Shah Nazir

Shah Nazir
  • Ph.D. postdoc
  • University of Swabi

About

237
Publications
160,321
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,757
Citations
Current institution
University of Swabi

Publications

Publications (237)
Conference Paper
Full-text available
Increasing use of Component Based Software Engineering (CBSE) has raised the issues related with the security of software components. Several methodologies are being used to evaluate security of software components and that of the base system with which it is integrated. Security characteristics of a component must be specified effectively and unam...
Article
Full-text available
Network-based mobility protocols, such as proxy mobile IPv6, are widely recognized as one of the most popular options for facilitating seamless mobility and reducing the burden of mobility-related signaling on mobile nodes in massive IoT environments. In the modern IoT ecosystem, experts in the field leverage the capabilities of artificial intellig...
Article
Full-text available
The adoption of Financial Technology (FinTech), along with the enhancement of Human Resource (HR) competencies, service innovation, and firm growth, plays a crucial role in the development of the banking sector. Despite their importance, obtaining reliable results is often challenging due to the complex, high-dimensional correlations among various...
Article
Full-text available
We investigate a class of third-order nonlinear integro-differential equations (IDEs) with parallel computing of intelligent Internet of Things and wireless networks for numerical solutions. A numerical scheme based on the Haar wavelet has been established to compute the approximate solution for the problem under our consideration. By utilizing the...
Article
Rapid developments in the Internet of Things (IoT) have opened the door for game-changing applications in numerous sectors, especially the vehicle industry. There is a rising demand for efficient assessment and decision-making methodologies to pinpoint the most promising choices for the vehicle sector with the introduction of IoT-based maritime veh...
Chapter
Smart grids, cloud computing, and artificial intelligence (AI) together are bringing about a radical change in the field of energy management. This chapter examines the complex confluence of various technologies, including prospective uses, integration difficulties, and ethical issues. In our introduction, we give a general review of smart grids an...
Article
Full-text available
With the advent of internet-enabled and hybrid technologies, information is becoming increasingly accessible to the general public. Smartphones and other gadgets are used extensively by people to share and promote ideas, in a variety of ways. Human interaction and communication has become more reliable and effective through advanced computing techn...
Article
Full-text available
Money laundering (ML) is a critical source of extracting the money illegally from the financial system. It is linked to various types of crimes, including corruption, exploitation of a specific community, drug use, and many others. Detection of ML operations is a difficult task on a global scale due to the large volume of financial transactions. Ho...
Article
Full-text available
The advent of technology has facilitated communication among individuals, structures, and transport, thereby revolutionizing contemporary living. In this regard, the Internet of Things has emerged as a transformative approach. Smart vehicles and the Internet of Vehicles (IoV) play a vital role in the development of smart cities and intelligent mobi...
Article
Full-text available
Ship tracking technology is crucial for emergency rescue in the event of a disaster. Quickly identifying the position and status of vessels is vital for rescue teams to be able to deploy efficiently in disaster areas. When responding to emergencies or natural disasters, ship tracking technology plays a critical role in supporting emergency rescue o...
Article
The classification of news articles is a crucial technology for processing news information, aiding in the organization of information. It is challenging to classify news due to the continuous emergence of news that requires processing. The modern technological era has reshaped traditional lifestyles in various domains. Similarly, the medium of pub...
Article
Full-text available
The development of smart and innovative software applications in various disciplines has inspired our lives by providing various cutting-edge technologies spanning from online to smart and efficient systems. The proliferation of innovative internet-enabled tools has transformed the nation into a globalized world where individuals can participate on...
Article
Full-text available
Context: The selection and use of appropriate multi-criteria decision making (MCDM) methods for solving complex problems is one of the challenging issues faced by decision makers in the search for appropriate decisions. To address these challenges, MCDM methods have effectively been used in the areas of ICT, farming, business, and trade, for exampl...
