Mohammad Zubair Khan
YOU?
Author Swipe
View article: A Novel Internet of Medical Things Hybrid Model for Cybersecurity Anomaly Detection
A Novel Internet of Medical Things Hybrid Model for Cybersecurity Anomaly Detection Open
The proliferation of Internet of Medical Things (IoMT) devices connected to the internet poses significant challenges to data integrity, confidentiality, and patient safety due to their vulnerability to outside exploitation. Specifically, …
View article: Neurolinguistic and acoustic analysis of articulatory impairments in Arabic speech disorders
Neurolinguistic and acoustic analysis of articulatory impairments in Arabic speech disorders Open
Background Pharyngeal sounds, integral to Arabic phonetics, require precise vocal tract coordination, posing significant challenges for individuals with speech disorders. Objective This study investigates the neurolinguistic and acoustic c…
View article: A Hybrid Machine Translation Framework for Low-Resource Indian Languages Using Differential Programming Loss Optimization
A Hybrid Machine Translation Framework for Low-Resource Indian Languages Using Differential Programming Loss Optimization Open
This paper proposes a hybrid machine translation (MT) framework for low-resource Indian languages by integrating an Iterative Data Merger (IDM), Synthetic Data Generation (SDG), and Differential Programming Loss Optimization (DPLO). The fr…
View article: The Impact of Performance-Based Funding on Higher Education Institutions
The Impact of Performance-Based Funding on Higher Education Institutions Open
This research evaluates the impact of performance-based funding (PBF) on higher education institutions in Pakistan, employing a mixed-methods framework. The researchers selected 12 universities across four provinces (public and private) on…
View article: SAFE-MED for Privacy-Preserving Federated Learning in IoMT via Adversarial Neural Cryptography
SAFE-MED for Privacy-Preserving Federated Learning in IoMT via Adversarial Neural Cryptography Open
Federated learning (FL) offers a promising paradigm for distributed model training in Internet of Medical Things (IoMT) systems, where patient data privacy and device heterogeneity are critical concerns. However, conventional FL remains vu…
View article: A novel prediction model for the analysis of Ree-Eyring fluid with Hall current in Darcy-Forchheimer porous media based on machine learning technique
A novel prediction model for the analysis of Ree-Eyring fluid with Hall current in Darcy-Forchheimer porous media based on machine learning technique Open
View article: Design and Development of Automated Student Attendance Framework in Fusion of CNN, HAAR, and ResNet
Design and Development of Automated Student Attendance Framework in Fusion of CNN, HAAR, and ResNet Open
View article: Improved swin transformer-based thorax disease classification with optimal feature selection using chest X-ray
Improved swin transformer-based thorax disease classification with optimal feature selection using chest X-ray Open
Thoracic diseases, including pneumonia, tuberculosis, lung cancer, and others, pose significant health risks and require timely and accurate diagnosis to ensure proper treatment. Thus, in this research, a model for thorax disease classific…
View article: Incidence, risk factors and clinical outcomes of pericardial effusion in left ventricular assist device patients
Incidence, risk factors and clinical outcomes of pericardial effusion in left ventricular assist device patients Open
BACKGROUND Development of pericardial effusion in patients with left ventricular assist devices (LVADs) can be detrimental to health outcomes. This study aims to elucidate the prevalence and risk factors for pericardial effusion in patient…
View article: Energy-aware data sharing protocol for vision disability management
Energy-aware data sharing protocol for vision disability management Open
The Internet of Medical Things (IoMT) is an emerging and impactful research area in healthcare, focused on enabling seamless data exchange among medical devices and sensors to enhance patient care and lifestyle. One promising application o…
