Ahthasham Sajid

Ahthasham Sajid
Baluchistan University of Information Technology, Engineering and Management Sciences · Computer Science

Doctor of Philosophy

About

66
Publications
17,987
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
274
Citations
Citations since 2017
59 Research Items
258 Citations
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
Introduction
Assistant Professor since 2009 and have more than 15 years administrative / Teaching Experience and overall more than 18 Years Experience PhD(CS)
Additional affiliations
November 2010 - April 2015
Balochistan University of Information Technology, Engineering and Management Sciences
Position
  • AP /HOD
March 2010 - March 2013
Balochistan University of Information Technology, Engineering and Management Sciences
Position
  • Head of Department
Description
  • Administrative Work along with Teaching and Research.
September 2007 - October 2009
Iqra University Quetta
Position
  • Lecturer

Publications

Publications (66)
Article
Full-text available
The world has advanced more than two centuries in the last 20 years in every aspect of existence. Every day, new inventions are made that improve our quality of life and make our lives easier. One aspect of contemporary innovation is the idea of the smart city. Many businesses and governments are embracing the idea of the "smart city" to improve qu...
Chapter
In modern era of cyber net and latest smart technology i.e., Internet of things (IOT) has played an essential role in every field of life. IOT is known as one of the pillars of 4th industrial revolution (4th IR). Connectivity using different sensor and objects used in daily mankind life are connected to internet that makes communication easy for hu...
Chapter
Full-text available
In this contemporary era internet of things are used in every realm of life. Recent software’s (e.g., vehicle networking, smart grid, and wearable) are established in result of its use: furthermore, as development, consolidation, and revolution of varied ancient areas (e.g., medical and automotive). The number of devices connected in conjunction wi...
Article
Full-text available
Peer-to-peer (P2P) live video streaming is an application-level approach providing ease of deployment with low cost as compared to the IP multicast and client/server (C/S) architecture. These systems solely rely on end-hosts to disseminate the content; therefore, their performance largely banks on end-hosts, called peers. Since peers themselves are...
Article
Full-text available
Cancer is among the major public health problems as well as a burden for Pakistan. About 148,000 new patients are diagnosed with cancer each year, and almost 100,000 patients die due to this fatal disease. Lung, breast, liver, cervical, blood/bone marrow, and oral cancers are the most common cancers in Pakistan. Perhaps smoking, physical inactivity...
Article
Full-text available
Cloud Computing (CC) is a promising technology due to its pervasive features, such as online storage, high scalability, and seamless accessibility, in that it plays an important role in reduction of the capital cost and workforce, which attracts organizations to conduct their businesses and financial activities over the cloud. Even though CC is a g...
Article
Full-text available
Burning velocity of different chemicals is estimated using a model from mixed population considering inverted Kumaraswamy (IKum) distribution for component parts. Two estimation techniques maximum likelihood estimation (MLE) and Bayesian analysis are applied for estimation purposes. BEs of a mixture model are obtained using gamma, inverse beta prio...
Article
Full-text available
In the near future, objects have to connect with each other which can result in gathering private sensitive data and cause various security threats and cyber crimes. To prevent cyber crimes, novel cyber security techniques are required that can identify malicious Internet Protocol (IP) addresses before communication. One of the best techniques is t...
Article
Full-text available
The Power-Domain Universal Filtered Multi-Carrier (PD-UFMC) waveform is one of the most promising technologies for the upcoming modern Underwater Optical Communication (UOC) systems due to its significant benefits in terms of bandwidth performance, massive connectivity, multi-path fading robustness and short-packed burst support. However, it...
Article
Full-text available
In step with rapid advancements in computer vision, vehicle classification demonstrates a considerable potential to reshape intelligent transportation systems. In the last couple of decades, image processing and pattern recognition-based vehicle classification systems have been used to improve the effectiveness of automated highway toll collection...
Article
Full-text available
Intelligently utilizing resources to meets the growing need of demanding services as well as user behavior is the future of wireless communication systems. Autonomous learning of wireless environment at run time by reconfiguring its operating mode that maximize its utility; Cognitive Radio (CR) can be programmed and configured dynamically and their...
