Mueen Uddin
YOU?
Author Swipe
View article: Classification of breast cancer using hybridization version of walrus and particle swarm optimization algorithm
Classification of breast cancer using hybridization version of walrus and particle swarm optimization algorithm Open
Breast cancer (BC) is the second‑leading cause of cancer‑related mortality among women worldwide. Accurate and early classification of mammographic lesions is therefore crucial for improving patient prognosis. In this study, we present a h…
View article: Development of a machine learning-based interface for insulin dependency prediction using clinical data
Development of a machine learning-based interface for insulin dependency prediction using clinical data Open
Diabetes mellitus is a major global health burden, and early identification of insulin dependency is important for timely intervention. This study developed an artificial intelligence-based diagnostic system using a real-world clinical dat…
View article: HALOGrid—HyperAdaptive long short term memory model with intelligent grid optimization
HALOGrid—HyperAdaptive long short term memory model with intelligent grid optimization Open
HALOGrid is an adaptive edge–cloud malware detection framework for IoT traffic. The approach couples a lightweight LSTM (residual paths, attention, drift-penalty regularization) for low-latency edge inference with a telemetry-driven tuner …
View article: A Novel Deep Reinforcement Learning Framework for Energy Management and Prediction in Smart Cities
A Novel Deep Reinforcement Learning Framework for Energy Management and Prediction in Smart Cities Open
Machine learning and deep learning algorithms have recently been progressively integrated into business intelligence for smart city management. Predicting smart city energy utilisation is crucial for sustainable growth and resource efficie…
View article: Adaptive resource aware and privacy preserving federated edge learning framework for real time internet of medical things applications
Adaptive resource aware and privacy preserving federated edge learning framework for real time internet of medical things applications Open
View article: Field programmable gate array-based neural network control strategy for computer power supply applications
Field programmable gate array-based neural network control strategy for computer power supply applications Open
View article: Development of a Machine Learning-Based Interface for Insulin Dependency Prediction Using Clinical Data
Development of a Machine Learning-Based Interface for Insulin Dependency Prediction Using Clinical Data Open
This study presents the development and evaluation of machine learning models to predict insulin dependency in diabetic patients using clinical and demographic data. Utilizing a dataset comprising variables such as age, gender, BMI, HbA1c,…
View article: Deep learning model for hair artifact removal and Mpox skin lesion analysis and detection
Deep learning model for hair artifact removal and Mpox skin lesion analysis and detection Open
View article: Detecting Web Attacks With End to End Deep Learning
Detecting Web Attacks With End to End Deep Learning Open
Websites and online applications are often targeted by hackers using attacks like SQLinjection, cross-site scripting (XSS), and denial-of-service (DoS). Traditional security systems usefixed rules to detect these attacks, but they often mi…
View article: AI Virtual Mouse Using Hand Gesture Recognition
AI Virtual Mouse Using Hand Gesture Recognition Open
The AI Virtual Mouse leverages advanced computer vision and artificial intelligence techniques to replace traditional physical mice with an innovative, touch-free solution for human-computer interaction. This system uses a camera to captur…
View article: UrduSER: A comprehensive dataset for speech emotion recognition in Urdu language
UrduSER: A comprehensive dataset for speech emotion recognition in Urdu language Open
Speech Emotion Recognition (SER) is a rapidly evolving field of research that aims to identify and categorize emotional states through speech signal analysis. As SER holds considerable socio¬cultural and business significance, researchers …
View article: Deep Learning-Driven Multi-Stage Text Recognition in Financial Documents: Overcoming Overlaps and Faded Handwriting in Bank Cheques
Deep Learning-Driven Multi-Stage Text Recognition in Financial Documents: Overcoming Overlaps and Faded Handwriting in Bank Cheques Open
Handwritten bank cheque images (BCI) can be segmented to extract crucial information and improve transactions. However, the segmentation process was disrupted in earlier studies when overlapped Handwritten Texts (HT) and Printed Texts (PT)…
View article: NFTs for the Unassailable Authentication of IoT Devices in Cyber-Physical Systems: An Implementation Study
NFTs for the Unassailable Authentication of IoT Devices in Cyber-Physical Systems: An Implementation Study Open
In the rapidly evolving landscape of IoT-enabled smart devices, significant challenges persist in integration to web3, security, and data reliability. This research presents the design and integration of IoT assets, particularly devices, t…
View article: Bridging Innovation and Security: Advancing Cyber-Threat Detection in Sustainable Smart Infrastructure
Bridging Innovation and Security: Advancing Cyber-Threat Detection in Sustainable Smart Infrastructure Open
The rapid evolution of Smart Infrastructure (SI) on a global scale has revolutionized our daily lives, empowering us with unprecedented connectivity and convenience. However, this evolution has also exposed smart devices to increasingly so…
View article: PermGuard: A Scalable Framework for Android Malware Detection Using Permission-to-Exploitation Mapping
PermGuard: A Scalable Framework for Android Malware Detection Using Permission-to-Exploitation Mapping Open
Android, the world’s most widely used mobile operating system, is increasingly targeted by malware due to its open-source nature, high customizability, and integration with Google services. The increasing reliance on mobile devices signifi…
