
Fasee Ullah- Universiti Teknologi Petronas
Fasee Ullah
- Universiti Teknologi Petronas
About
93
Publications
78,013
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,469
Citations
Introduction
Current institution
Publications
Publications (93)
Cloud-based Intelligence of Things is significant for Augmented Enterprise Management Systems. Data integrity auditing is challenging in the intelligence of things environment, mainly when the newer versions in the public cloud environment update existing encrypted data. The related literature on cloud-based intelligence relies on encrypted data up...
The analysis of high-dimensional microarray gene expression data presents critical challenges, including excessive dimensionality, increased computational burden, and sensitivity to random initialization. Traditional optimization algorithms often produce inconsistent and suboptimal results, while failing to preserve local data structures limiting b...
Introduction
The liver is one of the vital organs of human body that performs some of the most crucial biological processes such as protein and biochemical synthesis, which is required for digestion and cleansing. A large number of patients are suffering from liver disease and hence it has become a life-threatening issue around the world. Annually,...
Cloud-based setups are intertwined with the Internet of Things and advanced, and technologies such as blockchain revolutionize conventional healthcare infrastructure. This digitization has major advantages, mainly enhancing the security barriers of the green tree infrastructure. In this study, we conducted a systematic review of over 150 articles t...
Despotic leadership harms both employee motivation and well-being. It has been studied using several theories, including social exchange and social learning theory, the latter suggesting learning stems from imitation. This study explores dark side of leadership, particularly in current healthcare reforms in Pakistan, such as Medical Teaching Instit...
Recently, ionic liquids (ILs) have garnered remarkable attention as electrolytes for CO2 electrochemical reduction (CO2ER) due to their unique properties viz. thermal and chemical stability, good CO2 solubility, and their potential to reduce overpotential. While many researchers have explored the catalytic performance of ILs in CO2ER, a comprehensi...
The integration of modern technologies like Blockchain and the Internet of Everything (IoEs) is paving way for rapid transformation across industries by successfully addressing critical challenges in terms of security, transparency, and operational efficiency. This chapter aims to explore the sector-specific applications of a combination of these t...
Security and trust are two critical challenges of IoE, which refers to the interconnection of electronic devices providing intelligent services. The IoE ecosystem works using smart contracts based on pre-specified rules and dynamic automated transactions that self-eject contracts, permitting the removal of intermediaries from the process. This dyna...
In Software Quality Assurance (SQA), predicting defect-prone software modules is essential for ensuring software reliability and consistency. This task is commonly achieved through Machine Learning (ML) techniques, but improving model performance typically incurs significant computational costs. These high computational costs and uncertain payoffs...
The primary objective of text summarization is to condense a document’s length while preserving its essential content. Extractive summarization methods are commonly used due to their effectiveness and straightforward presentation. However, a significant challenge lies in segmenting documents into distinct concepts and understanding how sentences in...
Cryptocurrencies have reshaped finance with secure, decentralized trading, attracting investor interest due to high volatility and potential returns. Accurate price forecasting is essential for optimizing returns and managing risks in digital markets. This study introduces OPTICALS, a novel framework for daily cryptocurrency price forecasting, focu...
Numerous Feature Selection (FS) techniques have been widely utilized in Software Engineering (SE) to enhance the predictive accuracy of Machine Learning (ML) models. However, how consistently these FS techniques extract features under various data changes (made to the training data) remains underexplored. While prior studies have assessed the stabi...
This book gathers selected papers presented at International Conference on Machine Learning, Advances in Computing, Renewable Energy and Communication (MARC 2023), held in Glocal University, Saharanpur, Uttar Pradesh, India, during 28–29 November 2023. This book discusses key concepts, challenges, and potential solutions in connection with establis...
The 5th generation of wireless technology with a continuum leap rushing towards the future in the world of communication has a puzzle that enables the autonomous machine to work in site making a louder voice that shows the era where even if we cannot be fully robotic, we can make the machines do the work by sitting on a faraway control room. Making...
Computed Tomography (CT) is a non-invasive imaging modality widely used for the precise detection of abnormalities within the human body. However, the electromagnetic radiation generated during CT scans poses health risks, including metabolic disturbances and genetic mutations, which can increase cancer susceptibility. To mitigate these hazards, Lo...
