About
60
Publications
12,721
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,088
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (60)
Background
Faculty members' perceptions of blended learning are critical to developing effective strategies to improve its quality and prepare for its implementation under the new normal conditions. This study introduces a new FBL scale to address this issue, as no exclusive tool focuses on health sciences faculty members.
Materials and methods
Th...
Background
World Health Organization (WHO) identified noncommunicable diseases as the foremost risk to public health globally and the cause of approximately 80% of premature deaths. However, Cardiovascular diseases account for most of these premature deaths and established threats to public health. Recently, digitization of health consultancy servi...
Enhanced technologies of the future are gradually improving the digital landscape. Internet of Things (IoT) technology is an advanced technique that is quickly increasing owing to the development of a network of organized online devices. In today’s digital era, the IoT is considered one of the most robust technologies. However, attackers can effort...
Objectives
To implement state-of-the-art deep learning architectures such as Deep-Residual-U-Net and DeepLabV3+ for precise segmentation of hippocampus and ventricles, in functional magnetic resonance imaging (fMRI). Integrate VGG-16 with Random Forest (VGG-16-RF) and VGG-16 with Support Vector Machine (VGG-16-SVM) to enhance the binary classificat...
Consumer product recognition involves utilizing computer vision (CV) and machine learning (ML) systems for identifying and recognizing numerous consumer goods in video or image frames. This technology determines applications in retail, e-commerce, security systems, and inventory management. The purpose is to automate the detection of certain produc...
Currently, there is no unified Electronic Health Record (EHR) system connecting major healthcare organizations such as hospitals, medical centers, and specialists. Blockchain technology, with its unique features, provides an ideal platform for developing a large‐scale electronic health record system. In this article, the authors introduce HealthCha...
IoT is the technology that aids the interconnection of all kinds of devices over the internet to replace data,
monitor devices and enhance actuators to create outcomes. Cyber-physical systems (CPS) contain control and
computation components, which are compactly assured with physical procedures. The internet plays a prominent
role in modern lives, a...
With the rapid expansion of the Internet of Things (IoT), cloud storage has emerged as one of the cornerstones of data management, facilitating ubiquitous access and seamless sharing of information. However, with the involvement of a third party, traditional cloud‐based storage systems are plagued by security and availability concerns, stemming fro...
Vehicular Adhoc Network (VANET) suffers from the loss of perilous data packets and disruption of links due to the fast movement of vehicles and dynamic network topology. Moreover, the reliability of the vehicular network is also threatened by malicious vehicles and messages. The malicious vehicle can promulgate fake messages to the node to misguide...
Most existing methods for detecting fraudulent news or other forms of disinformation primarily rely on user profiling or content analysis, determining whether a given article aligns with a user’s stylistic or content-related preferences. This research departs from conventional approaches by concentrating not only on the characteristics of shared co...
Mild cognitive impairment (MCI) is a cognitive disease that primarily affects elderly persons.Patients with MCI have impairments in one or more cognitive areas, such as memory, attention,language, and problem-solving. The risk of Alzheimer’s disease development is 10 times higher among individuals who meet the MCI diagnosis than in those who do not...
In recent years, the extensive use of facial recognition technology has raised concerns about data privacy and security for various applications, such as improving security and streamlining attendance systems and smartphone access. In this study, a blockchain-based decentralized facial recognition system (DFRS) that has been designed to overcome th...
In this present time, Human Activity Recognition (HAR) has been of considerable aid in the case of health monitoring and recovery. The exploitation of machine learning with an intelligent agent in the area of health informatics gathered using HAR augments the decision-making quality and significance. Although many research works conducted on Smart...
The increasing demand for massive connectivity and high data rates has made the efficient use of existing spectrum resources an increasingly challenging problem. Non-orthogonal multiple access (NOMA) is a potential solution for future heterogeneous networks (HetNets) due to its high capacity and spectrum efficiency. In this study, we analyze an upl...
The AES (Advance Encryption Standard) has made the development of new block ciphers unnecessary; it is now the de facto standard for most uses of block ciphers. However, the AES is still not well-suited for very limited contexts like RFID (Radio-Frequency Identification) tags and WSN(Wireless Sensor Networks), despite recent implementation advancem...
Widespread adoption of internet of things (IoT) for automation, monitoring and control in various engineering, business and industrial applications poses serious challenges of data security and cyber-attacks to IoT networks. Blockchain enabled IoT networks, due to their immutability, transparency, and accountability, are commonly employed to ensure...
The effective usage of energy becomes crucial for the successful deployment and operation of unmanned aerial vehicles (UAVs) in different applications, such as surveillance, transportation, and communication networks. The increasing demand for UAVs in different industries such as agriculture, logistics, and emergency response has led to the develop...
