Urooj Akram

Urooj Akram
  • Master of Information Technology
  • Research Assistant at Tun Hussein Onn University of Malaysia

About

20
Publications
14,207
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
223
Citations
Introduction
Skills and Expertise
Current institution
Tun Hussein Onn University of Malaysia
Current position
  • Research Assistant

Publications

Publications (20)
Article
Full-text available
Solar energy, a renewable resource, is essential for the efficiency of solar photovoltaic (PV) panels. However, meteorological factors, such as solar irradiation, weather patterns, precipitation, and overall climate conditions, pose challenges to the seamless integration of energy production into the power grid. Accurate prediction of PV system pow...
Article
Full-text available
Model optimization is a problem of great concern and challenge for developing an image classification model. In image classification, selecting the appropriate hyperparameters can substantially boost the model’s ability to learn intricate patterns and features from complex image data. Hyperparameter optimization helps to prevent overfitting by find...
Article
Full-text available
Pneumonia is a potentially life-threatening infectious disease that is typically diagnosed through physical examinations and diagnostic imaging techniques such as chest X-rays, ultrasounds, or lung biopsies. Accurate diagnosis is crucial as wrong diagnosis, inadequate treatment or lack of treatment can cause serious consequences for patients and ma...
Article
Full-text available
Internet usage is increasing day by day all over the world and as a result, technology is also developing to make daily life appliances as smart as possible. Millions of devices are connected using IoT technology, and the vulnerabilities of these devices are still exploitable by attackers. Having access to IoT devices through a Bot Master allows th...
Article
Full-text available
An Internet of Things (IoT) network is prone to many ways of threatening individuals. IoT sensors are lightweight, lack complicated security protocols, and face threats to privacy and confidentiality. Hackers can attack the IoT network and access personal information and confidential data for blackmailing, and negatively manipulate data. This study...
Article
Full-text available
Twitter has become the foremost standard of social media in today’s world. Over 335 million users are online monthly, and near about 80% are accessing it through their mobiles. Further, Twitter is now supporting 35+ which enhance its usage too much. It facilitates people having different languages. Near about 21% of the total users are from US and...
Chapter
The biggest challenge in Electronic Commerce (E-Commerce) is understanding the demand of the market and customer perception regarding the products of online stores. Online user evaluations are faster than a direct poll for obtaining customers' perceptions. To predict the quality of service provided, sentiment analysis methodology is used, which ide...
Article
Full-text available
The internet provides a very vast amount of sources of news and the user has to search for desirable news by spending a lot of time because the user always prefers their related interest, desirable and informative news. The clustering of the news article having a great impact on the preferences of the user. The unsupervised learning techniques such...
Chapter
Elderly activity detection is one of the major issues in modern civilizations. Due to the increase in workload, people are not able to watch over their elderly ones and leave them into old homes for care and cure. In some countries, most elderly people like to live independently instead of living in old homes, which may leave them alone and helples...
Chapter
Twitter has become the most popular social media in today’s world. More than 284 million users are online monthly, and 80% user accesses their twitter account through mobile. A tweet is limited to 140 characters, so it contains concise information about particulars. Due to its popularity and usage, near about 500 million tweets are sent per day tha...
Chapter
Full-text available
Every year, approximately one million patent documents are issued with unique patent number or symbol. In order to find the relevant patent document, several users query the IPC documents using IPC symbols. So, there is a need of automatic classification and ranking of patent documents w.r.t. user query. Automatic classification is only possible th...
Article
. Every year, approximately one million patent documents are issued with unique patent number or symbol. In order to find the relevant patent document, several users query the IPC documents using IPC symbols. So, there is a need of automatic classification and ranking of patent documents w.r.t. user query. Automatic classification is only possible...
Article
Full-text available
A key scheduling algorithm is the mechanism that generates and schedules all session-keys for the encryption and decryption process. The key space of conventional key schedule algorithm using the 2D hybrid cubes is not enough to resist attacks and could easily be exploited. In this regard, this research proposed a new Key Schedule Algorithm based o...
Article
Full-text available
It is important to predict a time series because many problems that are related to prediction such as health prediction problem, climate change prediction problem and weather prediction problem include a time component. To solve the time series prediction problem various techniques have been developed over many years to enhance the accuracy of fore...
Article
Full-text available
Forecasting natural occurring phenomena has been addressed and analyzed in many domains of science and gets more attention because of its vast range of applications. Traditional time series forecasting tools have some limitations like slow training process, less efficient training methods that effect on performance. Higher Order Neural Network (HON...
Article
Full-text available
Prediction of time series grabs received much attention because of its effect on the vast range of real life applications. This paper presents a survey of time series applications using Higher Order Neural Network (HONN) model. The basic motivation behind using HONN is the ability to expand the input space, to solve complex problems it becomes more...
Article
Full-text available
Cloud computing exhibits a remarkable potential to offer cost-effective and more flexible services on-demand to the customers over the network. It dynamically increases the capabilities of the organization without training new people, investment in new infrastructure or licensing new software. Cloud computing has grown dramatically in the last few...

Network

Cited By