Mansoor Ahmed

ORCID: 0000-0003-2034-1403
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Cloud Data Security Solutions
  • Privacy, Security, and Data Protection
  • IoT and Edge/Fog Computing
  • Scientific Computing and Data Management
  • Energy and Environment Impacts
  • Network Security and Intrusion Detection
  • Spam and Phishing Detection
  • Research Data Management Practices
  • COVID-19 diagnosis using AI
  • Semantic Web and Ontologies
  • Advanced Steganography and Watermarking Techniques
  • Advanced Malware Detection Techniques
  • Energy, Environment, Economic Growth
  • Access Control and Trust
  • Energy, Environment, and Transportation Policies
  • Artificial Intelligence in Healthcare and Education
  • Digital Imaging for Blood Diseases
  • Information and Cyber Security
  • Cloud Computing and Resource Management
  • Software Engineering Research
  • Data Quality and Management
  • Internet Traffic Analysis and Secure E-voting

National University of Ireland, Maynooth
2021-2025

Software Engineering Institute of Guangzhou
2023-2025

Software Engineering Institute
2025

Pakistan Institute of Medical Sciences
2024

Mohammad Ali Jinnah University
2024

COMSATS University Islamabad
2010-2023

Câmara Municipal de Almada
2023

National University of Sciences and Technology
2023

Rawalpindi Medical University
2023

China University of Geosciences
2021-2022

A smart city is developed, deployed and maintained with the help of Internet Things (IoT). The cities have become an emerging phenomena rapid urban growth boost in field information technology. However, function operation a subject to pivotal development security architectures. contribution made this paper twofold. Firstly, it aims provide detailed, categorized comprehensive overview research on problems their existing solutions for cities. categorization based several factors such as...

10.14569/ijacsa.2016.070277 article EN cc-by International Journal of Advanced Computer Science and Applications 2016-01-01

Internet of things (IoT) is playing a pivotal role in bringing comfort and ease human lives by connecting billions devices across the globe. Innovation development IoT have established new ways to analyze patient data healthcare systems. Currently, cloud-based solutions are available process data, but cloud computing causes large end-to-end delay network usage problems while processing huge amounts data. Efficiency security still challenge IoT-based Fog introduced overcome issues providing...

10.1109/iotm.0001.1900096 article EN IEEE Internet of Things Magazine 2020-06-01

Glaucoma is an eye disease that can cause loss of vision by damaging the optic nerve. It world's second leading blindness after cataracts. Early diagnosis glaucoma a key to prevent permanent as it has no noticeable symptoms in its early stages. Color fundus photography used for examining disc (OD) which important step diagnoses glaucoma. This done estimating cup-to-disc ratio (CDR). In this paper, we proposed Cup Disc Encoder Decoder Network (CDED-Net) joint segmentation and cup (OC). We...

10.1109/access.2020.2998635 article EN cc-by IEEE Access 2020-01-01

Android has become the most popular smartphone operating system. This rapidly increasing adoption of resulted in significant increase number malwares when compared with previous years. There exist lots antimalware programs which are designed to effectively protect users' sensitive data mobile systems from such attacks. In this paper, our contribution is twofold. Firstly, we have analyzed and their penetration techniques used for attacking antivirus that act against systems. We categorize...

10.14569/ijacsa.2016.070262 article EN cc-by International Journal of Advanced Computer Science and Applications 2016-01-01

Abstract Scalable and secure authorization of smart things is the crucial essence for successful deployment Internet Things (IoT). Unauthorized access to could exacerbate security privacy concern, which could, in turn, lead reduced adoption IoT, ultimately emergence severe threats. Even though there are a variety IoT solutions authorization, schemes highly dynamic distributed environments remain daunting challenge. Access rights can dynamically change due heterogeneous nature shared devices...

