Muhammad Bilal Qureshi

Muhammad Bilal Qureshi
  • Doctor of Philosophy (Computer Science)
  • Researcher at COMSATS University Islamabad

About

37
Publications
17,566
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
687
Citations
Current institution
COMSATS University Islamabad
Current position
  • Researcher
Additional affiliations
October 2011 - present
COMSATS University Islamabad
Position
  • Researcher

Publications

Publications (37)
Article
Full-text available
Vaccine acceptance is a crucial component of a viable immunization program in healthcare system, yet the disparities in new and existing vaccination adoption rates prevail across regions. Disparities in the rate of vaccine acceptance result in low immunization coverage and slow uptake of newly introduced vaccines. This research presents an innovati...
Article
Full-text available
The economy of a country is directly proportional to the power sector of that country. An unmanaged power sector causes instability in the country. Pakistan is also facing this phenomenon due to uncontrolled power outage and circular debt. Pakistan’s power sector is analyzed as a case study to find out the root cause for the unmanaged power sector...
Article
Full-text available
Complex networks on the Internet of Things (IoT) and brain communication are the main focus of this paper. The benefits of complex networks may be applicable in the future research directions of 6G, photonic, IoT, brain, etc., communication technologies. Heavy data traffic, huge capacity, minimal level of dynamic latency, etc. are some of the futur...
Article
Full-text available
Autism spectrum disorder is a severe, life-prolonged neurodevelopmental disease typified by disabilities that are chronic or limited in the development of socio-communication skills, thinking abilities, activities, and behavior. In children aged two to three years, the symptoms of autism are more evident and easier to recognize. The major part of t...
Preprint
Full-text available
With increase in number of processing cores or systems, the high-performance edge-computing system’s power and computation speed will increase essentially. However, this comes at the expense of high-energy utilization. One notable solution to reduce the energy consumption of these system is to execute these systems at the slowest feasible speed so...
Article
Full-text available
The smart energy consumption of any household, maintaining the thermal comfort level of the occupant, is of great interest. Sensors and Internet-of-Things (IoT)-based intelligent hardware setups control the home appliances intelligently and ensure smart energy consumption, considering environment parameters. However, the effects of environment-driv...
Article
Full-text available
The mobility of user equipment (UE) in cellular network is a challenging issue in terms of its management. Current traditional handover in Long-Term Evolution (LTE) network is managed by evolved Node B or eNodeB (eNB) which is a decentralized solution. In contrast to existing technology, software defined network (SDN) has the capability of serving...
Article
Full-text available
With technological advancement, cloud computing paradigms are gaining massive popularity in the ever-changing technological advancement. The main objective of the cloud computing system is to provide on-demand storage and computing resources to the users on the pay-per-use policy. It allows small businesses to use top-notch infrastructure at low ex...
Article
Full-text available
Substantial information related to human cerebral conditions can be decoded through various noninvasive evaluating techniques like fMRI. Exploration of the neuronal activity of the human brain can divulge the thoughts of a person like what the subject is perceiving, thinking, or visualizing. Furthermore, deep learning techniques can be used to deco...
Article
Full-text available
In this paper, we have proposed a novel methodology based on statistical features and different machine learning algorithms. The proposed model can be divided into three main stages, namely, preprocessing, feature extraction, and classification. In the preprocessing stage, the median filter has been used in order to remove salt-and-pepper noise bec...
Article
Full-text available
In this paper, a model based on discrete wavelet transform and convolutional neural network for brain MR image classification has been proposed. The proposed model is comprised of three main stages, namely preprocessing, feature extraction, and classification. In the preprocessing, the median filter has been applied to remove salt-and-pepper noise...
Article
Full-text available
The detection of epileptic seizures by classifying electroencephalography (EEG) signals into ictal and interictal classes is a demanding challenge, because it identifies the seizure and seizure-free states of an epileptic patient. In previous works, several machine learning-based strategies were introduced to investigate and interpret EEG signals f...
Article
Full-text available
Interest in real-time systems has grown considerably over recent years, primarily due to significant increase in the use of smart technologies and latency-sensitive applications such as cloud gaming, audio/video streaming, and smart homes. Significant work has been done on resource mapping in the cloud environment, and a number of promising results...
Article
Full-text available
Cloud computing is the de facto platform for deploying resource- and data-intensive real-time applications due to the collaboration of large scale resources operating in cross-administrative domains. For example, real-time systems are generated by smart devices (e.g., sensors in smart homes that monitor surroundings in real-time, security cameras t...
