Sajid Shah
YOU?
Author Swipe
View article: Blockchain-based access management framework for interoperable digital twins in industrial IoT
Blockchain-based access management framework for interoperable digital twins in industrial IoT Open
Introduction Digital Twins (DT) have appeared as a significant tool in Industrial Internet of Things (IIoT) environments, allowing real-time monitoring, predictive maintenance, and maximizing device performance. However, integrating DTs wi…
View article: Expression of Immune Checkpoints LAG-3, CTLA-4, TIM-3 and PD-1 in Beta Thalassemia patients Treated using HbF Augmentation Therapy and Regular Transfusions
Expression of Immune Checkpoints LAG-3, CTLA-4, TIM-3 and PD-1 in Beta Thalassemia patients Treated using HbF Augmentation Therapy and Regular Transfusions Open
These findings are suggestive of alterations in immune regulation in beta-thalassemia which could be attributed to thalassemia itself, repeated exposure to blood products, recurrent infections and the immunomodulatory drugs.
View article: Evaluation of Cervical Proprioception and Its Association with Neck Pain Among Undergraduate Students of University in Peshawar: A Cross-Sectional Study.
Evaluation of Cervical Proprioception and Its Association with Neck Pain Among Undergraduate Students of University in Peshawar: A Cross-Sectional Study. Open
Background: Neck pain is a prevalent musculoskeletal disorder, particularly among university students, potentially linked to impaired cervical proprioception. Cervical proprioception, which refers to the ability to sense head and neck posi…
View article: Optimizing Swin-UNet with Search and Rescue Algorithm for Memory-Efficient Liver Tumor Segmentation on Edge Devices
Optimizing Swin-UNet with Search and Rescue Algorithm for Memory-Efficient Liver Tumor Segmentation on Edge Devices Open
Liver cancer poses a significant global health challenge, necessitating precise tumor segmentation in CT scans for diagnosis and treatment. While deep learning models like U-Net and Vision Transformers show promise, their computational dem…
View article: A Lightweight Swin-UNet Model for Accurate Liver Tumor Segmentation on Memory-Constrained Devices
A Lightweight Swin-UNet Model for Accurate Liver Tumor Segmentation on Memory-Constrained Devices Open
Liver cancer remains a critical global health challenge, with accurate segmentation of tumors in CT scans being vital for diagnosis. While deep learning models like U-Net and Vision Transformers offer promising results, their high computat…
View article: Enhancing cybersecurity incident response: AI-driven optimization for strengthened advanced persistent threat detection
Enhancing cybersecurity incident response: AI-driven optimization for strengthened advanced persistent threat detection Open
The Cyber Security Incident Response Team executes its critical duties in the Centralized Security Operation Centers. Its primary target is to protect organizational resources from all types of Advanced Persistent Threats (APTs) and attack…
View article: A two-phase transfer learning framework for gastrointestinal diseases classification
A two-phase transfer learning framework for gastrointestinal diseases classification Open
Gastrointestinal (GI) disorders are common and often debilitating health issues that affect a significant portion of the population. Recent advancements in artificial intelligence, particularly computer vision algorithms, have shown great …
View article: Knowledge, Attitude, and Practice (KAP) Regarding the Use of Artificial Intelligence in Hospital Settings in Mardan, Khyber Pakhtunkhwa, Pakistan
Knowledge, Attitude, and Practice (KAP) Regarding the Use of Artificial Intelligence in Hospital Settings in Mardan, Khyber Pakhtunkhwa, Pakistan Open
Background Artificial intelligence (AI) is revolutionizing healthcare globally by enhancing diagnostic accuracy, predicting patient outcomes, and enabling personalized treatment plans. However, in low- and middle-income countries (LMICs) l…
View article: Risk Stratification for Autoimmune Hemolytic Anemia in Children With Pediatric Transfusion-Dependent Thalassemia
Risk Stratification for Autoimmune Hemolytic Anemia in Children With Pediatric Transfusion-Dependent Thalassemia Open
Objective This study aimed to identify the risk factors for autoimmune hemolytic anemia (AIHA) in children with transfusion-dependent thalassemia (TDT). Methodology This cross-sectional study was conducted at the Department of Child Health…
View article: Medical Image Fusion for Multiple <scp>Diseases Features Enhancement</scp>
Medical Image Fusion for Multiple <span>Diseases Features Enhancement</span> Open
Throughout the past 20 years, medical imaging has found extensive application in clinical diagnosis. Doctors may find it difficult to diagnose diseases using only one imaging modality. The main objective of multimodal medical image fusion …
View article: Enhancing Cybersecurity Incident Response: AI-Driven Optimization for Strengthened Advance Persistence Threat Detection