Chapter
Information and communication technology (ICT) has simplified our lives and revolutionised many facets of human existence. It has been used in several sectors and has streamlined corporate procedures by grouping, condensing, coding, and personalising them. ICT has, however, resulted in unforeseen effects, including various cybercrimes. The term “cy...
Article
The term "Internet of Things (IoT)” refers to a network in which data from all connected devices may be gathered, analyzed, and modified as per requirements to offer new services. IoT devices require a constant Internet connection to exchange data. The volume and speed of data continue to grow quickly with the expansion of IoT devices nowadays. IoT...
Article
Full-text available
The term "Internet of things (IoT)” refers to a network in which data from all connected devices may be gathered, analyzed, and modified as per requirements to offer new services. IoT devices require a constant Internet connection to exchange data. The volume and speed of data continue to grow quickly with the expansion of IoT devices nowadays. IoT...
Article
Full-text available
Assessment of a player's knowledge in game education has been around for some time. Traditional evaluation in and around a gaming session may disrupt the players' immersion. This research uses an optimized Random Forest to construct a non-invasive prediction of a game education player's Memorization via in-game data. Firstly, we obtained the datase...
Article
Full-text available
Innovative applications surprised the research communities in the 21st by presenting in diverse domains. Financial technology (FinTech) is an example of these innovative applications. Financial technology applications have renovated traditional banking systems into improved smart business models. Financial technology applications enable the custome...
Article
Full-text available
Health is the basis of a happy and successful living, and modern people have significantly benefited from medical advancements. More information is available to analyze the difficulties that affect our well-being with each new technology. Researchers may be able to answer previously inaccessible health problems due to analyzing and sequencing healt...
Article
Full-text available
Fin-Tech is the merging of finance and technology, to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech is concerned. In the massive field of business, mobile money transaction security is a great challenge for researchers. The user authentication schemes restrict the ability to enforce the...
Article
Full-text available
The upcoming generation of communications can provide richer mobility, high data rate, reliable security, better quality of services, and supporting mobility requirements in the Internet of Things (IoT) environment. Integrating modern communication with IoT demands more secure, scalable, and resource-efficient mobility solutions for better business...
Article
Combination issues lie at the core of computer science and modern discrete mathematics. Artificial intelligence lays the foundation for induction and deduction techniques. Induction in computer science involves establishing statements based on specific to general observations, while deduction operates in the opposite direction. In this paper, we an...
Chapter
Software birthmarks were created in order to identify instances of software piracy. The perception of a software birthmark was established in response to the limitations of watermarks, fingerprints, and digital signatures, which make it challenging to determine the identity of software. Software programs can be compared based on their extracted pro...
Article
Full-text available
Regional and cultural diversities around the world have given birth to a large number of writing systems and scripts, which consist of varying character sets. Developing an optimal OCR for such a varying and large character set is a challenging task. Unlimited variations in handwritten text due to mood swings, varying writing styles, changes in med...
Article
Full-text available
Globally, with the maturity of information technology, society is now in the information age, magnifying the significance of integrating innovative applications in different financial and other regulatory arenas. The emergence of financial technology (FinTech) based applications has transformed the traditional banking and regulatory systems and enh...
Article
Full-text available
Improvements in communication and networking technologies have transformed people's lives and organizations' activities. Web 2.0 innovation has provided a variety of hybridized applications and tools that have changed enterprises' functional and communication processes. People use numerous platforms to broaden their social contacts, select items, e...
Article
Full-text available
Nazir, S.; Shafiq, M.; Shabaz, M. Metaverse Security: Issues, Challenges and a Viable ZTA Model. Electronics 2023, 12, 391. https:// Abstract: The metaverse is touted as an exciting new technology amalgamation facilitating next-level immersive experiences for users. However, initial experiences indicate that a host of privacy, security and control...
Article
Full-text available
We know that in today’s advanced world, artificial intelligence (AI) and machine learning (ML)-grounded methodologies are playing a very optimistic role in performing difficult and time-consuming activities very conveniently and quickly. However, for the training and testing of these procedures, the main factor is the availability of a huge amount...
