Muhammad Ehsan Rana

Muhammad Ehsan Rana
Asia Pacific University of Technology and Innovation · Department of Computing & Technology

PhD

About

108
Publications
60,398
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
358
Citations
Citations since 2017
91 Research Items
354 Citations
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120

Publications

Publications (108)
Conference Paper
Full-text available
The Internet of Things (IoT) has lately grown across various applications, drawing much attention to its development. This research proposes to use IoT to improve women's safety and ensure a much safer environment for their protection. It proposes to use an IoT-based safety system designed to help women in danger or stress by alerting authorities a...
Conference Paper
Full-text available
This research proposes a smart entrance system to cope with the COVID-19 pandemic in public places. The system can help automate standard operating procedures (SOPs) for checking. The paper focuses on exploring the problem context related to the COVID-19 SOPs for public places. The research on technologies involves using thermal cameras, fingerprin...
Conference Paper
Full-text available
The deadly virus COVID-19 has heavily impacted all countries and brought a dramatic loss of human life. It is an unprecedented scenario and poses an extreme challenge to the healthcare sector. The disruption to society and the economy is devastating, causing millions of people to live in poverty. Most citizens live in exceptional hardship and are e...
Conference Paper
Full-text available
Surveillance camera has become an essential, ubiquitous technology in people's daily lives, whether applicable for home surveillance or extended to public workplace detection. The importance of the camera is irreplaceable in terms of the agent for an enclosed system to function correctly. The goal of ubiquitous computing is to keep different device...
Conference Paper
Full-text available
This study elaborated on the importance of fitness in the contemporary environment, put forward the problems in traditional fitness, and conducted a series of discussions according to the questions. It conducted an in-depth analysis of fitness data utilising appropriate data analysis techniques to explore the relationship between different fitness...
Conference Paper
Full-text available
Flood disaster is known to impact people and the environment substantially. People impacted by floods may lose properties and homes. Furthermore, there are also a substantial number of deaths yearly in case of a flood disaster. Malaysia has been hit by floods pretty frequently for the past few years. Government bodies and non-government organisatio...
Conference Paper
Full-text available
Blockchain presents many new examples of delivering a robust audit trail using the distributed ledger. However, some potential issues, especially scalability and privacy, are still ongoing in the blockchain. Fortunately, these issues can be settled by using cloud computing. Cloud computing is an on-demand service that enables consumers to purchase...
Conference Paper
Full-text available
The introduction of cloud computing has altered how IT demands are satisfied. Every chief information officer is focused on cloud computing because it has ushered in a new era in IT. Many banks are now utilising cloud technologies to accomplish their ever-demanding goals. Cloud computing offers business models for providing cutting-edge customer ex...
Conference Paper
Full-text available
GI Tract related diseases are one of the most prevalent in today’s society. Studies have shown that continuous monitoring, early detection, and treatment of these diseases are imperative in improving patients’ recovery rate. Wireless Capsule Endoscopy (WCE) is an innovative imaging technology that enables invasive imaging of the GI Tract. Convoluti...
Conference Paper
Full-text available
Everyone understands the necessity of health management, especially in light of the COVID-19 viral infection. How to care for and manage health has emerged as the main topic of conversation, whether it concerns the elderly, adults, patients, or children. There are numerous ways to maintain one's health, and smartwatches are good at doing this becau...
Article
Full-text available
Ubiquitous computing is embedded in people's daily lives as people engage with computational devices and systems to perform tasks without being aware of the engagement with the computational infrastructures. Its core concept is to interconnect the physical and digital worlds seamlessly. By implementing ubiquitous computing in urban infrastructure,...
Conference Paper
Full-text available
Deaf and mute people face significant challenges in carrying out daily tasks that can cause them to be ignored by society. They mainly have issues in communicating with the people without disabilities, who represent the majority. Thus, several sign language applications have been developed aiming to help them in communication. Still, most of those...
Conference Paper
Full-text available
With the increase in students graduating every year, the forged certificate issue, a problem that could compromise the educational industry badly, has arisen. Due to the lack of measurement for verifying the integrity of educational credentials, certificate forgery has become one of the most frequently occurring frauds in the recruiting industry. W...
