
Abas Kadar- Bachelor of Technology
- Principal Investigator at DHPC Technologies, Inc.
Abas Kadar
- Bachelor of Technology
- Principal Investigator at DHPC Technologies, Inc.
About
81
Publications
3,754
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2
Citations
Introduction
I am a researcher in artificial intelligence, specializing in reinforcement learning and natural language models. My research aims to bridge the gap between decision-making systems and language understanding to develop AI agents that can learn, reason, and interact in real-world environments. I focus on creating AI that can solve complex problems across various industries such as robotics, healthcare, and customer support, with an emphasis on continuous learning and real-time adaptability.
Current institution

DHPC Technologies, Inc.
Current position
- Principal Investigator
Publications
Publications (81)
In the intersection of gender, religion, and power, women across faith traditions are challenging the structures that have historically placed them in subordinate roles within their religious communities. The article explores how women have fought against patriarchal structures in the name of faith, pushing the boundaries of religious practices, do...
The rapid evolution of cloud technologies and the increasing sophistication of cyber threats have prompted organizations to reassess their cybersecurity frameworks. This paper explores the integration of Generative AI capabilities into Zero Trust Architecture (ZTA), a model that assumes no implicit trust between users and systems. By leveraging Gen...
Religious pluralism, the acknowledgment and coexistence of diverse religious beliefs within a society, has become increasingly significant in our globalized world. Schools, as pivotal institutions in shaping societal values and norms, play a crucial role in fostering understanding and tolerance among students from varied religious backgrounds. This...
Religious education (RE) occupies a pivotal role in shaping societal values, moral frameworks, and cultural identities. In increasingly pluralistic societies, the challenge lies in balancing secularism, faith, and pluralism within educational frameworks. Secularism advocates for the separation of religion from state affairs, ensuring neutrality in...
Childhood sexual abuse (CSA) is a traumatic event that has far-reaching and long-lasting effects on the psychological, emotional, and social development of survivors. Adolescence is a critical stage in human development marked by significant changes in identity, relationships, and emotional regulation. For survivors of CSA, this developmental perio...
In the intersection of gender, religion, and power, women across faith traditions are challenging the structures that have historically placed them in subordinate roles within their religious communities. The article explores how women have fought against patriarchal structures in the name of faith, pushing the boundaries of religious practices, do...
The latest advancements in artificial intelligence (AI) have seen tremendous strides in reinforcement learning (RL) and natural language processing (NLP). Although large language models (LLMs) have revolutionized the domain of NLP by generating human-like text and responding to advanced queries, they remain less successful if required to carry out...
The learning environment now experiences a fundamental shift because technology has penetrated deeply into education methods. Real-time performance monitoring systems alongside predictive analytics show great potential for educational outcome enhancement. Teachers can monitor student engagement and academic development in real-time with real-time m...
The recent achievement in natural language processing (NLP) has seen the power of large-scale language models in solving various tasks, such as text generation, machine translation, and question answering. However, these models are often not dynamically adaptable to solve challenging and dynamic issues, particularly in real-world applications. This...
The healthcare industry has undergone significant changes over the past few decades, but the COVID-19 pandemic has highlighted the importance of resilience in healthcare operations, particularly in claims adjudication. The pandemic accelerated the adoption of technology, including contact centers, which play a pivotal role in processing healthcare...
The healthcare sector has experienced substantial changes in recent decades, with the COVID-19 pandemic underscoring the critical need for resilience in healthcare operations, particularly in claims adjudication. The pandemic expedited the integration of technology, especially in contact centers, which are essential for processing healthcare claims...
In recent years, Optical Character Recognition (OCR) technology has evolved significantly, driven by the integration of Artificial Intelligence (AI) (Cardozo et al., 2024). AI-based OCR systems are now capable of extracting and processing text from a variety of sources, including images, video streams, and scanned documents, in real-time. This is p...
As cloud systems underpin the digital transformation of industries, fault diagnosis has become a critical area of research. While Artificial Intelligence (AI) offers unprecedented capabilities for fault detection and prediction in complex environments, the lack of explainability in AI models often limits their adoption. This paper examines the role...
The field of natural language processing (NLP) has seen immense growth, primarily driven by the emergence of large-scale pre-trained language models (LLMs). Models such as GPT, BERT, and T5 have revolutionized the way machines process and generate human language. However, although these models are extremely effective in static tasks like text gener...
