid-e-Awam University of Engineering, Science and Technology
2017-2018
Pakistan Atomic Energy Commission
2006-2008
Due to globalization and advances in network technology, the Internet of Vehicles (IoV) with edge computing has gained increasingly more attention over last few years. The technology provides a new paradigm design interconnected distributed nodes Unmanned Aerial Vehicle (UAV)-assisted vehicle networks for communications between vehicles smart cities. process hierarchy current UAV-assisted is also becoming multifaceted as are connected, requiring accessing exchanging information, performing...
Cybersecurity is essential to safeguarding intellectual property, patient information, and other sensitive data from unauthorised access by cybercriminals. As healthcare technology advances, integrating the Medical Internet of Things (MIoT) into smart diagnostic laboratories has become instrumental in enhancing accuracy efficiency care. However, this integration also introduces significant cybersecurity privacy risks, given high confidentiality information stored processed MIoT systems....
A new zinc(II) complex of pyrrolidinedithiocarbamate (PDTC), bis[(μ 2-pyrrolidinedithiocarbamato-S,S′)(pyrrolidinedithiocarbamato-S,S′)zinc(II)], [Zn2(PDTC)4] (1) has been prepared by reaction ZnCl2 with ammonium in 1 : and 2 ratio, respectively. The characterized IR, NMR X-ray crystallography. Compound crystallizes the triclinic space group P form a centrosymmetric dimer. solid-state structure contains two crystallographically equivalent Zn+2 centers tetrahedrally distorted ion sphere....
Digital forensics (DF) is the scientific investigation of digital criminal activities, illegal attempts, and cyber-attacks through computer systems. It becoming a crucial aspect law enforcement agencies, court law, business farms to identify, preserve, examine, analyse evidence using proof approve efficient techniques for eventual demonstration that help take further actions. This review paper explores different methodologies frameworks related incident response, explain impact forgery...
OCR (OpticalCharacterRecognition) is a technology in which text image used to understand and write by machines.The work on languages containing isolated characters such as German, English, French others at its peak.The ICR (Intelligent Character Recognition) research Sindhi script currently starting stages not sufficient have been cited this area even though language rich culture history.This paper presents one of the initial steps recognizing handwritten characters.The written thesubjects...
In this research paper a multi-digit Sindhi handwritten numerals recognition system using SOM Neural Network is presented.Handwritten digits one of the challenging tasks and lot being carried out since many years.A remarkable work has been done for isolated characters as well in languages like English, Arabic, Devanagari, Chinese, Urdu Pashto.However, literature reviewed does not show any recognition.The difficult task due to various writing styles different font sizes.Therefore,...
This work is proposed to improve the security and privacy issues in real-time database system, such as military departments, public organizations other private organizations. These institutions are associated with system environments that shows controlled retrieving of data information their operation. In fact, huge volumes supervised by today's system. For purpose a concurrency control algorithm (OPT) used, simulation written C+ + for databases timing constraints also used this research....