
Shah Nazir- Ph.D. postdoc
- University of Swabi
Shah Nazir
- Ph.D. postdoc
- University of Swabi
About
237
Publications
160,321
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,757
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (237)
Increasing use of Component Based Software Engineering (CBSE) has raised the issues related with the security of software components. Several methodologies are being used to evaluate security of software components and that of the base system with which it is integrated. Security characteristics of a component must be specified effectively and unam...
Network-based mobility protocols, such as proxy mobile IPv6, are widely recognized as one of the most popular options for facilitating seamless mobility and reducing the burden of mobility-related signaling on mobile nodes in massive IoT environments. In the modern IoT ecosystem, experts in the field leverage the capabilities of artificial intellig...
The adoption of Financial Technology (FinTech), along with the enhancement of Human Resource (HR) competencies, service innovation, and firm growth, plays a crucial role in the development of the banking sector. Despite their importance, obtaining reliable results is often challenging due to the complex, high-dimensional correlations among various...
We investigate a class of third-order nonlinear integro-differential equations (IDEs) with parallel computing of intelligent Internet of Things and wireless networks for numerical solutions. A numerical scheme based on the Haar wavelet has been established to compute the approximate solution for the problem under our consideration. By utilizing the...
Rapid developments in the Internet of Things (IoT) have opened the door for game-changing applications in numerous sectors, especially the vehicle industry. There is a rising demand for efficient assessment and decision-making methodologies to pinpoint the most promising choices for the vehicle sector with the introduction of IoT-based maritime veh...
Smart grids, cloud computing, and artificial intelligence (AI) together are bringing about a radical change in the field of energy management. This chapter examines the complex confluence of various technologies, including prospective uses, integration difficulties, and ethical issues. In our introduction, we give a general review of smart grids an...
With the advent of internet-enabled and hybrid technologies, information is becoming increasingly accessible to the general public. Smartphones and other gadgets are used extensively by people to share and promote ideas, in a variety of ways. Human interaction and communication has become more reliable and effective through advanced computing techn...
Money laundering (ML) is a critical source of extracting the money illegally from the financial system. It is linked to various types of crimes, including corruption, exploitation of a specific community, drug use, and many others. Detection of ML operations is a difficult task on a global scale due to the large volume of financial transactions. Ho...
The advent of technology has facilitated communication among individuals, structures, and transport, thereby revolutionizing contemporary living. In this regard, the Internet of Things has emerged as a transformative approach. Smart vehicles and the Internet of Vehicles (IoV) play a vital role in the development of smart cities and intelligent mobi...
Ship tracking technology is crucial for emergency rescue in the event of a disaster. Quickly identifying the position and status of vessels is vital for rescue teams to be able to deploy efficiently in disaster areas. When
responding to emergencies or natural disasters, ship tracking technology plays a critical role in supporting
emergency rescue o...
The classification of news articles is a crucial technology for processing news information, aiding in the organization of information. It is challenging to classify news due to the continuous emergence of news that requires processing. The modern technological era has reshaped traditional lifestyles in various domains. Similarly, the medium of pub...
The development of smart and innovative software applications in various disciplines has inspired our lives by providing various cutting-edge technologies spanning from online to smart and efficient systems. The proliferation of innovative internet-enabled tools has transformed the nation into a globalized world where individuals can participate on...
Context: The selection and use of appropriate multi-criteria decision making (MCDM) methods for solving complex problems is one of the challenging issues faced by decision makers in the search for appropriate decisions. To address these challenges, MCDM methods have effectively been used in the areas of ICT, farming, business, and trade, for exampl...
Information and communication technology (ICT) has simplified our lives and revolutionised many facets of human existence. It has been used in several sectors and has streamlined corporate procedures by grouping, condensing, coding, and personalising them. ICT has, however, resulted in unforeseen effects, including various cybercrimes. The term “cy...
The term "Internet of Things (IoT)” refers to a network in which data from all connected devices may be gathered, analyzed, and modified as per requirements to offer new services. IoT devices require a constant Internet connection to exchange data. The volume and speed of data continue to grow quickly with the expansion of IoT devices nowadays. IoT...
The term "Internet of things (IoT)” refers to a network in which data from all connected devices may be gathered, analyzed, and modified as per requirements to offer new services. IoT devices require a constant Internet connection to exchange data. The volume and speed of data continue to grow quickly with the expansion of IoT devices nowadays. IoT...
