Muhammad Umar Aftab
YOU?
Author Swipe
View article: LncRNA–Protein Interactions: A Key to Deciphering LncRNA Mechanisms
LncRNA–Protein Interactions: A Key to Deciphering LncRNA Mechanisms Open
Long non-coding RNAs (lncRNAs) have emerged as pivotal regulators in a multitude of biological processes. However, their functional basis, particularly structure-based functional characteristics, remains elusive. lncRNAs exert their influe…
View article: Correction: Aziz et al. Geo-Spatial Mapping of Hate Speech Prediction in Roman Urdu. Mathematics 2023, 11, 969
Correction: Aziz et al. Geo-Spatial Mapping of Hate Speech Prediction in Roman Urdu. Mathematics 2023, 11, 969 Open
In the published publication [...]
View article: Correction: Javaid et al. WebGIS-Based Real-Time Surveillance and Response System for Vector-Borne Infectious Diseases. Int. J. Environ. Res. Public Health 2023, 20, 3740
Correction: Javaid et al. WebGIS-Based Real-Time Surveillance and Response System for Vector-Borne Infectious Diseases. Int. J. Environ. Res. Public Health 2023, 20, 3740 Open
In the published publication [...]
View article: Correction: Khalid et al. Real-Time Plant Health Detection Using Deep Convolutional Neural Networks. Agriculture 2023, 13, 510
Correction: Khalid et al. Real-Time Plant Health Detection Using Deep Convolutional Neural Networks. Agriculture 2023, 13, 510 Open
Affiliation Revision [...]
View article: Correction: Oluwasanmi et al. Multi-Head Spatiotemporal Attention Graph Convolutional Network for Traffic Prediction. Sensors 2023, 23, 3836
Correction: Oluwasanmi et al. Multi-Head Spatiotemporal Attention Graph Convolutional Network for Traffic Prediction. Sensors 2023, 23, 3836 Open
In the original publication [...]
View article: A Blockchain Based Scalable Domain Access Control Framework for Industrial Internet of Things
A Blockchain Based Scalable Domain Access Control Framework for Industrial Internet of Things Open
Industrial Internet of Things (IIoT) applications consist of resource constrained interconnected devices that make them vulnerable to data leak and integrity violation challenges. The mobility, dynamism, and complex structure of the networ…
View article: Association Between Sleeping Quality and Risk of Breast Cancer Among Women: A Case-Control Study From Pakistan
Association Between Sleeping Quality and Risk of Breast Cancer Among Women: A Case-Control Study From Pakistan Open
Background This case-control study investigated the relationship between sleep duration and quality with the occurrence of breast cancer among women, both pre- and post-menopausal, in the northwest Khyber Pakhtunkhwa (KP) region of Pakista…
View article: Sentiment Analysis for COVID-19 Vaccine Popularity
Sentiment Analysis for COVID-19 Vaccine Popularity Open
Social media is used for various purposes including entertainment, communication, information search, and voicing their thoughts and concerns about a service, product, or issue.The social media data can be used for information mining and g…
View article: Automatic Hybrid Access Control in SCADA-Enabled IIoT Networks Using Machine Learning
Automatic Hybrid Access Control in SCADA-Enabled IIoT Networks Using Machine Learning Open
The recent advancements in the Internet of Things have made it converge towards critical infrastructure automation, opening a new paradigm referred to as the Industrial Internet of Things (IIoT). In the IIoT, different connected devices ca…
View article: Multi-Head Spatiotemporal Attention Graph Convolutional Network for Traffic Prediction
Multi-Head Spatiotemporal Attention Graph Convolutional Network for Traffic Prediction Open
Intelligent transportation systems (ITSs) have become an indispensable component of modern global technological development, as they play a massive role in the accurate statistical estimation of vehicles or individuals commuting to a parti…
View article: Real-Time Plant Health Detection Using Deep Convolutional Neural Networks
Real-Time Plant Health Detection Using Deep Convolutional Neural Networks Open
In the twenty-first century, machine learning is a significant part of daily life for everyone. Today, it is adopted in many different applications, such as object recognition, object classification, and medical purposes. This research aim…
View article: WebGIS-Based Real-Time Surveillance and Response System for Vector-Borne Infectious Diseases
WebGIS-Based Real-Time Surveillance and Response System for Vector-Borne Infectious Diseases Open
The diseases transmitted through vectors such as mosquitoes are named vector-borne diseases (VBDs), such as malaria, dengue, and leishmaniasis. Malaria spreads by a vector named Anopheles mosquitos. Dengue is transmitted through the bite o…
View article: Geo-Spatial Mapping of Hate Speech Prediction in Roman Urdu
Geo-Spatial Mapping of Hate Speech Prediction in Roman Urdu Open
Social media has transformed into a crucial channel for political expression. Twitter, especially, is a vital platform used to exchange political hate in Pakistan. Political hate speech affects the public image of politicians, targets thei…
View article: Fabrication of Flexible Role-Based Access Control Based on Blockchain for Internet of Things Use Cases
Fabrication of Flexible Role-Based Access Control Based on Blockchain for Internet of Things Use Cases Open
The Internet of Things (IoT) connects many objects and allows continuous communication and data sharing has emerged as a revolutionary technology. However, expanding IoT devices has raised concerns regarding data security and access contro…
View article: Crowd Density Estimation in Spatial and Temporal Distortion Environment Using Parallel Multi-Size Receptive Fields and Stack Ensemble Meta-Learning
Crowd Density Estimation in Spatial and Temporal Distortion Environment Using Parallel Multi-Size Receptive Fields and Stack Ensemble Meta-Learning Open
The estimation of crowd density is crucial for applications such as autonomous driving, visual surveillance, crowd control, public space planning, and warning visually distracted drivers prior to an accident. Having strong translational, r…
View article: Small-Scale and Occluded Pedestrian Detection Using Multi Mapping Feature Extraction Function and Modified Soft-NMS
