Noor Zaman

Noor Zaman
Taylor's University · School of Computer Science and Engineering

PhD in IT

About

365
Publications
151,317
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,683
Citations
Introduction
Dr. Noor Zaman has completed his PhD. in IT from University Technology Petronas (UTP) Malaysia. He has 19 years of teaching and administrative experience internationally. He has an intensive background of academic quality accreditation in higher education besides scientific research activities, he had worked for academic accreditation for more than a decade and earned ABET accreditation twice for three programs at College of computer sciences and IT, King Faisal University Saudi Arabia. He also worked for National Commission for Academic Accreditation and Assessment (NCAAA), Education Evaluation Commission Higher Education Sector (EECHES) formerly NCAAA Saudi Arabia, for institutional level accreditation. He also worked for the National Computing Education Accreditation Council (NCEAC) Pak
Additional affiliations
August 2018 - present
Taylor's University
Position
  • Professor (Associate)
September 2008 - August 2018
King Faisal University
Position
  • Professor (Assistant)
Education
January 2010 - March 2012
UTP Universiti Teknologi PETRONAS
Field of study

Publications

Publications (365)
Article
Dementia is a condition in which cognitive ability deteriorates beyond what can be anticipated with natural ageing. Characteristically it is recurring and deteriorates gradually with time affecting a person’s ability to remember, think logically, to move about, to learn, and to speak just to name a few. A decline in a person’s ability to control em...
Article
Full-text available
Technology is continually evolving, and Blockchain development in recent years has shown tremendous adaptability. Blockchain’s emphasis lies mainly in the finance sector, but some latent fields such as healthcare still grow and transform the future. In this paper, we introduced a smart contract-based framework for Blockchain-based healthcare system...
Article
Full-text available
Due to the huge flow of data and complications in mutable characteristics of the data, Distributed Denial of Services attacks existed in the Multimedia Internet of Things. Attacks over the IoT have become an increasing menace in recent time, which tries to hack or illegally tamper the streaming data available over the networks. On the other hand, t...
Article
Full-text available
The popularity of wireless sensor networks for establishing different communication systems is increasing daily. A wireless network consists of sensors prone to various security threats. These sensor nodes make a wireless network vulnerable to denial-of-service attacks. One of them is a wormhole attack that uses a low latency link between two malic...
Book
Full-text available
INDUSTRIAL INTERNET OF THINGS (IIOT) This book discusses how the industrial internet will be augmented through increased network agility, integrated artificial intelligence (AI) and the capacity to deploy, automate, orchestrate, and secure diverse user cases at hyperscale. Since the internet of things (IoT) dominates all sectors of technology, fro...
Article
Full-text available
A growing amount of research conducted in digital, cooperative with advances in Artificial Intelligence, Computer Vision including Machine learning, has managed to the advance of progressive techniques that aim to detect and process affective information contained in multi-modal evidences. This research intends to bring together for theoreticians a...
Article
Full-text available
For the past few years, the IoT (Internet of Things)-based restricted WSN (Wireless sensor network) has sparked a lot of attention and progress in order to attain improved resource utilisation as well as service delivery. For data transfer between heterogeneous devices, IoT requires a stronger communication network and an ideally placed energy-effi...
Article
MRI is an influential diagnostic imaging technology specifically worn to detect pathological changes in tissues with organs early. It is also a non-invasive imaging method. Medical image segmentation is a complex and challenging process due to the intrinsic nature of images. The most consequential imaging analytical approach is MRI, which has been...
Article
Full-text available
An increasing number of genetic and metabolic anomalies have been determined to lead to cancer, generally fatal. Cancerous cells may spread to any body part, where they can be life-threatening. Skin cancer is one of the most common types of cancer, and its frequency is increasing worldwide. The main subtypes of skin cancer are squamous and basal ce...
