Muhammad Asif Habib

Muhammad Asif Habib
  • National Textile University

About

78
Publications
25,764
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,102
Citations
Current institution
National Textile University

Publications

Publications (78)
Article
Full-text available
The widespread use of online social media has enabled users to express their thoughts, feelings, opinions, and sentiments in their preferred languages. These diverse perspectives offer valuable insights for data-driven decision-making. While extensive sentiment analysis approaches have been developed for resource-rich languages like English and Chi...
Article
Full-text available
Vision-based vehicle detection in adverse weather conditions such as fog, haze, and mist is a challenging research area in the fields of autonomous vehicles, collision avoidance, and Internet of Things (IoT)-enabled edge/fog computing traffic surveillance and monitoring systems. Efficient and cost-effective vehicle detection at high accuracy and sp...
Article
Full-text available
The growing ubiquity of Internet of Things (IoT) devices within smart homes demands the use of advanced strategies in IoT implementation, with an emphasis on energy efficiency and security. The incorporation of Artificial Intelligence (AI) within the IoT framework improves the overall efficiency of the network. An inefficient mechanism of parent se...
Article
Full-text available
Over the years, researchers have discovered increased problems among children related to reading and writing. Dyslexia and Dysgraphia are the most common problems they try to solve with various paper-based activities and gaming interventions. But they either lack interactivity, and children get bored of the games after some time, or therapists and...
Article
Therapists have used paper-based exercises to treat learning disorders for many years. Dyslexia and Dysgraphia are one of the reading and writing disorders that are common nowadays. Different serious games and interventions are developed for the improvement of dyslexic and dysgraphic children. But these games cannot engage these children for a long...
Article
Ergonomics and human factors play an important role in interaction design. Poor usabil-ity design of critical safety systems can easily lead to human error. While inspecting the critical systems, there are vital factors that have to be considered, such as demographic, organizational, interface design, and task factors. This study has inspected the...
Article
Full-text available
Nowadays, electric load forecasting through a data analytic approach has become one of the most active and emerging research areas. It provides future consumption patterns of electric load. Since there are large fluctuations in both electricity production and use, it is a difficult task to achieve a balance between electric load and demand. By anal...
Article
Big IoT data is inherently distributed, high-dimensional, irregular, and sparse in nature. Fog computing model in its original form is by no means the optimal solution for mining big IoT data. However, utilizing the network edge for mining tasks, such as enabling edge and IoT devices to mine locally frequent patterns can significantly improve the m...
Article
Full-text available
Coronavirus disease 2019 (COVID-19) has a significant impact on human life. The novel pandemic forced humans to change their lifestyles. Scientists have broken through the vaccine in many countries, but the face mask is the only protection for public interaction. In this study, deep neural networks (DNN) have been employed to determine the persons...
Article
Full-text available
Vehicular cloud computing (VCC) is a promising paradigm for efficiently utilizing and sharing computing and storage resources on vehicles. However, the network topology and the available computing resources change rapidly due to vehicular mobility. In this paper, we study the task offloading problem in the vehicular cloud (VC), in which computing m...
Article
Full-text available
Ransomware is a malicious software that takes files hostage and demands ransomware to release them. It targets individuals, corporations, organizations, and public services such as hospitals and police stations. It is a growing industry that affected more than three million users from 2019 to 2020. The ransom payments totaled 25 billion-plus dollar...
Chapter
Mobile Ad-hoc Network (MANET) works without the help of any fixed infrastructure. As it has a dynamic topology thus, MANET can be created anywhere to use. MANET nodes are often mobile nodes, and they do not rely on any centralized infrastructure. Over the last few decades, many routing algorithms and routing protocols are designed to increase the e...
Chapter
With the rapid increase of E-commerce applications usage, the growth of data flow over the Internet is increasing these days. The negation of unnecessary data delays with data security is essential and ultimate requirement of organizations in terms of file transfer protocol (FTP) and voice over IP (VoIP) traffic in any network. This requirement is...
Article
Full-text available
For the last two decades, cybercrimes are growing on a daily basis. To track down cybercrimes and radio network crimes, digital forensic for radio networks provides foundations. The data transfer rate for the next-generation wireless networks would be much greater than today’s network in the coming years. The fifth-generation wireless systems are c...
