About
38
Publications
13,345
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
380
Citations
Introduction
Skills and Expertise
Current institution
Additional affiliations
August 2006 - present
Publications
Publications (38)
Acute leukemia is a proliferation of white blood cells that originates in the bone marrow and impinges on the working of the lymphatic system. Due to the abrupt and aggressive nature of spreading, it requires prompt medical attention. The procedure adopted by hematologists for evaluating morphological features and counting the cells is quite time-c...
One of the most under-researched area in the field of natural language processing (NLP) has been the text classification. Text classification of languages like Urdu is more deprived of research since it is not among the top-most spoken language of the world. Despite that, almost 230 million people around the world speak Urdu. Researchers have worke...
Acute leukemia is a cancer that starts in the bone marrow and is characterized by an abnormal growth of white blood cells. It is a disease that affects people all over the world. Hematologist study blood smears from patients to appropriately diagnose this anomaly. The methods used for diagnosis can be influenced by factors including the hematologis...
In today's modern era, e-commerce is making headway through the process of bringing goods within everyone's grasp. Consumers are not even required to step out of the comfort of their homes for buying things, which makes it very convenient for them. Moreover, there is a wide variety of brands to choose from. Since more customers depend on online sho...
Urdu Nastaliq script is a cursive and ligature-based script that is very difficult to recognize and detect using current computer algorithms dues to its complicated writing structure . Handwritten text imposes much more difficulty since all writers have their own writing styles. Many researchers have worked in this field on various aspects, from cr...
Even though several advances have been made in recent years, handwritten script recognition is still a challenging task in the pattern recognition domain. This field has gained much interest lately due to its diverse application potentials. Nowadays, different methods are available for automatic script recognition. Among most of the reported script...
Urdu Nastaliq script is a cursive and ligature-based script that is very difficult to recognize and detect using current computer algorithms dues to its complicated writing structure . Handwritten text imposes much more difficulty since all writers have their own writing styles. Many researchers have worked in this field on various aspects, from cr...
Dermatological problems are the most widely spread skin diseases amongst human beings. They can be infectious, chronic, and sometimes may also lead to serious health problems such as skin cancer. Generally, rural area clinics lack trained dermatologists and mostly rely on the analysis of remotely accessible experts through mobile-based networks for...
Abstract—Digitization of machine printed or handwritten
text documents have become very popular with the
advancements in computing and technology. Humans have
tried to automatized their work by replacing themselves with
machines. The transformation from manual to automatization
gave rise to several research areas and text recognition is one
among t...
Artificial intelligence (AI) is a technique, which makes machines to mimic the human behavior. Machine learning is an AI technique to train complex models, which can make the system or computer to work independently without human intervention. This paper is a survey on Machine learning approaches in terms of classification, regression, and clusteri...
Optical Character Recognition has emerged as an attractive research field nowadays. Lot of work has been done in Urdu script based on various approaches and diverse methodologies have been put forward based on Nastaliq font style. Urdu is written diagonally from top to bottom, the style known as Nastaliq. This feature of Nastaliq makes Urdu highly...
Image Captioning is the combination of Computer Vision and Natural Language Processing (NLP) in which simple sentences have been automatically generated describing the content of the image. This paper presents the comparative analysis of different models used for the generation of descriptive English captions for a given image. Feature extractions...
Analysis of different visual textures present in the given images is one of the important perspectives of human vision for objects segregation and identification. Texture-based features are widely used in medical diagnosis for informal prediction of dermatological diseases. Dermatological diseases are the most universal diseases affecting all the l...
Optical Character Recognition (OCR) has emerged as an interesting research field. Lot of work has been declared in Urdu script based on various approaches and diverse methodologies have been put forward on Nastaliq font style to get the desired output. The paper presents a survey on different techniques of OCR and ends up with the comparative analy...
The accuracy rate of recognizing ligatures in Urdu Character Recognition mostly relies on the accuracy with which the segmentation has been performed to convert Urdu text into lines and ligatures. Generally, it has been seen that the ligature based segmentation yields better results rather than character based segmentation. In this paper, we presen...
Skin diseases are common and are mainly caused by virus, bacteria, fungus, or chemical disturbances. Timely analysis and identification is of utmost importance in order to control the further spread of these diseases. Control of these diseases is even more difficult in rural and resource-poor environments due to lack of expertise in primary health...
With the advent of the booming millennial era, data is being generated in millions daily through various social platforms, unbeknownst to the users that generate it. This data can be used to enhance the user experience, for realizing the potential growth of a product and its marketing, by data analysts to find patterns and make important conclusion...
In the modern era, cloud computing gains a lot of attention due to its various features such as it is simple to use, minimum cost, and mostly low power consumption. Many algorithms and techniques have been proposed for scheduling of virtual machines to provide dynamic load balancing, dynamic scalability and reallocation of resources. Intelligent al...
Among the various enabling technologies for cloud computing, virtualization stands out high when it comes to optimizing a cloud provider’s infrastructure. The success of a cloud environment depends to a large extent on how gracefully its resources are managed. The issue of resource management in cloud computing has been very popular among the resea...
Over the past few years, cloud computing has evolved as most promising field in computing environment. It has advanced a lot and due to its attractive features, more and more organizations are adopting it day by day. But, still a lot needs to be done to provide seamless service to the cloud clients. In this paper, modified approach based on ant col...
Cloud computing enables the web hosting of computing resources, applications to be available for consumers on a pay-per-use basis. This has made cloud computing quite popular and the need of today's world. With this, the demand for computational power has increased and this has led to the creation of large-scale cloud data centres. These data centr...
Touchless Feed is a gestural interface for future computing which aims at using computer from far. It allows us to interact with our PC easily with the help of hand gestures. Here basically the mouse pointer is controlled by movement of fingers which are covered by some color markers. The webcam captures the position of our fingers and as the posit...
with the increasing amount of network throughput and security threat, Intrusion detection system has gained a lot of attention in computer science field. Current conventional security techniques cannot be able to deal with the security threats. So, Intrusion detection systems have the potential to prevent such attacks. There are many existing liter...
Wireless access points are popularly used nowadays for the ease of mobile users. The various risks associated with the wireless security attacks are presented due to growing acceptance of WLAN. Now a days Wi-Fi connectivity is provided to user at different public places and that to for free of cost. Every public place that provide Wi-Fi connectivit...
The proliferation of the World Wide Web and the pervasiveness of the related technologies have increased the demand of high performance clusters and distributed resources. Load balancing of the systems in which heterogeneous servers and resources are distributed becomes a key factor in achieving a rapid response time, efficient resource utilization...
Network Management is a service that employs a variety of tools, applications and devices to assist human network managers in monitoring and maintaining networks. The existing Network Management solutions provide inadequate coverage of functional areas of heterogeneous network leading to degrading level of performance and reliability. However, thes...