Article
Missing values in the k-NN algorithm are a significant research concern, especially in low-grade tumours and CSF fluid, which are commonly identified in MRI scans. Missing values are usually ignored, but when data is mined, they can lead to bias and errors. In addition, the data is not missing at random. This study improves image accuracy, boosts t...
Article
Full-text available
Lung cancer is among the most hazardous types of cancer in humans. The correct diagnosis of pathogenic lung disease is critical for medication. Traditionally, determining the pathological form of lung cancer involves an expensive and time-consuming process investigation. Lung cancer is a leading cause of mortality worldwide, with lung tissue nodule...
Poster
Full-text available
Tentative Table of Contents/Topic Coverage The edited book is dedicated to enabling XAI for different Smart City Applications. The edited book will include the chapters of the case studies where the XAI has an impact on the development of Smart City. Chapter 1: Overview of XAI for the development and modernization of Smart Cities Chapter 2: XAI: In...
Article
As new generations of technology appear, legacy knowledge management solutions and applications become increasingly out of date, necessitating a paradigm shift. Machine learning presents an opportunity by foregoing rule-based knowledge intensive systems inundating the marketplace. An extensive review was made on the literature pertaining to machine...
Article
Full-text available
The k-NN algorithm missing values is one of the current research issues, especially in 4D frequency. This study addresses the accuracy of the images, increases the efficiency of missing k-NN hybrid values, and constructs a research framework that can identify cancer-damaged areas isolated from non-tumors areas using 4D image light field tools. Addi...
Article
Full-text available
Age estimation in dental radiographs Orthopantomography (OPG) is a medical imaging technique that physicians and pathologists utilize for disease identification and legal matters. For example, for estimating post-mortem interval, detecting child abuse, drug trafficking, and identifying an unknown body. Recent development in automated image processi...
Article
Background: Standardization of software development processes using the software process improvement (SPI) frameworks like capability maturity model integration (CMMI) or the International Organization for Standardization (ISO) are vital for better performance and defect-free delivery of software engineering projects. Problem: The studies from d...
Conference Paper
Many are awestruck by the changes brought by Artificial Intelligence (AI). The ubiquitous technology has created its place in the job market and is here to stay for years to come. However, the impact of AI on various job sectors is susceptible. While most have welcomed this technology, many are concerned about the effects of AI. AI has led prominen...
Article
Full-text available
Cloud computing (CC) is the delivery of computing services on demand and is charged using a “pay per you use” policy. Of the multiple services offered by CC, SaaS is the most popular and widely adapted service platform and is used by billions of organizations due to its wide range of benefits. However, security is a key challenge and obstacle in cl...
Preprint
Age estimation in dental radiographs Orthopantomography (OPG) is a medical imaging technique that physicians and pathologists utilise for disease identification and legal matters. For example, for estimating post-mortem interval, detecting child abuse, drug trafficking, and identifying an unknown body. Recent development in automated image processi...
Article
Full-text available
The purpose of this study is to overcome coordination flaws and enhance end-to-end security in the drug distribution market (DDM). One of the major issues in drug market coordination management is the absence of a centralized monitoring system to provide adequate market control and offer real-time prices, availability, and authentication data. Furt...
Article
Full-text available
One of the leading healthcare concerns worldwide is the aging population. Aged patients require more significant healthcare resources because they are more likely to have chronic diseases that result in higher healthcare expenses. The design and implementation of e-health solutions, which offer patients mobile services to assist and enhance their t...
Article
Full-text available
Directing research on Alzheimer’s towards only early prediction and accuracy cannot be considered a feasible approach towards tackling a ubiquitous degenerative disease today. Applying deep learning (DL), Explainable artificial intelligence(XAI) and advancing towards the human-computer interface(HCI) model can be a leap forward in medical research....
Chapter
The stroke is an important health burden around the world that occurs due to the block of blood supply to the brain. The interruption of blood supply depends on either the sudden blood supply interruption to the brain or a blood vessel leak in tissues. It is tricky to treat stroke-affected patients because the accurate time of stroke is unknown. In...
