
Wazir Zada Khan- Doctor of Philosophy
- Professor (Full) at University of Wah
Wazir Zada Khan
- Doctor of Philosophy
- Professor (Full) at University of Wah
About
137
Publications
150,120
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,809
Citations
Introduction
Wazir Zada Khan is currently with Department of Computer Science, University of Wah, Wah Cantt, Pakistan. He received his PhD from Electrical and Electronic Engineering Department, Universiti Teknologi PETRONAS, Malaysia and MS in Computer Science from Comsats Institute of Information Technology (CIIT), Pakistan. His research interests includes Wireless Sensor Networks, Network Security, Internet of Things and Autonomous Vehicles.
Current institution
Additional affiliations
August 2015 - present
June 2012 - August 2015
Publications
Publications (137)
Mobile phone sensing is an emerging area of interest for researchers as smart phones are becoming the core communication device in people's everyday lives. Sensor enabled mobile phones or smart phones are hovering to be at the center of a next revolution in social networks, green applications, global environmental monitoring, personal and community...
If stolen, personal information collected from consumers by smart consumer devices connected to the Internet of Things (IoT) can cause enormous harm. That's why the success and wide adoption of IoT devices will rely heavily on gaining the trust of consumers. In this article, we offer a definition of consumer trust as it relates to IoT technology, a...
In recent years, the Edge computing paradigm has gained considerable popularity in academic and industrial circles. It serves as a key enabler for many future technologies like 5G, Internet of Things (IoT), augmented reality and vehicle-to-vehicle communications by connecting cloud computing facilities and services to the end users. The Edge comput...
Consumer Electronics Internet of Things (CEIoT) products, implemented with improper security measures and inadequate privacy-preserving mechanisms, let the hackers or intruders to access and misuse consumer’s personal information. In this paper, we present a framework and perspective to study and address Internet of Things (IoT) consumer’s security...
Melanoma is a lethal type of skin cancer that has become very common due to its high metastatic rate. Therefore, accurate and timely diagnosis plays a vital role in a patient’s effective treatment and recovery. Melanoma dermoscopic images provide a detailed analysis of pigmented lesions. Traditional manual segmentation by dermatologists has limitat...
This research aimed to promote the electronic evaluation tools to tackle the pandemic implications (corona, COVID-19) and analyze the attitude and academic acceptance at the level of the female student's in the department of computer science-faculty of computer science and information technology at Jazan University, Saudi Arabia. The student's atti...
The prevalence of brain tumor disorders is currently a global issue. In general, radiography, which includes a
large number of images, is an efficient method for diagnosing these life-threatening disorders. The biggest issue
in this area is that it takes a radiologist a long time and is physically strenuous to look at all the images. As a
result, r...
Autonomous Vehicles (AVs) and driverless cars which are equipped with communication capabilities, advanced sensing, and Intelligent Control Systems (ICS), aim to modernize the transportation system. It increases user satisfaction by enhancing personal safety, reducing infrastructure costs, decreasing environmental interruption, and saving time for...
The COVID-19 pandemic has led to increased use of online resources in educational institutions, making e-learning a necessity. This study aimed to investigate how students from four colleges at Jazan University in Saudi Arabia perceived and accepted e-learning and e-evaluation. Methods: 236 students participated in a cross-sectional study conducted...
Internet of Things (IoT) vision has astoundingly transcended environmental sensing with integrated computing systems and smart devices, providing seamless connectivity among humans, machines, and their environment to cooperate for convenience and economical benefits. Apart from all the tremendous benefits of IoT, this paradigm still suffers from ch...
Online learning and technology acceptance has become a highly significant subject in the field of information technology. The challenges of eLearning acceptance and adoption in higher education are complex and multifaceted: it is important to carefully consider the environmental, social, and economic implications of eLearning implementation and to...
The goal of gait recognition is to identify a person from a distance based on their walking style using a visual camera. However, the covariates such as a walk with carrying a bag and a change in clothes impact the recognition accuracy. This paper proposed a framework for human gait recognition based on deep learning and Bayesian optimization. The...