Conference Paper
Full-text available
Energy Management Systems (EMS) provide information on energy usage, especially which device is consuming how much energy for monitoring and control. These EMS can be substantially improved and enhanced through the use of Internet of Things (IoT) based energy monitoring technology to save more energy. This research proposes a real-time IoT based en...
Conference Paper
Full-text available
A weather station uses many sensors to collect ambient data. With the help of IoT, it integrates all devices, connects them to the Internet and frames an intelligent ecosystem. For this research, a smart weather monitoring system has been proposed which detects temperature, humidity, pressure, altitude, dew point, and light level, as well as the ex...
Conference Paper
Full-text available
Nowadays, cloud technology is at the forefront of digital transformation as most companies are shifting their mobile applications to the cloud. Cloud Service Providers (CSP) facilitate this journey with a range of services that enables corporations to realize IT savings whilst improving productivity, product availability and agility. As the mobile...
Conference Paper
Full-text available
Sustainable development is a strategy that brings into consideration both the immediate and long-term requirements, such as social and economic justice or environmental conservation and natural wealth. Cloud computing is the supply of computing environments, including analytics, software, networking, databases, storage and servers, in order to prov...
Chapter
Full-text available
Unmanned aerial vehicles (UAV), more often familiar as drone, has been widely used both in civilian activities and military missions. UAV ad-hoc networks, also known as flying ad-hoc networks, are ad-hoc multi-UAV systems (FANETs). The FANET’s medium access control (MAC) and physical (PHY) layer specifications are defined by the IEEE 802.11 standar...
Article
Full-text available
This research aims to improve anomaly detection performance by developing two variants of hybrid models combining supervised and unsupervised machine learning techniques. Supervised models cannot detect new or unseen types of anomaly. Hence in variant 1, a supervised model that detects normal samples is followed by an unsupervised learning model to...
Article
Full-text available
The network infrastructure suffers severe destruction when disaster strikes. As a result, the primary network powered by the electric grid is most likely destroyed. It makes communication between the victims and the rescue team much more difficult. This paper reviews past research to explore how different solutions can be rapidly deployed for disas...
Conference Paper
Full-text available
Cloud computing offers a secure, scalable, and widely accessible platform for enormous data distributed management systems. There are a variety of appealing characteristics in cloud computing for its consumer market as many cloud services and deployment strategies supplied by Cloud Service Providers (CSPs) are based on customer demands. Furthermore...
Conference Paper
Full-text available
Cloud based solutions provide a robust and flexible approach to support and improve the digital businesses for better success. This study is focused on the need analysis for the Small-to-Medium Enterprise (SME) companies for the perspective of finding the most suitable and appropriate cloud strategies to obtain the best outcome. Various aspects inc...
Conference Paper
Full-text available
Gang of Four (GoF) design patterns are the famous set of twenty-three reusable and robust solutions to certain established problems in object-oriented programming that still guides software developers and designers despite having been published in mid-90’s. However, it is relatively difficult to explicitly determine the overall appropriateness and...
Conference Paper
Full-text available
One of the essential infrastructural components of a computer laboratory is electronic equipment. People can work in a light and comfortable environment because of electronic devices. IoT devices are used in the intelligent computer laboratory monitoring system, interacting with software and hardware to improve its effectiveness and usability. Beca...
Chapter
Full-text available
When a software is constructed, it needs to be carefully architected and designed to get benefitted from the inherent features of software quality. In addition to hardware, which is usually taken as the primary source for improving performance, design and architecture has high impact on the performance of a software application. Software design imp...
Article
Full-text available
Mobile edge computing is a novel technique that can reduce computational burden of local terminal devices by tasks offloading, which emerges as a promising paradigm to provide computing capabilities near mobile users. In this paper, the task offloading decision to solve the queuing problem of tasks to be processed in the local terminals was being c...
Conference Paper
Full-text available
Big data emerges as an important technology that addresses the storage, processing and analytics aspects of massive data characterized by 5V's (volume, velocity, variety, veracity, value) which has grown exponentially beyond the handling capacity traditional data architectures. The most significant technologies include the parallel storage and proc...
Conference Paper
Full-text available
Electronic Health Record (EHR) is one of the most common ways to represent patients' medical information digitally. It contains the patients' medical data such as medical history, diagnoses, medication, treatment plans, allergies, and much more medical-related information. However, medical data stored through this method is often centralized and is...