Article
Full-text available
Biometric authentication is gaining the interest of private, public, consumer electronics and corporate security systems. For the protection of cyberspace from hackers and other harmful people, biometric security is growing more and more popular among organizations, individuals and enterprises. The word "cyber security" refers to the procedures, te...
Article
Full-text available
Online shopping has permeated modern society, and live e-commerce has emerged as a novel consumer shopping activity. However, online shopping inherently creates heightened risk within its extensive data. However, the powerful social nature of on-site e-commerce fosters favorable tendencies toward shopping by giving consumers a sense of control. Thi...
Article
Full-text available
Big data has revolutionized the world by providing tremendous opportunities for a variety of applications. It contains a gigantic amount of data, especially a plethora of data types that has been significantly useful in diverse research domains. In healthcare domain, the researchers use computational devices to extract enriched relevant information...
Preprint
Full-text available
Fin-Tech is the merging of finance and technology to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech is concerned. In the massive field of business, mobile money transaction security is a great challenge for researchers. The user authentication schemes restrict the ability to enforce the...
Article
Full-text available
With the development and advancement of information technology, artificial intelligence (AI) and machine learning are applied in every sector of life. Among these applications, music is one that has gained attention in the last couple of years. AI-based innovative and intelligent techniques are revolutionising the music industry. It is very conveni...
Article
Full-text available
Several people around the world have died from the coronavirus (COVID-19) disease. With the increase in COVID-19 cases, distribution, and deaths, much has occurred regarding the ban on travel, border closure, curfews, and the disturbance in the supply of services and goods. The world economy was severely affected by the spread of the virus. Every d...
Article
Full-text available
The creation of intelligent applications for numerous types of industry sectors has been accelerated by recent advancements and decision support systems. Any instrument or system with the ability to support decision-making processes is referred to as a decision support system. Making decisions is a significant and challenging undertaking that ultim...
Article
Full-text available
Seamless mobility is always one of the major requirements of modern-day communication. In a heterogeneous and massive IoT environment, efficient network-based mobility protocol such as proxy mobile IPv6 (PMIPv6), is potentially a good candidate for efficient mobility as well as resource utilization efficiency. Several extensions are devised for per...
Article
Full-text available
Recently, the novel coronavirus disease 2019 (COVID-19) has posed many challenges to the research community by presenting grievous severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) that results in a huge number of mortalities and high morbidities worldwide. Furthermore, the symptoms-based variations in virus type add new challenges for t...
Article
Full-text available
The phenomenon of big data has occurred in many fields of knowledge, one of which is astronomy. One example of a large dataset in astronomy is that of numerically integrated time series asteroid orbital elements from a time span of millions to billions of years. For example, the mean motion resonance (MMR) data of an asteroid are used to find out t...
Article
To resolve the problem of membership value and the control effect reliant on expert knowledge, a PID control approach based on an adaptive fuzzy PID-UAV attitude controller is proposed. The experimental findings demonstrate that the Unmanned Aerial Vehicle (UAV) is stable at the desired height of 2 m within 6 s after takeoff, and that altitude cont...
Article
Parkinson’s disease (PD) is a critical neurological ailment that affects millions of individuals worldwide. A correct diagnosis of Parkinson’s disease is required for effective treatment. Deep learning (DL) algorithms based on various diagnostic methodologies have been developed to detect PD and resolve related diagnostic issues. This research stud...
Article
Art design is a method of conveying human feelings and emotions, particularly via the use of visual structures such as paintings or sketches. Every element of our life, including arts and crafts, has been positively affected by the introduction of novel technologies such as artificial intelligence (AI) and machine learning (ML). In today's modern e...
Article
Background: Paddy is one of the crops with the largest production worldwide, after corn and wheat. In Indonesia, paddy crops play a role as one of the main boosters of national economic growth based on their contribution to Indonesia's gross domestic product (GDP). Therefore, it is imperative to do research aimed at predicting the yield of paddy cr...
