Syed Muhammad Saqlain
YOU?
Author Swipe
View article: THE RELATIONSHIP BETWEEN SOCIAL MEDIA USAGE, FEAR OF MISSING OUT AND EMOTIONAL DYSREGULATION AMONG YOUNG ADULTS
THE RELATIONSHIP BETWEEN SOCIAL MEDIA USAGE, FEAR OF MISSING OUT AND EMOTIONAL DYSREGULATION AMONG YOUNG ADULTS Open
Background: In an era where digital connectivity dominates daily life, social media has become an integral component of communication and identity formation, particularly among young adults. However, excessive engagement is increasingly as…
View article: Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection Open
Malware attacks on Windows machines pose significant cybersecurity threats, necessitating effective detection and prevention mechanisms. Supervised machine learning classifiers have emerged as promising tools for malware detection. However…
View article: Bandwidth and power efficient lightweight authentication scheme for healthcare system☆☆☆☆☆☆
Bandwidth and power efficient lightweight authentication scheme for healthcare system☆☆☆☆☆☆ Open
With the emergence of the Internet of Things (IoT) and the rapid advancement in sensor technology, wireless medical sensor networks (WMSNs) have become increasingly important in improving health services. WMSNs are deployed for remote moni…
View article: Secure Medical Data Against Unauthorized Access Using Decoy Technology in Distributed Edge Computing Networks
Secure Medical Data Against Unauthorized Access Using Decoy Technology in Distributed Edge Computing Networks Open
The recent advancements in cyber technology have facilitated the global electronic sharing of healthcare data among various healthcare professionals, including clinicians, researchers, business administrators, and others. Fog computing is …
View article: Multiobjective Genetic Algorithm for Class Testing using OCL Class Contract Specifications: A Framework
Multiobjective Genetic Algorithm for Class Testing using OCL Class Contract Specifications: A Framework Open
It has been a software trend to build large-scale complex systems with high reliability. Due to the size of the software and the dynamic requirements of the stakeholders, it becomes hard to test those software systems manually. This may le…
View article: Image Analysis Using Human Body Geometry and Size Proportion Science for Action Classification
Image Analysis Using Human Body Geometry and Size Proportion Science for Action Classification Open
Gestures are one of the basic modes of human communication and are usually used to represent different actions. Automatic recognition of these actions forms the basis for solving more complex problems like human behavior analysis, video su…
View article: An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks
An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks Open
In wireless sensor networks, the sensors transfer data through radio signals to a remote base station. Sensor nodes are used to sense environmental conditions such as temperature, strain, humidity, sound, vibration, and position. Data secu…
View article: EER: Enterprise Expert Ranking using Employee Reputation
EER: Enterprise Expert Ranking using Employee Reputation Open
The emergence of online enterprises spread across continents have given rise to the need for expert identification in this domain. Scenarios that includes the intention of the employer to find tacit expertise and knowledge of an employee t…
View article: Context based Adoption of Ranking and Indexing Measures for Cricket Team Ranks
Context based Adoption of Ranking and Indexing Measures for Cricket Team Ranks Open
There is an international cricket governing body that ranks the expertise of all the cricket playing nations, known as the International Cricket Council (ICC). The ranking system followed by the ICC relies on the winnings... | Find, read a…
View article: Human Behavior Classification Using Geometrical Features of Skeleton and Support Vector Machines
Human Behavior Classification Using Geometrical Features of Skeleton and Support Vector Machines Open
Classification of human actions under video surveillance is gaining a lot of attention from computer vision researchers. In this paper, we have presented methodology to recognize human behavior in thin crowd which may be very helpful in su…
View article: Shape Based Pakistan Sign Language Categorization Using Statistical Features and Support Vector Machines
Shape Based Pakistan Sign Language Categorization Using Statistical Features and Support Vector Machines Open
All over the world, deaf use sign language to communicate each other. The signs are built and communicated through movements and the shapes of the hands. Pakistan sign language (PSL) is used by the deaf community of Pakistan. Automatic rec…
View article: The Impact of Capability Maturity Model Integration on Return on Investment in IT Industry: An Exploratory Case Study
The Impact of Capability Maturity Model Integration on Return on Investment in IT Industry: An Exploratory Case Study Open
Capability Maturity Model Integration (CMMI) is a framework known for improving the quality of processes on consistent basis. This paper makes an attempt to explore, analyze and describe the impact of CMMI in terms of return on investment …
View article: The Impact Of Capability Maturity Model Integration On Return On Investment In It Industry: An Exploratory Case Study
The Impact Of Capability Maturity Model Integration On Return On Investment In It Industry: An Exploratory Case Study Open
Capability Maturity Model Integration (CMMI) is a framework known for improving the quality of processes on consistent basis. This paper makes an attempt to explore, analyze and describe the impact of CMMI in terms of return on investment …
View article: Numerical solution of generalized Burger’s-Huxley equation using local radial basis functions
Numerical solution of generalized Burger’s-Huxley equation using local radial basis functions Open
Partial differential equations are well known with their use in different areas of applied mathematics and engineering.Numerical solutions to these equations are widely accepted but the development of robust, simple and efficient numerical…
View article: Role-based efficient information extraction using rule-based decision tree
Role-based efficient information extraction using rule-based decision tree Open
View article: MEDICAL DROP BOX (MDB); A NATIONAL HEALTH INFORMATION EXCHANGE AND MANAGEMENT SYSTEM FOR MEDICAL INDUSTRY
MEDICAL DROP BOX (MDB); A NATIONAL HEALTH INFORMATION EXCHANGE AND MANAGEMENT SYSTEM FOR MEDICAL INDUSTRY Open
Introduction: National Health Information Exchange (NHIX) Systems are rapidlyevolving. Due to the cyber infrastructure and improvements in communication technology, itis possible to share healthcare related data within a geographic region …
View article: Conversion of Legal Text to a Logical Rules Set from Medical Law Using the Medical Relational Model and the World Rule Model for a Medical Decision Support System
Conversion of Legal Text to a Logical Rules Set from Medical Law Using the Medical Relational Model and the World Rule Model for a Medical Decision Support System Open
Automated formalization of legal text is a time- and effort-consuming task, but human-based validation consumes even more of both. The exchange of healthcare data in compliance with the medical privacy law requires experts with deep famili…