Conference Paper
Full-text available
Rapid development has also negatively impacted the sources that provide raw water for agricultural, domestic, and industrial needs. All these sources have been polluted due to man's pure pursuit of economic greed, which has caused illegal waste dumping and high amounts of industrial waste above government regulations, surpassing the ecosystem's sel...
Conference Paper
Full-text available
Software maintainability is a critical quality attribute that refers to the efforts required to perform specific changes to the software after deployment. This research aims to prove that the effective use of design patterns leads to a better software maintainability value by empirically evaluating a simpler solution (a solution without applying de...
Conference Paper
Full-text available
The integration of big data analytics and the cloud computing environment has become the focus area of many businesses and organizations. The growth that is being observed in big data requires more resources to perform analytics. In the business environment, it is important to be able to generate useful insights from the data that is collected. Whe...
Conference Paper
Full-text available
Big data is commonly used to extract meaningful insights for business decision making. While it presents a lot of opportunities, it is also posing numerous challenges, particularly in storage, processing and analytics. Cloud computing which is an emerging technology has assisted in the development of big data by providing the necessary features on...
Conference Paper
Full-text available
With the increased growth in scale and complexity of data, it is becoming more difficult for companies to maintain, manage and process their data to extract value using traditional architectures as large storage and computational power is required. Cloud computing steps in and proposes a whole infrastructure for the same while eliminating the need...
Conference Paper
Full-text available
The global cloud market has recently increased dramatically due to the Covid-19 pandemic. In such situation, people are looking for flexibility to work from home without going to the office physically and hence many organizations have started to look for a cloud-based solution. Clearly, Cloud not only offers flexibility, but also provides scalabili...
Conference Paper
Full-text available
Account credentials play a vital role in the continuity of an organisation. However, studies concluded that there are still many organisations that fail to protect their high privileged accounts. While some companies are starting to be aware of this issue, many organisations still pay little attention to it. As a result, high privileged accounts in...
Conference Paper
Full-text available
In this modern-day, the garbage issue still has not been resolved and it is getting worsen until people are less concerned about it. Besides that, some people were not educated properly to manage waste. Of course, the thing that humans cannot be neglected, recycling is the most significant to in waste reduction to ensure the environment has sustain...
Article
Full-text available
People spend a significant amount of time in their life finding parking whenever they visit shopping malls or travel to various places of their interest. Malaysia is known for its huge number of vehicles travelling every day during the morning rush and after work. Although many existing systems are in place to solve the parking problem, most of the...
Conference Paper
Full-text available
Academic assignment submission and management is a complex process that involves sub-processes, including collecting, date-stamping, safe-keeping, marking, collation of results and feedback to students. Nevertheless, this concept needs to be implemented with the emerging trends of automating business processes and green computing. In this research,...
Conference Paper
Full-text available
In computer networks, security is one of the most important aspects of protecting the network from various attacks. Especially in wireless networks, security can prevent unauthorized data access and save systems from potential threats. The security protocols in the wireless networks help to achieve the security process. Many protocols are designed...
Conference Paper
Full-text available
Cryptography plays a vital role in securing data for IT infrastructure by enabling an adequate level of security to the business. The increased significance of security in the IT infrastructure has raised the demand for public key cryptography. Public key cryptography eliminates the primary concern in private key cryptography, i.e. exchanging the k...
Article
Full-text available
Software flexibility is a crucial factor in designing and developing software as it reflects its capability to adapt to changes. It is a topic that has been discussed for a very long time which indicates its importance in software development. However, it is not easy to produce a flexible software design. Design principles provide fundamental conce...
Article
Full-text available
Software systems are hard to complete as customers became hard to satisfy and their requirements are more complicated. In this paper, quality factors that affect software are discussed, with some well-known standards that improve and assist while planning for quality assurance. The testing strategies and types that contribute to improving quality a...
Article
Full-text available
Active learning is a form of learning achieved through establishing high engagement between students and teachers. Active learning can be applied for multiple subjects and can take in many forms. Usually it involves students grouping together into small groups and engage in discussion, problem solving and reflection. E-learning platforms allow stud...
Article
Full-text available
Background: The increase in the prevalence of Autism Spectrum Disorder (ASD) and the complications related to effectively diagnosing the disorder has led to an urgent need for the development of easy implementing and effective screening methods. Problem: Diagnosing ASD is often a lengthy process that requires extremely careful assessment by clinica...
