Asif Ali Laghari

Asif Ali Laghari
Sindh Madressatul Islam University · Department of Computer Science

Doctor of Philosophy
Professor (Assistant) at Sindh Madressatul Islam University

About

231
Publications
246,500
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,293
Citations
Introduction
Quality of Experience QoE, Cloud Computing, Computer Networks, Multimedia Streaming, UAV Systems, Internet of Things IoT, Fog Computing
Additional affiliations
June 2019 - present
Sindh Madressatul Islam University
Position
  • Professor (Assistant)
September 2007 - August 2008
Digital Institute of Technology
Position
  • Lecturer
September 2015 - January 2019
Harbin Institute of Technology
Position
  • PhD Student
Education
March 2009 - February 2014
February 2003 - March 2007

Publications

Publications (231)
Article
EM) presents significant challenges in securely managing and exchanging information. This study introduces a blockchain-based platform, BAIoT-EMS, designed to enhance security and efficiency in AIoT-enabled EM systems. The platform leverages a consortium network and InterPlanetary File Storage (IPFS) for secure storage and transaction management, s...
Article
Full-text available
The integration of artificial intelligence (AI) has caused information and communication technology (ICT) to undergo a number of recent rapid fluctuations. These changes have primarily affected the areas of management, end-to-end device interconnectivity, resource organization, communication, networking, and application-related aspects of ICT. Owin...
Article
Full-text available
The proliferation of multimedia-based deepfake content in recent years has posed significant challenges to information security and authenticity, necessitating the use of methods beyond dependable dynamic detection. In this paper, we utilize the powerful combination of Deep Generative Adversarial Networks (GANs) and Transfer Learning (TL) to introd...
Article
Full-text available
Text sentiment is a way of extracting data and transforming it into meaningful sentiment. In this research study, we tried to extract Urdu text data linked to medicine and convert it into a useful format that can be used to create an application. Electronic media quickly provides a large amount of information in any language, but it is unstructured...
Article
Full-text available
Recently, the primary reason for blindness in adults has been diabetic retinopathy (DR) disease. Therefore, there is an increasing demand for a real-time efficient classification and detection system for diabetic retinopathy (DR) to overcome fast-growing disease (DR). We introduced a novel deep hybrid model for auto-mated diabetic retinopathy (DR)...
Conference Paper
Full-text available
In recent, machine learning techniques have been employed to predict various diseases such as lung, blood, liver, heart, etc. As the heart is considered one of the human body’s significant organs, this research proposes a comparative analysis of heart disease failure using various machine learning algorithms. Since the ECG and EEG are primary sou...
Article
The Internet of Things (IoT) is an advanced tech that transfers game data such as graphics, text, and other data over real-time networks. Game player surroundings can be sensed, or movement or situation can be observed for wearable devices that use sensors and actuators, this increases sales of wearables from 18 million in 2015 to 533.6 million uni...
Article
Full-text available
The Internet of Multimedia Things, or IoMT, has grown significantly in the modern era. Major IoMT applications, like video surveillance and image processing, are used to monitor real-time settings in smart cities. A number of frameworks and techniques were put forth to improve IoT solutions. IoMT services must comply with user preferences and addre...
Article
Full-text available
As computer vision algorithms have advanced rapidly, the widespread deployment of video surveillance systems has enhanced traffic safety and propelled the growth of intelligent highway systems. However, the intricate nature of real-world scenarios, particularly the presence of occlusions, introduces noise that can cause the loss of critical feature...
Article
Metal matrix composites (MMC) are used in a variety of industries, their applications including the major sectors such as automotive, medical, electrical, sports, electronics, and aerospace, due to their lightweight and exceptional mechanical and physical abilities. The key advantages of these materials are higher wear-resistance, stiffness, streng...
Article
In recent years, driven by the continuous development of mobile Internet technology and artificial intelligence technology, the improvement of the manufacturing level of 6G Internet-of-Everything (IoE) products and the increase in residents’ income level, the 6G IoE industry has shown a sustained and stable development trend. However, 6G IoE has gr...
Conference Paper
This design handles the “Quality of Service” (QoS)/“Quality of Experience” (QoE) in transmedia ventures with fog computing services and agent technologies. A suitable deployment must check the service supplier QoE to the client and any connected hardware objectively and subjectively. Also, it lets partakers impart service feedback. The resulting st...
Article
Full-text available
This paper investigates virtual reality (VR) technology which can increase the quality of experience (QoE) on the graphics quality within the gaming environment. The graphics quality affects the VR environment and user experience. To gather relevant data, we conduct a live user experience and compare games with high- and low-quality graphics. The q...
Article
Metal matrix composites (MMCs) have gained great recognition in recent decades in a wide range of applications, including aerospace, automobiles, engine cylinders, and other sectors. MMCs possess excellent properties including being light in weight, high corrosion resistance, stiffness, and strength. However, they are categorized as difficult-to-cu...
