Sohail Jabbar

Sohail Jabbar
University of Faisalabad · Department of Computational Sciences

PhD (Computer Science)
Associate Professor\Director - Office of Research, Innovation and Commercialization

About

142
Publications
73,741
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,584
Citations
Additional affiliations
November 2020 - present
University of Faisalabad
Position
  • Professor (Associate)
Description
  • *** Teaching different courses at Undergraduate, and MS level *** Supervising undergraduate projects, and MS theses *** Additional Charge of Associate Dean (Faculty of IT) *** Additional Charge of Director (Office of Research Innovation and Commercialization)
September 2020 - November 2020
University of Faisalabad
Position
  • Professor (Assistant)
Description
  • Teaching Undergraduate, and MS classes
September 2019 - August 2020
Manchester Metropolitan University
Position
  • Research Associate
Description
  • Research work on Blockchain, and IoT Conducted Labs Co-Supervision of MS Thesis
Education
September 2009 - November 2015
Bahria University Islamabad Campus
Field of study
  • Network and Wireless Communications
September 2007 - August 2009
Bahria University Islamabad Campus
Field of study
  • Telecommunication and Networks
September 2003 - August 2005
Mohi-ud-Din Islamic University
Field of study
  • Marketing

Publications

Publications (142)
Article
Full-text available
VANET is a category of MANET that aims to provide wireless communication. It increases the safety of roads and passengers. Millions of people lose their precious lives in accidents yearly, millions are injured, and others incur disability daily. Emergency vehicles need clear roads to reach their destination faster to save lives. Video streaming can...
Article
Full-text available
This paper presents an innovative approach to enhance the querying capability of ChatGPT, a conversational artificial intelligence model, by incorporating voice-based interaction and a convolutional neural network (CNN)-based impaired vision detection model. The proposed system aims to improve user experience and accessibility by allowing users to...
Article
Full-text available
The rapid evolution of electronic media in recent decades has exponentially amplified the propagation of fake news, resulting in widespread confusion and misunderstanding among the masses, especially concerning critical topics like the COVID‐19 pandemic. Consequently, detecting fake news on social media has emerged as a prominent area of research,...
Preprint
Full-text available
VANET is a category of MANET that aims to provide wireless communication. It increases the safety of roads and passengers. Millions of people lose their precious lives in accidents yearly, millions are injured, and others incur disability daily. Emergency vehicles need clear roads to reach their destination faster to save lives. Video streaming can...
Preprint
Full-text available
The scalability of Blockchain is a significant factor that requires attention for it to compete with traditional solutions. One of the main concerns in the scalability aspect of Blockchain is throughput and latency. The slow transaction verification process is one of the primary causes of this issue in the founding systems and their descendant solu...
Article
Full-text available
In the emerging and well-rooted field of Vehicular Adhoc-Networks (VANETs), the imperative of secure content exchange via Vehicle-to-Vehicle (V2V) communication for better safety emphasizes the importance of strong communication protocols. Implementing Information-Centric Networking (ICN) in VANETs allows for more efficient resource utilization via...
Article
Full-text available
According to research, the vast majority of road accidents (90%) are the result of human error, with only a small percentage (2%) being caused by malfunctions in the vehicle. Smart vehicles have gained significant attention as potential solutions to address such issues. In the future of transportation, travel comfort and road safety will be ensured...
Article
Full-text available
When the mutation affects the melanocytes of the body, a condition called melanoma results which is one of the deadliest skin cancers. Early detection of cutaneous melanoma is vital for raising the chances of survival. Melanoma can be due to inherited defective genes or due to environmental factors such as excessive sun exposure. The accuracy of th...
Article
Full-text available
Accommodating an increasing number of users in the Blockchain network has moved to the forefront of discussion. It is also evident that without jeopardizing the data security in Blockchain, it is of indispensable need to devise an appropriate method for improving the scalability trait of Blockchain. In this article, we have proposed a consensus met...
Article
In recent years researchers have shown significant interest in vehicular networks to augment road safety by providing real-time messaging services among vehicles. This work aims to provide a detailed analysis of emergency message dissemination techniques for the Internet of Vehicles (IoV). We explored position-based data dissemination techniques fo...