Urinary tract infection (UTI) can be considered one of the most frequent bacterial infections, and among the main indications for antibiotic use, in children. UTIs affect as much as 2% of the population admitted to community hospitals. Objective: The main objective of this randomized control trial was the assessment of the role of prophylactic anti...
Alternative splicing (AS) is a crucial process in genetic information processing that generates multiple mRNA molecules from a single gene, producing diverse proteins. Accurate prediction of AS events is essential for understanding various physiological aspects, including disease progression and prognosis. Machine learning (ML) techniques have been...
Computed Tomography (CT) is a non-invasive imaging modality used to detect abnormalities in the human body with high precision. However, the electromagnetic radiation emitted during CT scans poses health risks, potentially leading to the development of metabolic abnormalities and genetic disorders, which increase the risk of cancer. The Low-Dose CT...
Internet of Everything (IoE) is one of the smart networks where the interconnected and autonomously managed interactive devices and sensor nodes are connected for different services. Routing is always one of the significant areas for these networks. Edge and cloud-based networks are connected with IoE networks to facilitate the users by using wirel...
IIF (Indirect Immune Florescence) has gained much attention recently due to its importance in medical sciences. The primary purpose of this work is to highlight a step-by-step methodology for detecting autoimmune diseases. The use of IIF for detecting autoimmune diseases is widespread in different medical areas. Nearly 80 different types of autoimm...
The digital market trend is rapidly expanding due to key characteristics such as decentralization, accessibility, and market diversity enabled by blockchain technology. This study proposes a Predictive Analytics System to provide simplified reporting for the three most popular cryptocurrencies with varying digits, namely ADA Cardano, Ethereum, and...
Artificial intelligence (AI) is the most advanced developing area for enhancing Machine Intelligence and replicating the intelligence of humans. In this regard, Machine Learning (ML) is used to develop algorithms and models that help machines learn from data and predict problems. Although ML models provide accurate predictions, they are frequently...
Industrial development with the growth, strengthening, stability, technical advancement, reliability, selection, and dynamic response of the power system is essential. Governments and companies invest billions of dollars in technologies to convert, harvest, rising demand, changing demand and supply patterns, efficiency, lack of analytics required f...
The current spread out in Big Data analytics and the medical Internet of Things (IoT) originated the recognition of smart health. Smart health is the integration of devices, sensors, cameras, and objects or things embedded with sensors that generate an enormous amount of data known as big data. IoT-enabled smart health management assimilates the di...
Sustainable Cloud Computing is the modern era’s most popular technology. It is improving daily, offering billions of people sustainable services. Currently, three deployment models are available: (1) public, (2) private, and (3) hybrid cloud. Recently, each deployment model has undergone extensive research. However, relatively little work has been...
Deep learning is a rapidly growing research area having state of art achievement in various applications including but not limited to speech recognition, object recognition, machine translation, and image segmentation. In the current modern industrial manufacturing system, Machine Health Surveillance System (MHSS) is achieving increasing popularity...
The upcoming models of vehicles will be able to communicate with each other and will thus be able to share and/or transfer information. A vehicular ad hoc network (VANET) is an application of this vehicular communication that leads to an intelligent transportation system (ITS). Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) are the tw...
One of the most energy-saving design aspects is the reliability of the envelopes, which helps to monitor the temperature of the building and thus reduces dependence on mechanical heating, ventilation, and air conditioning systems for heating or cooling the building. This study designs home retrofits and new construction of single-family buildings b...
Flying Ad hoc Network (FANET) presents various challenges during communication due to the dynamic nature of network and ever-changing topology. Owing to high mobility, it is difficult to ensure a well-connected network and link stability. Thus, flying nodes have a higher chance of becoming disconnected from the network. In order to overcome these d...
The significance of the cloud enables the data owners (DOs) to store data remotely in cloud server (CS). The external and internal attacks on the stored data at CS can deliberately remove data. Furthermore, the CS removes the stored data to make empty location for the user's upcoming new data. However, it is a legal expectation of DOs to know wheth...
