Muhammad Faheem Mushtaq

Muhammad Faheem Mushtaq
Verified
Muhammad verified their affiliation via an institutional email.
Verified
Muhammad verified their affiliation via an institutional email.
  • Ph.D
  • Professor (Associate) at Islamia University of Bahawalpur

About

74
Publications
136,422
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,477
Citations
Introduction
Muhammad Faheem Mushtaq currently works as Head / Assistant Professor at the Department of Artificial Intelligence, The Islamia University of Bahawalpur, Pakistan. The area of interest are Information Security, Machine Learning, Deep Learning and Artificial Intelligence.
Current institution
Islamia University of Bahawalpur
Current position
  • Professor (Associate)
Additional affiliations
December 2020 - present
Islamia University of Bahawalpur
Position
  • Professor (Assistant)

Publications

Publications (74)
Article
Full-text available
Cloud computing exhibits a remarkable potential to offer cost-effective and more flexible services on-demand to the customers over the network. It dynamically increases the capabilities of the organization without training new people, investment in new infrastructure or licensing new software. Cloud computing has grown dramatically in the last few...
Article
Full-text available
XX Abstract – Popularity of a celebrity having twitter account is generally estimated by the number of twitter account holders following him on twitter. In this paper, we explore some content based features to evaluate their role for estimating the popularity of a celebrity. We try to find out the co-relation of celebrities' popularity with number...
Article
Full-text available
Hybrid Cube (HC) is generated from a combination and permutation of integers. All possible combinations of hybrid cube layers are the source for the generation of encryption and decryption keys in the non-binary block cipher. This study extends the hybrid cube encryption algorithm (HiSea) and analyzing their security issues by increasing the comple...
Article
Full-text available
Solar energy, a renewable resource, is essential for the efficiency of solar photovoltaic (PV) panels. However, meteorological factors, such as solar irradiation, weather patterns, precipitation, and overall climate conditions, pose challenges to the seamless integration of energy production into the power grid. Accurate prediction of PV system pow...
Article
Full-text available
Model optimization is a problem of great concern and challenge for developing an image classification model. In image classification, selecting the appropriate hyperparameters can substantially boost the model’s ability to learn intricate patterns and features from complex image data. Hyperparameter optimization helps to prevent overfitting by find...
Article
Full-text available
Predicting depression intensity from microblogs and social media posts has numerous benefits and applications, including predicting early psychological disorders and stress in individuals or the general public. A major challenge in predicting depression using social media posts is that the existing studies do not focus on predicting the intensity o...
Article
Full-text available
Pneumonia is a potentially life-threatening infectious disease that is typically diagnosed through physical examinations and diagnostic imaging techniques such as chest X-rays, ultrasounds, or lung biopsies. Accurate diagnosis is crucial as wrong diagnosis, inadequate treatment or lack of treatment can cause serious consequences for patients and ma...
Article
Full-text available
Cyber attacks are growing with the rapid development and wide use of internet technology. Botnet attack emerged as one of the most harmful attacks. Botnet identification is becoming challenging due to the numerous attack vectors and the ongoing evolution of viruses. As the Internet of Things (IoT) technology is developing rapidly, many network devi...
Article
Full-text available
Internet usage is increasing day by day all over the world and as a result, technology is also developing to make daily life appliances as smart as possible. Millions of devices are connected using IoT technology, and the vulnerabilities of these devices are still exploitable by attackers. Having access to IoT devices through a Bot Master allows th...
Article
Full-text available
An Internet of Things (IoT) network is prone to many ways of threatening individuals. IoT sensors are lightweight, lack complicated security protocols, and face threats to privacy and confidentiality. Hackers can attack the IoT network and access personal information and confidential data for blackmailing, and negatively manipulate data. This study...
Article
Full-text available
Twitter has become the foremost standard of social media in today’s world. Over 335 million users are online monthly, and near about 80% are accessing it through their mobiles. Further, Twitter is now supporting 35+ which enhance its usage too much. It facilitates people having different languages. Near about 21% of the total users are from US and...
Article
Full-text available
The exploitation of internet networks through denial of services (DoS) attacks has experienced a continuous surge over the past few years. Despite the development of advanced intrusion detection and protection systems, network security remains a challenging problem and necessitates the development of efficient and effective defense mechanisms to de...
Article
Full-text available
The advancement in technology made a significant mark with time, which affects every field of life like medicine, music, office, traveling, and communication. Telephone lines are used as a communication medium in ancient times. Currently, wireless technology overrides telephone wire technology with much broader features. The advertisement agencies...
Chapter
Pakistan is one of the major coal producing country and also have the most serious coal mine accidents around the world. The proposed study performs experiments on a dataset contain reviews based on accident reasons occurred during mining work to reduce the accident rate. The aim of this study achieved by categorizing the reasons into different cla...