Article
Full-text available
The over-population and the limited energy resources have puzzled the government and private organizations to think about the providence of non-stop energy resources to the industries, hospitals, smart homes, and shopping malls to ensure normal routine activities. To accept this challenge, some researchers put their efforts into generating energy f...
Article
Full-text available
Smart devices and things are widely increasing with the passage of time and with the developments of industrial technology. Various smarts devices such as sensors and actuators are interacting with each other for diverse purposes and specific goals. The role of automation can drastically revolutionize to adopt the things, to automate and accurately...
Article
Full-text available
Cloud computing is characterized as a shared computing and communication infrastructure. It encourages the efficient and effective developmental processes that are carried out in various organizations. Cloud computing offers both possibilities and solutions of problems for outsourcing and management of software developmental operations across disti...
Article
Full-text available
The emergence of smart and innovative applications in diverse domains has inspired our lives by presenting many state-of-the art applications ranging from offline to smart online systems, smart communication system to tracking systems, and many others. The availability of smart internet enabled systems has made the world as a global village where p...
Article
Full-text available
Internet of Things (IoT) refers to the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data. These devices can be controlled remotely, which makes them susceptible to exploitation or even takeover by an attacker. The lack of security features on many IoT devices makes them easy t...
Article
The advancement in the field of artificial intelligence (AI) has revolutionized every field of life, including the learning of second languages. These intelligent devices are capable of effectively and efficiently utilizing the time and energy of both learners and teachers. Students can learn at their own pace and at their own skill level. They can...
Article
Full-text available
A secure delegation has a key role in collaborative and dynamic systems, and it brings new challenges to security mechanisms. Secure delegation requires a flexible model that eliminates the challenges of access control and usage control services and provides separation of duty for static and dynamic circumstances. In this study, we propose a securi...
Article
Full-text available
In order to develop oral English and comprehensive skills, reading and writing English are more important. Artificial Intelligence (AI) plays a vital role in numerous fields of our lives, such as education, healthcare, businesses, and many others. In a short time, AI has become one of the most developed disciplines in educational technology and bri...
Chapter
The crowdsourcing term was first defined as the outsourcing of tasks or work to a group of an unknown workers in an open call for the purpose of utilizing human intelligence. Crowdsourcing nowadays gained popularity in industries and academia around the globe. Various organization and communities takes interest in it because of its parallel and cos...
Article
The characteristic of context-dependency in Urdu words needs to be handled carefully while performing Urdu Sentiment Analysis. In this research, an already constructed Urdu Sentiment Lexicon of positive and negative words is further expanded by the addition of context-dependent words. These context-dependent words are used with or without conjuncti...
Article
Full-text available
Big Data is data whose shape and volume are rising with the passage of time and innovations in technology. This increase will give birth to more uncertain and complex situations, which will then be difficult to properly analyze and manage. Various devices are interconnected with each other, which communicate different types of information. This inf...
Article
Full-text available
Based on applied linguistics, this study looked at the decision support system (DSS) for emphasizing self-assurance in academic writing. From a generic perspective, academic writing has been considered both a process and a product. It has highlighted the planning composite processes, editing, composing, revising, and assessment, which depend upon t...
Article
Full-text available
In this paper, Haar collocation algorithm is developed for the solution of first-order of HIV infection CD4⁺ T-Cells model. In this technique, the derivative in the nonlinear model is approximated by utilizing Haar functions. The value of the unknown function is obtained by the process of integration. Error estimation is also discussed, which aims...
Article
Full-text available
Aiming at the intrusion detection problem of the wireless sensor network (WSN), considering the combined characteristics of the wireless sensor network, we consider setting up a corresponding intrusion detection system on the edge side through edge computing. An intrusion detection system (IDS), as a proactive network security protection technology...
Article
Full-text available
Flying Ad-hoc Network (FANET) is a special member/class of Mobile Ad-hoc Network (MANET) in which the movable nodes are known as by the name of Unmanned Aerial Vehicles (UAVs) that are operated from a long remote distance in which there is no human personnel involved. It is an ad-hoc network in which the UAVs can more in 3D ways simultaneously in t...