Assessment of a player's knowledge in game education has been around for some time. Traditional evaluation in and around a gaming session may disrupt the players' immersion. This research uses an optimized Random Forest to construct a non-invasive prediction of a game education player's Memorization via in-game data. Firstly, we obtained the datase...
Innovative applications surprised the research communities in the 21st by presenting in diverse domains. Financial technology (FinTech) is an example of these innovative applications. Financial technology applications have renovated traditional banking systems into improved smart business models. Financial technology applications enable the custome...
Health is the basis of a happy and successful living, and modern people have significantly benefited from medical advancements. More information is available to analyze the difficulties that affect our well-being with each new technology. Researchers may be able to answer previously inaccessible health problems due to analyzing and sequencing healt...
Fin-Tech is the merging of finance and technology, to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech is concerned. In the massive field of business, mobile money transaction security is a great challenge for researchers. The user authentication schemes restrict the ability to enforce the...
The upcoming generation of communications can provide richer mobility, high data rate, reliable security, better quality of services, and supporting mobility requirements in the Internet of Things (IoT) environment. Integrating modern communication with IoT demands more secure, scalable, and resource-efficient mobility solutions for better business...
Combination issues lie at the core of computer science and modern discrete mathematics. Artificial intelligence lays the foundation for induction and deduction techniques. Induction in computer science involves establishing statements based on specific to general observations, while deduction operates in the opposite direction. In this paper, we an...
Software birthmarks were created in order to identify instances of software piracy. The perception of a software birthmark was established in response to the limitations of watermarks, fingerprints, and digital signatures, which make it challenging to determine the identity of software. Software programs can be compared based on their extracted pro...
Regional and cultural diversities around the world have given birth to a large number of writing systems and scripts, which consist of varying character sets. Developing an optimal OCR for such a varying and large character set is a challenging task. Unlimited variations in handwritten text due to mood swings, varying writing styles, changes in med...
Globally, with the maturity of information technology, society is now in the information age, magnifying the significance of integrating innovative applications in different financial and other regulatory arenas. The emergence of financial technology (FinTech) based applications has transformed the traditional banking and regulatory systems and enh...
Improvements in communication and networking technologies have transformed people's lives and organizations' activities. Web 2.0 innovation has provided a variety of hybridized applications and tools that have changed enterprises' functional and communication processes. People use numerous platforms to broaden their social contacts, select items, e...
Nazir, S.; Shafiq, M.; Shabaz, M. Metaverse Security: Issues, Challenges and a Viable ZTA Model. Electronics 2023, 12, 391. https:// Abstract: The metaverse is touted as an exciting new technology amalgamation facilitating next-level immersive experiences for users. However, initial experiences indicate that a host of privacy, security and control...
We know that in today’s advanced world, artificial intelligence (AI) and machine learning (ML)-grounded methodologies are playing a very optimistic role in performing difficult and time-consuming activities very conveniently and quickly. However, for the training and testing of these procedures, the main factor is the availability of a huge amount...
Biometric authentication is gaining the interest of private, public, consumer electronics and corporate security systems. For the protection of cyberspace from hackers and other harmful people, biometric security is growing more and more popular among organizations, individuals and enterprises. The word "cyber security" refers to the procedures, te...
Online shopping has permeated modern society, and live e-commerce has emerged as a novel consumer shopping activity. However, online shopping inherently creates heightened risk within its extensive data. However, the powerful social nature of on-site e-commerce fosters favorable tendencies toward shopping by giving consumers a sense of control. Thi...
Big data has revolutionized the world by providing tremendous opportunities for a variety of applications. It contains a gigantic amount of data, especially a plethora of data types that has been significantly useful in diverse research domains. In healthcare domain, the researchers use computational devices to extract enriched relevant information...
Fin-Tech is the merging of finance and technology to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech is concerned. In the massive field of business, mobile money transaction security is a great challenge for researchers. The user authentication schemes restrict the ability to enforce the...
With the development and advancement of information technology, artificial intelligence (AI) and machine learning are applied in every sector of life. Among these applications, music is one that has gained attention in the last couple of years. AI-based innovative and intelligent techniques are revolutionising the music industry. It is very conveni...
Several people around the world have died from the coronavirus (COVID-19) disease. With the increase in COVID-19 cases, distribution, and deaths, much has occurred regarding the ban on travel, border closure, curfews, and the disturbance in the supply of services and goods. The world economy was severely affected by the spread of the virus. Every d...