Article
Full-text available
Multimedia content in 5G/6G networks makes safe, confidential, and efficient content delivery difficult. Intelligent systems that adapt to the ever-changing network environment are needed to distribute multimedia content in these networks. Reinforcement learning (RL) can optimize multimedia content distribution based on network congestion, capacity...
Article
Full-text available
Ovarian cancer ranks as the fifth leading cause of cancer-related mortality in women. Late-stage diagnosis (stages III and IV) is a major challenge due to the often vague and inconsistent initial symptoms. Current diagnostic methods, such as biomarkers, biopsy, and imaging tests, face limitations, including subjectivity, inter-observer variability,...
Article
Full-text available
Consumer knowledge of the goods produced or processed by the numerous suppliers and processors is still relatively low due to the growing complexity of the structure of pharmaceutical supply chains. Information asymmetry in the pharmaceutical sector has an effect on welfare, sustainability, and health. (1) Background: In this respect, we wanted to...
Article
Full-text available
The potato plant is amongst the most significant vegetable crops farmed worldwide. The output of potato crop production is significantly reduced by various leaf diseases, which poses a danger to the world’s agricultural production in terms of both volume and quality. The two most destructive foliar infections for potato plants are early and late bl...
Article
Full-text available
Currently, malware attacks pose a high risk to compromise the security of Android-IoT apps. These threats have the potential to steal critical information, causing economic, social, and financial harm. Because of their constant availability on the network, Android apps are easily attacked by URL-based traffic. In this paper, an Android malware clas...
Article
Full-text available
Automotive industry experiences multiple injuries in our everyday life. The increasing road accident rate is due to driver drowsiness, such as fatigue and insomnia. This research is intended primarily to diagnose exhaustion and drowsiness, utilizing the deep learning models like convolution neural network. A research project has been initiated in t...
Article
Full-text available
Population size has made disease monitoring a major concern in the healthcare system, due to which auto-detection has become a top priority. Intelligent disease detection frameworks enable doctors to recognize illnesses, provide stable and accurate results, and lower mortality rates. An acute and severe disease known as Coronavirus (COVID19) has su...
Article
Malicious attacks to software applications are on the rise as more people use Internet of things (IoT) devices and high-speed internet. When a software system crash happens caused by malicious action, a malware imaging method can examine the application. In this study, we present a novel malware classification method that captures suspected operati...
Article
Vehicular Ad hoc Network (VANET) provides efficient communication among vehicles (V2V). The communication among all the vehicles complies with the on-demand, which contains a secure and trustable mechanism to ensure trustable communication. The modification in the communication information may result in falsified information. Secure data is very im...
Article
Full-text available
Pirated application developers find an alternate way to publish pirated versions of the same Android mobile applications (apps) on different Android markets. Therefore, a centralized, automated scrutiny system among multiple app stores is inevitable to prevent publishing pirated or cloned version of these Android applications. In this paper, we pro...
Article
With the swift growth of mobile devices in a wireless Internet of Things (IoT) network, mobility management in IP networks has attracted significant research interest due to certain issues with the frequent motion of Mobile Nodes (MNs) participating in the handover process. Hierarchical Mobile IPv6 (HMIPv6) is one of the protocols proposed to accom...
Article
Objective Epilepsy affected patient experiences more than one frequency seizures which can not be treated with medication or surgical procedures in 30% of the cases. Therefore, an early prediction of these seizures is inevitable for these cases to control them with therapeutic interventions. Methods In recent years, researchers have proposed multi...
Article
Full-text available
Managing the integrity of products and processes in a multi-stakeholder supply chain environment is a significant challenge. Many current solutions suffer from data fragmentation, lack of reliable provenance, and diverse protocol regulations across multiple distributions and processes. Amongst other solutions, Blockchain has emerged as a leading te...
Article
Full-text available
Restricted abilities of mobile devices in terms of storage, computation, time, energy supply, and transmission causes issues related to energy optimization and time management while processing tasks on mobile phones. This issue pertains to multifarious mobile device-related dimensions, including mobile cloud computing, fog computing, and edge compu...
