Natash Ali Mian

ORCID: 0000-0003-4041-7508
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Software Reliability and Analysis Research
  • Cloud Data Security Solutions
  • Cloud Computing and Resource Management
  • Distributed systems and fault tolerance
  • Advanced Database Systems and Queries
  • Advanced Text Analysis Techniques
  • ICT Impact and Policies
  • Cloud Computing and Remote Desktop Technologies
  • Service-Oriented Architecture and Web Services
  • vaccines and immunoinformatics approaches
  • E-Learning and Knowledge Management
  • ICT in Developing Communities
  • Child Development and Digital Technology
  • Mobile and Web Applications
  • Radiation Effects in Electronics
  • Digital Transformation in Industry
  • Tactile and Sensory Interactions
  • Internet of Things and AI
  • Data Quality and Management
  • Formal Methods in Verification
  • Genetics, Bioinformatics, and Biomedical Research
  • COVID-19 Pandemic Impacts
  • Anomaly Detection Techniques and Applications
  • Context-Aware Activity Recognition Systems

Beaconhouse National University
2013-2021

University of Central Punjab
2008-2010

Information Technology University
2008

Cloud computing is becoming popular technology due to its functional properties and variety of customer-oriented services over the Internet. The design reliable high-quality cloud applications requires a strong Quality Service QoS parameter metric. In hyperconverged ecosystem environment, building high-reliability challenging job. selection based on parameters that play essential roles in optimizing improving rankings. emergence significantly reshaping digital ecosystem, numerous offered by...

10.32604/cmc.2021.014729 article EN Computers, materials & continua/Computers, materials & continua (Print) 2021-01-01

Through the expeditious expansion of wireless network, unlicensed bandwidth-based devices are growing substantially as compared to present vacant bandwidth. Cognitive radio networks a proficient solution spectrum shortage diminution hitch by allowing usage part that is not currently in use Primary User licensed bandwidth secondary user or cognitive user. Spectrum management procedure network comprises sharing, sensing and handoff. handoff plays vital role primarily focuses on single...

10.3390/app10051674 article EN cc-by Applied Sciences 2020-03-02

The exponential speed of advancement innovation has expanded the needs all users to avail their information on Internet 24/7. things (IoT) enables smart objects develop a significant building block in development pervasive framework. messaging between with one another means least work and expense for enterprise. industry that intends implement medical (IoMT) its organizations is still facing difficulties. Recognition solving these challenges are time-consuming task also need expenses if not...

10.1155/2020/8815651 article EN Mobile Information Systems 2020-08-26

Fuzzy logic has wide adoption in every field of study due to its immense advantages and techniques. In cloud computing, there are many challenges that can be resolved with the help fuzzy logic. The core objective this paper is analyze application most demanding resear ch areas computing. We also analyzed methods were used solving problems relates A systematic literature review was conducted enlist all challenging research categorized critical research, studied existing problem-solving...

10.3233/jifs-179680 article EN Journal of Intelligent & Fuzzy Systems 2020-03-03

The Internet-of-Things (IoT) has become an important topic among researchers owing to its potential change the way we live and use smart devices. In recent years, many research work found in world are interrelated convey via existing web structure which makes a worldwide system called IoT. This study focused on significant improvement of answers for wider scope gadgets Internet Things IoT stages years. any case, each arrangement gives very own framework, gadgets, APIs, information...

10.54692/lgurjcsit.2020.0404116 article EN Lahore Garrison University Research Journal of Computer Science and Information Technology 2020-12-28

Coronaviruses are a family of viruses that can be transmitted from one person to another. Earlier strains have only been mild viruses, but the current form, known as coronavirus disease 2019 (COVID-19), has become deadly infection. The outbreak originated in Wuhan, China, and since spread worldwide. symptoms COVID-19 include dry cough, sore throat, fever, nasal congestion. Antimicrobial drugs, pathogen–host interaction, 2 weeks isolation recommended for treatment Safe operating procedures,...

10.32604/cmc.2021.012167 article EN Computers, materials & continua/Computers, materials & continua (Print) 2021-01-01

The organizations utilizing the cloud computing services are required to select suitable Information Security Controls (ISCs) maintain data security and privacy. Many bought popular products or traditional tools ISCs. However, selecting wrong information cont rol without keeping in view severity of risk, budgetary constraints, measures cost, implementation mitigation time may lead leakage resultantly, lose their user's information, face financial implications, even reputation organization be...