The creation of intelligent applications for numerous types of industry sectors has been accelerated by recent advancements and decision support systems. Any instrument or system with the ability to support decision-making processes is referred to as a decision support system. Making decisions is a significant and challenging undertaking that ultim...
Seamless mobility is always one of the major requirements of modern-day communication. In a heterogeneous and massive IoT environment, efficient network-based mobility protocol such as proxy mobile IPv6 (PMIPv6), is potentially a good candidate for efficient mobility as well as resource utilization efficiency. Several extensions are devised for per...
Recently, the novel coronavirus disease 2019 (COVID-19) has posed many challenges to the research community by presenting grievous severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) that results in a huge number of mortalities and high morbidities worldwide. Furthermore, the symptoms-based variations in virus type add new challenges for t...
The phenomenon of big data has occurred in many fields of knowledge, one of which is astronomy. One example of a large dataset in astronomy is that of numerically integrated time series asteroid orbital elements from a time span of millions to billions of years. For example, the mean motion resonance (MMR) data of an asteroid are used to find out t...
To resolve the problem of membership value and the control effect reliant on expert knowledge, a PID control approach based on an adaptive fuzzy PID-UAV attitude controller is proposed. The experimental findings demonstrate that the Unmanned Aerial Vehicle (UAV) is stable at the desired height of 2 m within 6 s after takeoff, and that altitude cont...
Parkinson’s disease (PD) is a critical neurological ailment that affects millions of individuals worldwide. A correct diagnosis of Parkinson’s disease is required for effective treatment. Deep learning (DL) algorithms based on various diagnostic methodologies have been developed to detect PD and resolve related diagnostic issues. This research stud...
Art design is a method of conveying human feelings and emotions, particularly via the use of visual structures such as paintings or sketches. Every element of our life, including arts and crafts, has been positively affected by the introduction of novel technologies such as artificial intelligence (AI) and machine learning (ML). In today's modern e...
Background: Paddy is one of the crops with the largest production worldwide, after corn and wheat. In Indonesia, paddy crops play a role as one of the main boosters of national economic growth based on their contribution to Indonesia's gross domestic product (GDP). Therefore, it is imperative to do research aimed at predicting the yield of paddy cr...
The over-population and the limited energy resources have puzzled the government and private organizations to think about the providence of non-stop energy resources to the industries, hospitals, smart homes, and shopping malls to ensure normal routine activities. To accept this challenge, some researchers put their efforts into generating energy f...
Smart devices and things are widely increasing with the passage of time and with the developments of industrial technology. Various smarts devices such as sensors and actuators are interacting with each other for diverse purposes and specific goals. The role of automation can drastically revolutionize to adopt the things, to automate and accurately...
Cloud computing is characterized as a shared computing and communication infrastructure. It encourages the efficient and effective developmental processes that are carried out in various organizations. Cloud computing offers both possibilities and solutions of problems for outsourcing and management of software developmental operations across disti...
The emergence of smart and innovative applications in diverse domains has inspired our lives by presenting many state-of-the art applications ranging from offline to smart online systems, smart communication system to tracking systems, and many others. The availability of smart internet enabled systems has made the world as a global village where p...
Internet of Things (IoT) refers to the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data. These devices can be controlled remotely, which makes them susceptible to exploitation or even takeover by an attacker. The lack of security features on many IoT devices makes them easy t...
The advancement in the field of artificial intelligence (AI) has revolutionized every field of life, including the learning of second languages. These intelligent devices are capable of effectively and efficiently utilizing the time and energy of both learners and teachers. Students can learn at their own pace and at their own skill level. They can...
A secure delegation has a key role in collaborative and dynamic systems, and it brings new challenges to security mechanisms. Secure delegation requires a flexible model that eliminates the challenges of access control and usage control services and provides separation of duty for static and dynamic circumstances. In this study, we propose a securi...
In order to develop oral English and comprehensive skills, reading and writing English are more important. Artificial Intelligence (AI) plays a vital role in numerous fields of our lives, such as education, healthcare, businesses, and many others. In a short time, AI has become one of the most developed disciplines in educational technology and bri...
The crowdsourcing term was first defined as the outsourcing of tasks or work to a group of an unknown workers in an open call for the purpose of utilizing human intelligence. Crowdsourcing nowadays gained popularity in industries and academia around the globe. Various organization and communities takes interest in it because of its parallel and cos...