Article
Full-text available
Datacentres provide the foundations for cloud computing, but require large amounts of electricity for their operation. Approaches that promise to reduce power use by minimizing execution time, for example using different scheduling and resource management techniques, are discussed in the literature. This paper summarizes some of the most important...
Article
Full-text available
Deployment of efficient and cost-effective parking lots is a known bottleneck for the electric vehicles (EVs) sector. A comprehensive solution incorporating the requirements of all key stakeholders is required. Taking up the challenge, we propose a real-time EV smart parking lot model to attain the following objectives: (a) maximize the smart parki...
Article
Full-text available
An efficient resource allocation scheme plays a vital role in scheduling applications on high-performance computing resources in order to achieve desired level of service. The major part of the existing literature on resource allocation is covered by the real-time services having timing constraints as primary parameter. Resource allocation schemes...
Article
Full-text available
Among several approaches to privacy-preserving cryptographic schemes, we have concentrated on noise-free homomorphic encryption. It is a symmetric key encryption that supports homomorphic operations on encrypted data. We present a fully homomorphic encryption (FHE) scheme based on sedenion algebra over finite Zn rings. The innovation of the scheme...
Article
Full-text available
The accidents happening to buildings and other human facilitation sectors due to poor water supply pipelining system is a random phenomenon, but an efficient estimation system can help to escape from such accidents. Such a system can be useful in assisting the caretakers to take the initiative measures to avoid the occurrence of the accidents or at...
Presentation
Full-text available
Wireless Sensor Networks (WSNs) provide noteworthy advantages over conventional methods for various real-time applications, i.e., healthcare, temperature sensing, smart homes, homeland security, and environmental monitoring. However, limited resources, short life-time network constraints, and security vulnerabilities are the challenging issues in t...
Article
Full-text available
Conventional RSA algorithm, being a basis for several proposed cryptosystems, has remarkable security laps with respect to confidentiality and integrity over the internet which can be compromised by state-of-the-art attacks, especially, for different types of data generation, transmission, and analysis by IoT applications. This security threat hind...
Article
Full-text available
Conventional RSA algorithm, being a basis for several proposed cryptosystems, has remarkable security laps with respect to confidentiality and integrity over the internet which can be compromised by state-of-the-art attacks, especially, for different types of data generation, transmission, and analysis by IoT applications. This security threat hind...
Conference Paper
Full-text available
Wireless Sensor Networks (WSNs) provide noteworthy advantages over conventional methods for various real-time applications, i.e., healthcare, temperature sensing, smart homes, homeland security, and environmental monitoring. However, limited resources, short lifetime network constraints, and security vulnerabilities are the challenging issues in th...
Conference Paper
Full-text available
The 5th generation (5G) of communication networks will facilitate innovative and emerging services and applications with lower latency requirements, increased energy efficiency and reliability. These characteristics of 5G make it capable to act as a potential underlying network for smart city services such as for implementation of demand response i...
Article
Various application classes are being deployed to the cloud these days making use of a pay-as-you-go policy. However, existing cloud technologies are still at an early stage of maturity for applications with real-time constraints. With the emergence of Internet of Things (IoT) deployments and embedded systems in smart infrastructure, requirements f...
Article
Full-text available
Grid resource allocation mechanism maps tasks to the available Grid resources according to some predefined criterion such as minimizing makespan or execution cost, load balancing, energy efficiency, maintaining user defined task deadlines, efficiently using resource memory etc. The minimization of the makespan is a dominant criterion and is more ch...
Article
Full-text available
When there is a mismatch between the cardinality of a periodic task set and the priority levels supported by the underlying hardware systems, multiple tasks are grouped into one class so as to maintain a specific level of confidence in their accuracy. However, such a transformation is achieved at the expense of the loss of schedulability of the ori...
Article
Full-text available
Grid is a distributed high performance computing paradigm that offers various types of resources (like computing, storage, communication) to resource-intensive user tasks. These tasks are scheduled to allocate available Grid resources efficiently to achieve high system throughput and to satisfy user requirements. The task scheduling problem has bec...
Conference Paper
Full-text available
Load balancing among cores or systems plays a vital role in overall performance of High Performance Computing (HPC). Efficient results may not be obtained unless a specific load is properly balanced among systems or cores in HPC. The main focus of this research is load balancing among cores in multi-core environment by using task shifting (migratio...

Network

Cited By