Article
Full-text available
Deepfake technology uses artificial intelligence to create realistic but false audio, images, and videos. Deepfake technology poses a significant threat to the authenticity of visual content, particularly in live-stream scenarios where the immediacy of detection is crucial. Existing Deepfake detection approaches have limitations and challenges, pro...
Article
Full-text available
There are two key distinctions between cloud and on-premise (OP) software, the cost for each varies and so does the level of control. As organizations explore to reduce costs, many data and rules are migrating to multiple clouds like GCP, AWS, AZURE, and so on. Cloud service providers provide the extensibility, resilience, and quickness that tradit...
Article
Full-text available
Particularly in the context of smart cities, remote sensing data (RSD) has emerged as one of the hottest study topics in information and communication technology (ICT) today. The development of machine learning (ML) and artificial intelligence (AI) has made it possible to solve a number of issues, including automation, control access, optimization,...
Article
Based on the development needs of Industry 5.0, Advanced On-orbit Systems (AOS) can be integrated with terrestrial 5G networks, with large-scale IoT links as well as with flexible deployment and resource optimization, enabling efficient transmission of multiple types of industrial data, human-machine collaboration, and improving the flexibility, in...
Article
Full-text available
Autonomous decision-making is considered an intercommunication use case that needs to be addressed when integrating open radio access networks with mobile-based 5G communication. The robustness of innovations is diminished by the conventional method of designing an end-to-end radio access network solution. Through an analysis of these possibilities...
Article
The need to update the electrical infrastructure led directly to the idea of smart grids (SG). Modern security technologies are almost perfect for detecting and preventing numerous attacks on the smart grid. They are unable to meet the challenging cyber security standards, nevertheless. We need many methods and techniques to effectively defend agai...
Data
https://www.routledge.com/Intelligent-Healthcare-Systems/Estrela/p/book/9781032052724 Medical cyber-physical systems, image processing, microscopy, security, biomedical imaging, multi-modal sensing, automation, robotics, network layers, software design, and biometrics for high computational load (CL) are shown. The book addresses the dimensionalit...
Presentation
Full-text available
The book sheds light on medical cyber-physical systems while addressing image processing, microscopy, security, biomedical imaging, automation, robotics, network layers’ issues, software design, and biometrics, among other areas. Hence, solving the dimensionality conundrum caused by the necessity to balance data acquisition, image modalities, diffe...
Article
Full-text available
Virtual reality (VR) gaming (VRG) captures, examines, analysis, and renders the game data virtually instead of the users’ devices over efficient networks. E.g., VR is crucial in visually guided surgery and manifold therapies. Video Quality Assessment (VQA) helps VRG software and devices execute high-quality inputs/outputs. This paper debates VRG pr...
Article
Full-text available
The evolution of Autonomous Vehicles (AVs) has blurred the distinction between drivers and passengers, resulting in increased demand for in-car entertainment. Simultaneously, social networking platforms are evolving to adopt AR (Augmented Reality)/VR (Virtual Reality)-centric metaverses. Self-driving cars will free up the drivers and passengers to...
Article
The robust development of the blockchain distributed ledger, the Internet of Things (IoT), and fog computing-enabled connected devices and nodes has changed our lifestyle nowadays. Due to this, the increased rate of device sales and utilization increases the demand for edge computing technology with collaborative procedures. However, there is a wel...
Article
Full-text available
The robust development of the blockchain distributed ledger, the Internet of Things (IoT), and fog computing-enabled connected devices and nodes has changed our lifestyle nowadays. Due to this, the increased rate of device sales and utilization increases the demand for edge computing technology with collaborative procedures. However, there is a wel...
Chapter
Full-text available
The gaming industry is growing daily, and gaming traffic is now a significant part of internet traffic. Gaming is continuously moving from desktop to portable devices through cloud environments. Game development organizations are generating vast amounts of revenue through these games. PUBG is a world-renowned online game popular among all age group...
Article
Nowadays, Blockchain is very popular among industries to solve security issues of information systems. The Internet of Things (IoT) has security issues during multi-organization communication, and any organization approves no such robust framework. The combination of blockchain technology with IoT makes it more secure and solves the problem of mult...
Preprint
Full-text available
Detecting copyright material and piracy, especially in videos, is a dedicated challenge in marketing, advertisement, and industry. The issue of video piracy has become increasingly significant. This paper introduces a video-based pattern recognition method that classifies a copyrighted video through images. More precisely, the research has concentr...
Article
Full-text available
The human brain is an incredible and wonderful organ that governs all body actions. Due to its great importance, any defect in the shape of its regions should be reported quickly to reduce the death rate. The abnormal region segmentation helps to plan and monitor the treatment. The most critical procedure is isolating normal and abnormal tissues fr...