In the last few years, artificial intelligence has shown a lot of promise in the medical domain for the diagnosis and classification of human infections. Several computerized techniques based on artificial intelligence (AI) have been introduced in the literature for gastrointestinal (GIT) diseases such as ulcer, bleeding, polyp, and a few others. M...
The COVID-19 pandemic has led to increased use of online resources in educational institutions, making e-learning a necessity. This study aimed to investigate how students from four colleges at Jazan University in Saudi Arabia perceived and accepted e-learning and e-evaluation. Methods: 236 students participated in a cross-sectional study conducted...
p>Classical blockchain cryptographic primitives are susceptible to quantum computing technology due to its unprecedented growth because it has the potential to make current blockchain encryption techniques obsolete against quantum attacks. Shor algorithm can perform transactional hijacking and forge digital signatures to impersonate blockchain user...
p>Classical blockchain cryptographic primitives are susceptible to quantum computing technology due to its unprecedented growth because it has the potential to make current blockchain encryption techniques obsolete against quantum attacks. Shor algorithm can perform transactional hijacking and forge digital signatures to impersonate blockchain user...
p>Internet of Everything (IoE) connects billions of people, devices, objects and things to the Internet for autonomous services provisioning. IoE benefits from the value created by the compound impacts of connecting people, processes, things, and data. The interoperability among heterogeneous components facilitates seamless communication exchange f...
p>Internet of Everything (IoE) connects billions of people, devices, objects and things to the Internet for autonomous services provisioning. IoE benefits from the value created by the compound impacts of connecting people, processes, things, and data. The interoperability among heterogeneous components facilitates seamless communication exchange f...
A common practice among programmers is to reuse existing code, accomplished by performing natural language queries through search engines. The main aim of code retrieval is to search for the most relevant snippet from a corpus of code snippets but unfortunately, code retrieval frameworks for low resource languages are insufficient. Retrieving the m...
The Holy Quran and Hadith are the two main sources of legislation and guidelines for Muslims to shape their lives. The daily activities, sayings, and deeds of the Holy Prophet Muhammad (PBUH) are called Hadiths. Hadiths are the optimal practical descriptions of the Holy Quran. Technological advancements of information and communication technologies...
In this paper, we propose an agent-based approach for the evaluation of Multiple Unmanned Autonomous Vehicle (MUAV) wildfire monitoring systems for remote and hard-to-reach areas. Emerging environmental factors are causing a higher number of wildfires and keeping these fires in check is becoming a global challenge. MUAV deployment for the monitorin...
Internet of Things (IoT) vision has astoundingly transcended the environmental sensing with integrated computing systems and smart devices, providing seamless connectivity among humans, machines and their environment to cooperate for convenience and economical benefits. Apart from all the tremendous benefits of IoT, this paradigm still suffers from...
Internet of Things (IoT) vision has astoundingly transcended the environmental sensing with integrated computing systems and smart devices, providing seamless connectivity among humans, machines and their environment to cooperate for convenience and economical benefits. Apart from all the tremendous benefits of IoT, this paradigm still suffers from...
Traditional methods for behavior detection of distracted drivers are not capable of capturing driver behavior features related to complex temporal features. With the goal to improve transportation safety and to reduce fatal accidents on roads, this research article presents a Hybrid Scheme for the Detection of Distracted Driving called HSDDD. This...
In this work, we have highlighted the recent developments on Fake news detection.
In this work, we have highlighted the recent developments on Fake news detection.
Cardiac diseases constitute a major root of global mortality and they are likely to persist. Electrocardiogram (ECG) is widely opted in clinics to detect countless heart illnesses. Numerous artifacts interfere with the ECG signal, and their elimination is vital to allow medical specialists to acquire valuable statistics from the ECG. The utmost art...