Article
Full-text available
In recent decades, agricultural goods demand has grown exponentially due to the growth of the human population. Agricultural production demands new and simple techniques. Moreover, safe, efficient, and cost-effective methods are required for monitoring agriculture crops. This research aims to provide a simple image processing technique that detects...
Article
Full-text available
Online learning is the most widely used application in educational institutions, specifically during pandemic COVID-19. Shortcomings in online learning systems negatively impact learner’s attitude and intention to use. Specifically, poor interface design can create a cognitive load that ultimately affects the learner’s intention to use. The design...
Article
Full-text available
In an automated steering system of the self-driving vehicles, the steering wheel angle is measured by the absolute angular displacement sensors or relative angle sensors. However, these sensors either encompass global navigation satellite systems (GNSS)/gyroscope – Micro Electromechanical-Sensor (MEMS) based solutions or comprise of the complex gea...
Article
Full-text available
Internet of Things (IoT) revolutionizes our daily life by incorporating the Internet and Wireless Sensor Network (WSN) together. IoT provides us healthier, comfortable, and easy life than before. Due to these reasons, IoT is now becoming the center of attraction for not only the research community but also for marketers and business owners. Due to...
Article
Full-text available
Deep learning is one of the most unexpected machine learning techniques which is being used in many applications like image classification, image analysis, clinical archives and object recognition.With an extensive utilization of digital images as information in the hospitals, the archives of medical images are growing exponentially. Digital images...
Article
Full-text available
Many healthcare centers are deploying advanced Internet of Things (IoT) based on Software-Defined Networks (SDNs). Transmission Control Protocol (TCP) was developed to control the data transmission in wide range of networks and provides reliable communication by using many caching and congestion control schemes. TCP is predestined to always increas...
Article
Full-text available
Due to recent development in technology, the complexity of multimedia is significantly increased and the retrieval of similar multimedia content is an open research problem. In the service of multimedia service, the requirement of Multimedia Indexing Technology is increasing to retrieve and search for interesting data from huge Internet. Since the...
Article
Full-text available
Data provenance is becoming extremely important these days for distributed environment, due to the ease in sharing and modifying data stored (e.g. cloud storage systems). However, the protection of provenance chain has been greatly understudied problem. This paper presents a secure provenance scheme for a distributed environment, designed to ensure...
Article
Full-text available
Sparseness is the distinctive aspect of big data generated by numerous applications at present. Furthermore, several similar records exist in real-world sparse datasets. Based on Iterative Trimmed Transaction Lattice (ITTL), the recently proposed TRICE algorithm learns frequent itemsets efficiently from sparse datasets. TRICE stores alike transacti...
Article
Full-text available
Sparseness is often witnessed in big data emanating from a variety of sources, including IoT, pervasive computing, and behavioral data. Frequent itemset mining is the first and foremost step of association rule mining, which is a distinguished unsupervised machine learning problem. However, techniques for frequent itemset mining are least explored...
Article
Full-text available
Data and information security is considered to be an important and challenging task for any field of life. But it becomes more critical especially when it deals with the medical field due to life and health hazards. The ratio of internal security threats to external threats always remains high. A huge number of efforts and technical expertise are r...
Article
Full-text available
With the widespread usage of the Internet, retailers moved enormously towards e-commerce. To get success in e-commerce, retailers must consider the liking and disliking of consumers in their website designs. Because of the easy availability of numerous online shopping websites, consumers are now choosy and selective in using these websites. It is i...
Conference Paper
Blockchain is a distributed ledger which works on a peer to peer network, with attributes of decentralized technology it's an emerging technology which will revolutionize the way of management of organizations of public and private sectors in coming decades.it provides transpires, security, trust on the system with its qualities like decentralizati...
Conference Paper
User Experience (UX) deals with the user's emotions and all the aspects of the end user's interaction with the system. It plays a vital role in enhancing user satisfaction by improving usability. Similarly, the effective user interface of the gaming environment can be designed by considering aspects of User Experience (UX). The primary objective of...
Article
Full-text available