Article
Full-text available
In artificial intelligence, text identification and analysis that are based on images play a vital role in the text retrieving process. Automatic text recognition system development is a difficult task in machine learning, but in the case of cursive languages, it poses a big challenge to the research community due to slight changes in character’s s...
Article
Full-text available
Emerging technologies such as cloud computing, integration of Internet of Things, data science, self‐powered data centers, dense sensor network, artificial intelligence convergence, machine learning and deep learning, self‐service IT for business users and others play an important role in daily life. Dense sensor networks (DSNs) can be useful in fi...
Article
Full-text available
In China, landslides are abundant, widespread, and regular, destroying villages and agriculture and sometimes posing a threat to people’s lives. The question of how to rapidly detect and attain landslide data is a significant topic of research, yet traditional measurement using medium-resolution remote sensing data is problematic. Object-oriented c...
Article
Full-text available
Object detection is a computer vision technique for locating instances of objects in images. Because edge detection techniques are at the forefront of image processing for object recognition, having a thorough grasp of them is essential. Object detection techniques play a significant rule in image processing. The proposed study aims to present diff...
Article
Full-text available
Deploying caches at the macro base station (MBS), unmanned aerial vehicle (UAV), and mobile user caches can effectively reduce the retransmission of duplicate content in the 5G cellular wireless hotspot network. As the storage capacity of MBS is much higher than UAVs and other hotspot cache nodes, the MBS advertises its vacant storage space so that...
Article
Full-text available
The Internet of Thing (IoT) is one of the most imperative technology for all organizations that’s play a vital role in many operations, using communication networks, for exchange of data in order to perform a useful task. However, security of IoT devices and data is a major concern. This research work prioritizes the alternatives of security authen...
Article
Full-text available
Existing plant leaf disease detection approaches are based on features of extracting algorithms. These algorithms have some limits in feature selection for the diseased portion, but they can be used in conjunction with other image processing methods. Diseases of a plant can be classified from their symptoms. We proposed a cucumber leaf recognition...
Article
Full-text available
With the constant developments in Internet communication and the rise of the Internet of Things (IoT), technologies incorporating intelligent manufacturing have given birth to the growing industry and production lines. The network of IoT is generally interconnected with different devices through the Internet. The interactions of the IoT devices for...
Article
Full-text available
Social communication has evolved, with e-mail still being one of the most common communication means, used for both formal and informal ways. With many languages being digitized for the electronic world, the use of English is still abundant. However, various native languages of different regions are emerging gradually. The Urdu language, coming fro...
Article
Full-text available
Flying Ad-hoc Network (FANET) is a new class of Mobile Ad-hoc Network in which the nodes move in three-dimensional (3-D) ways in the air simultaneously. These nodes are known as Unmanned Aerial Vehicles (UAVs) that are operated live remotely or by the pre-defined mechanism which involves no human personnel. Due to the high mobility of nodes and dyn...
Article
Full-text available
The wide-ranging implementation of Android applications used in various devices, from smartphones to intelligent television, has made it thought-provoking for developers. The permission granting mechanism is one of the defects imposed by the developers. Such assessing of defects does not allow the user to comprehend the implication of privacy for g...
Article
Full-text available
We live in a modern and technological society run by intelligent and human-like machines and systems. This is due to the advancements in the field of artificial intelligence. The machines are directly or indirectly used in different sectors like healthcare, automatic vehicles, and complex decision-making and at the same used in educational institut...
Article
Full-text available
Technical facilities are an element that can support educational and learning activities, especially for professional students in the fields of technology and information. Computational thinking is also one of the supportive skills that every student must have. This is consistent with the preliminary research conducted by the researchers. The teach...
Article
Full-text available
Energy infrastructure is well thought-out to be one of the complex infrastructures due to its convoluted configuration and automatic control among all of the systems. With such systems, various connections are made for the purpose of configurations. The energy system infrastructure aims to analytically evaluate each element of the system based on f...