Cyber-physical systems (CPSs) are affected by cyberattacks once they are more connected to cyberspace. Advanced CPSs are highly complex and susceptible to attacks such as false data injection attacks (FDIA) targeted to mislead the systems and make them unstable. Leveraging an integration of anomaly detection methods, real-time monitoring, and machi...
According to the World Health Organization (WHO), congenital heart disorders (CHDs) impact a significant proportion of babies worldwide, with prevalence rates ranging from 0.8% to 1.2%. Phonocardiography (PCG) is the leading non-invasive method for detecting congenital heart defects (CHDs), offering important information about cardiac signals i.e....
Social media presents both opportunities and risks for any firm. The Internet has recently made everything possible. Due to its low cost and rapid speed, it is in high demand. Due to the virtual technique of interacting through various social media apps like Instagram, WhatsApp, Twitter, Facebook, etc., people are drawn to social networking. Despit...
COVID-19, a novel pathogen that emerged in late 2019, has the potential to cause pneumonia with unique variants upon infection. Hence, the development of efficient diagnostic systems is crucial in accurately identifying infected patients and effectively mitigating the spread of the disease. However, the system poses several challenges because of th...
Facial expressions serve as crucial indicators of an individual's psychological state, playing a pivotal role in face-to-face communication. This research focuses on advancing collaboration between machines and humans by undertaking a thorough investigation into facial expressions. Specifically, we delve into the analysis of emotional variations re...
The COVID-19 epidemic poses a worldwide threat that transcends provincial, philosophical, spiritual, radical, social, and educational borders. By using a connected network, a healthcare system with the Internet of Things (IoT) functionality can effectively monitor COVID-19 cases. IoT helps a COVID-19 patient recognize symptoms and receive better th...
Test case selection is to minimize the time and effort spent on software testing in real-time practice. During software testing, software firms need techniques to finish the testing in a stipulated time while uncompromising on quality. The motto is to select a subset of test cases rather than take up all available test cases to uncover most bugs. O...
Parkinson’s disease (PD) affects a large proportion of elderly people. Symptoms include tremors, slow movement, rigid muscles, and trouble speaking. With the aging of the developed world’s population, this number is expected to rise. The early detection of PD and avoiding its severe consequences require a precise and efficient system. Our goal is t...
Vision impairment affects an individual’s quality of life, posing challenges for visually impaired people (VIPs) in various aspects such as object recognition and daily tasks. Previous research has focused on developing visual navigation systems to assist VIPs, but there is a need for further improvements in accuracy, speed, and inclusion of a wide...
Wind patterns can change due to climate change, causing more storms, hurricanes, and quiet spells. These changes can dramatically affect wind power system performance and predictability. Researchers and practitioners are creating more advanced wind power forecasting algorithms that combine more parameters and data sources. Advanced numerical weathe...
In this study, we discussed our contribution to building a data analytic framework that supports clinical statistics and analysis by leveraging a scalable standards-based data model named Fast Healthcare Interoperability Resource (FHIR). We developed an intelligent algorithm that is used to facilitate the clinical data analytics process on FHIR-bas...
Systolic arrays are an integral part of many modern machine learning (ML) accelerators due to their efficiency in performing matrix multiplication that is a key primitive in modern ML models. Current state-of-the-art in systolic array-based accelerators mainly target area and delay optimizations with power optimization being considered as a seconda...
The fast development of the Internet of Things (IoT) and widespread utilization in a large number of areas, such as vehicle IoT, industrial control, healthcare, and smart homes, has made IoT security increasingly prominent. Ransomware is a type of malware which encrypts the victim’s records and demands a ransom payment for restoring access. The eff...
The task of analyzing sentiment has been extensively researched for a variety of languages. However, due to a dearth of readily available Natural Language Processing methods, Urdu sentiment analysis still necessitates additional study by academics. When it comes to text processing, Urdu has a lot to offer because of its rich morphological structure...
Facial expression recognition (FER) remains a hot research area among computer vision researchers and still becomes a challenge because of high intra-class variations. Conventional techniques for this problem depend on hand-crafted features, namely, LBP, SIFT, and HOG, along with that a classifier trained on a database of videos or images. Many exe...
Background: Alzheimer’s, the predominant formof dementia, is a neurodegenerative brain disorder with no known cure. With the lack of innovative findings to diagnose and treat Alzheimer’s, the number of middle-aged people with dementia is estimated to hike nearly to 13 million by the end of 2050. The estimated cost of Alzheimer’s and other related a...