Coronavirus (COVID-19) is an ecumenical pandemic that has affected the whole world drastically by raising a global calamitous situation. Due to this pernicious disease, millions of people have lost their lives. The scientists are still far from knowing how to tackle the coronavirus due to its multiple mutations found around the globe. Standard test...
Fake news is a major threat to democracy (e.g., influencing public opinion), and its impact cannot be understated particularly in our current socially and digitally connected society. Researchers from different disciplines (e.g., computer science, political science, information science, and linguistics) have also studied the dissemination, detectio...
The characterization of aircraft in remote sensing satellite imagery has many armed and civil applications. For civil purposes, such as in tragedy and emergency aircraft searching, airport scrutiny and aircraft identification from satellite images are very important. This study presents an automated methodology based on handcrafted and deep convolu...
Relational databases are still important in modern times due to their many advantages, such as ease of interaction, simplicity and data integrity. In this regard, structured query language (SQL) and technical knowledge about database schemas are the basic building blocks for retrieving information from relational databases. Generally, non-expert us...
Social networks have become an important venue to express the feelings of their users on a large scale. People are intuitive to use social networks to express their feelings, discuss ideas, and invite folks to take suggestions. Every social media user has a circle of friends. The suggestions of these friends are considered important contributions....
Blockchain is considered a distributed ledger that can transact securely and trustfully without involving any third party. It has caused a lot of interest in various sectors, like government, finance, banking, etc. Blockchain technology is suitable for areas where multiple data storage and transaction types generally require the third party to auth...
Public Acceptance is a prerequisite forgaining the intended benefits of Connected and Au-tonomous Vehicles (CAVs). This paper proposes anidea of digital labels for CAVs so as to increaseconsumers trust and awareness regarding the se-curity level of their vehicle. We come up with anarchitecture named Cybersecurity Box (CSBox) inwhich digital labels...
Enterprise Resource Planning (ERP) software is extensively used for the management of business processes. ERP offers a system of integrated applications with a shared central database. Storing all business-critical information in a central place raises various issues such as data integrity assurance and a single point of failure, which makes the da...
Peer-to-peer (P2P) computing involves exchanging resources and files by computers connected through a network rather than a central server. In P2P, over mobile ad hoc networks (MANETs), the fundamental necessity is the linkage of the overlay participating peers (OPPs) for the efficient operation of the DHT-based P2P overlay protocol over MANETs. Th...
The progression of Internet of Things (IoT) has resulted in generation of huge amount of data. Effective handling and analysis of such big volumes of data proposes a crucial challenge. Existing cloud-based frameworks of Big Data visualization are rising costs for servers, equipment, and energy consumption. There is a need for a green solution targe...
Due to the inability of the Global Positioning System (GPS) signals to penetrate through surfaces like roofs, walls, and other objects in indoor environments, numerous alternative methods for user positioning have been presented. Amongst those, the Wi-Fi fingerprinting method has gained considerable interest in Indoor Positioning Systems (IPS) as t...
Coronavirus (COVID-19) is an ecumenical pandemic that has affected the whole world drastically by raising a global calamitous situation. Due to this pernicious disease, millions of people have lost their lives. The scientists are still far from knowing how to tackle the coronavirus due to its multiple mutations found around the globe. Standard test...
This research aimed to promote the electronic evaluation tools to tackle the pandemic implications (corona, COVID-19) and analyze the attitude and their academic acceptance at the level of the female student's in the department of computer science-faculty of computer science and information technology at Jazan University, Saudi Arabia. The students...
In the next few years, smart farming will reach each and every nook of the world. The prospects of using unmanned aerial vehicles (UAV) for smart farming are immense. However, the cost and the ease in controlling UAVs for smart farming might play an important role for motivating farmers to use UAVs in farming. Mostly, UAVs are controlled by remote...
Due to recent advances in wireless gadgets and mobile computing, the location-based services have attracted the attention of computing and telecommunication industries to launch location-based fast and accurate localization systems for tracking, monitoring and navigation. Traditional lateration-based techniques have limitations, such as localizatio...