View article: A Succinct Review on Identification of Network Anomalies and Protection in Cyber-Physical Systems
A Succinct Review on Identification of Network Anomalies and Protection in Cyber-Physical Systems Open
Advanced cyberattacks outperform traditional threat detection methods in the rapidly expanding cybersecurity field. Advanced Machine Learning (ML) algorithms can detect network traffic and system problems using AI-based Anomaly Detection (…
View article: Enhancing student career guidance and sentimental analysis: A performance-driven hybrid learning approach with feature ranking
Enhancing student career guidance and sentimental analysis: A performance-driven hybrid learning approach with feature ranking Open
Choosing the appropriate career path poses a significant hurdle for students, especially when time is constrained. This research addresses the challenge of career prediction by introducing a method that integrates additional attributes, re…
View article: An adaptive hybrid framework for IIoT intrusion detection using neural networks and feature optimization using genetic algorithms
An adaptive hybrid framework for IIoT intrusion detection using neural networks and feature optimization using genetic algorithms Open
In Industrial Internet of Things (IIoT) networks, securing device connectivity through effective intrusion detection systems is essential for maintaining operational integrity. This paper presents an adaptive hybrid framework for IIoT intr…
View article: Implementation of Single Candidate Loss Optimization Algorithm for Loss Optimization of Bhojpuri-English Machine Translation Model
Implementation of Single Candidate Loss Optimization Algorithm for Loss Optimization of Bhojpuri-English Machine Translation Model Open
Machine translation of low-resource Indian languages is necessary as most of the regions still know and speak their specific dialects and are still not comfortable understanding the English language. Indian languages are morphologically ri…
View article: Analyzing Ambiguity in Newspaper Headlines: The Case of Crash-Blossoms
Analyzing Ambiguity in Newspaper Headlines: The Case of Crash-Blossoms Open
The current study was conducted to explore ambiguous newspaper headlines in two leading Pakistani dailies, namely Dawn and The Express Tribune, focusing on “crash-blossoms”, which are kind of headlines that initially confuse the readers wi…
View article: Performance Assessment of ML and DL Models in Detecting Hate Speech from Mixed English–Roman Urdu Text with Small-Scale Datasets
Performance Assessment of ML and DL Models in Detecting Hate Speech from Mixed English–Roman Urdu Text with Small-Scale Datasets Open
This research evaluates hate speech detection across a minimal-size Mixed English and Roman Urdu language intersection through machine learning and deep learning model analysis. For traditional models, the data required text cleaning along…
View article: Improving Accessibility for the Visually Impaired with Enhanced Multi-class Object Detection Using YOLOv8L, YOLO11x, and Faster R-CNN with Diverse Backbones
Improving Accessibility for the Visually Impaired with Enhanced Multi-class Object Detection Using YOLOv8L, YOLO11x, and Faster R-CNN with Diverse Backbones Open
Advances in deep learning and computer vision have revolutionized object detection, enabling real-time and accurate object recognition. These object detection technologies can potentially transform accessibility solutions, especially for i…
View article: Corrections to “Converging Technologies for Health Prediction and Intrusion Detection in Internet of Healthcare Things With Matrix-Valued Neural Coordinated Federated Intelligence”
Corrections to “Converging Technologies for Health Prediction and Intrusion Detection in Internet of Healthcare Things With Matrix-Valued Neural Coordinated Federated Intelligence” Open
Presents corrections to the paper, (Corrections to “Converging Technologies for Health Prediction and Intrusion Detection in Internet of Healthcare Things With Matrix-Valued Neural Coordinated Federated Intelligence”).