The present spreading out of the Internet of Things (IoT) originated the realization of millions of IoT devices connected to the Internet. With the increase of allied devices, the gigantic multimedia big data (MMBD) vision is also gaining eminence and has been broadly acknowledged. MMBD management offers computation, exploration, storage, and contr...
Deep learning is a rapidly growing research area having state of art achievement in various applications including but not limited to speech recognition, object recognition, machine translation, and image segmentation. In the current modern industrial manufacturing system, Machine Health Surveillance System (MHSS) is achieving increasing popularity...
Agricultural food production is projected to be 70% higher by 2050 than it is today, with the world population rising to more than 9 billion, 34% higher than it is now. The farmers have been forced to produce more with the same resources. This pressure means that optimizing productivity is one of the main objectives of the producers but also in a s...
A wireless body area network (WBAN) has gained access in monitoring of health conditions of patients. WBAN is applicable in all types of domains like an ambulance (vehicle) to ambulance communication in which one ambulance passes information to another for accessing the road on the priority-basis. The reason is that the ambulance has a patient with...
In vehicular ad hoc networks (VANETs), the topology information (TI) is updated frequently due to vehicle mobility. These frequent changes in topology increase the topology maintenance overhead. To reduce the control message overhead, cluster-based routing schemes are proposed. In cluster-based routing schemes, the nodes are divided into different...
Clustering algorithms optimization can minimize topology maintenance overhead in large scale vehicular Ad hoc networks (VANETs) for smart transportation that results from dynamic topology, limited resources and non-centralized architecture. The performance of a clustering algorithm varies with the underlying mobility model to address the topology m...
There is a need to develop an effective data preservation scheme with minimal information loss when the patient’s data are shared in public interest for different research activities. Prior studies have devised different approaches for data preservation in healthcare domains; however, there is still room for improvement in the design of an elegant...
Internet of Everything (IoE) indicates a fantastic vision of the future, where everything is connected to the internet, providing intelligent services and facilitating decision making. IoE is the collection of static and moving objects able to coordinate and communicate with each other. The moving objects may consist of ground segments and flying s...
In mobile adhoc networks for internet of things, the size of routing table can be reduced with the help of clustering structure. The dynamic nature of MANETs and its complexity make it a type of network with high topology changes. To reduce the topology maintenance overhead, the cluster based structure may be used. Hence, it is highly desirable to...
Vehicular ad hoc networks are considered as a promising wireless communication area to provide safety and comfort on the roads. Due to high mobility and dynamic topologies, the wireless communication links are not stable and network suffers from delay and disconnection issues. Geographical routing protocols rely on beacon exchange to update source...
Wireless body area network (WBAN) has witnessed significant attentions in the healthcare domain using biomedical sensor-based monitoring of heterogeneous nature of vital signs of a patient’s body. The design of frequency band, MAC superframe structure, and slots allocation to the heterogeneous nature of the patient’s packets have become the challen...
In mobile ad hoc networks (MANETs), the topology differs very often due to mobile nodes (MNs). The flat network organization has high topology maintenance messages overload. To reduce this message overload in MANET, clustering organizations are recommended. Grouping MANET into MNs has the advantage of controlling congestion and easily repairing the...
Huge data on the web come from discussion forums, which contain millions of threads. Discussion threads are a valuable source of knowledge for Internet users, as they have information about numerous topics. The discussion thread related to single topic comprises a huge number of reply posts, which makes it hard for the forum users to scan all the r...
The IoT devices produce a massive amount of content compared to the host-centric (IP-based) network. The IP-based network has no strengthened capabilities to handle the growing traffic of the IoT network. The existing research is focusing on proposing Information Centric Network (ICN) framework with potential replacement of IP-based network. Using...
In vehicular ad hoc network (VANET), the size of routing table can be reduced with the help of clustering architecture. The frequent changes in topology are the noteworthy characteristics of a VANET as its nature is dynamic. To manage the topology dynamics in VANET with less overhead, the concept of clustering can be used. Henceforth, an effective...
Wireless body area network (WBAN) is the emerging field in domain of healthcare to monitor vital signs of patients with the support of bio-medical sensors. The design of delay-aware and energy efficient routing protocol based on the traffic prioritization is the key research theme in WBAN. In addition, WBAN has challenging issues of packet loss, te...