Article
In today's smart world, the privacy protection of data is an important issue. Data is distributed, reproduced, and disclosed with extensive use of communication technologies. Many non-traditional challenges arise with the rapid increase of IoT devices for system design and implementation. However, security and privacy are the main issues in IoT. Wi...
Article
Full-text available
In any business network for record transactions, validation, and track assets, we have used a Blockchain platform, which is shared a distributed ledger that used cryptography techniques. Globally, there are different rules and operating procedures in the supply chain network. These regulations are used for end-to-end tracking between industries of...
Article
The act of source code plagiarism is an academic offense that discourages the learning habits of students. Online support is available through which students can hire professional developers to code their regular programming tasks. These facilities make it easier for students to practice plagiarism. First, raw source codes are cleaned from noisy da...
Article
Full-text available
In the last couple of years, academia-industry collaboration has demonstrated rapid advancements in the development of self-driving vehicles. Since it is evident that self-driving vehicles are going to reshape the traditional transportation systems in near future through enhancement in safe and smart mobility, motion control in self-driving vehicle...
Article
Source Code Authorship Attribution (SCAA) is a direct challenge to the privacy and anonymity of developers. However, it is important to recognize the malicious authors and the origin of the attack. In this paper, we proposed Source Code Authorship Attribution using Abstract Syntax Tree (SCAA-AST) for efficient classification of programmers. First,...
Article
Full-text available
In wireless sensor and IoT networks dedicated to smart-cities, a leader node performs critical tasks such as generating encryption/decryption keys. In this paper, the leader is the node situated at the extreme left of the network. It is the node which starts the algorithm of searching the boundary nodes. These nodes will be used to monitor any sens...
Article
The articles in this special issue have solicited high-quality manuscripts that describe in-depth the breadth of real-world blockchain-based multi-disciplinary IIoT deployments and present actual experiences in resolving contextual blockchain-related challenges. In addition, these articles develop and share best practices, vision realizations and l...
Article
Full-text available
The growing volume of traffic generates the ultimate challenge on the research for traffic control. Vehicle automation is getting closer to reality due to the massive mobile communication capacity provided by fifth‐generation (5G) wireless sensor networks (WSNs). Nowadays, manually controlling and monitoring vehicles at traffic rush hours is becomi...
Article
Full-text available
The multimedia-based e-Learning methodology provides virtual classrooms to students. The teacher uploads learning materials, programming assignments and quizzes on university’ Learning Management System (LMS). The students learn lessons from uploaded videos and then solve the given programming tasks and quizzes. The source code plagiarism is a seri...
Article
Full-text available
The Software Defined Network (SDN) is merged in the Internet of Things (IoT) to interconnect large and complex networks. It is used in the education system to interconnect students and teacher by heterogenous IoT devices. In this paper, the SDN-based IoT model for students’ Interaction is proposed which interconnects students to a teacher in a smar...
Article
Full-text available
Due to recent development in technology, the complexity of multimedia is significantly increased and the retrieval of similar multimedia content is an open research problem. In the service of multimedia service, the requirement of Multimedia Indexing Technology is increasing to retrieve and search for interesting data from huge Internet. Since the...
Article
Full-text available
Software Defined Network (SDN) brought revolution in the network field with the partnership of Academia and Industry. SDN bridges the gap to overcome issues of IoT deployment, optimization and better utilization of network resources. The escalation in resource congestion in Wireless Sensor Networks (WSNs) can usually lead to scalability, data compu...
Chapter
Network layer functionalists are of core importance in the communication process and so the routing with energy aware trait is indispensable for improved network performance and increased network lifetime. Designing of protocol at this under discussion layer must consider the aforementioned factors especially for energy aware routing process. In wi...
Article
Full-text available
Deep learning (DL) has emerged as a key application exploiting the increasing computational power in systems such as GPUs, multicore processors, Systems-on-Chip (SoC), and distributed clusters. It has also attracted much attention in discovering correlation patterns in data in an unsupervised manner and has been applied in various domains including...