View article: Comparative evaluation of data imbalance addressing techniques for CNN-based insider threat detection
Comparative evaluation of data imbalance addressing techniques for CNN-based insider threat detection Open
View article: Exploring the convergence of Metaverse, Blockchain, and <scp>AI</scp>: A comprehensive survey of enabling technologies, applications, challenges, and future directions
Exploring the convergence of Metaverse, Blockchain, and <span>AI</span>: A comprehensive survey of enabling technologies, applications, challenges, and future directions Open
The Metaverse, distinguished by its capacity to integrate the physical and digital realms seamlessly, presents a dynamic virtual environment offering diverse opportunities for engagement across innovation, entertainment, socialization, and…
View article: Editorial: Technological developments in point of interest recommendation for smart and sustainable cities
Editorial: Technological developments in point of interest recommendation for smart and sustainable cities Open
Editorial: Technological developments in point of interest recommendation for smart and sustainable cities
View article: A novel methodology for offline English handwritten character recognition using ELBP-based sequential (CNN)
A novel methodology for offline English handwritten character recognition using ELBP-based sequential (CNN) Open
View article: A systematic literature review on contemporary and future trends in virtual machine scheduling techniques in cloud and multi-access computing
A systematic literature review on contemporary and future trends in virtual machine scheduling techniques in cloud and multi-access computing Open
Introduction The migration of business and scientific operations to the cloud and the surge in data from IoT devices have intensified the complexity of cloud resource scheduling. Ensuring efficient resource distribution in line with user-s…
View article: Predicting Microvascular Complications in Diabetic Mellitus Using Improved Enhanced Coati Optimizer
Predicting Microvascular Complications in Diabetic Mellitus Using Improved Enhanced Coati Optimizer Open
View article: Cluster-based anonymity model and algorithm for 1:1 dataset with a single sensitive attribute using machine learning technique
Cluster-based anonymity model and algorithm for 1:1 dataset with a single sensitive attribute using machine learning technique Open
Privacy is a significant issue that requires consideration in all applications. Data collected from various individuals and organizations must be disclosed to the public or private parties for analysis and research purposes. The collected …
View article: Plant disease management: a fine-tuned enhanced CNN approach with mobile app integration for early detection and classification
Plant disease management: a fine-tuned enhanced CNN approach with mobile app integration for early detection and classification Open
Farmers face the formidable challenge of meeting the increasing demands of a rapidly growing global population for agricultural products, while plant diseases continue to wreak havoc on food production. Despite substantial investments in d…
View article: Performance evaluation of E-VGG19 model: Enhancing real-time skin cancer detection and classification
Performance evaluation of E-VGG19 model: Enhancing real-time skin cancer detection and classification Open
Skin cancer is a pervasive and potentially life-threatening disease. Early detection plays a crucial role in improving patient outcomes. Machine learning (ML) techniques, particularly when combined with pre-trained deep learning models, ha…
View article: Large Language Models meet Network Slicing Management and Orchestration
Large Language Models meet Network Slicing Management and Orchestration Open
Network slicing, a cornerstone technology for future networks, enables the creation of customized virtual networks on a shared physical infrastructure.This fosters innovation and agility by providing dedicated resources tailored to specifi…
View article: Large Language Models meet Network Slicing Management and Orchestration
Large Language Models meet Network Slicing Management and Orchestration Open
Network slicing, a cornerstone technology for future networks, enables the creation of customized virtual networks on a shared physical infrastructure. This fosters innovation and agility by providing dedicated resources tailored to specif…
View article: Dickson polynomial-based secure group authentication scheme for Internet of Things
Dickson polynomial-based secure group authentication scheme for Internet of Things Open
Internet of Things (IoT) paves the way for the modern smart industrial applications and cities. Trusted Authority acts as a sole control in monitoring and maintaining the communications between the IoT devices and the infrastructure. The c…
View article: Prioritizing factors for the adoption of IoT-based smart irrigation in Saudi Arabia: a GRA/AHP approach
Prioritizing factors for the adoption of IoT-based smart irrigation in Saudi Arabia: a GRA/AHP approach Open
The irrigation sector in the Kingdom of Saudi Arabia (KSA) confronts a range of obstacles, such as scarce water resources, the elevated salinity and alkalinity of irrigation water, inefficient irrigation practices, and inter-sectoral compe…
View article: A smart decentralized identifiable distributed ledger technology‐based blockchain (<scp>DIDLT‐BC</scp>) model for <scp>cloud‐IoT</scp> security
A smart decentralized identifiable distributed ledger technology‐based blockchain (<span>DIDLT‐BC</span>) model for <span>cloud‐IoT</span> security Open
The most important and difficult challenge the digital society has recently faced is ensuring data privacy and security in cloud‐based Internet of Things (IoT) technologies. As a result, many researchers believe that the blockchain's Distr…
View article: A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models Open