Article
Full-text available
Prediction algorithms have seen a rise in popularity in various applications. These algorithms are frequently implemented in applications to assist in making data-driven decisions based on the predicted output. Time prediction algorithms are often used to predict the travel time between two distances that allow better planning and anticipation. How...
Article
Full-text available
In most IT projects, software maintenance had always been a difficult task to perform especially when the software is not designed properly. This has led to numerous changes all over the places despite a minor change request. Design patterns are widely known for its proven solution to recurring problems. If fully utilized, design patterns can preve...
Article
Full-text available
Cloud technology has been widely adopted across the world in manufacturing as well as service sector. However, adoption of cloud in the Malaysian hospitality industry is limited due to the lack of investment in information technology (IT) and lack of understanding pertaining to the actions that are required to be taken for adoption of cloud in hosp...
Article
Full-text available
The purpose of this study is to identify and investigate the significant issues and challenges of BlockChain technology in Malaysian higher education institutes. The six issues and challenges which are identified from secondary literature under examination during this study are scalability, integration, data privacy, security, latency, and standard...
Article
Inventory management has significant importance in the industry that allows manufacturers and wholesalers to efficiently store and manage information in the warehouse. The Warehouse management provides the facility to manage functions such as store newly shipped products in available locations and track inventory information and product distributio...
Article
Full-text available
Document verification is a complex domain that involves various challenging and tedious processes to authenticate. Moreover various types of documents for instance banking documents, government documents, transaction documents, educational certificates etc. might involve customized verification and authentication practices. The content for each typ...
Article
Full-text available
It has been observed that rapidly increasing urbanization causes tremendous traffic congestion which is a threat to the developing nation's welfare in terms of their economy, growth, and social-integration. Apparently, among various reasons, adequate car parking management can reduce traffic obstruction, unpredictable accidents, pollution as well a...
Article
Full-text available
Software project schedule management has become a concern for many small and medium-sized companies. They still use traditional project management solutions and are unable to meet the needs of modern software. Some large software companies do acquire services of professional tools for managing software project progress, but small and medium-sized s...
Article
Full-text available
Recent years have witnessed the growing usage of cloud computing services in different aspects as it promises a wide change in how information is stored and used to run applications. This emerging trend has rapidly become a new computing paradigm of great interest for the software practitioner community. All cloud based applications needs to be del...
Article
Full-text available
Unified Communication is described as the process of integrating organisational operations and processes with multiple communication methods. It brings together various communications-voice, telephony, email, instant message, video conference etc.-used by enterprise workers. With the advancement of technology, the need to adapt change has become a...
Article
Full-text available
Depression is a type of mental illness that can be said as the feeling of being down emotionally which may affect an individual likeness of doing activities that are usually enjoyable by that individual. Recent researches have mentioned the global increase in depression rates. This anxiety and depression have led to a substantial increase in suicid...
Article
Full-text available
The problem with the existing indoor Wi-Fi networks compose of many factors such as bandwidth limitations, security issues, and health hazards. The implementation of an indoor, point to point visible light communication (VLC) system using an intensity modulated, direct detection scheme is investigated in this paper. The main results detailed in thi...
Article
Full-text available
To accommodate the transportation needs of world's growing population, automobiles numbers are increasing rapidly around the globe. This resulted in increased number of road accidents and deaths. By adopting Internet of Things (IoT), vehicles can be turned into a Smart Vehicle Monitoring System (SVMS) to monitor driver's heath condition and prevent...
Article
Full-text available
With the rapid advancement in science and technology, the development speed has surpassed peoples’ anticipation. However with the advent of this increasingly mature technology, small and medium-sized companies are still utilizing management methods using traditional development project schedule management tools for software development. These conve...
Article
Full-text available
Scalability refers to the ability of a system to handle resource utilization in a constant and smooth fashion when high or low volume of data is applied. It is among the key attractions for migration to a cloud based infrastructure. Most of the previous studies in this area are based on the enhancement of cloud scalability in terms of hardware reso...
Article
Full-text available
In recent times, especially since the beginning of the new millennium, governments, industry players, IT firms and business enterprises have given more consideration to the use of data for their decision and operational processes. This data, that usually contain users, clients and customers’ information, is collected using varying infrastructure, i...