10.1007/s40747-022-00765-y article EN cc-by Complex & Intelligent Systems 2022-05-19

Electricity theft is one of the major issues in developing countries which affecting their economy badly. Especially with introduction emerging technologies, this issue became more complicated. Though many new energy detection (ETD) techniques have been proposed by utilising different data mining (DM) techniques, state & network (S&N) based and game theory (GT) techniques. Here, a detailed survey presented where state-of-the-art ETD are studied analysed for strengths limitations. Three...

10.1109/jas.2022.105404 article EN IEEE/CAA Journal of Automatica Sinica 2022-01-28

With population and income growth, the need for energy has increased in developing emerging economies, which inevitably led to an increase carbon dioxide emissions (CO2e). This paper investigates impact of consumption on CO2e influenced by per capita, income. In particular, this whether or not consumption, intensity, impacts China, India, USA. The study applied non-linear Autoregressive distributed lag (NARDL) machine learning techniques. We found a significant capita CO2 Furthermore,...

10.3390/su151511956 article EN Sustainability 2023-08-03

In this study, we analyse incremental cooperative communication for wireless body area networks (WBANs) with different numbers of relays. Energy efficiency (EE) and the packet error rate (PER) are investigated schemes. We propose a new scheme three-stage relaying compare it to existing Our proposed provides reliable less PER at cost surplus energy consumption. Analytical expressions EE also derived, taking into account effect PER. Later on, cooperation is implemented in network layer...

10.3390/s16030284 article EN cc-by Sensors 2016-02-24

Abstract A computing environment requires a robust and comprehensive process to track document user activities uphold confidence in the system. Audit logs are used for this purpose monitor actions of administrators users. However, these vulnerable multidimensional attacks, including modification logs, erasability privacy user. Since have unprecedented access they can modify, delete, even destroy them. Securing against malicious is prime requirement audit log management. Existing schemes...

10.1002/ett.4272 article EN Transactions on Emerging Telecommunications Technologies 2021-04-17

This research investigates the impact of transformational leadership (TL) style on project success (PS) in indirect effect serial mediation team-building and teamwork quality (TWQ). A quantitative approach was used for this study. Data were gathered from 374 professional information system development (ISD) managers Pakistan. The hypotheses tested using regression analysis with bootstrapping. Both independently serially mediate relationship between TL PS managers, respectively. manager...

10.3389/fpsyg.2021.689311 article EN cc-by Frontiers in Psychology 2021-09-07

Air quality has a significant influence on the environment and health. Instruments that efficiently inexpensively detect air could be extremely valuable in detecting indices. This study presents robust deep learning model named AQE-Net, for estimating from mobile images. The algorithm extracts features patterns scene photographs collected by camera device then classifies images according to index (AQI) levels. Additionally, an dataset (KARACHI-AQI) of high-quality outdoor was constructed...

10.3390/rs14225732 article EN cc-by Remote Sensing 2022-11-13

Electronic health record transmission and storage involve sensitive information, requiring robust security measures to ensure access is limited authorized personnel. In the existing state of art, there a growing need for efficient control approaches secure accessibility patient data by sustainable electronic records. Locking medical in healthcare center forms information isolation; thus, setting up exchange platforms driving force behind centers. The entities rights like subject, controller,...

10.7717/peerj-cs.2647 article EN cc-by PeerJ Computer Science 2025-01-23

This study examines the multidimensional energy poverty index (MEPI), headcount ratio, and intensity in six South Asian countries. Using two datasets (India, 2005 2015), (Bangladesh, 2011 2017), (Afghanistan, 2010 (Pakistan, 2012 (Nepal, 2016), (the Maldives, 2009 this employs an adjusted MEPI to compare each country’s effort reduction (2005 2017). The empirical results indicate that India, Bangladesh, Pakistan, Nepal, Maldives significantly reduced MEPI, compared past years. However, case...

10.54517/ssd3154 article EN cc-by Sustainable Social Development 2025-03-05
Coming Soon ...