The main challenge in database-as-a-service is the security and privacy of data because service providers are not usually considered as trustworthy. So, the data must be encrypted before storing into the database. Another challenge arises that the performance is degraded on the deployment of encryption algorithm on runtime. Furthermore, the connect...
Article
The main challenge in database-as-a-service is the security and privacy of data because service providers are not usually considered as trustworthy. So, the data must be encrypted before storing into the database. Another challenge arises that the performance is degraded on the deployment of encryption algorithm on runtime. Furthermore, the connect...
Article
Vehicular networks are continually gaining popularity, owing to the evolution of the Internet of things, by means of rapid communication in IP-based networks. Vehicles are being fitted with sensory devices to gain inputs from the external environment for information processing. Numerous applications of vehicular networks depend on the use of commun...
Chapter
The Internet of Things (IoT) is a framework in which every real-world object can be identified uniquely and has the capacity to send and receive data to the network. This paper presents analysis and survey on IOT security, also discusses the current status and challenges of IOT security. Typically, there are three layers in IoT architecture, i.e. p...
Chapter
The Internet of Things (IoT) is spreading to virtually all everyday objects. Therefore, the best technology must be selected for IoT devices. This paper presents the state of the art of the best IoT connectivity technologies. The paper first discusses basic points like frequency bands, network range, and topologies that are necessary to know for th...
Article
Full-text available
Modern algorithms for mining frequent itemsets face the noteworthy deterioration of performance when minimum support tends to decrease, especially for sparse datasets. Long-tailed itemsets, frequent itemsets found at lower minimum support, are significant for present-day applications such as recommender systems. In this study, a novel power set bas...
Article
The flow of data traffic has been vastly increased because of the implementation of the Internet of Things (IoT)-and security is a top need for Internet communication. The encryption-decryption process ensures that data access is restricted to legitimate users. But there is a tradeoff between the level of security and the communication overhead.
Article
Full-text available
In cognitive radio network, the secondary users (SUs) use the spectrum of primary users for communication which arises the security issues. The status of SUs as legitimate users is compulsory for the stability of the system. This paper addresses the issue of delay caused by a band-selection decision process that directly affects the security and pe...
Article
Full-text available
Most of the data concerning business‐oriented systems are still based on either NoSQL or the relational data model. On the other hand, Semantic Web data model Resource Description Framework (RDF) has become the new standard for data modeling and analysis. Due to this situation integration of NoSQL, Relational Database (RDB) and RDF data models are...
Article
Full-text available
The throughput of a TCP flow depends on the average size of Congestion Window (cwnd) of a congestion control mechanism being used during the communication. The size of cwnd depends upon the usage of available link bandwidth during communication. The response function is a measure of average throughput of a single TCP flow of congestion control mech...
Article
Geo‐related data, also known as spatial data, is represented using a vector used for representing longitude, elevation, and latitude. Specially built systems, well known as Geographical Information Systems (GIS), made use of such data for querying, manipulating, navigation, and analyzing. In the current era of data, science needs to involve smart i...
Conference Paper
We conducted this empirical investigation to determine the relationship between web-design features and irritation. The objective was to assess the effective role of design artifacts, which help to minimize the individuals’ feeling of irritation in the online shopping environment. A survey technique was employed to collect data to refute the propos...
Article
Full-text available
Among constituents of communication architecture, routing is the most energy squeezing process. In this survey article, we are targeting an innovative aspect of analysis on routing in wireless sensor network (WSN) that has never been seen in the available literature before. This article can be a guiding light for new researchers to comprehend the W...
Article
Many datasets are available in the form of conventional databases, or simplified comma separated values. The machines do not adequately handle these types of unstructured data. There are compatibility issues as well, which are not addressed well to manage the transformation. The literature describes several rigid techniques that do the transformati...
Article
Full-text available
This survey reviews the energy effective mechanisms that direct the IoT evolution while examining the specific areas for energy optimization in wireless sensor nodes. This paper emphasizes the progress in evolving energy techniques which target to reform the skeleton of IoT. Energy dissipation of an IoT sensor node on its layer-based structure is d...