In William Shakespeare's A Midsummer Night's Dream, the fantastical and dreamlike atmosphere allows for an exploration of themes rooted in Ovidian mythology, notably the concept of transformation. One of the most striking ways this theme manifests is through animal imagery, which plays a central role in the dream sequences and overall narrative of...
In the modern manufacturing environment, the need for continuous improvement and real-time optimization has become paramount. Manufacturing Execution Systems (MES) play a critical role in managing and controlling the manufacturing process. However, their potential is significantly enhanced when integrated with advanced time-series data management s...
In the modern digital age, cybersecurity threats are becoming increasingly sophisticated, requiring innovative solutions to detect, prevent, and mitigate cyber-attacks in real-time. Traditional security measures often struggle to keep pace with the scale and complexity of emerging threats. However, the integration of Machine Learning (ML) and Big D...
In the ever-evolving banking sector, the complexity of financial markets, coupled with rapidly changing economic conditions, requires advanced tools for efficient risk management. Traditional risk management techniques, often reliant on historical data and static models, are increasingly insufficient in handling the dynamic nature of modern financi...
Stock market prediction is a challenging task due to the complexity, volatility, and nonlinearity inherent in financial data. Traditional statistical models like ARIMA and GARCH have been used for time-series forecasting, but they struggle to model the intricate patterns and long-term dependencies of stock prices. Deep learning, particularly in the...
In the fast-evolving landscape of e-commerce, dynamic pricing has become a critical strategy for retailers aiming to optimize revenue, stay competitive, and respond to market fluctuations in real-time. Traditional pricing models often fail to adapt quickly enough to the rapidly changing environments, resulting in suboptimal pricing decisions. Adapt...
The integration of autonomous robotic systems in manufacturing processes has revolutionized the ability to conduct high-precision tasks, such as insertion assembly. However, the inherent uncertainties in real-world environments, including part variability, sensor inaccuracies, and environmental disturbances, significantly challenge the reliability...
Automated drug discovery platforms integrating artificial intelligence (AI), robotics, and cloud computing have emerged as transformative forces in pharmaceutical research and development. These technologies enable highthroughput screening, predictive analytics, and streamlined workflows, significantly reducing the time and cost associated with tra...
The convergence of Artificial Intelligence (AI) and Optical Character Recognition (OCR) has significantly enhanced the ability to capture, process, and analyze data in real-time. Traditional OCR systems, although effective in converting static printed or handwritten text into digital data, often struggle with the challenges posed by dynamic environ...
The proliferation of big data across diverse sectors has led to the urgent need for scalable, cost-effective, and efficient computational paradigms. Serverless computing, an emerging paradigm in cloud computing, offers a compelling alternative to traditional infrastructure-centric models by abstracting server management and enabling automatic scali...
Cloud computing has revolutionized the way data is processed and stored, offering scalable, on-demand resources that enable organizations to handle vast amounts of data efficiently. However, this technological advancement comes with a significant environmental cost, particularly due to the high energy consumption of data centers. Energy-efficient d...
Dementia, particularly Alzheimer's disease (AD), is one of the most significant health challenges in aging populations, with increasing prevalence worldwide. Cholinesterase inhibitors (ChEIs) are widely prescribed to manage symptoms of dementia, especially in Alzheimer's disease. However, these medications often carry antimuscarinic side effects th...
Artificial Intelligence (AI) is rapidly reshaping the healthcare landscape, with profound implications for preventive care and early diagnosis. Through the use of machine learning (ML), deep learning, and big data analytics, AI systems are capable of analyzing vast datasets to predict and diagnose diseases before they manifest in their most severe...
Surviving child sexual abuse (CSA) is a traumatic experience that can have profound and lasting effects on adolescents. The road to recovery is complex and requires the development of effective coping mechanisms to navigate the emotional, psychological, and social challenges that arise from such trauma. This article explores various coping strategi...
Film is a dominant form of storytelling in contemporary culture, significantly influencing youth perceptions, beliefs, and behaviors. This article examines the prevalence of stereotypes in movies and their impact on young audiences. By analyzing the ways in which these portrayals shape identity formation, social interactions, and societal norms, th...
Film is a powerful medium that shapes societal perceptions and influences the identities of young audiences. However, many popular films perpetuate harmful stereotypes, leading to distorted understandings of race, gender, and class. This article explores the role of art education in addressing these stereotypes through critical engagement and creat...