Deep learning is an innovative set of algorithms in machine learning and requires minimum efforts of human engineering in extraction of features from data. It has the ability to find the optimum set of parameters for the network layers using a back-propagation algorithm, thereby modeling intricate structures in the data distribution. Further, deep...
With resource constraint’s distributed architecture and dynamic topology, network issues such as congestion, latency, power awareness, mobility, and other quality of service issues need to be addressed by optimizing the routing protocols. As a result, a number of routing protocols have been proposed. Routing protocols have trade-offs in performance...
Advances in wireless communication technologies invented body sensor networks (BSNs) for health care systems. BSN monitors patients' health remotely and automatically. It is economical and helpful solution for both patients and healthcare providers. BSN is made up of small Bio-medical sensors (BMSs) and Body Coordinator (BC). BMSs sense and transmi...
Health monitoring using biomedical sensors has witnessed significant attention in recent past due to the evolution of a new research area in sensor network known as Wireless Body Area Networks (WBANs). In WBANs, a number of implantable, wearable, and off-body biomedical sensors are utilized to monitor various vital signs of patient’s body for early...
The implementation of IEEE 802.15.6 in Wireless Body Area Network (WBAN) is contention based. Meanwhile, IEEE 802.15.4 MAC provides limited 16 channels in the Superframe structure, making it unfit for N heterogeneous nature of patient’s data. Also, the Beacon-enabled Carrier-Sense Multiple Access/Collision-Avoidance (CSMA/CA) scheduling access sche...
Wireless body area network (WBAN) has witnessed significant attentions in the healthcare domain using biomedical sensor-based monitoring of heterogeneous nature of vital signs of a patient’s body. The design of frequency band, MAC superframe structure, and slots allocation to the heterogeneous nature of the patient’s packets have become the challen...
Recently, Wireless Body Area Network (WBAN) has witnessed significant attentions in research and product development due to the growing number of sensor-based applications in healthcare domain. Design of efficient and effective Medium Access Control (MAC) protocol is one of the fundamental research themes in WBAN. Static on-demand slot allocation t...
Biomedical sensors (BMSs) monitor the heterogeneous vital signs of patients. They have diverse Quality of Service (QoS) requirements including reduced collision, delay, loss, and energy consumption in the transmission of data, which are non-constrained, delay-constrained, reliabilityconstrained, and critical. In this context, this paper proposes a...
In Wireless Body Area Networks (WBANs), every healthcare application that is based on physical sensors is responsible for monitoring the vital signs data of patient. WBANs applications consist of heterogeneous and dynamic traffic loads. Routine patient’s observation is described as low-load traffic while an alarming situation that is unpredictable...
In recent decades, cluster-based schemes have emerged as viable solutions for energy conservation problem in wireless sensor networks (WSN). However, most of the existing solutions incur imbalanced energy consumption and high network overheads. In addition, existing cluster-based solutions do not optimize route discovery based on the restricted res...
Wireless sensor network (WSN) consists of several tiny devices that are dispersed randomly for gathering network field. Clustering mechanism divides the WSN into different sub-regions called clusters. Individual cluster is consisting of cluster head (CH) and member nodes. The main research challenges behind clustering mechanism are to optimize netw...
Existing wireless technologies provide communication and information services to all fields of life. The one of the emerging and popular field is vehicular ad hoc networks, with its unique characteristics and highly mobile environment. Different types of routing protocols have been proposed to address the routing issues in network and one of the mo...
Existing wireless technologies provide communication and information services to all fields of life. The one of the emerging and popular field is vehicular ad hoc networks, with its unique characteristics and highly mobile environment. Different types of routing protocols have been proposed to address the routing issues in network and one of the mo...
Wireless sensor network (WSN) consists of several tiny devices that are dispersed randomly for gathering network field. Clustering mechanism divides the WSN into different sub-regions called clusters. Individual cluster is consisting of cluster head (CH) and member nodes. The main research challenges behind clustering mechanism are to optimize netw...
With recent advancement, Wireless Body Area Network (WBAN) plays an important role to detect various diseases of a patient in advance and informs the medical team about the life threatening situation. WBAN comprises of small intelligent Biomedical sensors which are implanted inside patient body and attached on the surface of a patient to monitor di...
