Browsing by Author "Khan, Habib Ullah"
Now showing items 1-20 of 91
-
Adaptive architecture and principles for securing the iot systems
Gill, Asif Qumer; Beydoun, Ghassan; Niazi, Mahmood; Khan, Habib Ullah ( Springer , 2021 , Book chapter)There is an increasing interest in IoT-enabled smart digital systems. However, it is important to address their security concerns. This paper aims to address this need and proposes an adaptive architecture driven approach ... -
Analysis of Cursive Text Recognition Systems: A Systematic Literature Review
Khan, Sulaiman; Nazir, Shah; Khan, Habib Ullah ( Association for Computing Machinery (ACM) , 2023 , Article)Regional and cultural diversities around the world have given birth to a large number of writing systems and scripts, which consist of varying character sets. Developing an optimal character recognition for such a varying ... -
Analysis of Navigation Assistants for Blind and Visually Impaired People: A Systematic Review
Khan, Sulaiman; Nazir, Shah; Khan, Habib Ullah ( IEEE , 2021 , Article)Over the last few decades, the development in the field of navigation and routing devices has become a hindering task for the researchers to develop smart and intelligent guiding mechanism at indoor and outdoor locations ... -
Analyzing factors that influence offshore outsourcing decision of application maintenance
Rahman, Hanif Ur; Raza, Mushtaq; Afsar, Palwasha; Khan, Habib Ullah; Nazir, Shah ( IEEE , 2020 , Article)Application maintenance consumes a considerable amount of an organization's time and resources each year. Almost 60% of IT budget is spent alone on application maintenance. The reason of offshore outsourcing of application ... -
Are enterprises ready for big data analytics? A survey-based approach
Brock, Vitor Fabian; Khan, Habib Ullah ( Inderscience Publishers , 2017 , Article)Big data analytics is a fascinating topic in the field of computer science and information systems as it challenges fundamental aspects of computation. The aim of this study is to investigate the acceptance and usage of ... -
Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions
Liao, Zitian; Nazir, Shah; Khan, Habib Ullah; Shafiq, Muhammad ( Hindawi , 2021 , Article)Software component plays a significant role in the functionality of software systems. Component of software is the existing and reusable parts of a software system that is formerly debugged, confirmed, and practiced. The ... -
Assessing the Role of AI-Based Smart Sensors in Smart Cities Using AHP and MOORA
Khan, Habib Ullah; Nazir, Shah ( Multidisciplinary Digital Publishing Institute (MDPI) , 2023 , Article)We know that in today’s advanced world, artificial intelligence (AI) and machine learning (ML)-grounded methodologies are playing a very optimistic role in performing difficult and time-consuming activities very conveniently ... -
Attributes-Based Decision Making for Selection of Requirement Elicitation Techniques Using the Analytic Network Process
Li, Jinyu; Ullah, Asif; Li, Jun; Nazir, Shah; Khan, Habib Ullah; Ur Rehman, