
Mudassar Ahmad- University of Technology Malaysia
Mudassar Ahmad
- University of Technology Malaysia
About
81
Publications
27,970
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
967
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (81)
This study analyze web attack models using variety of vulnerability tools. It also analyze some of the known cyber attacks like Cross-Site Scripting, SQL Injection which are in fact the major threats of web application. The proposed method implements the Enhanced XSS Guard to identify XSS attacks and Aho-Cora sick Pattern to identify SQLi attacks....
Vision-based vehicle detection in adverse weather conditions such as fog, haze, and mist is a challenging research area in the fields of autonomous vehicles, collision avoidance, and Internet of Things (IoT)-enabled edge/fog computing traffic surveillance and monitoring systems. Efficient and cost-effective vehicle detection at high accuracy and sp...
Therapists have used paper-based exercises to treat learning disorders for many years. Dyslexia and Dysgraphia are one of the reading and writing disorders that are common nowadays. Different serious games and interventions are developed for the improvement of dyslexic and dysgraphic children. But these games cannot engage these children for a long...
Ransomware is a malicious software that takes files hostage and demands ransomware to release them. It targets individuals, corporations, organizations, and public services such as hospitals and police stations. It is a growing industry that affected more than three million users from 2019 to 2020. The ransom payments totaled 25 billion-plus dollar...
Content naming and lookup are decisive functions of the future architecture named data network (NDN). The core concept of NDN is the content distribution between consumers and content providers. The NDN supports advance vehicular networks that is famous with vehicular-named data network (VNDN) with different naming schemes such as hybrid, flat, att...
Mobile Ad-hoc Network (MANET) works without the help of any fixed infrastructure. As it has a dynamic topology thus, MANET can be created anywhere to use. MANET nodes are often mobile nodes, and they do not rely on any centralized infrastructure. Over the last few decades, many routing algorithms and routing protocols are designed to increase the e...
With the rapid increase of E-commerce applications usage, the growth of data flow over the Internet is increasing these days. The negation of unnecessary data delays with data security is essential and ultimate requirement of organizations in terms of file transfer protocol (FTP) and voice over IP (VoIP) traffic in any network. This requirement is...
In the current era of technology, digital contents copyright protection is a significant issue in the Internet of Things and smart grid. Digital contents are distributed, reproduced, and disclosed with extensive use of communication technologies such as the cloud. It has become quite easy to produce an illegal copy of digital content. Limited techn...
Online learning is the most widely used application in educational institutions, specifically during pandemic COVID-19. Shortcomings in online learning systems negatively impact learner’s attitude and intention to use. Specifically, poor interface design can create a cognitive load that ultimately affects the learner’s intention to use. The design...
Internet of Things (IoT) revolutionizes our daily life by incorporating the Internet and Wireless Sensor Network (WSN) together. IoT provides us healthier, comfortable, and easy life than before. Due to these reasons, IoT is now becoming the center of attraction for not only the research community but also for marketers and business owners. Due to...
Many healthcare centers are deploying advanced Internet of Things (IoT) based on Software-Defined Networks (SDNs). Transmission Control Protocol (TCP) was developed to control the data transmission in wide range of networks and provides reliable communication by using many caching and congestion control schemes. TCP is predestined to always increas...
Sparseness is the distinctive aspect of big data generated by numerous applications at present. Furthermore, several similar records exist in real-world sparse datasets. Based on Iterative Trimmed Transaction Lattice (ITTL), the recently proposed TRICE algorithm learns frequent itemsets efficiently from sparse datasets. TRICE stores alike transacti...
Sparseness is often witnessed in big data emanating from a variety of sources, including IoT, pervasive computing, and behavioral data. Frequent itemset mining is the first and foremost step of association rule mining, which is a distinguished unsupervised machine learning problem. However, techniques for frequent itemset mining are least explored...
Vehicular ad hoc networks (VANETs) have gained interest because of their applicability and significance in the fields of traffic management, road monitoring and safety, infotainment, and on-demand services. Route planning in vehicular networks based on efficient collection of real-time data can effectively mitigate traffic congestion problems in ur...
Data and information security is considered to be an important and challenging task for any field of life. But it becomes more critical especially when it deals with the medical field due to life and health hazards. The ratio of internal security threats to external threats always remains high. A huge number of efforts and technical expertise are r...
The main challenge in database-as-a-service is the security and privacy of data because service providers are not usually considered as trustworthy. So, the data must be encrypted before storing into the database. Another challenge arises that the performance is degraded on the deployment of encryption algorithm on runtime. Furthermore, the connect...
The main challenge in database-as-a-service is the security and privacy of data because service providers are not usually considered as trustworthy. So, the data must be encrypted before storing into the database. Another challenge arises that the performance is degraded on the deployment of encryption algorithm on runtime. Furthermore, the connect...
Vehicular networks are continually gaining popularity, owing to the evolution of the Internet of things, by means of rapid communication in IP-based networks. Vehicles are being fitted with sensory devices to gain inputs from the external environment for information processing. Numerous applications of vehicular networks depend on the use of commun...
The cancer of lung has been one of the major threats to human life for decades in developed and developing countries. The Computer Aided Detection CAD could be a powerful tool for initial lung nodule detection and preventing the deaths caused by the lung tumor. In this paper, an advanced technique for lung-nodule detection by using a hybrid feature...
Ongoing research on epidemic modeling is seeking for interventions to contain epidemic spread. Developing countries are at high risk of epidemics and pose a threat to developed countries as well. We have developed an epidemic scenario simulator to assist in choice of optimal vaccination strategy in case of scarce resources. The objective of this mo...
The Internet of Things (IoT) is a framework in which every real-world object can be identified uniquely and has the capacity to send and receive data to the network. This paper presents analysis and survey on IOT security, also discusses the current status and challenges of IOT security. Typically, there are three layers in IoT architecture, i.e. p...
The Internet of Things (IoT) is spreading to virtually all everyday objects. Therefore, the best technology must be selected for IoT devices. This paper presents the state of the art of the best IoT connectivity technologies. The paper first discusses basic points like frequency bands, network range, and topologies that are necessary to know for th...
In this paper, we have presented a comprehensive study on designing an aware energy architecture of clustered wireless sensor networks. In continuation to it, we have also analysed our proposed scheme, extended-multilayer cluster designing algorithm (E-MCDA), in a large network. Our novel layer-based hybrid algorithms for cluster head and cluster m...
Modern algorithms for mining frequent itemsets face the noteworthy deterioration of performance when minimum support tends to decrease, especially for sparse datasets. Long-tailed itemsets, frequent itemsets found at lower minimum support, are significant for present-day applications such as recommender systems. In this study, a novel power set bas...
Today data is a strategic asset and organizational goal is to maximize the value of their information. The concept of big data is now treated from different points of view covering its implications in many fields remarkably including Healthcare. Healthcare data is progressively being digitized and the Healthcare era is expansively using new ma-chin...
The flow of data traffic has been vastly increased because of the implementation of the Internet of Things (IoT)-and security is a top need for Internet communication. The encryption-decryption process ensures that data access is restricted to legitimate users. But there is a tradeoff between the level of security and the communication overhead.
In cognitive radio network, the secondary users (SUs) use the spectrum of primary users for communication which arises the security issues. The status of SUs as legitimate users is compulsory for the stability of the system. This paper addresses the issue of delay caused by a band-selection decision process that directly affects the security and pe...
The throughput of a TCP flow depends on the average size of Congestion Window (cwnd) of a con-gestion control mechanism being used during the communication. The size of (cwnd) depends uponthe usage of available link bandwidth during communication. The response function is a measureof average throughput of a single TCP flow of congestion control mec...
Today data is a strategic asset and organizational goal is to maximize the value of their information. The concept of big data is now treated from different points of view covering its implications in many fields remarkably including Healthcare. Healthcare data is progressively being digitized and the Healthcare era is expansively using new machine...
Majorly, nowadays, the collected raw data through mobiles is huge based on sensors embedded in devices and IoT based applications. These applications use Internet of Things (IoT) and Big Data analytics services and daily activities as routines for recording and analyzing real-time data for human-care. Nowadays, mobile is having services built on se...
The Bag-of-Visual-Words (BoVW) model is widely used for image classification, object recognition and image retrieval problems. In BoVW model, the local features are quantized and 2-D image space is represented in the form of order-less histogram of visual words. The image classification performance suffers due to the order-less representation of im...
Long distance high bandwidth networks are spanning several continents and many remote Healthcare centers are centralizing their data centers for economic reasons. For the best performance of their data centers, TCP (Transmission Control Protocol) performance and data security are the main critical issues in these network scenarios. TCP performance...
Geo‐related data, also known as spatial data, is represented using a vector used for representing longitude, elevation, and latitude. Specially built systems, well known as Geographical Information Systems (GIS), made use of such data for querying, manipulating, navigation, and analyzing. In the current era of data, science needs to involve smart i...
We conducted this empirical investigation to determine the relationship
between web-design features and irritation. The objective
was to assess the effective role of design artifacts, which help to
minimize the individuals’ feeling of irritation in the online shopping
environment. A survey technique was employed to collect
data to refute the propos...
The traditional big-data analytical approaches use data clustering as small buckets while providing distributed computation among different child nodes. These approaches bring the issues especially concerning network capacity, specialized tools and applications not capable of being trained in a short period. Furthermore, raw data generated through...
Many smart healthcare centers are deploying long distance, high bandwidth networks in their computer network infrastructure and operation. Transmission Control Protocol (TCP) is responsible for reliable and secure communication of data in these medial infrastructure networks. TCP is reliable and secure due to its congestion control mechanism, which...
Among constituents of communication architecture, routing is the most energy squeezing process. In this survey article, we are targeting an innovative aspect of analysis on routing in wireless sensor network (WSN) that has never been seen in the available literature before. This article can be a guiding light for new researchers to comprehend the W...
Many datasets are available in the form of conventional databases, or simplified comma separated values. The machines do not adequately handle these types of unstructured data. There are compatibility issues as well, which are not addressed well to manage the transformation. The literature describes several rigid techniques that do the transformati...
This paper introduces the novel idea of using human social norms and human emotions to improve the collision avoidance of Autonomous Vehicles (AVs). Until now, the literature has been concerned with theoretical debates regarding ethical issues connected to AVs, while no practical steps have yet been undertaken. This paper introduces the concept of...
Predicting epidemics spread in networks is an important agent-based modeling application. It helps in making better policies to protect the networks. Scale free networks are built as an outcome of the process of preferential attachment. This process enables each newly joining node to establish links preferably with existing well connected nodes. Re...
In software development life cycle the most important step is requirement elicitation as all the success of software product depends upon this phase. There are many methods of requirement elicitation exist because this phase is the backbone of software development. All methods are somehow performing well, but there is always a gap between the softw...
In this Global Village, Wireless Sensor Networks enable Internet of Things Technology to facilitate users by providing control and services over various interconnected physical devices in smart homes that can communicate and exchange data with less user interaction. This paper proposes an Enhanced Secure DNS Name Auto-Configuration for IOT. Massive...
Role-based access control (RBAC) is a widely-used protocol to design and build an access control for providing the system security regarding authorization. Even though in the context of internet resources access, the authentication and access control are providing critical functionalities. In practice, the RBAC model has three perspectives such as...
Originally TCP was designed for early, low bandwidth, short distance networks, so Standard TCP did not utilize the maximum bandwidth in today’s high bandwidth network environments. Therefore a lot of TCP congestion control mechanisms also known as TCP variants have been developed for today’s long distance high bandwidth networks. In this paper the...
Internet usage is rapidly increasing in every field of life. Internet coverage is wide either it is textile, pharmaceutical or education sectors. In every sectors where internet envisions are exist, there objects must be connected with each other. When we discussed the objects are connected with each other, a word internet of things (IoT) must exis...
Component Based Software Engineering (CBSE) methodology deals with software systems by evaluation and selection of appropriate components. CBSE offers software developers a compact software development life cycle, reduce development times, cost effective and less strenuous efforts. In under development countries (UDCs) most of the IT developers are...
In Mobile Cloud Computing (MCC), load balancing is essential to distribute the local workload evenly across all the nodes either statically or dynamically. A high level of user satisfaction and resource utilization ratio can be achieved by ensuring an efficient and fair allocation of all computing resources. In the absence of proper load balancing...
To extract useful information from huge data sets are considerable problem for researcher that is insufficient for conventional databases querying methods. K-means clustering algorithm is a one of the major cluster analysis method that is commonly used in practical applications for extracting useful information in terms of grouping data. But the st...
CUBIC is one of the most popular version of TCP being used by many flavours of Linux now a days. CUBIC [6] is an enhanced version of BIC TCP (Binary Increase Congestion Transmission Control Protocol) ??. To enhance the scalability of TCP in long distance network scenarios, CUBIC modified the linear window growth function of standard TCP to cubic [6...
Wireless ad-hoc and intrastructure networks have become very popular during the last ten years. Due to this reason, wireless security has become a very serious issue, specially in healthcare intrastructure networks. The aim of this research is to quantify the impact of security on the performance of healthcare networks. Many experiments are conduct...
The growing popularity and evolutionary nature of Wireless local area networks have raised some serious security issues to its users which are being solved by advanced security mechanisms. Applying strong security mechanisms affect the TCP and UDP performance negatively. In this research TCP and UDP performance is measured and investigated that how...
Digital Signatures are becoming a core technology in today's e-commerce world. The new technology of Elliptic Curve Digital Signature Algorithm (ECDSA) promises a better alternative for RSA in terms of smaller key size, higher performance and stronger security. ECC offers the highest strength per bit of any public-key cryptography system known toda...
Wireless Networks are being deployed everywhere as an alternative to Wired Networks. Most of people configured wireless networks using default configurations, as a result they may not achieve maximum network performance. Selection of frequency channel-pattern and physically placement of Access Points are main reasons for poor network performance. I...
Wireless Networks are being deployed everywhere as an alternative to Wired Networks. Most of people configured wireless networks using default configurations, as a result they may not achieve maximum network performance. Selection of frequency channel-pattern and physically placement of Access Points are main reasons for poor network performance. I...
In early 20th century when technology evolve, the performance of systems suffered from the problems of complexity, increasing cost of maintenance and software of hardware failure caused by unpredictable behavior and poor manageability. This fostered researchers to discover new design and techniques that enable the systems to operate autonomously. I...