Article
Pakistan views cyberspace as a critical source of power in the twenty-first century when governments no longer have complete control over power games. Private entities, terrorist groups, criminals, and people, on the other hand, are prominent players in cyberspace, offering unpredictable and multifaceted cyber risks to sensitive networks and infras...
Article
This study proposes a novel method for streaming data compression and encoding protocols based on Generative Adversarial Networks (GAN) and Fuzzy Logic. The concept of GAN and Fuzzy Logic integration creates a different prospect as compared to the existing multimedia streaming data compression and security protocols. This paper proposed a collabora...
Article
Full-text available
Traveling demand increased rapidly on the roads of big cities. Traffic congestion is observed on a regular basis and causes serious problems for citizens. It is a vital need in larger cities to deal with the problem of overcrowded roads because Traffic congestion has negative consequences on daily routines and activities. All of the factors that ca...
Conference Paper
The Internet of Things (IoT) is one the major part of the fourth Industrial Revolution; it’s the process to enable things to gather data and get controlled remotely from anywhere in the world through the Internet. IoT is changing the world so that impossibilities are converting into possibilities, e.g., self-driving cars, automated machine payments...
Article
Web applications play a vital role in modern digital world. Their pervasiveness is mainly underpinned by numerous technological advances that can often lead to misconfigurations, thereby opening a way for a variety of attack vectors. The rapid development of E-commerce, big data, cloud computing and other technologies, further enterprise services a...
Article
Full-text available
The problems of data storage and sharing have been well solved with cloud storage. However, the disadvantage is that users' messages are stored in the cloud without encryption protection. Cloud storage managers can access or even obtain user data, which brings significant security risks to data owners. Therefore, some cloud storage centers adopt ci...
Article
The Industrial Internet of Things has gained more attention because of the self-governing nature of system configuration with interoperable application connectivity. In the E-Healthcare environment, it cooperates with medical sensors to capture, examine, analyze, preserve, and document day-to-day transactions of patients in real-time. The integrati...
Book
Full-text available
The book sheds light on medical cyber-physical systems while addressing image processing, microscopy, security, biomedical imaging, automation, robotics, network layers’ issues, software design, and biometrics, among other areas. Hence, solving the dimensionality conundrum caused by the necessity to balance data acquisition, image modalities, diffe...
Article
With the wide deployment of the Internet of Things (IoT), large volumes of incomplete multiview data that violates data integrity is generated by various applications, which inevitably produces negative impacts on the quality of service (QoS) of IoT systems. Incomplete multiview clustering (IMC), as an essential technique of data processing, has th...
Article
Full-text available
Atrial fibrillation easily leads to stroke, cerebral infarction and other complications, which will seriously harm the life and health of patients. Traditional deep learning methods have weak anti-interference and generalization ability. Therefore, we propose a new-fashioned deep residual-dense network via bidirectional recurrent neural network (RN...
Preprint
Full-text available
The immersive development in computing and communication systems, especially the evaluation of multimedia technology, has created various new paradigms. One of the concepts that has popped up recently is the metaverse. The technology opens different environments to the users for rapid connection on any of the socio-cyber platforms. With the emergen...
Article
Full-text available
Online education was widely launched worldwide with the increasing impact of Covid-19 and multiple online platforms were developed or improved due to their demands. Several surveys have been conducted to analyze the Covid-19 impact on education, revealing the importance of information and communication technology (ICT). This epidemic has significan...
Article
Full-text available
Acute Lymphoblastic Leukemia is one of the fatal types of disease which causes a high mortality rate among children and adults. Traditional diagnosing of this disease is achieved through analyzing the microscopic images of white blood cells by a clinical pathologist. However, this procedure relies on manual observation and often provides inaccurate...
Chapter
Smart Healthcare System (SHS), whose functions contain the overall and highly connected coordinated operation, must rely on command centers, efficient transportation, healthcare staff, and receiving facilities. Integrated healthcare services, medical security, drug dispensing/supervision/follow-up, public health, and other services aiming to improv...
Chapter
Deep learning has seen significant success in several fields of artificial intelligence research during the last decade. This technique, which arose from prior research on artificial neural networks, has outperformed conventional machine learning algorithms in image and speech recognition, natural language processing, and others. The first wave of...
Chapter
The DICOM medical imaging (MI) standard aids in sharing imageries across healthcare applications. The JPEG 2000 extends JPEG for therapeutic imaging relying on a Discrete Transformation along with wavelets. Nevertheless, JPEG 2000 is extremely unapt to encode certain visual arrangements and render good-quality 3D reconstruction. This paper analyzes...
Chapter
Disease theragnostics (DT) identifies health issues a person may have, and this task can sometimes be very easy, while in other cases may be a bit trickier. Large data sets can limit tools' accuracy to decide which are the patterns and coming up with predictions. The customary tactics used to diagnose/treat illnesses are manual and error-prone. Art...