Enhancing Cybersecurity Incident Response: AI-Driven Optimization for Strengthened Advance Persistence Threat Detection Open
The Cyber Security Incident Response Team executes its critical duties in the Centralized Security Operation Centers. Its primary target is to protect organizational resources from all types of Advanced Persistent Threats (APT) and attacks…
View article: Short-term wind power forecasting through stacked and bi directional LSTM techniques
Short-term wind power forecasting through stacked and bi directional LSTM techniques Open
Background Computational intelligence (CI) based prediction models increase the efficient and effective utilization of resources for wind prediction. However, the traditional recurrent neural networks (RNN) are difficult to train on data h…
View article: An optimized neural network with AdaHessian for cryptojacking attack prediction for Securing Crypto Exchange Operations of MEC applications
An optimized neural network with AdaHessian for cryptojacking attack prediction for Securing Crypto Exchange Operations of MEC applications Open
Bitcoin exchange security is crucial because of MEC's widespread use. Cryptojacking has compromised MEC app security and bitcoin exchange ecosystem functionality. This paper propose a cutting-edge neural network and AdaHessian optimization…
View article: Federated Learning for Sarcasm Detection: A Study of Attention-Enhanced BILSTM, GRU, and LSTM Architectures
Federated Learning for Sarcasm Detection: A Study of Attention-Enhanced BILSTM, GRU, and LSTM Architectures Open
The previous centralized machine learning methods required combining large amounts of personal data on central servers, raising privacy concerns. Federated Learning (FL) presents a solution by training the models directly on users’ devices…
View article: Classification and Comprehension of Software Requirements Using Ensemble Learning
Classification and Comprehension of Software Requirements Using Ensemble Learning Open
The software development process mostly depends on accurately identifying both essential and optional features. Initially, user needs are typically expressed in free-form language, requiring significant time and human resources to translat…
View article: A Method for Predicting the Visual Attention Area in Real-Time Using Evolving Neuro-Fuzzy Models
A Method for Predicting the Visual Attention Area in Real-Time Using Evolving Neuro-Fuzzy Models Open
This research paper presents the prediction of the visual attention area on a visual display using an evolving rule-based fuzzy model: evolving Takagi–Sugeno (eTS). The evolving fuzzy model is feasible for predicting the visual attention a…
View article: Digital Information Credibility: Towards a Set of Guidelines for Quality Assessment of Grey Literature in Multivocal Literature Review
Digital Information Credibility: Towards a Set of Guidelines for Quality Assessment of Grey Literature in Multivocal Literature Review Open
Credibility, in general, can be interpreted as a sense of trust in someone. The credibility of information remarkably influences the public’s willingness to do or not to do some things. In this research study, the credibility of digital ne…
View article: Can Nonliterates Interact as Easily as Literates with a Virtual Reality System? A Usability Evaluation of VR Interaction Modalities
Can Nonliterates Interact as Easily as Literates with a Virtual Reality System? A Usability Evaluation of VR Interaction Modalities Open
The aim of the study is twofold: to assess the usability of a virtuality (VR) interaction designed for nonliterate users in accordance with ISO-Standard 9241-11 and to compare the feasibility of two interaction modalities (motion controlle…
View article: Deep Learning-Based Multi-Modal Ensemble Classification Approach for Human Breast Cancer Prognosis
Deep Learning-Based Multi-Modal Ensemble Classification Approach for Human Breast Cancer Prognosis Open
Ensemble models based on deep learning have made significant contributions to the medical field, particularly in the area of disease prediction. Breast cancer is a highly aggressive disease with a high mortality rate. Timely and effective …
View article: Towards Automatic Detection of Social Anxiety Disorder via Gaze Interaction
Towards Automatic Detection of Social Anxiety Disorder via Gaze Interaction Open
Social anxiety disorder (SAD) is an extreme fear of underperformance in various social situations. It is necessary to detect people with or without SAD for counseling and treatment. A few manual techniques in the existing literature show t…
View article: The prevalence of foot ulcers in diabetic patients in Pakistan: A systematic review and meta-analysis
The prevalence of foot ulcers in diabetic patients in Pakistan: A systematic review and meta-analysis Open
We aimed to determine the pooled prevalence of diabetic foot ulcers in Pakistan. MEDLINE (PubMed), Web of Science, Google scholars, and local databases were systematically searched for studies published up to August 10, 2022, on the preval…