Conference Paper
Full-text available
Predicting epidemics spread in networks is an important agent-based modeling application. It helps in making better policies to protect the networks. Scale free networks are built as an outcome of the process of preferential attachment. This process enables each newly joining node to establish links preferably with existing well connected nodes. Re...
Conference Paper
In software development life cycle the most important step is requirement elicitation as all the success of software product depends upon this phase. There are many methods of requirement elicitation exist because this phase is the backbone of software development. All methods are somehow performing well, but there is always a gap between the softw...
Conference Paper
In this Global Village, Wireless Sensor Networks enable Internet of Things Technology to facilitate users by providing control and services over various interconnected physical devices in smart homes that can communicate and exchange data with less user interaction. This paper proposes an Enhanced Secure DNS Name Auto-Configuration for IOT. Massive...
Conference Paper
Role-based access control (RBAC) is a widely-used protocol to design and build an access control for providing the system security regarding authorization. Even though in the context of internet resources access, the authentication and access control are providing critical functionalities. In practice, the RBAC model has three perspectives such as...
Article
Full-text available
Interoperability remains a major burden to the developers of Internet of Things systems. It is due to IoT devices are extremely heterogeneous regarding basic communication protocols, data formats, and technologies. Furthermore, due to the absence of worldwide satisfactory standards, Interoperability tools remains imperfect. In this paper, we have p...
Conference Paper
Full-text available
Role based access control (RBAC) is well known due to its high security and ease in management for permissions. But it also has some deficiencies like role structure complexity and having no dynamic behavior. Attribute based access control (ABAC) is a dynamic access control model that provides ease of role structuring. Analyzing roles and permissio...
Article
Full-text available
The confluence of cheap wireless communication, sensing and computation has produced a new group of smart devices and by using thousands of these kind of devices in self-organizing networks has formed a new technology that is called wireless sensor networks (WSNs). WSNs use sensor nodes that placed in open areas or in public places and with a huge...
Conference Paper
Role based Access Control (RBAC) is known as an evolution in the field of access control. The strength of RBAC is considered due to the incorporation of concept of roles. Separation of Duty (SOD) is a constraint that implements least privilege principle in RBAC. Dynamic Separation of Duty (DSD) is a powerful constraint to control internal security...
Article
In networks selecting the shortest path and sending data over that path is called routing. The path selection can be done either manually or through some routing protocol. There are many protocols that are used for routing like Routing Information Protocol (RIP), Open Shortest Path First (OSPF), Enhanced Interior Gateway Routing Protocol (EIGRP), a...
Article
Role-based access control (RBAC) always provides tight security of information and ease of management to security policy. There are certain constraints which make the information security tight. Separation of duty (SOD) in terms of mutual exclusion and role inheritance (RI) are some of those constraints which provide security of information and mak...
Article
Full-text available
Role-based access control (RBAC) is an evolution in the field of access control. RBAC offers tight security of information and ease of management to implement. The focus of this paper is on some of the important factors in RBAC, i.e., dynamic separation of duty (DSD) which is implemented to avoid internal security threats and role inheritance. We d...
Conference Paper
Full-text available
Role based access control (RBAC) always provides tight security of information and ease of management to security policy. There are certain constraints which make the information security tight. Separation of duty (SOD) in terms of mutual exclusion and role inheritance (RI) are some of those constraints which provide security of information and mak...
Conference Paper
Full-text available
Role Based Access Control (RBAC) offers tight security of information and ease of management to implement. RBAC is a proven and open ended technology that is being attracted by most of the organizations for its capability to reduce security administration in terms of cost and complexity. The focus of this paper is one of the important factors in RB...
Article
Full-text available
Grid computing provides high computing power, enormous data storage, and collaboration possibilities to its users. In the networked access to computation with a single-sign-on system as the portal to the possibilities of world wide computing grids security plays an important role. This paper provides an overview about the state-of-the-art of se-cur...

Network

Cited By