Umar Islam

Umar Islam
  • Ms (computer science)
  • Lecturer at IQRA National University Swat Campus

Ph.D. Scholar Department of Computer Science, University of Malakand (UoM). Additionally, Working as a freelancer.

About

22
Publications
12,507
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
213
Citations
Introduction
I am Umar Islam, currently immersed in the dynamic realm of IoT, AI in IoT, and Cloud Computing. My focus lies in tackling prediction, identification, security, and privacy challenges within these domains. Moreover, my research areas are: AI in Cybersecurity , AI in Healthcare, AI in finance and business data forecasting.
Current institution
IQRA National University Swat Campus
Current position
  • Lecturer

Publications

Publications (22)
Article
Full-text available
Today’s complex world is defined by digital changes in educational paradigms to which E-learning has contributed significantly, and as such, accurate prediction methods are needed for student performance modeling. In this paper a new and complex model is proposed, namely the Hyperdynamic Adaptive Learning Fusion (HALF) model that leverages adaptive...
Preprint
Full-text available
Ultrasound imaging plays an important role in fetal growth and maternal-fetal health evaluation, but due to the complicated anatomy of the fetus and image quality fluctuation, its interpretation is quite challenging. Although deep learning include Convolution Neural Networks (CNNs) have been promising, they have largely been limited to one task or...
Article
Full-text available
Ethereum has emerged as a major platform for decentralized apps and smart contracts with the heightened interest in cryptocurrencies in recent years. Investors and market participants in the cryptocurrency space will find it increasingly important to use reliable price prediction models as Ethereum's popularity grows. To better estimate Ethereum pr...
Article
Full-text available
In the rapidly evolving landscape of modern technology, the convergence of blockchain innovation and machine learning advancements presents unparalleled opportunities to enhance computer forensics. This study introduces SentinelFusion, an ensemble-based machine learning framework designed to bolster secrecy, privacy, and data integrity within block...
Article
Stroke is a severe illness, that requires early stroke detection and intervention, as this would help prevent the worsening of the condition. The research is done to solve stroke prediction problem, which may be divided into a number of sub-problems such as an individual's predisposition to develop stroke. To attain this objective, a multiturn data...
Article
Full-text available
In the realm of medical imaging, the early detection of kidney issues, particularly renal cell hydronephrosis, holds immense importance. Traditionally, the identification of such conditions within ultrasound images has relied on manual analysis, a labor-intensive and error-prone process. However, in recent years, the emergence of deep learning-base...
Article
Full-text available
Over the past few years, there has been a notable surge in the integration of Blockchain technology into supply chain management systems. This integration holds the promise of enhanced transparency, security, and efficiency in monitoring the movement of goods and services. This study presents a novel approach aimed at fortifying privacy and accurac...
Article
Full-text available
In today’s globalized economic landscape, the assurance of economic stability is of paramount importance, necessitating precise financial decision-making and policy formulation. This assurance is significantly augmented by innovative approaches to predicting crude oil prices, particularly in the context of energy stock markets denominated in USD. T...
Article
Full-text available
Memory Denial of Service (M-DoS) attacks refer to a class of cyber-attacks that aim to exhaust the memory resources of a system, rendering it unavailable to legitimate users. This type of attack is particularly dangerous in cloud computing environments, where multiple users share the same resources. Detection and mitigation of M-DoS attacks in real...
Article
Full-text available
In the Internet of Things (IoT) era, the mobile crowd sensing system (MCS) has become increasingly important. The Internet of Things Auto (IOTA) has evolved rapidly in practically every technology field over the last decade. IOTA-based mobile crowd sensing technology is being developed in this study using machine learning to detect and prevent mobi...
Article
Full-text available
As criminal activity increasingly relies on digital devices, the field of digital forensics plays a vital role in identifying and investigating criminals. In this paper, we addressed the problem of anomaly detection in digital forensics data. Our objective was to propose an effective approach for identifying suspicious patterns and activities that...
Article
Full-text available
The Internet of Railways (IoR) network is made up of a variety of sensors, actuators, network layers, and communication systems that work together to build a railway system. The IoR’s success depends on effective communication. A network of railways uses a variety of protocols to share and transmit information amongst each other. Because of the wid...
Article
The Internet of Railways (IoR) network is made up of a variety of sensors, actuators, network layers, and communication systems that work together to build a railway system. The IoR’s success depends on effective communication. A network of railways uses a variety of protocols to share and transmit information amongst each other. Because of the wid...
Article
Full-text available
Cyberattacks can trigger power outages, military equipment problems, and breaches of confidential information, i.e., medical records could be stolen if they get into the wrong hands. Due to the great monetary worth of the data it holds, the banking industry is particularly at risk. As the number of digital footprints of banks grows, so does the att...
Article
Full-text available
Cyberattacks can trigger power outages, military equipment problems, and breaches of confidential information, i.e., medical records could be stolen if they get into the wrong hands. Due to the great monetary worth of the data it holds, the banking industry is particularly at risk. As the number of digital footprints of banks grows, so does the att...
Article
Full-text available
Development and use of IoT devices have grown significantly in recent years. Many departments such as smart homes, smart healthcare, smart sports analysis, and different smart industries use IoT-based devices. In IoT devices, traffic is a very important part. IoT device traffic is distinct from traditional device traffic in various respects. In thi...
Article
Full-text available
In the Internet of Things (IoT) era, the mobile crowd sensing system (MCS) has become increasingly important. The Internet of Things Auto (IOTA) has evolved rapidly in practically every technology field over the last decade. IOTA-based mobile crowd sensing technology is being developed in this study using machine learning to detect and prevent mobi...
Chapter
Full-text available
Daily millions of images are uploaded and download to the web, as a result the data is available in the paperless form in the computer system for organization. Nowadays, with the help of powerful computer software such as Photoshop and Corel Draw, it is very easy to alter the contents of the authenticated image without leaving any clues. This led t...

Questions

Questions (7)
Question
Dear i need a book of "Practical Internet of Things Security"
By Brian Russell, Drew Van Duren.
Please if some one have then kindly share with me.
Question
dear ns3 expert.please help.
Ns3 code is run on ubuntu 14.0 version with free errors output while the same ns3 codes give errors as an output in ubuntu 16.0 + version. is there any issue of version ? or need to correct the ns3 code without changing the ubuntu version?
Question
Hello Dear !
I want to set a Nessi2 simulation environment but there are some problems face to me specially the Back-end of simulation. please anyone help me.
Question
Hello Dears . Can you help me in matlab ? that
How can be create two nodes (Node_1 &  Node_2) and then transfer a packet "P" with attributes User_id, Name, from Node_1 to Node_2. then Node_2 reply back with message "Yes".
Question
Aoa Dears!
If somebody work in NS-2 please help me. i need the implementation of ECC cryptographic protocol in NS-2.
Question
Dear!
Please give me information about the performance analysis of he ECC Encryption and Decryption for a given text data.
Question
example: if Alice has a public key of Bob but Bob has now public key of Alice due to some privacy reasons. So Alice send their public key for every transmission. So my question is that is it a suitable and possible way for key sharing?

Network

Cited By