About
14
Publications
1,080
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
148
Citations
Introduction
Artificial Intelligence, Cognitive Computing, Image Processing, Multi-agent systems
Current institution
Additional affiliations
March 2023 - present
Lahore Garrison University
Position
- Professor (Assistant)
March 2023 - present
Lahore Garrison University
Position
- Assistant Professor
Education
October 2017 - August 2021
November 2011 - March 2013
Publications
Publications (14)
Objective: The usage of power and automated control systems can save energy, but creating an intelligent control system via the Internet of Things (IoT) is an advanced technique because it provides remote access and control through the Internet, especially for those who are facing issues with monitoring their home’s smart gears remotely. In this se...
Artificial intelligence (AI) is poised to play an increasingly pivotal role in reshaping and enhancing the way we communicate, fostering more intuitive, efficient, and personalized interactions across various domains. In this chapter, we delve into the future of AI in communication, exploring its transformative potential across a spectrum of domain...
Road torments are ample cause of deterioration of pavements structure. As they are not assessed and recovered on time. Progress can be easily assessed by the strong infrastructure of roads. But this infrastructure requires a lot of effort not only in construction but also in maintenance. In this paper our cause to detect main cause of road destruct...
Over the past few decades, home automation systems have gained significant popularity due to their ability to enhance comfort and improve the quality of life. However, with the increasing reliance on internet connectivity, these systems face challenges in coping with the expanding attack surfaces and the corresponding attacks. This paper provides a...
In response to the demand for impartial and precise personality testing, this study presents a unique multi-modal method for predicting personality traits in collaborative settings. Conventional approaches that depend on surveys frequently create biases, which has led to the investigation of raw, subconscious open writing as a rich source of person...
The Coronavirus family belongs to the significant infection in both human and animal pathogens. The current universal of the Coronavirus respiring ailment (COVID-19) shows a state of worldwide public outbreak. Coronavirus affliction (COVID-19) is spread through large droplets produced during coughing and sneezing by symptomatic patients, as well as...
The Internet of Things (IoT) is a system of physical objects attached to software and other technologies that allow them to connect to and exchange information between devices and systems over the Internet. There is a framework in the Internet of Things (IoT) in which devices are usually outfitted with wireless sensor nodes to connect several physi...
Increasing man-machine trust has burgeoned during the last few decades. The growing
interest in trust-building has led to the study of the non-dichotomous nature of trust. Trust as social behavior is an integral part of effective team building. The major focus has been offered to study how humans build trust towards machines, whereas few attempts h...
Trust is an essential requirement for effective Human-Agent interaction as artificial agents are becoming part of human society in a social context. To blend into our society and maximize their acceptability and reliability, artificial agents need to adapt to the complexity of their surroundings, like humans. This adaptation should come through kno...
Social network analysis for multi agent based models can support deeper and empirically grounded understanding of the activities as well as agent’s roles in the system. An agent may store and share information of its environment with other agents of the system. Implementing a secure communication setup, in accordance with requested information is s...