Chapter
The current problem with CRM is weak marketing, as there is no individualization strategy, low productivity, and blurred marketing objectives. Next, companies are failing to completely capitalize on and extract useful information from a vast collection of databases. Organizations were also unable to adequately evaluate consumer behaviors and custom...
Chapter
Machine intelligence is a backbone of self-driving automotive (SDA) systems. Presently, ResNet, DenseNet, and ShuffleNet V2 are excellent convolution choices, whereas object detection focuses on YOLO and F-RCNN design. This study discovers the uniqueness of methods and argues the suitability of using each design in SDA technology. Real-time object...
Chapter
Diabetes has become a growing global public health issue. This illness can become chronic since there are no early symptoms and it can lead to several negative health impacts. This study focuses on the early identification of diabetes based on the symptoms of the disease and finds the relation between the symptoms and the diagnosis. Successful earl...
Article
Full-text available
Convolutional Neural Networks (CNNs) operate within a wide variety of hyperparameters, the optimization of which can greatly improve the performance of CNNs when performing the task at hand. However, these hyperparameters can be very difficult to optimize, either manually or by brute force. Neural architecture search or NAS methods have been develo...
Article
Full-text available
Wireless sensor networks (WSNs) have various applications which include zone surveillance, environmental monitoring, event tracking where the operation mode is long term. WSNs are characterized by low-powered and battery-operated sensor devices with a finite source of energy. Due to the dense deployment of these devices practically it is impossible...
Chapter
A cyber-attack can damage data, computer programs, and network one or more computers through applying different methods and cybercriminal's activities to steal information. The increasing of new technologies among the users facilities them. The cyber-attacks are growing tremendously. E-governance is an application of IT and giving online services....
Article
Full-text available
Kingdom of Saudi Arabia (KSA) highways hold the record for having the straightest, longest highways in the world. Since the country’s major population centers are dispersed across the country and due to the country’s geography, which includes valleys, deserts, and mountains, among other landscapes, these highways connect the many cities of the king...
Book
he recent advancements in the machine learning paradigm have various applications, specifically in the field of medical data analysis. Research has proven the high accuracy of deep learning algorithms, and they have become a standard choice for analyzing medical data, especially medical images, video, and electronic health records. Deep learning me...
Article
Employee categorisation differentiates valuable employees as eighty per cent of profit comes from twenty per cent of employees. Also, retention of all employees is quite challenging and incur a cost. Previous studies have focused on employee churn analysis using various machine learning algorithms but have missed the categorisation of an employee b...
Article
Full-text available
The coronavirus disease (COVID-19) is rapidly spreading around the world. Early diagnosis and isolation of COVID-19 patients has proven crucial in slowing the disease’s spread. One of the best options for detecting COVID-19 reliably and easily is to use deep learning (DL) strategies. Two different DL approaches based on a pertained neural network m...
Article
Full-text available
An emergency can occur at any time. To overcome that emergency efficiently, we require seamless movement on the road to approach the destination within a limited time by using an Emergency Vehicle (EV). This paper proposes an emergency vehicle management solution (EVMS) to determine an efficient vehicle-passing sequence that allows the EV to cross...
Article
Full-text available
Online portals provide an enormous amount of news articles every day. Over the years, numerous studies have concluded that news events have a significant impact on forecasting and interpreting the movement of stock prices. The creation of a framework for storing news-articles and collecting information for specific domains is an important and untes...
Article
Breast Cancer is one of the most prevalent tumors after lung cancer and is common in both women and men. This disease is mostly asymptomatic in the early stages thus detection is difficult, and it becomes complicated and expensive to be treated in later stages resulting in increased fatality rates. There are comparatively very few pieces of literat...
Book
This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI. This book brings together, in one resource, information security across multiple domains. Information Security Handbook addresses the knowledge for emerging mul...