Film significantly shapes societal norms and influences adolescent perceptions. Many films perpetuate stereotypes that can distort identities and reinforce harmful biases. This article explores critical viewing as an educational strategy to empower adolescents to analyze, deconstruct, and challenge stereotypes in popular cinema. By fostering media...
Popular cinema significantly influences the perceptions and identities of adolescents, often perpetuating harmful stereotypes related to race, gender, and class. This article examines how teenagers engage with these cinematic stereotypes and the role of art as a medium for exploration and expression. By incorporating creative projects and critical...
Visual literacy is increasingly recognized as a crucial skill for navigating today's media-rich environment, particularly for adolescents. As films continue to play a significant role in shaping cultural narratives and societal perceptions, the ability to critically analyze visual media becomes essential. This article explores the concept of visual...
Artificial Intelligence (AI) systems are rapidly transforming industries, but they also present new and complex security challenges. As AI continues to be integrated into critical applications, from autonomous vehicles to healthcare diagnostics, its susceptibility to cyberattacks becomes a significant concern. Traditional security models, which rel...
The integration of artificial intelligence (AI) in DevOps and Machine Learning Operations (MLOps) has revolutionized software development and deployment. Traditional Continuous Integration and Continuous Deployment (CI/CD) pipelines face challenges in scalability, efficiency, and automation. AI-driven DevOps automation enables predictive analytics,...
The fast-growing fintech sector depends heavily on security because innovation combined with customer-centered services drives its achievement success. Rising numbers of financial operations taking place through digital channels have made protecting sensitive customer data an absolute necessity. Artificial intelligence functions as a groundbreaking...
Microservices architecture offers advantages in modularity, scalability, and flexibility by decomposing applications into smaller, independently deployable services. However, achieving high performance in such distributed systems presents challenges, particularly in state management and communication efficiency. Event sourcing, a pattern where stat...
Microservices architecture has gained popularity for building scalable, flexible, and resilient applications. However, as systems grow in size and complexity, managing state consistency and scalability becomes challenging. Event sourcing, a design pattern that records state changes as a sequence of immutable events, provides a robust solution for e...
Microservices architecture has become a predominant model for building complex, scalable applications by decomposing monolithic systems into smaller, independently deployable services. However, achieving scalability and consistency in these distributed systems poses significant challenges. Event sourcing, an architectural pattern where state change...
The integration of artificial intelligence (AI) into software development processes has become a significant trend, promising to enhance productivity, code quality, and decision-making. However, applying AI-based guidance to complex and legacy codebases presents several unique challenges. These challenges stem from issues such as code structure, te...
In an increasingly interconnected world, secure communication is of paramount importance. The rising volume of digital interactions has introduced new security challenges, making it essential for communication systems to evolve. Artificial Intelligence (AI), particularly machine learning (ML), has emerged as a crucial solution in addressing these c...
In today's fast-paced digital landscape, industries such as finance, healthcare, telecommunications, and autonomous systems require real-time, high-performance applications capable of making decisions in microseconds. However, traditional monolithic architectures-where all components are tightly coupled into a single, large codebase-present signifi...
Loneliness has emerged as a pressing public health concern, particularly among adults in the United States. The isolation experienced by individuals due to evolving social structures, the aging population, and more recently, the COVID-19 pandemic has escalated the incidence of loneliness, posing severe risks to mental and physical well-being. This...
The exponential growth of distributed systems, cloud computing, and edge networks has revolutionized how businesses operate, offering unparalleled flexibility, scalability, and efficiency. However, the decentralization of resources, data, and services introduces a range of unique cybersecurity challenges. Traditional defense mechanisms focused on p...
Vehicular Ad Hoc Networks (VANETs) are an essential part of intelligent transportation systems (ITS), enabling efficient communication between vehicles and between vehicles and infrastructure. As the scale and complexity of VANETs grow, optimizing routing protocols and forwarding strategies becomes crucial to ensure reliable, low-latency communicat...
As organizations continue to expand their digital landscapes, the shift toward distributed systems has introduced a host of new challenges in network security. Traditional security models, which were designed for more centralized architectures, are proving ineffective against the complexities and dynamic nature of distributed systems. These systems...
Artificial Intelligence (AI) has become a cornerstone of modern technological advancement, driving innovation in various sectors, from healthcare to finance to telecommunications. However, the reliance on large-scale data collection and centralization has sparked growing concerns regarding data privacy and security. Traditional AI models often invo...