10.3233/jifs-179692 article EN Journal of Intelligent & Fuzzy Systems 2020-03-06

In Natural Language Processing (NLP), topic modeling is the technique to extract abstract information from documents with huge amount of text. This leads towards identification topics in document. One way retrieve keyphrase extraction. Keyphrases are a set terms which represent high level description Different techniques extraction for prediction have been proposed multiple languages i.e. English, Arabic, etc. However, this area needs be explored other e.g. Urdu. Therefore, paper, novel...

10.1109/access.2020.3039548 article EN cc-by IEEE Access 2020-01-01

A collection of different interconnected small or large networks is called an Internet. It a speedy high way that connects multiple regions. Each region can have one more than networks. Internet has become influential tool to minimize the communication gap all over world.  Internet service providers (ISPs) are providing cheap, fast and good services now day. Today’s technology playing important role in growth users. The easy cheap availability computers, laptops, mobiles may cause for...

10.21015/vtse.v3i2.116 article EN VFAST Transactions on Software Engineering 2014-01-31

COVID-19 is a pandemic faced by almost every country in the world, this has resulted health crisis. Due to COVID-19, all countries around world have decided close educational institutes prevent pandemic. Educational taken possible measure minimize impact of closure schools and introduce concept an online education system which not only massive shock for parents but it also affects children's learning process social life. The applications (Apps) are very important, because they offer more...

10.54692/lgurjcsit.2020.0404117 article EN Lahore Garrison University Research Journal of Computer Science and Information Technology 2020-12-28

In Pakistan, millions of people have access to internet and now it has become essential part their lives. It is a driving force for innovation all industries. After arrival wireless service providers, users are growing rapidly. On the other hand, still just source information sharing social interaction. Its role in trade business limited. Some organizations adopted partial ecommerce solutions but no pure-ecommerce model implemented throughout country. E-Commerce plays an important economic...

10.1109/fit.2013.52 article EN 2013-12-01

Opinion target or aspect extraction is the key task of aspect-based sentiment analysis. This focuses on targeted words phrases against which a user has expressed his/her opinion. Although, opinion been studied extensively in English language domain, with notable work other languages such as Chinese, Arabic etc., regional have neglected. One reasons lack resources and available texts for these languages. Urdu one, millions native non-native speakers across globe. In this paper, domain focused...

10.32604/iasc.2021.018572 article EN cc-by Intelligent Automation & Soft Computing 2021-01-01

Blind and visually impaired (BVI) users often have interface accessibility problems while using mobile applications. This study was conducted to reduce the cognitive effort required for navigation by identifying issues according user’s mental model. The evaluated of smartphone screens solve organizational, presentation, behavioral (OPB) Usability evaluation an application validated with a specific focus on BVI user experience. A total 56 participants were included in evaluation. Overall,...

10.32604/iasc.2021.018009 article EN cc-by Intelligent Automation & Soft Computing 2021-01-01

Fault-tolerance technique enables a system or application to continue working even if some fault /error occurs in system. Therefore, it is vital choose appropriate tolerant best suited our application. In case of real-time embedded systems space project, the importance such techniques becomes more critical. applications, there minor no possibility maintenance and faults occurrence may lead serious consequences terms partial complete mission failure. This paper describes comparison various...

10.21015/vtse.v3i2.115 article EN VFAST Transactions on Software Engineering 2014-01-31

When we think about formal method; the first thing which comes in our mind is mathematical approach. The process of formalization an approach based on mathematics and used to elaborate properties systems (hardware software). modeling or methods provide us a framework for large complex systems. Thus these can be specified, analyzed, designed, verified systematic way rather than approaches are conventionally. Formal verification applied using theoretical computer science fundamentals solve...

10.21015/vtcs.v3i2.105 article EN VAWKUM Transactions on Computer Sciences 2014-01-24

Cloud computing is modrendevelopingtechnoloy which provides on-claim resources in cloud envoirnment.  modern technology guarantees to provide elastic Infrastructure, accessible via the Internet with low cost. refers a huge bundle of and data can be access different protocols interfaces. service model containsSoftware-as-a-service (SaaS),Infrastructure-as-a (IaaS), Platform-as-a-service (PaaS. users enjoy these services without knowing underlying behind cloud. Quality playsa vital role any...

10.21015/vtse.v2i2.112 article EN VFAST Transactions on Software Engineering 2014-01-30

Database systems are considered as an integral part of any software system, therefore, all complex maintain a database in different formats. Relational management based on relational model for creation and storage databases. reverse engineering (DBRE) is process extracting the requirements from operational system. Objective DBRE to enhance existing system optimal way. Of course, requires detailed mathematical analysis achieve objective optimality. For efficient data manipulation techniques...

10.1109/iccea.2010.280 article EN 2010-01-01
Coming Soon ...