
Noor Zaman JhanjhiTaylor's University · School of Computer Science and Engineering
Noor Zaman Jhanjhi
PhD in IT
About
489
Publications
261,790
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7,913
Citations
Introduction
Prof. Dr. Noor Zaman Jhanjhi, a renowned Computer Science Professor specializing in Cybersecurity, holds key roles at Taylor’s University, Malaysia, including Program Director for Postgraduate Research, Director of CSS5. Recognized globally, he's in the top 2% of research scientists for 2022 and 2023. He’s nominated as Outstanding Faculty by MDEC. With an impactful publication record, patents, and editorial roles, his expertise spans cybersecurity, IoT, wireless security, data science, and UAVs.
Additional affiliations
August 2018 - present
September 2008 - August 2018
Education
January 2010 - March 2012
UTP Universiti Teknologi PETRONAS
Field of study
Publications
Publications (489)
This is to certify that, in pursuance of and subject to the provision of Registered Designs Act 1949, the design of which a representation or specimen is attached, had been registered as of the date of registration shown above in the name of Md.
This is to certify that, in pursuance of and subject to the provision of Registered Designs Act 1949, the design of which a representation or specimen is attached, had been registered as of the date of registration shown above in the name of
[This corrects the article DOI: 10.1371/journal.pone.0250959.].
The timely and accurate forecasting of urban road traffic is crucial for smart city traffic management and control. It can assist both drivers and traffic controllers in selecting efficient routes and diverting traffic to less congested roads. However, estimating traffic volume while taking into account external factors such as weather and accident...
Prolonged hyperglycemia can cause diabetic retinopathy (DR), which is a major contributor to blindness. Numerous incidences of DR may be avoided if it were identified and addressed promptly. Throughout recent years, many deep learning (DL)-based algorithms have been proposed to facilitate psychometric testing. Utilizing DL model that encompassed fo...
Electronic Medical Data (E-Medical Data) is sensitive and the privacy should be preserved. E-Medical Data is easily stolen, altered, or even deleted entirely. Accordingly, the healthcare organizations must guarantee that their medical data is treated confidential, secure, and private. If the situation happens like medical data cannot be logged or r...
Synthetic crime scenes can provide an effective training tool for law enforcement personnel, enabling them to gain valuable experience without the need for real-world practice. However, creating realistic synthetic crime scenes is a challenging task that requires advanced artificial intelligence techniques. In this paper, we propose a novel archite...
The Internet of Medical Things (IoMT) and Electronic Health Records (EHR) are core aspects of today’s healthcare facilities, hence these technologies and storage platforms should be equipped with innate safeguarding and secrecy concerns for the welfare of individual human beings. The utmost feasible precautions need to be taken by healthcare organi...
Objective:
Diabetic retinopathy (DR) can sometimes be treated and prevented from causing irreversible vision loss if caught and treated properly. In this work, a deep learning (DL) model is employed to accurately identify all five stages of DR.
Methods:
The suggested methodology presents two examples, one with and one without picture augmentatio...
Atrial fibrillation is a prevalent cardiac arrhythmia that poses significant health risks to patients. The use of non-invasive methods for AF detection, such as Electrocardiogram and Photoplethysmogram, has gained attention due to their accessibility and ease of use. However, there are challenges associated with ECG-based AF detection, and the sign...
With the increasing growth rate of smart home devices and their interconnectivity via the Internet of Things (IoT), security threats to the communication network have become a concern. This paper proposes a learning engine for a smart home communication network that utilizes blockchain-based secure communication and a cloud-based data evaluation la...
With the increasing growth rate of smart home devices and their interconnectivity via the Internet of Things (IoT), security threats to the communication network have become a concern. This paper proposes a learning engine for a smart home communication network that utilizes blockchain-based secure communication and a cloud-based data evaluation la...
Programmable Object Interfaces are increasingly intriguing researchers because of their broader applications, especially in the medical field. In a Wireless Body Area Network (WBAN), for example, patients' health can be monitored using clinical nano sensors. Exchanging such sensitive data requires a high level of security and protection against att...
Wireless sensor networks (WSN) comprise a huge number of stationary or mobile sensor nodes that considerably support multi-hop communication. Intruder attacks such as wormholes, spoofing, etc., make it more susceptible in turn influence WSN's confidentiality. Therefore, utilizing tanh activation function centered deep convolution neural network (TD...
Electronic health records (EHRs) are an increasingly important source of information for healthcare professionals and researchers. However, EHRs are often fragmented, unstructured, and difficult to analyze due to the heterogeneity of the data sources and the sheer volume of information. Knowledge graphs have emerged as a powerful tool for capturing...
Retinoblastoma is a rare and aggressive form of childhood eye cancer that requires prompt diagnosis and treatment to prevent vision loss and even death. Deep learning models have shown promising results in detecting retinoblastoma from fundus images, but their decision-making process is often considered a “black box” that lacks transparency and int...