Cloud computing offers organizations scalability, flexibility, and cost-efficiency, but it also introduces unique security challenges. The complexity and rapid pace at which cloud environments evolve require advanced mechanisms to monitor, evaluate, and strengthen security postures. Cloud Security Posture Management (CSPM) has emerged as a vital ap...
In the modern digital landscape, the demand for high-capacity, low-latency data transmission is accelerating at an unprecedented rate. Driven by the rise of cloud computing, big data analytics, artificial intelligence, and high-definition streaming, backbone networks must evolve to support the immense data volumes of the future. Dense Wavelength Di...
Concrete is a widely used construction material that, while robust under normal conditions, is prone to degradation when exposed to elevated temperatures. The issue of crack formation and propagation becomes even more critical when concrete is reinforced with non-traditional materials, such as Glass Fiber Reinforced Plastic (GFRP) rebars. GFRP, kno...
The rise of smart manufacturing, fueled by automation, data analytics, and interconnected systems, presents significant opportunities and challenges for operators and supervisors. As production environments become increasingly complex, traditional interfaces are no longer adequate to support effective decision-making. This paper explores the evolut...
As global conflict increasingly shifts to the digital realm, the integration of artificial intelligence (AI) into cyberwarfare is heralding a new era of unprecedented complexity and risk. Cyberwarfare, once largely characterized by conventional hacking and espionage, is now evolving into a battleground where AI systems on both sides engage in an ar...
Glass Fiber-Reinforced Plastic (GFRP) rebars have gained increasing popularity as an alternative to traditional steel reinforcement in concrete structures due to their superior corrosion resistance, high strength, and lightweight properties. However, the response of concrete reinforced with GFRP rebars to elevated temperatures remains a crucial con...
As organizations continue to transition to cloud-native architectures, they face a growing need to address security in a way that accommodates the speed, scalability, and dynamism of modern software development. Traditional security approaches, which often treat security as a separate and final step in the development lifecycle, are inadequate for...
Industrial Control Systems (ICS) are the backbone of critical infrastructure such as energy grids, water treatment plants, and manufacturing systems. The integration of these systems into interconnected cyber-physical environments exposes them to a new spectrum of vulnerabilities, particularly adversarial attacks that exploit both technical weaknes...
Cloud storage has become a cornerstone of modern computing, offering scalability, flexibility, and cost-efficiency. However, as cloud computing grows, so do the associated security risks, such as data breaches, unauthorized access, and data integrity issues. Traditional security measures, such as encryption and access controls, while important, are...
Financial inclusion is essential to economic empowerment and the achievement of broader societal goals such as poverty alleviation, wealth-building, and social mobility. Despite the U.S. being a global economic powerhouse, a significant portion of its population remains financially excluded, often facing barriers to accessing basic financial servic...
Wireless Sensor Networks (WSNs) have emerged as a transformative technology in smart agriculture, offering real-time monitoring, data-driven decision-making, and automation capabilities. The integration of WSNs in agricultural settings enhances productivity, optimizes resource utilization, and mitigates environmental impacts. This research explores...
The demand for low-latency, high-performance applications is rapidly increasing across industries such as finance, healthcare, telecommunications, and autonomous systems. These applications rely on real-time processing of vast amounts of data and require near-instantaneous responses, where even a small delay can have catastrophic consequences. Trad...
As the volume of unstructured data continues to grow exponentially, organizations face significant challenges in extracting valuable insights from this wealth of information. Traditional data processing methods often fall short in effectively handling unstructured data, which encompasses formats such as text, images, and videos. Cognitive Robotic P...
The migration from monolithic applications to microservices has become a key strategy for improving software scalability, flexibility, and agility. Microservices enable independent deployment of services, facilitating faster iterations and scaling. However, this decomposition introduces operational challenges, particularly around service coordinati...
In modern software architecture, the shift from monolithic to microservices has been a key strategy for enabling greater scalability, flexibility, and resilience. Event-driven microservices, where services communicate asynchronously through events, have emerged as a promising design pattern to overcome the limitations of synchronous architectures....
As cybersecurity threats grow more sophisticated, organizations face an increasingly complex landscape of potential vulnerabilities. Traditional security models, focused primarily on perimeter defense, are becoming inadequate in addressing modern cyber threats, especially with the rise of cloud computing, remote work, and interconnected third-party...
