About
44
Publications
23,661
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
622
Citations
Introduction
Current institution
Publications
Publications (44)
The crowd of smart devices surrounds us all the time. These devices popularize social media platforms (SMP), connecting billions of users. The enhanced functionalities of smart devices generate big data that overutilizes the mainstream network, degrading performance and increasing the overall cost, compromising time-sensitive services. Research ind...
The healthcare industry has been put to test the need to manage enormous amounts of data provided by various sources, which are renowned for providing enormous quantities of heterogeneous information. The data are collected and analyzed with different Data Analytic (DA) and machine learning algorithm approaches. Researchers, scientists, and industr...
Sentiment analysis also referred to as opinion mining, plays a significant role in automating the identification of negative, positive, or neutral sentiments expressed in textual data. The proliferation of social networks, review sites, and blogs has rendered these platforms valuable resources for mining opinions. Sentiment analysis finds applicati...
The Internet of Things (IoT) market is experiencing exponential growth, with projections increasing from 15 billion dollars to an estimated 75 billion dollars by 2025. Quantum computing has emerged as a key enabler for managing the rapid expansion of IoT technology, serving as the foundation for quantum computing support. However, the adoption of q...
The purpose of the healthcare Information System (HIS) is to replace the conventional method of data gathering and organization in hospitals into a modern method of systematic data collection, maintenance and dissemination. There has been an unprecedented rise in the malware and cyber-attacks on HIS recently. Cyber-attacks have become a major crisi...
The rapid spread of the internet over the last two decades has prompted more and more companies to deploy their work internationally. The offshoring strategy enables organizations to cut down costs, boost shareholder value, acquire a competitive advantage, reduce cycle time, increase workforce flexibility, generate revenue and focus on their core b...
Mobile Cloud Computing (MCC) results from the evolution of several Internet-based technologies that allow mobile consumers to gain cloud computing advantages and attain green computing by utilizing their cellphones. MCC's use may be restricted because of increasing energy utilization and restricted access to energy supplies. This challenge may be t...
Deep learning is a rapidly growing research area having state of art achievement in various applications including but not limited to speech recognition, object recognition, machine translation, and image segmentation. In the current modern industrial manufacturing system, Machine Health Surveillance System (MHSS) is achieving increasing popularity...
Datasets with the imbalanced class distribution are difficult to handle with the standard classification algorithms. In supervised learning, dealing with the problem of class imbalance is still considered to be a challenging research problem. Various machine learning techniques are designed to operate on balanced datasets; therefore, the state of t...
A document’s keywords provide high-level descriptions of the content that summarize the document’s central themes, concepts, ideas, or arguments. These descriptive phrases make it easier for algorithms to find relevant information quickly and efficiently. It plays a vital role in document processing, such as indexing, classification, clustering, an...
The coronavirus disease (COVID-19) outbreak, which began in December 2019, has claimed numerous lives and impacted all aspects of human life. COVID-19 was deemed an outbreak by the World Health Organization (WHO) as time passed, putting a tremendous strain on substantially all countries, particularly those with poor health services and delayed reac...
E-Vehicles are used for transportation and, with a vehicle-to-grid optimization approach, they may be used for supplying a backup source of energy for renewable energy sources. Renewable energy sources are integrated to maintain the demand of consumers, mitigate the active and reactive power losses, and maintain the voltage profile. Renewable energ...
To reduce costs and improve organizational efficiency, the adoption of innovative services such as Cloud services is the current trend in today’s highly competitive global business venture. The aim of the study is to guide the software development organization for Cloud-based testing adoption. Therefore, the objective is to develop a two-stage Inte...
Generally, software developers make errors during the distributed software development process; therefore, software testing delay is a significant concern. Some of the software mistakes are minor, but others may be costly or harmful. Since things can still go wrong—individuals encounter mistakes from time to time—there is a need to double-check any...
Deep Learning (DL) techniques as a subfield of data science are getting overwhelming attention mainly because of their ability to understand the underlying pattern of data in making classifications. These techniques require a considerable amount of data to efficiently train the DL models. Generally, when the data size is larger, the DL models perfo...
Breast cancer is a dangerous disease with a high morbidity and mortality rate. One of the most important aspects in breast cancer treatment is getting an accurate diagnosis. Machine-learning (ML) and deep learning techniques can help doctors in making diagnosis decisions. This paper proposed the optimized deep recurrent neural network (RNN) model b...
Cyber-attacks are becoming progressively complicated; hence, the functional issues of intrusion-detection systems (IDSs) present ever-growing challenges. Failing to detect intrusions may jeopardize the trustworthiness of security services, such as privacy preservation, authenticity, and accessibility. To fight these risks, different organizations n...
A wireless body area network (WBAN) is a technology that is widely employed in the medical sector. It is a low-cost network that allows for mobility and variation. It can be used for long-distance, semiautonomous remote monitoring without interfering with people’s regular schedules. Detection devices are embedded in the human body in a simple WBAN...
This research work proposes a new stack-based generalization ensemble model to forecast the number of incidences of conjunctivitis disease. In addition to forecasting the occurrences of conjunctivitis incidences, the proposed model also improves performance by using the ensemble model. Weekly rate of acute Conjunctivitis per 1000 for Hong Kong is c...
Semantic tags can enrich citation graphs by inter-connecting papers with citation reasons. One of the best sources of knowledge to tell the reason for citation is the author himself. Integrating these reasons in an authoring system can help authors to choose a reason while citing. We examined various Human and Automatic authoring systems for integr...