Chapter
In this study, a method is proposed in which accurate prediction at early stage is important of cardiac patient for efficiently treating. The novelty of this research is using feature extraction with the help of some techniques of signals processing. Ten different kinds of sensors are used are metal oxide semiconductors that are used for sensing th...
Chapter
The COVID-19 outbreak is moving individuals globally. Monitoring social media and internet news is now vital to grasping this phenomenon and its impact. This study’s goal is to offer a method for capturing important concepts and themes addressed in the mainstream media and social networks and then apply it to the COVID-19 outbreak. This study compa...
Chapter
Facial Expression Recognition (FER) has applications in various areas, including human behavior, human-machine interaction, mental disorder detection, human psychology, mood and response behavior, better interpersonal relationship, effective communication, video surveillance, face detection & tracking system, and real-time emotion detection system,...
Chapter
Clustering is a standard paradigm for associating some similar objects to a cluster while associating others to their respective clusters in an unsupervised manner. Different techniques are proposed in the domain of clustering depending upon the underlying methodology slightly vary from one another. Some of these are regarded as Hierarchical Cluste...
Chapter
The biggest challenge in Electronic Commerce (E-Commerce) is understanding the demand of the market and customer perception regarding the products of online stores. Online user evaluations are faster than a direct poll for obtaining customers' perceptions. To predict the quality of service provided, sentiment analysis methodology is used, which ide...
Article
Full-text available
COVID-19 is a widely spread disease, and in order to overcome its spread, vaccination is necessary. Different vaccines are available in the market and people have different sentiments about different vaccines. This study aims to identify variations and explore temporal trends in the sentiments of tweets related to different COVID-19 vaccines (Covax...
Article
Full-text available
The internet provides a very vast amount of sources of news and the user has to search for desirable news by spending a lot of time because the user always prefers their related interest, desirable and informative news. The clustering of the news article having a great impact on the preferences of the user. The unsupervised learning techniques such...
Chapter
Elderly activity detection is one of the major issues in modern civilizations. Due to the increase in workload, people are not able to watch over their elderly ones and leave them into old homes for care and cure. In some countries, most elderly people like to live independently instead of living in old homes, which may leave them alone and helples...
Article
Full-text available
Depression detection from social media texts such as Tweets or Facebook comments could be very beneficial as early detection of depression may even avoid extreme consequences of long-term depression i.e. suicide. In this study, depression intensity classification is performed using a labeled Twitter dataset. Further, this study makes a detailed per...
Article
Full-text available
Developments in drones have opened new trends and opportunities in different fields, particularly in small drones. Drones provide interlocation services for navigation, and this interlink is provided by the Internet of Things (IoT). However, architectural issues make drone networks vulnerable to privacy and security threats. It is critical to provi...
Article
Full-text available
Reviews of users on social networks have been gaining rapidly interest on the usage of sentiment analysis which serve as feedback to the government, public and private companies. Text Mining has a wide variety of applications such as sentiment analysis, spam detection, sarcasm detection, and news classification. Reviews classification using user se...
Article
Full-text available
Brain Hemorrhage is the eruption of the brain arteries due to high blood pressure or blood clotting that could be a cause of traumatic injury or death. It is the medical emergency in which a doctor also need years of experience to immediately diagnose the region of the internal bleeding before starting the treatment. In this study, the deep learnin...
Article
Full-text available
Recent advancements in drone technology are opening new opportunities and applications: in various fields of life especially in the form of small drones. However, these advancements are also causing new challenges in terms of security, adaptability, and consistency. Small drones are proving to be a new opportunity for the civil and military industr...
Article
Full-text available
Coronaviruses are a family of viruses that can be transmitted from one person to another. Earlier strains have only been mild viruses, but the current form, known as coronavirus disease 2019 (COVID-19), has become a deadly infection. The outbreak originated in Wuhan, China, and has since spread worldwide. The symptoms of COVID-19 include a dry coug...
Article
Full-text available
Novel Coronavirus-19 (COVID-19) is a newer type of coronavirus that has not been formally detected in humans. It is established that this disease often affects people of different age groups, particularly those with body disorders, blood pressure, diabetes, heart problems, or weakened immune systems. The epidemic of this infection has recently had...
Article
Full-text available
The contemporary evolution in healthcare technologies plays a considerable and significant role to improve medical services and save human lives. Heart disease or cardiovascular disease is the most fatal and complex disease which it is hardly to be detected through our naked eyes, as numerous people have been suffering from this disease globally. H...