Cloud computing has revolutionized the way organizations manage their IT infrastructure, offering unprecedented scalability, flexibility, and cost-efficiency. However, the increased reliance on cloud-based services also brings with it significant cybersecurity risks. As organizations migrate more of their operations to the cloud, the complexity and...
The landscape of digital threats is evolving rapidly, with cybercriminals employing increasingly sophisticated methods to bypass traditional security measures. Conventional cybersecurity systems, reliant on static rule sets and signature-based detection methods, are struggling to keep pace with the sheer volume, diversity, and complexity of modern...
Large Language Models (LLMs) have become pivotal in natural language processing (NLP), offering state-of-the-art solutions for a wide range of tasks. However, the increasing complexity of real-world queries often presents challenges for traditional machine learning approaches that require extensive training data. Zero-Shot and Few-Shot learning tec...
With the ever increasing penetration of artificial intelligence (AI) into various sectors, there have been increasing concerns about data privacy and security, giving rise to novel approaches for the protection of users. Federated machine learning (FML) is one such solution-a decentralized methodology that enables multiple parties to train models i...
Railway embankments are crucial for the transportation infrastructure of modern society, supporting heavy loads from trains while ensuring the stability of railway tracks. However, their construction and maintenance in environmental protection zones (EPZs) require special attention to sustainability, as these regions are often characterized by sens...
Cryptography has long been a cornerstone of network security, safeguarding sensitive data and ensuring the integrity and privacy of communications. With the rapid evolution of digital technologies and the increasing complexity of cyber threats, traditional cryptographic methods are being pushed to their limits. This article explores the advancement...
The rapid advancement of artificial intelligence (AI) has revolutionized various sectors, including cybersecurity. While AI offers significant benefits in threat detection and response, it also presents new avenues for cybercriminals to exploit. This paper explores the dual-edged nature of AI in cybersecurity, focusing on how malicious actors lever...
The demand for ultra-low latency in mission-critical applications has intensified as industries increasingly rely on real-time decision-making, fast data processing, and high-performance computing. From healthcare systems that require instant patient monitoring to financial trading platforms that depend on millisecond speed, low-latency performance...
The transition from monolithic systems to microservices is a popular approach for organizations seeking to enhance their scalability, flexibility, and development speed. However, the process is complex and often fraught with challenges that can negate the intended benefits. A key approach to achieving successful decomposition lies in adopting event...
As manufacturing increasingly adopts data-driven approaches, the need for privacy-preserving data analytics has become a critical concern, particularly in industries where sensitive operational data must remain confidential. Federated Learning (FL), a distributed machine learning framework, offers a solution to this problem by enabling collaborativ...
The landscape of cybersecurity is evolving rapidly, driven by the increasing sophistication of cyber threats and the expanding digital footprint of organizations. Traditional methods of defending against cyberattacks, such as signature-based detection systems, are becoming increasingly ineffective against newer, more complex forms of attacks. Artif...
The stability of railway embankments is a crucial factor in ensuring the safety and longevity of railway infrastructure. Embankments provide the essential foundation that supports railway tracks and absorbs dynamic loads from trains. However, weak or unstable soils beneath the embankments can lead to issues such as excessive settlement, differentia...
Railway infrastructure plays a pivotal role in modern transportation systems, enabling efficient movement of goods and people. However, the long-term sustainability of railway networks is increasingly challenged by environmental, economic, and social pressures. The stability and strength of railway embankments, the foundation supporting railway tra...
Settlement of railway embankments is a significant challenge faced by railway engineers worldwide. The stability of embankments is crucial to the safe and efficient operation of rail systems, as excessive settlement can lead to misaligned tracks, uneven train rides, and increased maintenance costs. Settlement is especially problematic in areas with...
The increasing sophistication of modern smoke alarm systems is driven by the need for improved accuracy, reduced false alarms, and enhanced responsiveness in detecting potential fire hazards. Multi-sensor fusion, a technique that integrates data from multiple sensor types, has emerged as a transformative approach in the domain of smoke alarm system...
EMV (Europay, MasterCard, and Visa) payment systems have been the biggest contributor in the worldwide shift to more secure payment systems, reducing the incidence of card present fraud. However, as the payments landscape evolves, EMV systems are faced with a number of technical challenges that will work to restrain its effectiveness. These involve...