Machine learning has grown in popularity in recent years as a method for evaluating financial text data, with promising results in stock price projection from financial news. Various research has looked at the relationship between news events and stock prices, but there is little evidence on how different sentiments (negative, neutral, and positive...
Breast cancer is one of the leading causes of death in women worldwide-the rapid increase in breast cancer has brought about more accessible diagnosis resources. The ultrasonic breast cancer modality for diagnosis is relatively cost-effective and valuable. Lesion isolation in ultrasonic images is a challenging task due to its robustness and intensi...
The primary goal of this research study, in the field of information technology (IT), is to improve the security and durability of software. A quantum computing-based security algorithm springs quite a lot of symmetrical approaches and procedures to ensure optimum software retreat. The accurate assessment of software’s durability and security is a...
Machine learning (ML) is one of the dominating technologies practiced in both the industrial and academic domains throughout the world. ML algorithms can examine the threats and respond to intrusions and security incidents swiftly in an instinctive way. It plays a critical function in providing a proactive security mechanism in the cybersecurity do...
Security has always been a vital research topic since the birth of web application. A great deal of research has been conducted to determine the ways of identifying and classifying security issues or goals However, in the recent years, it has been noticed that high secure web applications have less durability; thus reducing their business continuit...
COVID-19, being the virus of fear and anxiety, is one of the most recent and emergent of various respiratory disorders. It is similar to the MERS-COV and SARS-COV, the viruses that affected a large population of different countries in the year 2012 and 2002, respectively. Various standard models have been used for COVID-19 epidemic prediction but t...
Underwater wireless sensor networks (UWSNs) gained the attention of researchers due to their substantial applications in various fields. The major application areas of UWSN are environmental monitoring, underwater oil and gas extraction and military surveillance, smart farming, communication, and others. However, UWSNs are also prone to significant...
Considering rising pollution as well as fuel expenses, it has now become critical to transition to a sustainable method of transportation. As a result, automakers have begun to spend on research and development in the electric vehicle (EV) industry. The amount of EVs has expanded rapidly in recent years. This is owing to new improved technology, pa...
Software or web application security is the main objective in the era of Information Technology (IT) and Artificial Intelligence (AI). Distinguishing proof of security at the initial stage produces significant results to comprehend the administration of security relics for best potential outcomes. A security alternative gives several methods and al...
Deep learning is a rapidly growing research area having state of art achievement in various applications including but not limited to speech recognition, object recognition, machine translation, and image segmentation. In the current modern industrial manufacturing system, Machine Health Surveillance System (MHSS) is achieving increasing popularity...
To restrict COVID-19, individuals must remain two meters away from one another in public since public health authorities find this a healthy distance. In this way, the incidence of "social distancing" keeps pace with COVID-19 spread. For this purpose, the proposed solution consists of the development of a tool based on AI technologies which takes a...
Low heart rate causes a risk of death, heart disease, and cardiovascular diseases. Therefore, monitoring the heart rate is critical because of the heart’s function to discover its irregularity to detect the health problems early. Rapid technological advancement (e.g., artificial intelligence and stream processing technologies) allows healthcare sec...
In vehicular ad hoc networks (VANETs), the topology information (TI) is updated frequently due to vehicle mobility. These frequent changes in topology increase the topology maintenance overhead. To reduce the control message overhead, cluster-based routing schemes are proposed. In cluster-based routing schemes, the nodes are divided into different...
The context prediction and especially the location prediction is an important feature for improving the performance of smart systems. Predicting the next location or context of the user make the system proactive, so the system will be capable to offer the suitable services to the user without his involving. In this paper, a new approach will be pre...
The chapter presents current security concerns in the Cloud Computing Environment. The cloud concept and operation raise many concerns for cloud users since they have no control of the arrangements made to protect the services and resources offered. Additionally, it is obvious that many of the cloud service providers will be subject to significant...
Cyber security is one of the most attention seeking issues with the increasing advancement of technology specifically when the network availability is threaten by attacks such as Denial of Service attacks (DoS), Distributed DoS attacks (DDoS), and Economic Denial of Sustainability (EDoS). The loss of the availability and accessibility of cloud serv...
Cybersecurity attacks resulting in loss of availability of cloud services can have significantly higher impact than those in the traditional stand-alone enterprise setups. Therefore, availability attacks, such as Denial of Service attacks (DoS); Distributed DoS attacks (DDoS) and Economical Denial of Sustainability (EDoS) attacks receive increasing...
Denial of Service attack (DoS) forms a permanent risk to the traditional networks and the cloud environment. This malicious attack can be amplified by Distributed Denial of Service (DDoS) attacks. Moreover, the cloud payment model can be affected by such attacks exploiting the cloud scalability. In this case, it is called Economical Denial of Susta...
Distributed Denial of Service (DDoS) attacks can affect the availability of the networks. In the age of cloud computing, these attacks are being more harmful in terms of their common influences and their new effects that harm the cloud sustainability by exploiting its scalability and payment model (pay-as-you-use). Therefore, a new form of DDoS att...
The chapter presents current security concerns in the Cloud Computing Environment. The cloud concept and operation raise many concerns for cloud users since they have no control of the arrangements made to protect the services and resources offered. Additionally, it is obvious that many of the cloud service providers will be subject to significant...
In the cloud era, security has become a renewed source of concerns. Distributed Denial of Service (DDoS) and the Economical Denial of Sustainability (EDoS) that can affect the pay-per-use model, which is one of the most valuable benefits of the cloud, can again become very relevant especially with the introduction of new policies in enterprises suc...