Article
Full-text available
Intelligently utilizing resources to meets the growing need of demanding services as well as user behavior is the future of wireless communication systems. Autonomous learning of wireless environment at run time by reconfiguring its operating mode that maximize its utility; Cognitive Radio (CR) can be programmed and configured dynamically and their...
Article
Full-text available
Segmentation of cursive text remains the challenging phase in the recognition of text. In OCR systems, the recognition accuracy of text is directly dependent on the quality of segmentation. In cursive text OCR systems, the segmentation of handwritten Urdu language text is a complex task because of the context sensitivity and diagonality of the text...
Article
Full-text available
In this article, Maximum likelihood estimation (MLE) and Bayesian estimation for Rayleigh distribution using progressive type-II censoring in the presence of outliers is considered. Inverse Gamma prior and Jeffreys prior are used for Bayesian estimation. Squared error loss function (SELF), precautionary loss function (PLF) and K-loss function (KLF)...
Article
Full-text available
Data analysis of social media posting continues to offer a huge variety of information about the health situation faced by an individual. Social networking or social media websites provide us a wealth of information generated by users in a variety of domains, that generated information are unstructured and unlabeled and are not captured in an excee...
Article
Full-text available
Data analysis of social media posting continues to offer a huge variety of information about the health situation faced by an individual. Social networking or social media websites provide us a wealth of information generated by users in a variety of domains, that generated information are unstructured and unlabeled and are not captured in an excee...
Article
Full-text available
Opportunistic network is emerging as a research domain nowadays with the introduction of Internet of things phenomena. In recent years, storage level congestion issue due to handheld devices is considered as a key challenge to be handled in the opportunistic networks. The prime objective of conducting this research is to develop artificial intellig...
Article
Full-text available
Scalability and ease of implementation make Peer-to-Peer (P2P) infrastructure an attractive option for live video streaming. Peer end-users or peers in these networks have extremely complex features and exhibit unpredictable behavior, i.e. any peer may join or exit the network without prior notice. Peers' dynamics is considered one of the key probl...
Article
Full-text available
Nowadays, there is a growing trend in smart cities. Therefore, the Internet of Things (IoT) enabled Underwater and Wireless Sensor Networks (I-UWSN) are mostly used for monitoring and exploring the environment with the help of smart technology, such as smart cities. The acoustic medium is used in underwater communication and radio frequency is most...
Article
Full-text available
Cloud computing becomes very popular and growing rapidly since the last few years, various information technology giants such as Amazon, Google, Microsoft and others speed up their growth in development of cloud computing systems and enhance services for consumers all over the world. Cloud computing provides virtual storage for the clients to avail...
Article
Full-text available
In this paper is discussed the different kinds of environment monitoring systems related to water goodness. Different parameters are discussed to elaborate each water monitoring system with different aspects. The technology aspects of different approach techniques related to water quality monitoring with their way of implementation with the IOT asp...
Article
Full-text available
Nowadays, there is a growing trend in smart cities. Therefore, Terrestrial and Internet of Things (IoT) enabled Underwater Wireless Sensor Networks (TWSNs and IoT-UWSNs) are mostly used for observing and communicating via smart technologies. For the sake of collecting the desired information from the underwater environment, multiple acoustic sensor...
Article
Full-text available
Conventional RSA algorithm, being a basis for several proposed cryptosystems, has remarkable security laps with respect to confidentiality and integrity over the internet which can be compromised by state-of-the-art attacks, especially, for different types of data generation, transmission, and analysis by IoT applications. This security threat hind...
Article
Full-text available
Conventional RSA algorithm, being a basis for several proposed cryptosystems, has remarkable security laps with respect to confidentiality and integrity over the internet which can be compromised by state-of-the-art attacks, especially, for different types of data generation, transmission, and analysis by IoT applications. This security threat hind...