With the development of wireless technology, users not only have wireless access to the Internet, but this has also sparked the emergence of Wireless Ad-hoc Networks (WANETs); this promising networking paradigm has the potential to adopt the shape of new emergent networks such as the Internet of Things (IoT), Vehicular Ad-hoc Networks (VANET) and W...
Floods are one of the most severe and most frequent natural calamities. It causes enormous economic damage and even leads to higher mortality rates. Studies on damage detection of roads using artificial intelligence (AI) methods gained more attention currently, especially in the development of smart cities. Therefore, this study designs an optimal...
In medical informatics, deep learning-based models are being used to predict and diagnose cardiovascular diseases (CVDs). These models can detect clinical signs, recognize phenotypes, and pick treatment methods for complicated illnesses. One approach to predicting CVDs is to collect a large dataset of patient medical records and use it to train a d...
Smart farming helps to increase yield by smartly deciding the steps that should be practised in the season. A few components of precision farming are recommending the crops for cultivation, predicting the weather conditions, examining the soil; determining the pesticides, and fertilizers that have to be used. Smart Farming utilizes advanced technol...
IoT-based remote health monitoring is a promising technology to support patients who are unable to travel to medical facilities. Due to the sensitivity of health data, it is important to secure it against all possible threats. While a great deal of work has been done to secure IoT device-cloud communication and health records on the cloud, insider...
Microgrid (MG) technologies offer users attractive characteristics such as enhanced power quality, stability, sustainability, and environmentally friendly energy through a control and Energy Management System (EMS). Microgrids are enabled by integrating such distributed energy sources into the utility grid. The microgrid concept is proposed to crea...
Due to the exponential increase in internet and social media users, fake news travels rapidly, and no one is immune to its adverse effects. Various machine learning approaches have evaluated text and images to categorize false news over time, but they lack a comprehensive representation of relevant features. This paper presents an automated method...
Traction applications, such as electric and hybrid vehicles, require the electrical motor to be operated at low load conditions during most of their driving cycle. Permanent magnet (PM) motors in this case may not be an optimal choice due to their poor efficiency under low load conditions despite the fact that they exhibit the best output character...
COVID-19 has become a very transmissible disease that has had a worldwide impact, resulting in a huge number of infections and fatalities. Testing is critical to the pandemic’s successful response because it helps detect illnesses and so attenuate (isolate/cure) them and now vaccination is a life-safer innovation against the pandemic which helps to...
Background and aim: Machine learning methods are examined by many researchers to identify weeds in crop images captured by drones. However, metaheuristic optimization is rarely used in optimizing the machine learning models used in weed classification. Therefore, this research targets developing a new optimization algorithm that can be used to opti...
Several academicians have been actively contributing to establishing a practical solution
to storing and distributing medical images and test reports in the research domain of health care in recent years. Current procedures mainly rely on cloud-assisted centralized data centers, which raise maintenance expenditure, necessitate a large amount of sto...
Managing physical objects in the network's periphery is made possible by the Internet of Things (IoT), revolutionizing human life. Open attacks and unauthorized access are possible with these IoT devices, which exchange data to enable remote access. These attacks are often detected using intrusion detection methodologies, although these systems' ef...
Blockchain technology has emerged as a promising candidate for space exploration and sustainable energy systems. This transformative technology offers secure and decentralized strategies to process and manipulate space resources. Remote sensing provides viable potential with the coexistence of open data from various sources, such as short-range sen...
Background
Higher education institutions (HEIs) shifted from in-person attendance to blended and online learning due to the COVID-19 lockdowns.
Objective
This study investigated the students' perception of satisfaction, convenience, engagement, and learning towards blended and online courses conducted before, during, and after the COVID-19 lockdow...
Tuberculosis is curable, still the world’s second inflectional murderous disease, and ranked 13th (in 2020) by the World Health Organization on the list of leading death causes. One of the reasons for its fatality is the unavailability of modern technology and human experts for early detection. This study represents a precise and reliable machine v...
Purpose:
Telehealth, Internet interventions, or digital apps provide healthcare to isolated regions and can span borders. The purpose of this research was to assess the use of the Seha application, public perceptions toward the application, and factors that affect its utilization.
Methods:
The cross-sectional method was used to analyze the quant...
The precise and proficient detection of the kidney boundary in low-contrast images is considered as the main difficulty in the detection of kidney boundary in MRI image. The exact identification of a kidney shape in medical images with decreased non-kidney components to acquire insignificant false edge detection is adequately vital for several appl...
Background: Information system use has substantially increased among the organization based on its effective integration of the resources and improved performance. The increasing reliance on the information system serves as a great security threat for the firms. Objective: The study intends to evaluate the security of the information system in the...