With the availability of various sensors for vital signs monitoring of a human body, Wireless Sensor Networks (WSNs) have envisioned several applications in the health-care domain. Different wearable and implanted sensor nodes report the vital signs information to a remote medical facility via the local body coordinator. Together the set of sensor...
A vehicular ad hoc network has emerged as a new technology to integrate the capabilities of new generation wireless networking for vehicles and envisioned to provide unbelievable services in near future. Vehicles connect with/without existing infrastructure using IEEE 802.11p standards. However, due to high mobility and dynamic nature of topologies...
Wireless body area network (WBAN) has brought revolutionary changes in the health domain for patients. Various biomedical sensors (BMSs) have been deployed to monitor various vital signs of a patient for detecting the abnormality of the vital signs and inform the medical staff in advance before the patient " s life goes into a threatening situation...
Vehicular ad hoc networks are expected to support a large spectrum of applications in the field of intelligent transportation systems. It is an emerging and boosting field to provide wireless communication among vehicles. VANET has some unique and special characteristics compared with traditional mobile ad hoc networks such as self-organization, hi...
Ontology is an efficient and an adequate way of conceptualization of knowledge representation for real world applications. Ontologies are successfully used in varieties of knowledge domains.
In this paper, we focus on the field of medical ontology knowledge construction and representation. We identified three different medical ontologies classes: G...
In emergency health cases such as mass casualty incidents, the death ratio is still high due to lack of an automatic and intelligent system which timely observes and reports patient criticality. Indeed, the existing criticality assessment approaches are manual such as the established Simple Triage and Rapid Treatment (START). Accordingly, it is dif...
Nowadays, it is very challenging task to reveal the scientific knowledge due to availability of numerous research materials. The use of visualization tools to discover scientific models and their relationship is very difficult. The intellectual structures of a particular knowledge domain can be captured by visualizing the knowledge structures. This...
This paper analyses the web 2.0 attributes presented in wikipedia.com and amazon.com. They are among the most popular websites in the fileds of education and business respectively. Most of the web 2.0 attributes have been added in these two websites due to which they are more feasible, popular and well-organized. These two websites provide common c...
The impact of social websites can be good on students but if we have a closer look on the real impact of social networks. Today it is ruining the future and carrier of students. The social networking websites like https://www.linkedin.com, http://www.facebook.com/, https://twitter.com/ and https://www.orkut.com/ etc. are continuously distracting st...
An Intelligent use of technology can give competitive advantages to the organization's business processes. This is also true about Enterprise resource planning (ERP) which merges related internal and external management information across the whole organization, such as order processing, finance, manufacturing, accounting, sales, supply chain manag...
In Computer Network number of security techniques provide security consolation but not up to optimal security extent. There are massive attacks and efficient viruses travel across the network which incapacitates computer system and default configuration of the operating system. Preceding techniques can capture anomalous activates and previous known...
Sensor network is one of the authoritative leading technology of current century. Security is the main concern for everything whether it is for wired based networks or wireless based networks. So far, many of the researches have thought to physically implement the sensor nodes and sensor networks for secure communications but they did not think ove...
Lifetime of a WSN is directly proportional to the energy consumption of its constituent nodes. In cluster-based routing, all the cluster-heads may be selected from one part of the network. Since routing in these networks are one of the major sources of energy drains, therefore Energy Aware Uniform Cluster-Head Distribution (EAUCD) technique which s...
IEEE 802.16, known as WiMax, is at the top of communication technology drive because it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not secured as like others networking technologies. A lot of security concerns are needed to secure a wireless network. By keeping in mi...
Sensor network is a dominant technology among different wireless communication technologies due to its great deal of efficiency. Security is the critical issue for every types of network whether it is sensor networks or other networks. So far, many of the researchers have thought to physically implement the sensor nodes and sensor networks but thei...
Sensor networks help find ways where schematic networks that is where wired media won't exist or won't work. Sensor Networks are de facto Standards for communication over distances depending up on the need and requirements. The anticipated outcome that is intended of sensor networks embodies monitoring and evaluation. In this paper we acquaint the...