The Internet of vehicles (IoVs) is an innovative paradigm which ensures a safe journey by communicating with other vehicles. It involves a basic safety message (BSM) that contains sensitive information in a plain text that can be subverted by an adversary. To reduce such attacks, a pool of pseudonyms is allotted which are changed regularly in diffe...
Programmable Object Interfaces are increasingly intriguing researchers because of their broader applications, especially in the medical field. In Wireless Body Area Network (WBAN), for example, the patients’ health can be monitored using clinical nano sensors. Exchanging such sensitive data requires a high level of security and protection against a...
The Internet of Things (IoT) uses wireless networks without infrastructure to install a huge number of wireless sensors that track system, physical, and environmental factors. There are a variety of WSN uses, and some well-known application factors include energy consumption and lifespan duration for routing purposes. The sensors have detecting, pr...
When it comes to skin tumors and cancers, melanoma ranks among the most prevalent and deadly. With the advancement of deep learning and computer vision, it is now possible to quickly and accurately determine whether or not a patient has malignancy. This is significant since a prompt identification greatly decreases the likelihood of a fatal outcome...
The present invention provides an Internet of Things -based mechanical device for monitoring and controlling mechanical systems. The device comprises Internet of Things sensors and devices that are placed on various components of a mechanical system. The data collected by these sensors is transmitted to a cloud-based platform where it is analyzed a...
The present invention is an Internet of Things-based innovative actuator design for enhanced performance. The actuator design incorporates Internet of Things sensors and devices to gather data and provide real-time feedback on the performance of the actuator. The actuator design also includes an innovative mechanism that improves its overall perfor...
A significant majority of the population in India makes their living through agriculture. Different illnesses that develop due to changing weather patterns and are caused by pathogenic organisms impact the yields of diverse plant species. The present article analyzed some of the existing techniques in terms of data sources, pre-processing technique...
Pressure ulcers are significant healthcare concerns affecting millions of people worldwide, particularly those with limited mobility. Early detection and classification of pressure ulcers are crucial in preventing their progression and reducing associated morbidity and mortality. In this work, we present a novel approach that uses YOLOv5, an advanc...
Machine learning techniques are often used for sports analytics, such as player health prediction and avoidance, appraisal of prospective skill or market worth, and predicting team or player performance. This reshapes the sports performance and helps in coaching the teams and individuals. This research focuses on football analytics, which can help...
The study of object tracking has substantially advanced thanks to the development of deep learning visual recognition and tracking methods. However, because to the additional difficulties they provide, such as the difficulty in tracking small, swiftly moving objects like a ball or shuttlecock due to the fast camera movement and the existence of swi...
In this research, we address the problem of accurately predicting lane-change maneuvers on highways. Lane-change maneuvers are a critical aspect of highway safety and traffic flow, and the accurate prediction of these maneuvers can have significant implications for both. However, current methods for lane-change prediction are limited in their abili...
Cybersecurity continues to be a major issue for all industries engaged in digital activity given the cyclical surge in security incidents. Since more Internet of Things (IoT) devices are being used in homes, offices, transportation, healthcare, and other venues, malicious attacks are happening more frequently. Since distance between IoT as well as...
p>Precise stock market prediction is crucial for investors, but the volatility of the stock market is influenced by multiple factors such as public sentiments, business news, and related product volatility. While several algorithms have been proposed to predict the stock exchange index based on historical data, they are not ideal as external factor...
p>Precise stock market prediction is crucial for investors, but the volatility of the stock market is influenced by multiple factors such as public sentiments, business news, and related product volatility. While several algorithms have been proposed to predict the stock exchange index based on historical data, they are not ideal as external factor...
The offloading of computationally intensive tasks to edge servers is indispensable in the mobile edge computing (MEC) environment. Once the tasks are offloaded, the subsequent challenges lie in buffering them and assigning them to edge virtual machine (VM) resources to meet the multicriteria requirement. Furthermore, the edge resources’ availabilit...
With the evolution of technology, many modern applications like habitat monitoring, environmental monitoring, disaster prediction and management, and telehealth care have been proposed on wireless sensor networks (WSNs) with Internet of Things (IoT) integration. However, the performance of these networks is restricted because of the various constra...
Medication safety and delivery challenge the well-being of the elderly and the management of the elderly center. With the outbreak of COVID-19, the elderly in the care center were challenged by the inconvenience of the medication restocking. The purpose of this paper accentuates the importance of the design and development of an UAV-based Smart Med...
One of the most significant issues in Internet of Things (IoT) cloud computing is scheduling tasks. Recent developments in IoT-based technologies have led to a meteoric rise in the demand for cloud storage. In order to load the IoT services onto cloud resources efficiently even while satisfying the requirements of the applications, sophisticated pl...