Preprint
Age estimation in dental radiographs Orthopantomography (OPG) is a medical imaging technique that physicians and pathologists utilise for disease identification and legal matters. For example, for estimating post-mortem interval, detecting child abuse, drug trafficking, and identifying an unknown body. Recent development in automated image processi...
Article
Full-text available
The importance of Software Testing (ST) in the Software Development Life Cycle (SDLC) can never be ignored. Smarter ST can give us more relievable and defect-free products which are as per our stakeholder demand. That is the reason it takes more time and resources. But unfortunately, the limited time has left when the product reached the testing st...
Preprint
Automatic plant classification through plant leaf is a classical problem in Computer Vision. Plants classification is challenging due to the introduction of new species with a similar pattern and look-alike. Many efforts are made to automate plant classification using plant leaf, plant flower, bark, or stem. After much effort, it has been proven th...
Article
Full-text available
This paper presents a novel feature descriptor termed principal component analysis (PCA)-based Advanced Local Octa-Directional Pattern (ALODP-PCA) for content-based image retrieval. The conventional approaches compare each pixel of an image with certain neighboring pixels providing discrete image information. The descriptor proposed in this work ut...
Chapter
Sensitive cloud storage security is an important part to secure confidential data of the business. Sensitive data security in merged cloud database environment is increased in recent few years. Data centers are located throughout the world. Cloud computing provides virtual resources using the internet facilitates to its consumers. It is an exciting...
Chapter
Software quality assurance constitutes an important share to total development over heads of an organization. Mainly anticipates around fifty percent to the costs could be endorsed for error recognition, and elimination that could be the capable area for charges optimization. Various practices could be usage for advance the quality of software. The...
Article
Medical Imaging Segmentation is an essential technique for modern medical applications. It is the foundation of many aspects of clinical diagnosis, oncology, and computer-integrated surgical intervention. Although significant successes have been achieved in the segmentation of medical images, DL (deep learning) approaches. Manual delineation of OAR...
Article
Heart failure (HF) is an intercontinental pandemic influencing in any event 26 million individuals globally and is expanding in commonness. HF healthiness consumptions are extensive and will increment significantly with a maturing populace. As per the World Health Organization (WHO), Cardiovascular diseases (CVDs) are the major reason for all-inclu...
Article
Full-text available
Environment monitoring is an important area apart from environmental safety and pollution control. Such monitoring performed by the physical models of the atmosphere is unstable and inaccurate. Machine Learning (ML) techniques on the other hand are more robust in capturing the dynamics in the environment. In this paper, a novel approach is proposed...
Chapter
Low-grade tumor or CSF fluid, the symptoms of brain tumor and CSF liquid, usually require image segmentation to evaluate tumor detection in brain images. This research uses systematic literature review (SLR) process for analysis of the different segmentation approach for detecting the low-grade tumor and CSF fluid presence in the brain. This resear...
Chapter
Breast cancer is the most common cancer in women aged 59 to 69 years old. Studies have shown that early detection and treatment of breast cancer increases the chances of survival significantly. They also demonstrated that detecting small lesions early improves forecasting and results in a significant reduction in death cases. The most effective scr...
Chapter
Low-grade tumor or CSF fluid, the symptoms of brain tumour and CSF liquid, usually requires image segmentation to evaluate tumour detection in brain images. This research uses systematic literature review (SLR) process for analysis of the different segmentation approach for detecting the low-grade tumor and CSF fluid presence in the brain. This res...
Chapter
Brain metastases are the most prevalent intracranial neoplasm that causes excessive morbidity and mortality in most cancer patients. The current medical model for brain metastases is focused on the physical condition of the affected individual, the anatomy of the main tumor, and the number and proximity of brain lesions. In this paper, a new hybrid...
Article
Diagnosing data or object detection in medical images is one of the important parts of image segmentation especially those data which is less effective to identify inMRI such as low-grade tumors or cerebral spinal fluid (CSF) leaks in the brain. The aim of the study is to address the problems associated with detecting the low-grade tumor and CSF in...