With the advent and advancements in the wireless technologies, Wi-Fi fingerprinting-based Indoor Positioning System (IPS) has become one of the most promising solutions for localization in indoor environments. Unlike the outdoor environment, the lack of line-of-sight propagation in an indoor environment keeps the interest of the researchers to deve...
The rapid deployment of Electric Vehicles (EVs) and the integration of renewable energy sources have ameliorated the existing power systems and contributed to the development of greener smart communities. However, load balancing problems, security threats, privacy leakage issues, etc., remain unresolved. Many blockchain-based approaches have been u...
There are numerous channels available such as social media, blogs, websites, etc., through which people can easily access the news. It is due to the availability of these platforms that the dissemination of fake news has become easier. Anyone using these platforms can create and share fake news content based on personal or professional motives. To...
Social Internet of Things (SIoT) is an extension of the Internet of Things (IoT) that converges with social networking concepts to create social networks of interconnected smart objects. This convergence allows the enrichment of the two paradigms, resulting into new ecosystems. While IoT follows two interaction paradigms, human to human (H2H) and t...
Stroke is enlisted as one of the leading causes of death and serious disability affecting millions of human lives across the world with high possibilities of becoming an epidemic in the next few decades. Timely detection and prompt decision making pertinent to this disease, plays a major role which can reduce chances of brain death, paralysis and o...
The land registry system is one of the very important department in any governance system that stores the records of land ownership. There are various issues and loopholes in the existing system that give rise to corruption and disputes. This requires a significant chunk of valuable government resources from judiciary and law enforcement agencies i...
Security threat is a crucial issue in cognitive radio network (CRN). These threats come from physical layer, data link layer, network layer, transport layer, and application layer. Hence, security system to all layers in CRN has a responsibility to protect the communication between among Secondary User (SU) or to maintain valid detection to the pre...
The rise of blockchain technology within a few years has attracted researchers across the world. The prime reason for worldwide attention is undoubtedly due to its feature of immutability along with the decentralized approach of data protection. As this technology is progressing, lots of developments in terms of identifying new applications, blockc...
Multi-microgrid (MMG) system is a new method that concurrently incorporates different types of distributed energy resources, energy storage systems and demand responses to provide reliable and independent electricity for the community. However, MMG system faces the problems of management, real-time economic operations and controls. Therefore, this...
In the next few years, smart farming will reach each and every nook of the world. The prospects of using unmanned aerial vehicles (UAV) for smart farming are immense. However, the cost and the ease in controlling UAVs for smart farming might play an important role for motivating farmers to use UAVs in farming. Mostly, UAVs are controlled by remote...
Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-19 pandemic is no exception. For example, social distancing measures have resulted in travel bans, lockdowns, and stay-at-home orders, consequently increasing the reliance on information and communications technologies, such as Zoom. Cybercriminals have also a...
In the competing era of online industries, understanding customer feedback and satisfaction is one of the important concern for any business organization. The well‐known social media platforms like Twitter are a place where customers share their feedbacks. Analyzing customer feedback is beneficial, as it provides an advantage way of unveiling custo...
Human drivers have different driving styles, experiences, and emotions due to unique driving characteristics, exhibiting their own driving behaviors and habits. Various research efforts have approached the problem of detecting abnormal human driver behavior with the aid of capturing and analyzing the face of driver and vehicle dynamics via image an...
The inefficient disposal of industrial waste causes water and soil pollution; thus, to protect the health of different ecosystems, industrial wastewater management is essential. Wastewater treatment's aim is to clean and protect water and to extract pollutants and remove toxicants before the remaining water is discharged into the environment. Curre...
In the last few decades, there is a massive increase in population and hence increase in societal development. Concerning environmental change as a result of development in society and the economy, the marine environment plays a significant role in global climatic change. Hence recent Information and Communication Technologists are attracted toward...
The recent state of the art innovations in technology enables the development of low-cost sensor nodes with processing and communication capabilities. The unique characteristics of these low-cost sensor nodes such as limited resources in terms of processing, memory, battery, and lack of tamper resistance hardware make them susceptible to clone node...