Article
Full-text available
The future of the Internet of Things (IoT) is interlinked with digital communication in smart cities. The digital signal power spectrum of smart IoT devices is greatly needed to provide communication support. The line codes play a significant role in data bit transmission in digital communication. The existing line-coding techniques are designed fo...
Article
Full-text available
In the modernworld, natural fiber reinforced polymer composites (NFRP) are gaining too much attention due to thelower manufacturing cost and favorable effects on the environment after use. Besides this, the processing problems ofsuch materials always remain a challenge. The bio/natural fiber has some protective layers and coatings causing hindrance...
Article
Full-text available
This paper is about the various limitations of the novel Li-Fi technology and perhaps those which have an adverse impact on its security and efficiency. Line of sight has been one of the major barriers for VLC based technology which causes eminent hindrance in the widen applicability of the technology. Li-Fi is a non-Line of Sight alternative which...
Article
Full-text available
In 21st century technological word now has bring a tremendous change to health care system is widely used by doctor patients and researchers. Patients use wearable device such as smart eyewear, foot wear, smart watches, which is use by both patient to wear and by doctor to monitor patient condition remotely on cloud. This provides time savage faste...
Article
Full-text available
Wi-Fi and Li-Fi are two modern era technologies that are used for data communication. Wi-Fi stands for Wireless Fidelity and Li-Fi stands for Light Fidelity. Wi-Fi uses radio frequency (RF) waves to for transmission of data, on the other hand Li-Fi uses light signals or visible light for data communication. Li-Fi provides transmission of data throu...
Article
Full-text available
Bitcoin is a cryptocurrency (digitized money) and is a worldwide decentralized payment system that is allowed and kept alive due to the technology called Block Chain. TheTnetworkTconsistsTofTpeer-to-peer transactions and these transactions are verified by using cryptography technology bank. Chain technology keeps the records of public distributed l...
Article
Full-text available
Internet of things (IoT) plays a great role in the 21 st century than a couple of years ago. Internet of things (IoT) provides us a technologically and optimistic image of the future where several computing objects are linked to the internet and they can recognize themselves with additional computing strategies. In this paper detail review of secur...
Article
Full-text available
In this study, Burr‐XII and Rayleigh distributions are combined to form a new mixture model that is considered to model heterogeneous data. Our objective is to estimate parameters of the proposed mixture model using Bayesian technique under type‐I censoring. Bayesian parameter estimation for the said mixture model is conducted by using informative...
Research
Full-text available
In the last few years with the advent of various compiler languages, it is perhaps difficult to choose one development language over another for a specific set of needs such that compatibility with a compiler for a particular problem is optimal as regards to caching, garbage handling and priority tasking. This hints at a need for automated optimiza...
Article
Full-text available
Wearable technology provides number of opportunities in today's world that trigged all the imaginations for the people. In today's era we are more and more dependent on computers and to be compatible with the technology we have to be omnipresent and embrace new developments. Our daily use material is imposed by factor such as battery life, processo...
Article
Full-text available
Delay tolerant networks (DTN’s) is the most growing application of wireless multi-hop networking under the umbrella of research done so far in sensor networks. Numerous challenges have to be faced by such networks; because of disconnection in terms of intermittent community, long delays etc in network due to drastic mobility. An intermediate node t...
Article
Full-text available
In the last few years with the advent of various compiler languages, it is perhaps difficult to choose one development language over another for a specific set of needs such that compatibility with a compiler for a particular problem is optimal as regards to caching, garbage handling and priority tasking. This hints at a need for automated optimiza...
Article
Full-text available
In the last few years with the advent of various compiler languages, it is perhaps difficult to choose one development language over another for a specific set of needs such that compatibility with a compiler for a particular problem is optimal as regards to caching, garbage handling and priority tasking. This hints at a need for automated optimiza...
Article
Full-text available
In the last few years with the advent of various compiler languages, it is perhaps difficult to choose one development language over another for a specific set of needs such that compatibility with a compiler for a particular problem is optimal as regards to caching, garbage handling and priority tasking. This hints at a need for automated optimiza...