The characteristic of context-dependency in Urdu words needs to be handled carefully while performing Urdu Sentiment Analysis. In this research, an already constructed Urdu Sentiment Lexicon of positive and negative words is further expanded by the addition of context-dependent words. These context-dependent words are used with or without conjuncti...
Big Data is data whose shape and volume are rising with the passage of time and innovations in technology. This increase will give birth to more uncertain and complex situations, which will then be difficult to properly analyze and manage. Various devices are interconnected with each other, which communicate different types of information. This inf...
Based on applied linguistics, this study looked at the decision support system (DSS) for emphasizing self-assurance in academic writing. From a generic perspective, academic writing has been considered both a process and a product. It has highlighted the planning composite processes, editing, composing, revising, and assessment, which depend upon t...
In this paper, Haar collocation algorithm is developed for the solution of first-order of HIV infection CD4⁺ T-Cells model. In this technique, the derivative in the nonlinear model is approximated by utilizing Haar functions. The value of the unknown function is obtained by the process of integration. Error estimation is also discussed, which aims...
Aiming at the intrusion detection problem of the wireless sensor network (WSN), considering the combined characteristics of the wireless sensor network, we consider setting up a corresponding intrusion detection system on the edge side through edge computing. An intrusion detection system (IDS), as a proactive network security protection technology...
Flying Ad-hoc Network (FANET) is a special member/class of Mobile Ad-hoc Network (MANET) in which the movable nodes are known as by the name of Unmanned Aerial Vehicles (UAVs) that are operated from a long remote distance in which there is no human personnel involved. It is an ad-hoc network in which the UAVs can more in 3D ways simultaneously in t...
In artificial intelligence, text identification and analysis that are based on images play a vital role in the text retrieving process. Automatic text recognition system development is a difficult task in machine learning, but in the case of cursive languages, it poses a big challenge to the research community due to slight changes in character’s s...
Emerging technologies such as cloud computing, integration of Internet of Things, data science, self‐powered data centers, dense sensor network, artificial intelligence convergence, machine learning and deep learning, self‐service IT for business users and others play an important role in daily life. Dense sensor networks (DSNs) can be useful in fi...
In China, landslides are abundant, widespread, and regular, destroying villages and agriculture and sometimes posing a threat to people’s lives. The question of how to rapidly detect and attain landslide data is a significant topic of research, yet traditional measurement using medium-resolution remote sensing data is problematic. Object-oriented c...
Object detection is a computer vision technique for locating instances of objects in images. Because edge detection techniques are at the forefront of image processing for object recognition, having a thorough grasp of them is essential. Object detection techniques play a significant rule in image processing. The proposed study aims to present diff...
Deploying caches at the macro base station (MBS), unmanned aerial vehicle (UAV), and mobile user caches can effectively reduce the retransmission of duplicate content in the 5G cellular wireless hotspot network. As the storage capacity of MBS is much higher than UAVs and other hotspot cache nodes, the MBS advertises its vacant storage space so that...
The Internet of Thing (IoT) is one of the most imperative technology for all organizations that’s play a vital role in many operations, using communication networks, for exchange of data in order to perform a useful task. However, security of IoT devices and data is a major concern. This research work prioritizes the alternatives of security authen...
Existing plant leaf disease detection approaches are based on features of extracting algorithms. These algorithms have some limits in feature selection for the diseased portion, but they can be used in conjunction with other image processing methods. Diseases of a plant can be classified from their symptoms. We proposed a cucumber leaf recognition...
With the constant developments in Internet communication and the rise of the Internet of Things (IoT), technologies incorporating intelligent manufacturing have given birth to the growing industry and production lines. The network of IoT is generally interconnected with different devices through the Internet. The interactions of the IoT devices for...
Social communication has evolved, with e-mail still being one of the most common communication means, used for both formal and informal ways. With many languages being digitized for the electronic world, the use of English is still abundant. However, various native languages of different regions are emerging gradually. The Urdu language, coming fro...
Flying Ad-hoc Network (FANET) is a new class of Mobile Ad-hoc Network in which the nodes move in three-dimensional (3-D) ways in the air simultaneously. These nodes are known as Unmanned Aerial Vehicles (UAVs) that are operated live remotely or by the pre-defined mechanism which involves no human personnel. Due to the high mobility of nodes and dyn...
The wide-ranging implementation of Android applications used in various devices, from smartphones to intelligent television, has made it thought-provoking for developers. The permission granting mechanism is one of the defects imposed by the developers. Such assessing of defects does not allow the user to comprehend the implication of privacy for g...