Article
Full-text available
Breast cancer is the most frequently detected tumor that eventually could result in a significant increase in female mortality globally. According to clinical statistics, one woman out of eight is under the threat of breast cancer. Lifestyle and inheritance patterns may be a reason behind its spread among women. However, some preventive measures, s...
Article
Full-text available
Cloud computing is seeking attention as a new computing paradigm to handle operations more efficiently and cost-effectively. Cloud computing uses dynamic resource provisioning and de-provisioning in a virtualized environment. The load on the cloud data centers is growing day by day due to the rapid growth in cloud computing demand. Elasticity in cl...
Article
Full-text available
Reviews of users on social networks have been gaining rapidly interest on the usage of sentiment analysis which serve as feedback to the government, public and private companies. Text Mining has a wide variety of applications such as sentiment analysis, spam detection, sarcasm detection, and news classification. Reviews classification using user se...
Article
Full-text available
The fast-paced growth of artificial intelligence provides unparalleled opportunities to improve the efficiency of various industries, including the transportation sector. The worldwide transport departments face many obstacles following the implementation and integration of different vehicle features. One of these tasks is to ensure that vehicles a...
Article
Full-text available
The idea of a smart home is getting attention for the last few years. The key challenges in a smart home are intelligent decision making, secure identification, and authentication of the IoT devices, continuous connectivity, data security, and privacy issues. The existing systems are targeting one or two of these issues whereas a smart home automat...
Article
Full-text available
Urdu language written in English alphabets for communication is known as Roman Urdu. In pronunciation, both are the same but different in spelling and have different shapes of the alphabet. A survey acknowledges that 300 million people are speaking Urdu and about 11 million speakers in Pakistan from which maximum users prefer Roman Urdu for the tex...
Article
Full-text available
People talks on the social media as they feel good and easy way to express their feelings about topic, post or product on the ecommerce websites. In the Asia mostly the people use the Roman Urdu language script for expressing their opinion about the topic. The Sentiment analysis of the Roman Urdu (Bilal et al. 2016)language processes is a big chall...
Chapter
Breast cancer is leading disease of females and every year death rate is increased gradually due to the breast cancer. Early diagnosis and treatment of breast cancer is an effective way to reduce the death rate of women. The development of the CAD systems improved the mortality rate by reducing false assumptions. This proposed work presents a compu...
Article
Full-text available
In this paper, we investigate the possibility of extending Latin Square of Order 4 in Hybrid Cube Encryption Algorithm (HiSea) and Three-Dimensional Hybrid Cubes Encryption (3D-HiSea) algorithm using Latin square of order 8. The objective of this research is to investigate the security improvement of key provided in current algorithm using Four-Dim...
Article
Full-text available
The modern age of technology in which most of the customer needs to wait in the supermarket for shopping because it is a highly time-consuming process. A huge crowd in the supermarket at the time of discount offers or weekends makes trouble to wait in long queues because of a barcode-based billing process. In this regard, the Internet of Things (Io...
Chapter
Twitter has become the most popular social media in today’s world. More than 284 million users are online monthly, and 80% user accesses their twitter account through mobile. A tweet is limited to 140 characters, so it contains concise information about particulars. Due to its popularity and usage, near about 500 million tweets are sent per day tha...
Chapter
This study is related to assist for finding the mental health Apps on Google Play Store using text reviews and rating. The apps are related to Anxiety, Bipolar disorder, Epilepsy, Migraine and Mental retarded. A prediction system has been proposed using Tri-Gram features and Logistic Regression. The system is trained using reviews as features and r...
Chapter
Full-text available
Every year, approximately one million patent documents are issued with unique patent number or symbol. In order to find the relevant patent document, several users query the IPC documents using IPC symbols. So, there is a need of automatic classification and ranking of patent documents w.r.t. user query. Automatic classification is only possible th...
Conference Paper
Full-text available
Buildings contribute 40% of the worldwide energy usage and contribute notable amount of the total CO2 emissions. The drive to cut building energy consumption and the CO2 emissions is the key catalyst to automate energy consumption monitoring systems. Reduction in energy consumption can be attained through sensible cooperation between end users and...
Article
. Every year, approximately one million patent documents are issued with unique patent number or symbol. In order to find the relevant patent document, several users query the IPC documents using IPC symbols. So, there is a need of automatic classification and ranking of patent documents w.r.t. user query. Automatic classification is only possible...
Article
Full-text available
Skin wounds either minor or chronic may heal up with different time durations. But, this time duration of healing could not be easily predicted as healing is affected by different factors, e.g., age, nutrition, medication, and surroundings. Despite these factors, wound characteristic also plays a role in the healing process. Wound characteristics i...
