Muhammad Asif Habib
YOU?
Author Swipe
View article: A flexible finite-state birth–death model for the number of active users in a cognitive network environment
A flexible finite-state birth–death model for the number of active users in a cognitive network environment Open
Introduction Reliable handover mechanisms are vital for ensuring seamless connectivity in cognitive radio networks (CRNs). The challenge becomes more complex when the upper limit of allowable users fluctuates randomly and when arrival and …
View article: A Deep Learning Framework for Early Parkinson’s Disease Detection: Leveraging Spiral and Wave Handwriting Tasks with EfficientNetV2-S
A Deep Learning Framework for Early Parkinson’s Disease Detection: Leveraging Spiral and Wave Handwriting Tasks with EfficientNetV2-S Open
Background: Early detection of Parkinson’s disease (PD) is vital for improving patient outcomes, yet traditional diagnostic methods often depend on subjective clinical evaluations. Methods: This study proposes a novel deep learning framewo…
View article: Comparison of Volar Plating and Percutaneous K-Wire Fixation in Distal Radius Fractures
Comparison of Volar Plating and Percutaneous K-Wire Fixation in Distal Radius Fractures Open
Background: In the recent past, surgeons used external fixation or a combination of bone grafting, Kirschner wire (K-wire) augmentation, and restricted open reduction to manage intra-articular distal radius fractures. However, fragment-spe…
View article: Comparison of Open Reduction and Internal Fixation with PHILOS Plate versus Close Reduction and Fixation with Percutaneous K-wiring in Proximal Humerus Fractures
Comparison of Open Reduction and Internal Fixation with PHILOS Plate versus Close Reduction and Fixation with Percutaneous K-wiring in Proximal Humerus Fractures Open
Introduction: Fractures of the proximal humerus are the most common injuries in the upper limbs, especially in the elderly. Surgical options are available, including open reduction and PHILOS plating, as well as K-wire percutaneously reduc…
View article: A Linear-Time Greedy Approach With Directional Optimization for Minimum Weight Triangulation of Convex Polygons
A Linear-Time Greedy Approach With Directional Optimization for Minimum Weight Triangulation of Convex Polygons Open
Minimum Weight Triangulation (MWT) of convex polygons is a cornerstone problem in computational geometry with applications in mesh generation, terrain modeling, computer vision, and geographic information systems. Traditional dynamic progr…
View article: Integrating Large Language Models and AI Into Blockchain: A Framework for Intelligent Smart Contracts and Fraud Detection
Integrating Large Language Models and AI Into Blockchain: A Framework for Intelligent Smart Contracts and Fraud Detection Open
The convergence of Artificial Intelligence (AI) and Large Language Models (LLMs) with blockchain technology is transforming information systems by enhancing their efficiency, security, and decision-making capabilities. This research explor…
View article: ActionSync Video Transformation: Automated Object Removal and Responsive Effects in Motion Videos Using Hybrid CNN and GRU
ActionSync Video Transformation: Automated Object Removal and Responsive Effects in Motion Videos Using Hybrid CNN and GRU Open
Large data volumes, dynamic scenes, and intricate object motions make video analysis extremely difficult. Traditional methods depend on human-crafted features that are not scalable. This work develops a deep neural network-powered automate…
View article: An Efficient and Cost-Effective Vehicle Detection and Tracking System for Collision Avoidance in Foggy Weather
An Efficient and Cost-Effective Vehicle Detection and Tracking System for Collision Avoidance in Foggy Weather Open
An Efficient and Cost-Effective Vehicle Detection and Tracking (ECE-VDT) system is proposed and is essential for real-time collision avoidance and driver assistance in foggy weather conditions. The proposed ECE-VDT system encompasses an op…
View article: Assessing Industry 4.0 Readiness and Adoption Barriers in Textile Sector: Strategic Insights for Sustainable Industrial Transformation
Assessing Industry 4.0 Readiness and Adoption Barriers in Textile Sector: Strategic Insights for Sustainable Industrial Transformation Open
The Industrial Revolution (Industry 4.0) signifies a revolutionary change in industrial production driven by digital technologies, and promises exceptional improvements in operational efficiency. Multiple studies have shown that the adopt…