Article
Full-text available
In the last few years with the advent of various compiler languages, it is perhaps difficult to choose one development language over another for a specific set of needs such that compatibility with a compiler for a particular problem is optimal as regards to caching, garbage handling and priority tasking. This hints at a need for automated optimiza...
Article
Full-text available
Radio Frequency Identification is a technology which falls in the category of automatic identification technologies. RFID is used to identify objects using radio waves. This technology is one of the widest used technologies in the world; almost every organization on some stage uses RFID based identification, tracking, etc. RFID basically needs two...
Article
Full-text available
Nodes in Mobile Opportunistic Network (MON) must cache packets to deal with the key challenging issue of intermittent connection. Management strategy of handling buffer therefore plays a vital impact on the performance of MON, and it attracts more attention recently. Intermittent connection and lengthy postpone are the key challenges in such networ...
Article
Full-text available
Nodes in Mobile Opportunistic Network (MON) must cache packets to deal with the key challenging issue of intermittent connection. Management strategy of handling buffer therefore plays a vital impact on the performance of MON, and it attracts more attention recently. Intermittent connection and lengthy postpone are the key challenges in such networ...
Article
Full-text available
The threshold based clustering schemes are a new era of clustering techniques. The threshold based clustering scheme offers a process of optimal cluster formations. The optimal utilization of the energy by using threshold-based clustering scheme network lifetime by process of making clusters. The outset of optimal threshold based clustering is new...
Article
Full-text available
Altmetrics is complementary to the traditional bibliographic impact measurement techniques. This study explores the extent to which Altmetrics co-relate with the bibliographic impact measurement techniques: H-index and its variants. Analysis is accomplished based on around 70,000 published papers of 45categories from the field of mathematics. Numbe...
Conference Paper
Full-text available
This review plans to survey the nature of users experience of responsive website design on cell phones (mobile devices) and desktop. Information were gathered from 150 understudies of Universities of Islamabad and Rawalpindi, who were included to assess users experience from website outline on one of the accompanying environments (conditions): resp...
Conference Paper
Full-text available
the paper presents the automatic detection of a violent object observed in a video. The approach can be applied on certain institutions like educational, restricted areas, banks and any other crowded place where the chance of violent behavior may occur. Artificial Intelligence is used to detect such objects depending upon the number of taken positi...
Conference Paper
Full-text available
This research paper accentuates on the technologies utilized as a part of the virtual classroom (VCR) and favourable circumstances of VCR over conventional classroom framework. This paper centres around Interactive learning Methodologies utilizing HTML5 and another web-based tool to draw in the student in assembling exercises and individual assignm...
Article
Full-text available
Opportunistic networks are part of the most popular categories of Mobile Ad hoc networks. Opportunistic networks usually deal with discontinuous path from source to the destination and therefore such networks suffers from numerous key challenges. One of these challenge is the selection of best custodian node that can store messages at its buffer un...
Article
Full-text available
IoT (Internet of Things) has suppressed technology to utmost level by sensing a situation through sensors and reacting to that situation via actuators without human intervention. The term coined by Kevin Ashton in 1999 but the actual development started taking place a few years back. It is predicted that by 2020 billion of devices will be connected...
Article
Full-text available
Opportunistic networks are one of the most popular categories of mobile Adhoc networks. These types of networks usually have to deal with intermittent disconnected path from source to the destination most of the time therefor suffers from numerous key challenges for successful custody transfer to be done between encounter nodes. There are numerous...
Article
Full-text available
Broadband infrastructure is a key component of knowledge economy. Broadband service both on fixed and mobile networks are becoming an indicator of the knowledge economy. Globally it is viewed that countries with developed broadband infrastructures are working more efficiently and effectively towards social and economic growth. To achieve worldwide...
Article
Full-text available
In the early days, the Internet used static routes, but after sometimes updating routing table manually becomes tough task for network administrators to achieve. Later, EGP protocol was introduced for Internet network administrator, but EGP was not scalable so in replacement of EGP a new protocol BGP was introduced to solve all problems which were...