Article
Full-text available
Text classification has become very serious problem for big organization to manage the large amount of online data and has been extensively applied in the tasks of Natural Language Processing (NLP). Text classification can support users to excellently manage and exploit meaningful information require to be classified into various categories for fur...
Article
Full-text available
A key scheduling algorithm is the mechanism that generates and schedules all session-keys for the encryption and decryption process. The key space of conventional key schedule algorithm using the 2D hybrid cubes is not enough to resist attacks and could easily be exploited. In this regard, this research proposed a new Key Schedule Algorithm based o...
Article
Full-text available
It is important to predict a time series because many problems that are related to prediction such as health prediction problem, climate change prediction problem and weather prediction problem include a time component. To solve the time series prediction problem various techniques have been developed over many years to enhance the accuracy of fore...
Article
Full-text available
Forecasting natural occurring phenomena has been addressed and analyzed in many domains of science and gets more attention because of its vast range of applications. Traditional time series forecasting tools have some limitations like slow training process, less efficient training methods that effect on performance. Higher Order Neural Network (HON...
Article
Nowadays, with the increasing availability of online text documents, it becomes an important task for an organization to automatically classify the document. In Text Classification (TC), Support Vector Machine is the commonly used machine-learning algorithm. Performance of SVM highly depends on parameter tuning using metaheuristic algorithm for tex...
Article
Full-text available
The imbalanced data problems in data mining are common nowadays, which occur due to skewed nature of data. These problems impact the classification process negatively in machine learning process. In such problems, classes have different ratios of specimens in which a large number of specimens belong to one class and the other class has fewer specim...
Chapter
A relational database is a digital collection of data constructed on data stored in relations. RDF (Resource Description Framework) is a standard exemplification for data substitution on the Web RDF Schema is a semantic addition of RDF. It renders the technique for narrating groups of allied resources. The direct mapping of RDF interprets the descr...
Article
Full-text available
Artificial neural network has been proved among the best tools in data mining for classification tasks. Where, Multilayer Perceptron (MLP) is known as benchmarked technique for classification tasks due to common use and easy implementation. Meanwhile, it is fail to make high combination of inputs from lower feature space to higher feature space. In...
Article
Full-text available
Today, heart diseases have become one of the leading causes of deaths in nationwide. The best prevention for this disease is to have an early system that can predict the early symptoms which can save more life. Recently research in data mining had gained a lot of attention and had been used in different kind of applications including in medical. Th...
Article
Full-text available
Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. The generation of Hybrid Cubes (HC) based on permutation and combination of integer numbers are utilized in the construction of encryption and decryption key in the non-binary block cipher. In this study, we e...
Article
Full-text available
Prediction of time series grabs received much attention because of its effect on the vast range of real life applications. This paper presents a survey of time series applications using Higher Order Neural Network (HONN) model. The basic motivation behind using HONN is the ability to expand the input space, to solve complex problems it becomes more...
Article
Full-text available
Security is the major concern when the sensitive information is stored and transferred across the internet where the information is no longer protected by physical boundaries. Cryptography is an essential, effective and efficient component to ensure the secure communication between the different entities by transferring unintelligible information a...
Article
Full-text available
Sentiment analysis is the process to study of people opinion, emotion and way of considering a matter and take the decision into different categorize like positive, negative and neutral in data mining. The sentiment analysis is used to find out negation within the text using Natural Language Processing rules. Our aim is to detect negation affect on...
Article
Full-text available
In this paper, we introduce conceptualization of an intelligent health-care system (named as SN2SMS and read as Social Networks to Short Text Messaging) which sends personalized health-care messages prepared from content extracted from campaigns running on online social networks. This combination of online social networking with latest communicatio...
Article
Full-text available
Popularity of a celebrity having twitter account is generally estimated by the number of twitter account holders following him on twitter. In this paper, we explore some content based features to evaluate their role for estimating the popularity of a celebrity. We try to find out the co-relation of celebrities' popularity with number of other featu...

Questions

Question (1)
Question
Generally, why we need the secrecy of Hash value? Mostly, the researchers claim that the Encrypt then MAC is more suitable approach to implemented AE. They follows the rules like always compute the MACs on the ciphertext, never on the plaintext and used different keys for Encryption and MAC. Can anyone help me to explain the suitable structure for implementing AE and Which kind of Attacks are possible under which situation?

Network

Cited By