Small-Scale and Occluded Pedestrian Detection Using Multi Mapping Feature Extraction Function and Modified Soft-NMS Open
In autonomous driving and Intelligent transportation systems, pedestrian detection is vital in reducing traffic accidents. However, detecting small-scale and occluded pedestrians is challenging due to the ineffective utilization of the low…
View article: Trust Management Technique Using Blockchain in Smart Building
Trust Management Technique Using Blockchain in Smart Building Open
Security is a big challenge for developing and implementing IoT in smart building situations. In this context, our goal is to create a secure blockchain-based trust management system. To do so we take advantage of the security features tha…
View article: Combining Latent Factor Model for Dynamic Recommendations in Community Question Answering Forums
Combining Latent Factor Model for Dynamic Recommendations in Community Question Answering Forums Open
Community Question Answering (CQA) web service provides a platform for people to share knowledge. Quora, Stack Overflow, and Yahoo! Answers are few sites where questioners post their queries and answerers respond to their respective querie…
View article: The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)
The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR) Open
Cloud computing is a long-standing dream of computing as a utility, where users can store their data remotely in the cloud to enjoy on-demand services and high-quality applications from a shared pool of configurable computing resources. Th…
View article: Metaheuristic Algorithms Based on Compromise Programming for the Multi-Objective Urban Shipment Problem
Metaheuristic Algorithms Based on Compromise Programming for the Multi-Objective Urban Shipment Problem Open
The Vehicle Routing Problem (VRP) and its variants are found in many fields, especially logistics. In this study, we introduced an adaptive method to a complex VRP. It combines multi-objective optimization and several forms of VRPs with pr…
View article: Traditional and Hybrid Access Control Models: A Detailed Survey
Traditional and Hybrid Access Control Models: A Detailed Survey Open
Access control mechanisms define the level of access to the resources among specified users. It distinguishes the users as authorized or unauthorized based on appropriate policies. Several traditional and hybrid access control models have …
View article: Metaheuristic Algorithms Based on Compromise Programming for Multi-Objective Urban Shipment Problem
Metaheuristic Algorithms Based on Compromise Programming for Multi-Objective Urban Shipment Problem Open
The Vehicle Routing Problem (VRP) and its variants are found in many fields, especially logistics. In this study, we introduced an adaptive method to a complex VRP. It combines multi-objective optimization and several forms of VRPs with pr…
View article: Analyzing and Enabling the Harmonious Coexistence of Heterogeneous Industrial Wireless Networks
Analyzing and Enabling the Harmonious Coexistence of Heterogeneous Industrial Wireless Networks Open
Nowadays multiple wireless communication systems operate in industrial environments side by side. In such an environment performance of one wireless network can be degraded by the collocated hostile wireless network having higher transmiss…
View article: Classification of COVID‐19 and Influenza Patients Using Deep Learning
Classification of COVID‐19 and Influenza Patients Using Deep Learning Open
Coronavirus (COVID‐19) is a deadly virus that initially starts with flu‐like symptoms. COVID‐19 emerged in China and quickly spread around the globe, resulting in the coronavirus epidemic of 2019–22. As this virus is very similar to influe…
View article: Attention Autoencoder for Generative Latent Representational Learning in Anomaly Detection
Attention Autoencoder for Generative Latent Representational Learning in Anomaly Detection Open
Today, accurate and automated abnormality diagnosis and identification have become of paramount importance as they are involved in many critical and life-saving scenarios. To accomplish such frontiers, we propose three artificial intellige…
View article: Trends in Vehicle Re-Identification Past, Present, and Future: A Comprehensive Review
Trends in Vehicle Re-Identification Past, Present, and Future: A Comprehensive Review Open
Vehicle Re-identification (re-id) over surveillance camera network with non-overlapping field of view is an exciting and challenging task in intelligent transportation systems (ITS). Due to its versatile applicability in metropolitan citie…
View article: Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network
Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network Open
The Internet of Things (IoT) devices, networks, and applications have become an integral part of modern societies. Despite their social, economic, and industrial benefits, these devices and networks are frequently targeted by cybercriminal…
View article: A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare
A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare Open
Cloud computing aims to provide reliable, customized, and quality of service (QoS) guaranteed dynamic computing environments for end-users. However, there are applications such as e-health and emergency response monitoring that require qui…
View article: Secure and dynamic access control for the Internet of Things (IoT) based traffic system
Secure and dynamic access control for the Internet of Things (IoT) based traffic system Open
Today, the trend of the Internet of Things (IoT) is increasing through the use of smart devices, vehicular networks, and household devices with internet-based networks. Specifically, the IoT smart devices and gadgets used in government and…
View article: Trends in Vehicle Re-identification Past, Present, and Future: A Comprehensive Review
Trends in Vehicle Re-identification Past, Present, and Future: A Comprehensive Review Open
Vehicle Re-identification (re-id) over surveillance camera network with non-overlapping field of view is an exciting and challenging task in intelligent transportation systems (ITS). Due to its versatile applicability in metropolitan citie…