View article: ISCC: Intelligent Semantic Caching and Control for NDN-Enabled Industrial IoT Networks
ISCC: Intelligent Semantic Caching and Control for NDN-Enabled Industrial IoT Networks Open
Effective content caching plays a crucial role in meeting the latency and reliability requirements of Industrial Internet of Things (IIoT) networks. However, existing caching mechanisms in NDN-based IIoT networks often exhibit problems in …
View article: RNAF: ResilienceNet Adversarial Framework Using Deep Reinforcement Learning for Adversarial Attacks on Digital Images
RNAF: ResilienceNet Adversarial Framework Using Deep Reinforcement Learning for Adversarial Attacks on Digital Images Open
View article: Leveraging Multilingual Transformer for Multiclass Sentiment Analysis in Code-Mixed Data of Low-Resource Languages
Leveraging Multilingual Transformer for Multiclass Sentiment Analysis in Code-Mixed Data of Low-Resource Languages Open
The widespread use of online social media has enabled users to express their thoughts, feelings, opinions, and sentiments in their preferred languages. These diverse perspectives offer valuable insights for data-driven decision-making. Whi…
View article: Barriers to Adoption Industry 4.0 in Textile Sector: Analyzing Challenges in Transitioning to Smart Manufacturing With ISM and MICMAC
Barriers to Adoption Industry 4.0 in Textile Sector: Analyzing Challenges in Transitioning to Smart Manufacturing With ISM and MICMAC Open
In the contemporary competitive landscape, industrial organisations are compelled to augment their innovation capacities and productivity levels through Industry 4.0 technologies. However, the adoption of these disruptive technologies is c…
View article: Automated Cardiac Disease Prediction Using Composite GAN and DeepLab Model
Automated Cardiac Disease Prediction Using Composite GAN and DeepLab Model Open
Cardiovascular diseases remain the leading global cause of mortality, resulting in over 17 million deaths annually. Manual cardiac image interpretation is often subjective and varies significantly among clinicians. However, constraints lik…
View article: Arabic Language Learning Assistance Using Direct Methods at MTs Al–Barokah Jaharun B Galang
Arabic Language Learning Assistance Using Direct Methods at MTs Al–Barokah Jaharun B Galang Open
This study uses a descriptive qualitative approach with the ABCD (Asset Based Community Development) model to explore the potential problems in improving MT students' Arabic speaking skills in Jaharun B Village. Conducted on March 25-28, 2…
View article: Efficient and Cost-Effective Vehicle Detection in Foggy Weather for Edge/Fog-Enabled Traffic Surveillance and Collision Avoidance Systems
Efficient and Cost-Effective Vehicle Detection in Foggy Weather for Edge/Fog-Enabled Traffic Surveillance and Collision Avoidance Systems Open
View article: An Android App Using Virtual Trial Room to Minimize Clothing Perceived Risks of Buyers
An Android App Using Virtual Trial Room to Minimize Clothing Perceived Risks of Buyers Open
The world is moving on the clothing mobile application shopping applications, especially during the pandemic COVID 19 days there seems to be an excessive demand of online shopping. Online shopping applications where provides an approach of…
View article: Individuals Utilization Behavior While Using Critical Healthcare Systems (Medical Ventilator)
Individuals Utilization Behavior While Using Critical Healthcare Systems (Medical Ventilator) Open
Ergonomics and human factors play an important role in interaction design. Poor usabil-ity design of critical safety systems can easily lead to human error. While inspecting the critical systems, there are vital factors that have to be con…
View article: Development of an Augmented Reality based Serious Game for the Training of Children with Dyslexia and Dysgraphia
Development of an Augmented Reality based Serious Game for the Training of Children with Dyslexia and Dysgraphia Open
Therapists have used paper-based exercises to treat learning disorders for many years. Dyslexia and Dysgraphia are one of the reading and writing disorders that are common nowadays. Different serious games and interventions are developed f…
View article: Enhanced Machine-Learning Techniques for Medium-Term and Short-Term Electric-Load Forecasting in Smart Grids
Enhanced Machine-Learning Techniques for Medium-Term and Short-Term Electric-Load Forecasting in Smart Grids Open
Nowadays, electric load forecasting through a data analytic approach has become one of the most active and emerging research areas. It provides future consumption patterns of electric load. Since there are large fluctuations in both electr…
