Shahid Mahmood Awan
YOU?
Author Swipe
View article: Enabling Trust and Security in Digital Twin Management: A Blockchain-Based Approach with Ethereum and IPFS
Enabling Trust and Security in Digital Twin Management: A Blockchain-Based Approach with Ethereum and IPFS Open
The emergence of Industry 5.0 has highlighted the significance of information usage, processing, and data analysis when maintaining physical assets. This has enabled the creation of the Digital Twin (DT). Information about an asset is gene…
View article: Enabling trust and security in digital twin management: a blockchain-based approach with ethereum and IPFS
Enabling trust and security in digital twin management: a blockchain-based approach with ethereum and IPFS Open
The emergence of Industry 5.0 has highlighted the significance of information usage, processing, and data analysis when maintaining physical assets. This has enabled the creation of the Digital Twin (DT). Information about an asset is gene…
View article: Classification of Images of Skin Lesion Using Deep Learning
Classification of Images of Skin Lesion Using Deep Learning Open
Skin cancer is among common and rapidly increasing human malignancies, which can be diagnosed visually. The diagnosis begins with preliminary medical screening and by dermoscopic examination, histopathological examination, and proceeding t…
View article: Blockchain-Based Secure Authentication with Improved Performance for Fog Computing
Blockchain-Based Secure Authentication with Improved Performance for Fog Computing Open
Advancement in the Internet of Things (IoT) and cloud computing has escalated the number of connected edge devices in a smart city environment. Having billions more devices has contributed to security concerns, and an attack-proof authenti…
View article: Origins and Consequences of Misunderstood/Slipped Requirements on Large Scale Software Projects
Origins and Consequences of Misunderstood/Slipped Requirements on Large Scale Software Projects Open
Requirement engineering is the first and foremost phase of a software development life cycle. Making mistakes during this process has enormous negative impact on all underlying activities of software development. Defects discovered when a …
View article: Automatic Unusual Activities Recognition Using Deep Learning in Academia
Automatic Unusual Activities Recognition Using Deep Learning in Academia Open
In the current era, automatic surveillance has become an active research problem due to its vast real-world applications, particularly for maintaining law and order. A continuous manual monitoring of human activities is a tedious task. The…
View article: Identification of Trainees Enrollment Behavior and Course Selection Variables in Technical and Vocational Education Training (TVET) Program Using Education Data Mining
Identification of Trainees Enrollment Behavior and Course Selection Variables in Technical and Vocational Education Training (TVET) Program Using Education Data Mining Open
Producing skilled workforce according to industry required skills is quite challenging.Knowledge of trainee's enrollment behavior and trainee's course selection variables can help to address this issue.Prior knowledge of both can help to p…
View article: Internet of medical things for smart D3S to enable road safety
Internet of medical things for smart D3S to enable road safety Open
It has been seen that most of the accidents occur due to driver’s fatigue. Drowsiness is a state of mind before the driver falls asleep, which means the driver could not accomplish his actions, such as vehicular braking, controlling vehicu…
View article: A Review on State-of-the-Art Violence Detection Techniques
A Review on State-of-the-Art Violence Detection Techniques Open
With the rapid growth of surveillance cameras to monitor the human activity demands such system which recognize the violence and suspicious events automatically. Abnormal and violence action detection has become an active research area of …
View article: A Survey on State-of-the-Art Drowsiness Detection Techniques
A Survey on State-of-the-Art Drowsiness Detection Techniques Open
Drowsiness or fatigue is a major cause of road accidents and has significant implications for road safety. Several deadly accidents can be prevented if the drowsy drivers are warned in time. A variety of drowsiness detection methods exist …
View article: A Data Specific Comparative Study for Choosing Best Cryptographic Technique
A Data Specific Comparative Study for Choosing Best Cryptographic Technique Open
Data security has gauged much attention for over a past few decades. Cryptography is one of the most serious domains as far as security is concerned. This article evaluates and compares among few of the well-known state of art cryptographi…