Asif Ali Wagan
YOU?
Author Swipe
View article: An efficient LSTM based cross domain aspect based sentiment analysis (CD-ABSA)
An efficient LSTM based cross domain aspect based sentiment analysis (CD-ABSA) Open
This research study focuses the cross-domain aspect-based sentiment analysis (CD-ABSA) for existing source domain annotation data. The CD-ABSA tries to use the valuable information in a source domain to extract aspect terms and evaluate th…
View article: Rewarding Developers by Storing Applications on Non-Fungible Tokens
Rewarding Developers by Storing Applications on Non-Fungible Tokens Open
Non-fungible tokens (NFTs) are individual tokens with valuable information stored inside them over blockchain technology. They can be purchased and sold like other physical and virtual art pieces because their worth is mostly determined by…
View article: Artificial Intelligence-Enabled Game-Based Learning and Quality of Experience: A Novel and Secure Framework (B-AIQoE)
Artificial Intelligence-Enabled Game-Based Learning and Quality of Experience: A Novel and Secure Framework (B-AIQoE) Open
Game-based learning in schools and colleges, with the help of AI-enabled augmented intelligence techniques, is reported to improve children’s neurodevelopment, intellectual sensing, and specific learning abilities, according to US official…
View article: What You Should Know About Next Generation 6G Mobile Technology
What You Should Know About Next Generation 6G Mobile Technology Open
The fifth generation (5G) mobile communication technology though, is being deployed in various parts of the world to improve the wireless systems in terms of infrastructure and quality of services, in view of mobile communication history, …
View article: BIoMT: A State-of-the-Art Consortium Serverless Network Architecture for Healthcare System Using Blockchain Smart Contracts
BIoMT: A State-of-the-Art Consortium Serverless Network Architecture for Healthcare System Using Blockchain Smart Contracts Open
Owing to the sensitive nature of healthcare data, the aforementioned approach to transferring patient data to central servers creates serious security and privacy issues. In addition, blockchain distributed ledger technology has introduced…
View article: BIoMT Modular Infrastructure: The Recent Challenges, Issues, and Limitations in Blockchain Hyperledger‐Enabled E‐Healthcare Application
BIoMT Modular Infrastructure: The Recent Challenges, Issues, and Limitations in Blockchain Hyperledger‐Enabled E‐Healthcare Application Open
This paper presents a layered hierarchy that depicts the progressive relationship between data, information, knowledge, and wisdom. To begin with, data is gathered and organized into information. Information is gathered, filtered, refined,…
View article: Ontology-Based Transformation and Verification of UML/OCL Constraints
Ontology-Based Transformation and Verification of UML/OCL Constraints Open
In Software Engineering (SE), the graphical models specify the system's architecture, connection, and characteristics. New SE methods such as MDA utilize graphical models as a nucleus of all development activities. This paper presents the …
View article: Blockchain-Aware Distributed Dynamic Monitoring: A Smart Contract for Fog-Based Drone Management in Land Surface Changes
Blockchain-Aware Distributed Dynamic Monitoring: A Smart Contract for Fog-Based Drone Management in Land Surface Changes Open
In this paper, we propose a secure blockchain-aware framework for distributed data management and monitoring. Indeed, images-based data are captured through drones and transmitted to the fog nodes. The main objective here is to enable proc…
View article: EPS-Ledger: Blockchain Hyperledger Sawtooth-Enabled Distributed Power Systems Chain of Operation and Control Node Privacy and Security
EPS-Ledger: Blockchain Hyperledger Sawtooth-Enabled Distributed Power Systems Chain of Operation and Control Node Privacy and Security Open
A distributed power system operation and control node privacy and security are attractive research questions that deliver electrical energy systems to the participating stakeholders without being physically connected to the grid system. Th…
View article: Students’ Class Performance Prediction Using Machine Learning Classifiers
Students’ Class Performance Prediction Using Machine Learning Classifiers Open
Nowadays, educational data mining is being employed as assessing tool for study and analysis of hidden patterns in academic databases which can be used to predict student’s academic performance. This paper implements various machine learni…
View article: Impact of Occupational Health & Safety Management on Risk Existing At Construction Sites of Karachi
Impact of Occupational Health & Safety Management on Risk Existing At Construction Sites of Karachi Open
The assessment of OHSM is the mostcrucial element in a Pakistani construction industry. In Pakistan, the industryrelated to the constructionis the biggest industry as compared to another industry and it is considered as the industry contai…
View article: More Than Two Decades of Research on Verification of UML Class Models: A Systematic Literature Review
More Than Two Decades of Research on Verification of UML Class Models: A Systematic Literature Review Open
Error checking is easy and inexpensive in the initial stages as compared to later stages due to when the development cycle precedes the development cost and efforts also increase. UML class model is a key element of modern software methodo…
View article: Analysis Of Session Initiation Protocol With VoIP In Multimedia Conferencing System
Analysis Of Session Initiation Protocol With VoIP In Multimedia Conferencing System Open
Today various applications like Command line client (OH phone, SIP), Video conferencing server (MCU), SIP answering machine, gatekeeper and gateways, Gnome Meeting.Session Initiation Protocol (SIP) is a multimedia conferencing protocol sta…
View article: Design and Develop CMS for Sindhi E-News Papers
Design and Develop CMS for Sindhi E-News Papers Open
Objective: To design and Develop CMS for Sindhi e-newspaper by using the searching techniques. Methods/analysis: Existing e-newspapers are not implementing any CMS with searching techniques. The research methodology is supposed to b experi…
View article: Multipath Mobile Internet Protocol for Mobility Networks
Multipath Mobile Internet Protocol for Mobility Networks Open
The internet data traffic is rapidly increases by twofold or even more in the near future. Most of the data traffic are generated from mobile devices. Due to this explosion of data traffic, existing network architecture is incapable in han…
View article: RETRACTED: An Efficient Algorithm for Image De-noising by using Adaptive Modified Decision Based Median Filters [EAI Endorsed Scal Inf Syst (2022), Online First]
RETRACTED: An Efficient Algorithm for Image De-noising by using Adaptive Modified Decision Based Median Filters [EAI Endorsed Scal Inf Syst (2022), Online First] Open
\nWe, the Publisher, have retracted the following article: Faiz Ullah, Kamlesh Kumar, Mansoor Ahmed Khuhro, Asif Ali Laghari, Asif Ali Wagan, Umair Saeed (2022). An Efficient Algorithm for Image De-noising by using Adaptive Modified Decisi…
View article: Effect of Packet Loss and Reorder on Quality of Audio Streaming
Effect of Packet Loss and Reorder on Quality of Audio Streaming Open
In this paper, Audio QoE assessment experiments were conducted by using network parameters such as packet loss and reorder. The network model was created by using three computers, which includes sender, receiver, and middle between Linux b…
View article: An Efficient Algorithm for Image De-noising by using Adaptive Modified Decision Based Median Filters
An Efficient Algorithm for Image De-noising by using Adaptive Modified Decision Based Median Filters Open
This article has been retracted, and the retraction notice can be found here: http://dx.doi.org/10.4108/eai.8-4-2022.173796. INTRODUCTION: In image processing noise removal is a hot research field. Lots of studies have been carried out and…
View article: Distributed Dynamic Mobility Management Scheme for Network Mobility
Distributed Dynamic Mobility Management Scheme for Network Mobility Open
Various network management research communities have developed mobility management solutions for the Network Mobility Basic Support Protocol (NEMO-BSP) to allow seamless attachment between heterogeneous networks. The mobility management is…