View article: Performing in-situ analytics: Mining frequent patterns from big IoT data at network edge with D-HARPP
Performing in-situ analytics: Mining frequent patterns from big IoT data at network edge with D-HARPP Open
Big IoT data is inherently distributed, high-dimensional, irregular, and sparse in nature. Fog computing model in its original form is by no means the optimal solution for mining big IoT data. However, utilizing the network edge for mining…
View article: Incentive-Based Schema Using Game Theory in 5/6G Cellular Network for Sustainable Communication System
Incentive-Based Schema Using Game Theory in 5/6G Cellular Network for Sustainable Communication System Open
Due to the technological advancement in cellular networks, massive data traffic appends to the existing digital technologies. These emerging digital technologies face quality of service (QoS) challenges, particularly when it comes to maint…
View article: Digital Forensics as Advanced Ransomware Pre-Attack Detection Algorithm for Endpoint Data Protection
Digital Forensics as Advanced Ransomware Pre-Attack Detection Algorithm for Endpoint Data Protection Open
Ransomware is a malicious software that takes files hostage and demands ransomware to release them. It targets individuals, corporations, organizations, and public services such as hospitals and police stations. It is a growing industry th…
View article: Radio Network Forensic with mmWave Using the Dominant Path Algorithm
Radio Network Forensic with mmWave Using the Dominant Path Algorithm Open
For the last two decades, cybercrimes are growing on a daily basis. To track down cybercrimes and radio network crimes, digital forensic for radio networks provides foundations. The data transfer rate for the next-generation wireless netwo…
View article: [Retracted] Facial Mask Detection Using Image Processing with Deep Learning
[Retracted] Facial Mask Detection Using Image Processing with Deep Learning Open
Coronavirus disease 2019 (COVID‐19) has a significant impact on human life. The novel pandemic forced humans to change their lifestyles. Scientists have broken through the vaccine in many countries, but the face mask is the only protection…
View article: Implementation of Mail Server Based Of Squirrelmail Using Virtualization Technology at Universitas Muhammadiyah Sumatera Utara
Implementation of Mail Server Based Of Squirrelmail Using Virtualization Technology at Universitas Muhammadiyah Sumatera Utara Open
Server virtualization technology is the use of one physical machine by several server operating systems. The design and implementation of this mail server was built using Debian.5 as the base operating system server. The design and impleme…
View article: Micro-electromechanical system based optimized steering angle estimation mechanism for customized self-driving vehicles
Micro-electromechanical system based optimized steering angle estimation mechanism for customized self-driving vehicles Open
In an automated steering system of the self-driving vehicles, the steering wheel angle is measured by the absolute angular displacement sensors or relative angle sensors. However, these sensors either encompass global navigation satellite …
View article: Detecting White Cotton Bolls Using High-Resolution Aerial Imagery Acquired Through Unmanned Aerial System
Detecting White Cotton Bolls Using High-Resolution Aerial Imagery Acquired Through Unmanned Aerial System Open
In recent decades, agricultural goods demand has grown exponentially due to the growth of the human population. Agricultural production demands new and simple techniques. Moreover, safe, efficient, and cost-effective methods are required f…
View article: Role of Design Attributes to Determine the Intention to Use Online Learning via Cognitive Beliefs
Role of Design Attributes to Determine the Intention to Use Online Learning via Cognitive Beliefs Open
Online learning is the most widely used application in educational institutions, particularly during the pandemic (COVID-19). However, shortcomings in online learning systems negatively impact learner’s attitudes and intention to use. Espe…
View article: LoRaWAN: State of the Art, Challenges, Protocols and Research Issues
LoRaWAN: State of the Art, Challenges, Protocols and Research Issues Open
Low Power Wide Area Network (LPWAN) gaining much attention in the industry as well as in academia due to its ability to communicate over the long-range. Due to this reason, LPWAN is considered one of the favorable technologies for the Inte…