View article: Adaptive Intelligent Reflecting Surfaces for Enhanced Wireless Communication via Multi-Agent Deep Reinforcement Learning
Adaptive Intelligent Reflecting Surfaces for Enhanced Wireless Communication via Multi-Agent Deep Reinforcement Learning Open
This research introduces an innovative model-free framework for Intelligent Reflecting Surface (IRS) control in multi-user wireless communication systems using Multi-Agent Reinforcement Learning (MARL). Departing from traditional methods t…
View article: TU‐AcqNet: A Transformer‐U‐Net Framework for Robust Channel Acquisition in THz UM‐MIMO Systems
TU‐AcqNet: A Transformer‐U‐Net Framework for Robust Channel Acquisition in THz UM‐MIMO Systems Open
Accurate channel acquisition remains a fundamental challenge in terahertz (THz) ultra‐massive multiple‐input multiple‐output (UM‐MIMO) communication systems, primarily due to near‐field propagation effects and the large‐scale nature of ant…
View article: Impact of Cybersecurity Measures in theHealthcare Sector: A Comprehensive Review ofContemporary Approaches and EmergingTrends
Impact of Cybersecurity Measures in theHealthcare Sector: A Comprehensive Review ofContemporary Approaches and EmergingTrends Open
View article: Dynamic Logistic Ensembles with Recursive Probability and Automatic Subset Splitting for Enhanced Binary Classification
Dynamic Logistic Ensembles with Recursive Probability and Automatic Subset Splitting for Enhanced Binary Classification Open
This paper presents a novel approach to binary classification using dynamic\nlogistic ensemble models. The proposed method addresses the challenges posed by\ndatasets containing inherent internal clusters that lack explicit feature-based\n…
View article: Effect of Load and Routing Protocols on Networks on Chip (NoC): An Analysis
Effect of Load and Routing Protocols on Networks on Chip (NoC): An Analysis Open
Communication infrastructure for multi-core Systems-on-Chip (SoCs) is provided by Network-on-Chip (NoC). Point-to-Point (P2P) and bus-based communication systems are NoCs and are two communication channels of NoC that can probably overcome…
View article: Performance Analysis of Garbage Classification Using Balanced and Unbalanced Dataset with EfficientNetV2B1 Architecture
Performance Analysis of Garbage Classification Using Balanced and Unbalanced Dataset with EfficientNetV2B1 Architecture Open
This research concentrates on EfficientNetV2B1 deep learning model to classify garbage collection tasks, with both balanced and unbalanced dataset configurations. The dataset includes 7,260 images for the balanced dataset and 15,515 for th…
View article: Hybrid Spider Monkey Optimization Mechanism with Simulated Annealing for Resource Provisioning in Cloud Environment
Hybrid Spider Monkey Optimization Mechanism with Simulated Annealing for Resource Provisioning in Cloud Environment Open
Cloud computing is an emerging concept that makes better use of a large number of distributed resources. The most significant issue that affects the cloud computing environment is resource provisioning. Better performance in the shortest a…
View article: Clustering Based Prediction For VM Workload In Green Computation
Clustering Based Prediction For VM Workload In Green Computation Open
In order to support the different new generation equipment and technologies, cloud computing is depends to deal with the bulky data. Because a rich amount of data is generated using these devices and processing such big data need the cloud…
View article: A Novel QoS Prediction Model for Web Services Based on an Adaptive Neuro-Fuzzy Inference System Using COOT Optimization
A Novel QoS Prediction Model for Web Services Based on an Adaptive Neuro-Fuzzy Inference System Using COOT Optimization Open
The adoption of adaptive neuro-fuzzy inference systems (ANFIS) and metaheuristic optimization approaches has been widely observed in recent research. Even so, integrating these methods improves the model’s capability to solve complex probl…
View article: Converging Technologies for Health Prediction and Intrusion Detection in Internet of Healthcare Things With Matrix- Valued Neural Coordinated Federated Intelligence
Converging Technologies for Health Prediction and Intrusion Detection in Internet of Healthcare Things With Matrix- Valued Neural Coordinated Federated Intelligence Open
This paper introduces Matrix-Valued Neural Coordinated Federated Deep Extreme Machine Learning, a novel approach for enhancing health prediction and intrusion detection on the Internet of Healthcare Things (IoHT). By leveraging Machine Lea…
View article: Predicting ICU Admission for COVID-19 Patients in Saudi Arabia: A Comparative Study of AdaBoost and Bagging Methods
Predicting ICU Admission for COVID-19 Patients in Saudi Arabia: A Comparative Study of AdaBoost and Bagging Methods Open
COVID-19's high fatality rate and accurately deter-mining the mortality rate within a particular geographic region continue to be significant concerns. In this study, the authors investigated and assessed the performance of two advanced ma…
View article: An Efficient Intrusion Detection System to Combat Cyber Threats using a Deep Neural Network Model
An Efficient Intrusion Detection System to Combat Cyber Threats using a Deep Neural Network Model Open
The proliferation of Internet of Things (IoT) solutions has led to a significant increase in cyber-attacks targeting IoT networks. Securing networks and especially wireless IoT networks against these attacks has become a crucial but challe…