Article
As networks have continued to gain popularity throughout the 1980s and well into today, communication technologies have taken a critical number of major t wists and turns, with a wide variety of wireless technologies, protocols, services, and configurations developed and deployed. There have been murmurs of network functions virtualization and soft...
Article
Full-text available
Video services are becoming more pervasive due to the swift development of next-generation intelligent communications and network systems. With the growth of these types of services, the numbers of users are increasing at an exponential rate, and numbers of devices are being used for it, e.g., wearable equipment, smartphones, tablets, personal comp...
Article
Rear end collisions are deadliest in nature and result in life losses and severe injuries. Many of the proposed rear-end collision avoidance schemes focus only on specific aspects without considering several non-direct factors, such as driver inattention or distraction, tailgating, panic stops, street surface circumstances, driver response time, pe...
Article
Full-text available
Anomalies in cardiac functionality can be fatal. Early detection of these anomalies, and in many cases their precursors, can save lives. The probability of the occurrence of these anomalies is extremely among people with a pre-diagnosed heart condition. In this research, we discovered that much remote Electrocardiography (ECG) monitoring systems do...
Article
Full-text available
Source Code Authorship Attribution (SCAA) is to find the real author of source code in a corpus. Though, it is a privacy threat to open-source programmers, but, it may be significantly helpful to develop forensic based applications. Such as, ghostwriting detection, copyright dispute settlements, and other code analysis applications. The efficient f...
Article
Full-text available
The IoT (Internet of Things) connect systems, applications, data storage, and services that may be a new gateway for cyber-attacks as they constantly offer services in the organization. Currently, software piracy and malware attacks are high risks to compromise the security of IoT. These threats may steal important information that causes economic...
Article
Full-text available
The IoT (Internet of Things) connect systems, applications, data storage, and services that may be a new gateway for cyber-attacks as they constantly offer services in the organization. Currently, software piracy and malware attacks are high risks to compromise the security of IoT. These threats may steal important information that causes economic...
Article
Full-text available
With the widespread usage of the Internet, retailers moved enormously towards e-commerce. To get success in e-commerce, retailers must consider the liking and disliking of consumers in their website designs. Because of the easy availability of numerous online shopping websites, consumers are now choosy and selective in using these websites. It is i...
Conference Paper
Full-text available
Blockchain is attracting attention from academia and Industry as well due to its amalgamation of various characteristics; cryptography, public key infrastructure, and economic modeling, that is applied to peer-to-peer networking and decentralized consensus to achieve distributed database synchronization. Among other applications of Blockchain, secu...
Conference Paper
User Experience (UX) deals with the user's emotions and all the aspects of the end user's interaction with the system. It plays a vital role in enhancing user satisfaction by improving usability. Similarly, the effective user interface of the gaming environment can be designed by considering aspects of User Experience (UX). The primary objective of...
Article
Full-text available
Abstract With the evolution of fog computing, processing takes place locally in a virtual platform rather than in a centralized cloud server. Fog computing combined with cloud computing is more efficient as fog computing alone does not serve the purpose. Inefficient resource management and load balancing leads to degradation in quality of service a...
Article
Full-text available
Abstract Edge-of-Things (EoT) emerged as a novel computing and storage paradigm to overcome the limitations of IoT-cloud environment by providing cloud-like services at edge of the network. EoT offers a vast area for research and development as the invention has laid out great opportunities to experiment the possibilities for handling large data se...
Article
Social Internet of Things (SIoT) is an interdisciplinary emerging domain that enables autonomous interaction among social networking and Internet of Things. It provides an unprecedented opportunity to offer new applications and services. However, such an integration brings forth new issues and challenges. In this editorial, we briefly describe the...
Article
Vehicular networks are continually gaining popularity, owing to the evolution of the Internet of things, by means of rapid communication in IP-based networks. Vehicles are being fitted with sensory devices to gain inputs from the external environment for information processing. Numerous applications of vehicular networks depend on the use of commun...
Article
Full-text available
Face recognition, expression identification, age determination, racial binding and gender classification are common examples of image processing computerization. Gender classification is very straightforward for us like we can tell by the person’s hair, nose, eyes, mouth and skin whether that person is a male or female with a relatively high degree...