Android OS is the most popular mobile OS for the past few years. Vulnerabilities arise
with respect to the increasing functionality of Android OS, impolitic app development
practices of developers, end-user incautious and interestingly remediation for the
vulnerabilities has been introduced frequently as well. To mitigate security risk factor
Googl...
In recent years, unprecedented work has been done in the area of smart cities. The purpose of developing smart cities is to enhance quality of life factors for people dwelling within them. To achieve that purpose, technologies such as IoT and cloud computing have been utilized. Blockchain technology is also among the promising technologies that can...
Fake news, particularly with the speed and reach of unverified/false information dissemination, is a troubling trend with potential political and societal consequences, as evidenced in the 2016 United States presidential election, the ongoing COVID-19 pandemic, and the ongoing protests. To mitigate such threats, a broad range of approaches have bee...
The adoption of emerging technological trends and applications of the Internet of Things (IoT) in the industrial systems is leading towards the development of Industrial IoT (IIoT). IIoT serves as a new vision of IoT in the industrial sector by automating smart objects for sensing, collecting, processing and communicating the real-time events in in...
Industrial Internet of Things (IIoT) has enabled the oil and gas industry to reap potential benefits such as improved efficiency, lower operating costs, and higher productivity. However, due to the elevated connectivity, the oil and gas industry is now at higher risk by becoming a significant target for cyberattacks. The three sectors of oil and ga...
Smart City is an application of the Internet of Things (IoT) with the aim of managing cities without human intervention. Each IoT device that is producing data may sense a sensitive one that should not be disclosed unintentionally. Due to the existence of a large number of devices in the near future, the possibility of information leakage, privacy...
String matching has been an extensively studied research domain in the past two decades due to its various applications in the fields of text, image, signal, and speech processing. As a result, choosing an appropriate string matching algorithm for current applications and addressing challenges is difficult. Understanding different string matching a...
The significant part of smart grid is to make smart grid cost-efficient by predicting electricity price and load. To improve the prediction performance we proposed an Efficient Convolutional Neural Network (ECNN) and Efficient K-nearest Neighbour (EKNN) in which the parameters are tuned. It may be difficult to deal with huge amount of load data tha...
One of the key issues in the Smart Grid (SG) is accurate electric load forecasting. Energy generation and consumption have highly varying. Accurate forecasting of electric load can decrease the fluctuating behavior between energy generation and consumption. By knowing the upcoming electricity load consumption, we can control the extra energy genera...
Due to the limited availability of battery power of the acoustic node, an efficient utilization is desired. Additionally, the aquatic environment is harsh; therefore, the battery cannot be replaced, which leaves the network prone to sudden failures. Thus, an efficient node battery dissipation is required to prolong the network lifespan and optimize...
The Internet of Things (IoTs) is an evolving new face of technology that provides state of the art services using ubiquitously connected smart objects. These smart objects are capable of sensing, processing, collaborating, communicating the events and provide services. The IoT is a collection of heterogeneous technologies like Sensor, RFID, Communi...
The industrial world of oil and gas involves critical processes and machinery for the exploration, extraction, refining, transporting and marketing petroleum products. Oil and gas companies need to control, monitor, maintain and secure the processes and industrial assets in an efficient manner. To resolve the critical challenges of pipeline conditi...
Malicious user is internal attacker that disturb
communication. In case of cognitive radio, malicious user attacks
primary signal detection and influences the fidelity of sensing
outcome. This paper studies malicious user attack and its impacts
to sensing outcome in cognitive radio network (CRN). We
consider a number of malicious user that emulate...
Signal detection in cognitive radio network (CRN) is influenced by several factors. One of them is malicious user that emulate primary user (PU) signal. Emulation of PU signal causes detection error. This paper investigates the impact of malicious user attack to PU signal detection. A number of malicious users are randomly deployed around secondary...
Questions
Question (1)
How can we apply Differential Privacy to real time data for privacy preserving?