Chapter
6G wireless networks will transform customer services and applications through the Internet of Medical Things (IoMT), ushering in a future of expert and autonomous systems. This chapter looks at the 6G in addition to IoMT convergence, emergent openings offered by 6G technologies (6GTs) in medical networks and applications. Next, it highlights some...
Chapter
Full-text available
The Internet of Medical Things (IoMT) designates the interconnection of communication-enabled medical-grade devices and their integration into wider-scale health networks to improve patients' health. However, because of health-related systems' critical nature, the IoMT still faces numerous challenges, particularly reliability, safety, and security....
Chapter
Full-text available
Using a feature vector comprising a collection of similarity cues, Content-Based Image Retrieval (CBIR) localizes, obtains, and displays pictures that are similar to those specified in a query. It necessitates data in medical archives and from medical equipment as inputs in order to infer meaning following some processing. An issue that is comparab...
Chapter
The growing usage of digital image processing practices devoted to health is explicit, aiding in the solution, improving diagnosis, and creating new diagnostic schemes. Histopathological assessments are the first, most common inspections to catch the general patient clinical picture. Still, their cost can be unreachable to populaces of less favored...
Chapter
Digital twins (DTs) have become progressively more popular in contemporary years and may continue to get snowballing acceptance. This chapter uses the terminology Personal Health Devices (PHDs) as a simplification for the set of healthcare gadgets comprising on-body and in-body devices, i.e., wearables, injectables, implantable, ingestible, and oth...
Chapter
Full-text available
Disease mapping and epidemiology (DME) makes use of disease maps to show complex geographic data that offer a high-level perspective of public health in any specific geographic region. Epidemiology is concerned with determining the causes of illnesses, which frequently vary in frequency and spatial distribution. This variance in space provided an o...
Article
Full-text available
The services are delivered to the user through a protocol interface of different resources. Service delivery conferring on quality of service (QoS) mentioned in service level agreement (SLA) and user satisfaction has been a major problem to access cloud services. To avoid such situations quality of experience (QoE) domain was added to the cloud com...
Article
Artificial Intelligence (AI) integrated with Blockchain distributed ledger technology (BDLT) has become the most attractive research area in the domain of renewable energy and related power automations. However, the increased use of renewable energy-enabled devices raised various challenging problems, such as smart grid-based control management, po...
Article
Full-text available
Telehealthcare systems are nowadays becoming a massive daily helping kit for elderly and disabled people. By using the Kinect sensors, remote monitoring has become easy. Also, the sensors' data are useful for the further improvement of the device. In this paper, we have discussed our newly developed “Eldo-care” system. This system is designed for t...
Article
Full-text available
Nowadays, video streaming is very popular around the world, users use video streaming to watch online movies, education, and do office work. Video streaming is referred to as the transmission of video content, live or recorded from server/cloud to end-users. Video and music files are prearranged and transmitted in sequential packets of data so they...
Article
Full-text available
Among several kinds of metal matrix composite materials (MMCs), such as silicon-based reinforced aluminum matrix (SiCp/Al) composites have become the most valuable composite material due to their various applications in industries, sports equipment, electrons, and automotive. Due to the presence of hard ceramic reinforcements, the SiCp/Al composite...
Chapter
Full-text available
The usage of artificial intelligence (AI) and machine training technologies has also improved quickly during this era of fast-cloud adoption. These technologies have transformed and continue to play a vital role well beyond the epidemic, from the exchange and analysis of information without compromising privacy to ensuring that patients with the mo...
Article
Full-text available
Fog computing, also known as edge computing, is a decentralized computing architecture that brings computing and data storage closer to the users and devices that need it. It offers several advantages over traditional cloud computing , such as lower latency, improved reliability, and enhanced security. As the Internet of Things continues to grow, t...
Article
Full-text available
Game-based learning in schools and colleges, with the help of AI-enabled augmented intelligence techniques, is reported to improve children’s neurodevelopment, intellectual sensing, and specific learning abilities, according to US officials. There is currently a huge transformation from traditional assisted learning to augmented reality-enabled com...
Article
Full-text available
The lightweight Unmanned Aerial Vehicle (UAV) flight activities are constrained, particularly in the UAV range or activity span and perseverance, by the strategic correspondence link capabilities. This paper tends to the different overlap issue of trading off a set of mission prerequisites, the UAV execution parameters, and strategic credibility; t...
Conference Paper
In this paper, the face milling experiments were performed to investigate the cutting process of SiCp/Al (SiCp 65%) volume percentage and their effect on tool life and tool wear mechanism. The study was performed based on different cutting parameters (cutting speed vc, feed per tooth fz, and axial depth of cut ap, 1mm, and width of cut ae 8mm,) and...