With continuous advancements in Internet technology and the increased use of cryptographic techniques, the cloud has become the obvious choice for data sharing. Generally, the data are outsourced to cloud storage servers in encrypted form. Access control methods can be used on encrypted outsourced data to facilitate and regulate access. Multi-autho...
The Quality-of-Service (QoS) provision in machine learning is affected by lesser accuracy, noise, random error, and weak generalization (ML). The Parallel Turing Integration Paradigm (PTIP) is introduced as a solution to lower accuracy and weak generalization. A logical table (LT) is part of the PTIP and is used to store datasets. The PTIP has elem...
The need for data is growing steadily due to big data technologies and the Internet’s quick expansion, and the volume of data being generated is creating a significant need for data analysis. The Internet of Things (IoT) model has appeared as a crucial element for edge platforms. An IoT system has serious performance issues due to the enormous volu...
Digital Twins and Healthcare: Trends, Techniques, and Challenges facilitates the advancement and knowledge dissemination in methodologies and applications of digital twins in the healthcare and medicine fields. This book raises interest and awareness of the uses of digital twins in healthcare in the research community. Covering topics such as deep...
Cancer is a complicated global health concern with a significant fatality rate. Breast cancer is among the leading causes of mortality each year. Advancements in prognoses have been progressively based primarily on the expression of genes, offering insight into robust and appropriate healthcare decisions, owing to the fast growth of advanced throug...
The Wireless Body Area Network (WBAN) shows potential as a technology that can provide high-quality healthcare services to its users. However, the limited battery life of low-power devices attached to the body is a challenge. The data must be sent through a reliable connection with minimum delay to the healthcare centre since it directly influences...
In smart homes, the management of energy is gaining huge significance among researchers in recent times. This paper presents a system for predicting power utilization and scheduling household appliances in smart homes. The system utilizes a combination of Grey Wolf optimization (GWO), Convolutional Neural Networks (CNN), and Long Short-Term Memory...
Air collection around the lung regions can cause lungs to collapse. Conditions like emphysema can cause chronic obstructive pulmonary disease (COPD), wherein lungs get progressively damaged, and the damage cannot be reversed by treatment. It is recommended that these conditions be detected early via highly complex image processing models applied to...
e-Learning is a sought-after option for learners during pandemic situations. In e-Learning platforms, there are many courses available, and the user needs to select the best option for them. Thus, recommender systems play an important role to provide better automation services to users in making course choices. It makes recommendations for users in...
Currently, fraud detection is employed in numerous domains, including banking, finance, insurance, government organizations, law enforcement, and so on. The amount of fraud attempts has recently grown significantly, making fraud detection critical when it comes to protecting your personal information or sensitive data. There are several forms of fr...
Fruit that has reached maturity is ready to be harvested. The prediction of fruit maturity and quality is important not only for farmers or the food industry but also for small retail stores and supermarkets where fruits are sold and purchased. Fruit maturity classification is the process by which fruits are classified according to their maturity i...
The heart of the application's secure operation is its software code. If the code contains flaws, the entire program might be hacked. The issue with software vulnerabilities is that they reveal coding flaws that hackers could exploit. The prevention of cybersecurity issues begins with the program code itself. When writing software code, a software...
The ability of IoT technology to simplify the adoption of artificial intelligence is precious to consumer product companies. The robustness of consumer companies' IoT initiatives will determine whether they benefit from the rise of IoT. A well-thought-out IoT strategy and execution will improve supply chain efficiency and align products with modern...
The “digital twin” concept creates a virtual portrayal, with the actual and virtual worlds being in perfect sync. The digitization process of a product's whole life cycle, from design to maintenance, will provide the organization with a predictive analysis of problems. Using digital representations' maximum effect of predicting issues in the develo...
A digital twin (DT) is a virtual representation of a physical object or activity that acts as its real-time digital equivalent. The authors evaluated the structure of research in the same field, and to do so, the authors used the techniques of bibliometric analysis using VOSviewer. This study scrutinizes the dynamics of scientific publications devo...
Cloud-based storage ensures the secure dissemination of media. Authentication and integrity are important aspects in the distribution of digital media. Encryption-based techniques shelter this media between the communicating parties which are involved in a transaction. The challenge is how to restrict the digital media which is illegally redistribu...
Twitter is a radiant platform with a quick and effective technique to analyze users’ perceptions of activities on social media. Many researchers and industry experts show their attention to Twitter sentiment analysis to recognize the stakeholder group. The sentiment analysis needs an advanced level of approaches including adoption to encompass data...
For networks with limited resources, such as IoT-enabled smart homes, smart industrial equipment, and urban infrastructures, the Routing Protocol for Low-power and Lossy Networks (RPL) was developed. Additionally, a number of optimizations have been suggested for its application in other contexts, such as smart hospitals, etc. Although these networ...