Sobia Wassan

Sobia Wassan
  • Doctor of Business Administration
  • Nanjing University

About

15
Publications
29,868
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,058
Citations
Current institution
Nanjing University

Publications

Publications (15)
Article
Full-text available
Diabetes presents a major global health challenge, with an increasing prevalence worldwide. Early detection and continuous glucose monitoring are pivotal to effective diabetes management. Optical glucose sensing is a promising noninvasive alternative to traditional methods, such as finger‐prick blood glucose tests. This study explores the cutting‐e...
Chapter
This chapter elucidates what the major effects of generative artificial intelligence are: It changes things a lot. It first discusses the overall of what generative AI can do using one kind of generative AI, then it considers what generative AI does to make our defences against new things that can go wrong much more effective, and then it reflects...
Chapter
The chapter presents a comprehensive exploration of the changing dynamics at the intersection between the rapidly growing landscape of the interconnectivity of various devices—the internet of things—and the innovations piloted by advancements in generative artificial intelligence. In the following background-focused analysis, the significance of th...
Article
Full-text available
Background Deep Learning is an AI technology that trains computers to analyze data in an approach similar to the human brain. Deep learning algorithms can find complex patterns in images, text, audio, and other data types to provide accurate predictions and conclusions. Neuronal networks are another name for Deep Learning. These layers are the inpu...
Chapter
In developing technology, hackers are actively collecting personal information. To achieve their goals and acquire simple access to information about any individual, they use a range of methods and techniques. A privacy breach occurs when hackers gain access to complete information without the user's permission. Threats and dangers to security can...
Article
Full-text available
Climate change brings many changes in a physical environment like plants and leaves. The flowers and plants get affected by natural climate and local weather extremes. However, the projected increase in the frost event causes sensitivity in plant reproduction and plant structure vegetation. The timing of growing and reproduction might be an essenti...
Article
Full-text available
Online banking is an ideal method for conducting financial transactions such as e-commerce, e-banking, and e-payments. The growing popularity of online payment services and payroll systems, however, has opened new pathways for hackers to steal consumers' information and money, a risk which poses significant danger to the users of e-commerce and e-b...
Article
Full-text available
People in today’s world are getting used to buying the products they need to shop online. They don’t need to go much more than beyond to shop online. They can easily access online stores or put mobile devices in place and arrange what you want. Our research is about online vs offline purchasing preference. What customers prefer to buy online or off...
Article
Full-text available
Artificial intelligence brings large markets, including advertising, tourism, finance, policy, workplace education. We probably associated with Chabot's job (defined as an automated, but personalized, a conversation between software and human users). We plan to use Chatbots in the workplace to assist us in pursuing a new career, addressing human re...
Article
Full-text available
This research paper would discuss the use of artificial intelligence (AI) in stock market modelling, sales forecasting, and market segmentation problems, with a focus on convolutional neural networks (CNN) and fuzzy logic. Backpropagation algorithms were used to solve the first two problems, while self-organizing maps were used to solve the third (...
Article
Full-text available
Online stores like Amazon provide a website for consumers to express their opinions about different items. Since then, it has been established that buying online, 90% of consumers are testing different websites channels to determine the quality of their purchase. To evaluate the text data and then extract the sentiment element from that the field o...
Article
Unfortunately, both researchers and malware authors have demonstrated that malware scanners are limited and can be easily evaded by simple obfuscation techniques. This paper proposes a novel ensemble convolutional neural networks (CNNs) based architecture for effective detection of both packed and unpacked malware. We have named this method image-b...
Article
The volume, type, and sophistication of malware is increasing. Deep convolutional neural networks (CNNs) have lately proven their effectiveness in malware binary detection through image classification. In this paper, we propose a novel classifier to detect variants of malware families and improve malware detection using CNN-based deep learning arch...

Network

Cited By