Article
Full-text available
The main symptoms of COVID-19 are high temperature, throat infection, and irregular heartbeat. An integrated wearable device has been presented in this paper for the measurement of temperature and heartbeat in real time using different sensors and NodeMCU ESP8266. For temperature, the DHT11 sensor is used and, for heartbeat, the pulse sensor is use...
Article
Full-text available
E-health sustainable systems can be optimized by empowering patients in self-care programs through artificial intelligence ecosystems in which both doctors and patients interact in an agile way. This work proposes agent-based simulators as a mechanism for predicting the repercussions of certain self-care programs in certain patients for finding the...
Article
Future generation networks such as millimeter-wave LAN, broadband wireless access systems, and 5th or 6th generation (5G/6G) networks demand more security, low latency with more reliable standards and communication capacity. Efficient congestion control is considered one of the key elements of 5G/6G technology that allows the operators to run vario...
Article
Full-text available
There are many wetland resources in the area where the Yellow River enters the sea. This area has good ecological and economic value. Therefore, wetlands are precious resources. The accuracy of traditional wetland classification methods is low (for example, based on the support machine method). In order to explore ways to improve the accuracy of we...
Article
Full-text available
Artificial intelligence (AI) is making computer systems capable of executing human brain tasks in many fields in all aspects of daily life. The enhancement in information and communications technology (ICT) has indisputably improved the quality of people's lives around the globe. Especially, ICT has led to a very needy and tremendous improvement in...
Article
Full-text available
Peer-to-peer networking is a disseminated architecture application which partition the workload among peers. The peers are distributed with equal privileges pertaining the equipotent application. The peers are making portion of their resources including disk storage, processing power, bandwidth, which is in a straight line available to the particip...
Article
Full-text available
This article deals with the climate parameters and their possible impact on river discharge in the Hindu Kush region using fuzzy logic approach. The study area possesses a diverse geographical setting and is generally an unexplored region in term of research on climatic variability. All the hydro-climatic variables such as temperature, rainfall, ri...
Article
Full-text available
Internet of Things (IoT) is a computing term which describes universal Internet connectivity, transforming everyday objects into connected devices. Many smart devices are interconnected to sense their surroundings, send, and process the sensed data. The IoT connects the real world with the global world by interconnecting edge devices. The main goal...
Article
Full-text available
Numerous raised areas are established in the field of fog computing (FC), applied for various purposes, and are evaluated for running analytics on various devices including devices of internet of things and many others in a disseminated way. FC progresses the prototype of cloud computing to network edge leading various possibilities and services. F...
Article
Full-text available
In the last decade, the Internet of Things (IoT) has grown to connect a large number of smart entities, devices, and components. These connected entities provide a wide range of services to improve the current society of end customers. The Industrial Internet of Things (IIoTs) are revolutionary systems that have linked manufacturing processes with...
Article
Full-text available
The communication industry is rapidly growing with the passage of time and the number of communication devices is increasing. This increase of communication devices put the devices and their communication into a high risk and security challenges. Intruders tries for capturing important information from such communication devices and are using for t...
Article
Full-text available
The Internet has already become a medium for people to access information, express their views, and connect with one another through various media and tools as a result of its rapid global development. Web 2.0 has become increasingly important in people’s daily lives. With the passing of time, many online communities, such as blogs, forums, and web...
Article
Full-text available
In computer vision and artificial intelligence, text recognition and analysis based on images play a key role in the text retrieving process. Enabling a machine learning technique to recognize handwritten characters of a specific language requires a standard dataset. Acceptable handwritten character datasets are available in many languages includin...
Article
Full-text available
Acute coronary syndrome (ACS) is a set of symptoms and signs which define a range of conditions related with the unexpected reduced blood flow to the heart. In ACS, the heart muscles cannot function properly due to the decrease of blood flow. Myocardial infarction (MI) is a condition which comes under the umbrella of acute coronary syndrome. The ai...

Network

Cited By