We live in a modern and technological society run by intelligent and human-like machines and systems. This is due to the advancements in the field of artificial intelligence. The machines are directly or indirectly used in different sectors like healthcare, automatic vehicles, and complex decision-making and at the same used in educational institut...
Technical facilities are an element that can support educational and learning activities, especially for professional students in the fields of technology and information. Computational thinking is also one of the supportive skills that every student must have. This is consistent with the preliminary research conducted by the researchers. The teach...
Energy infrastructure is well thought-out to be one of the complex infrastructures due to its convoluted configuration and automatic control among all of the systems. With such systems, various connections are made for the purpose of configurations. The energy system infrastructure aims to analytically evaluate each element of the system based on f...
The main symptoms of COVID-19 are high temperature, throat infection, and irregular heartbeat. An integrated wearable device has been presented in this paper for the measurement of temperature and heartbeat in real time using different sensors and NodeMCU ESP8266. For temperature, the DHT11 sensor is used and, for heartbeat, the pulse sensor is use...
E-health sustainable systems can be optimized by empowering patients in self-care programs through artificial intelligence ecosystems in which both doctors and patients interact in an agile way. This work proposes agent-based simulators as a mechanism for predicting the repercussions of certain self-care programs in certain patients for finding the...
Future generation networks such as millimeter-wave LAN, broadband wireless access systems, and 5th or 6th generation (5G/6G) networks demand more security, low latency with more reliable standards and communication capacity. Efficient congestion control is considered one of the key elements of 5G/6G technology that allows the operators to run vario...
There are many wetland resources in the area where the Yellow River enters the sea. This area has good ecological and economic value. Therefore, wetlands are precious resources. The accuracy of traditional wetland classification methods is low (for example, based on the support machine method). In order to explore ways to improve the accuracy of we...
Artificial intelligence (AI) is making computer systems capable of executing human brain tasks in many fields in all aspects of daily life. The enhancement in information and communications technology (ICT) has indisputably improved the quality of people's lives around the globe. Especially, ICT has led to a very needy and tremendous improvement in...
Peer-to-peer networking is a disseminated architecture application which partition the workload among peers. The peers are distributed with equal privileges pertaining the equipotent application. The peers are making portion of their resources including disk storage, processing power, bandwidth, which is in a straight line available to the particip...
This article deals with the climate parameters and their possible impact on river discharge in the Hindu Kush region using fuzzy logic approach. The study area possesses a diverse geographical setting and is generally an unexplored region in term of research on climatic variability. All the hydro-climatic variables such as temperature, rainfall, ri...
Internet of Things (IoT) is a computing term which describes universal Internet connectivity, transforming everyday objects into connected devices. Many smart devices are interconnected to sense their surroundings, send, and process the sensed data. The IoT connects the real world with the global world by interconnecting edge devices. The main goal...
Numerous raised areas are established in the field of fog computing (FC), applied for various purposes, and are evaluated for running analytics on various devices including devices of internet of things and many others in a disseminated way. FC progresses the prototype of cloud computing to network edge leading various possibilities and services. F...
In the last decade, the Internet of Things (IoT) has grown to connect a large number of smart entities, devices, and components. These connected entities provide a wide range of services to improve the current society of end customers. The Industrial Internet of Things (IIoTs) are revolutionary systems that have linked manufacturing processes with...
The communication industry is rapidly growing with the passage of time and the number of communication devices is increasing. This increase of communication devices put the devices and their communication into a high risk and security challenges. Intruders tries for capturing important information from such communication devices and are using for t...
The Internet has already become a medium for people to access information, express their views, and connect with one another through various media and tools as a result of its rapid global development. Web 2.0 has become increasingly important in people’s daily lives. With the passing of time, many online communities, such as blogs, forums, and web...
In computer vision and artificial intelligence, text recognition and analysis based on images play a key role in the text retrieving process. Enabling a machine learning technique to recognize handwritten characters of a specific language requires a standard dataset. Acceptable handwritten character datasets are available in many languages includin...
Acute coronary syndrome (ACS) is a set of symptoms and signs which define a range of conditions related with the unexpected reduced blood flow to the heart. In ACS, the heart muscles cannot function properly due to the decrease of blood flow. Myocardial infarction (MI) is a condition which comes under the umbrella of acute coronary syndrome. The ai...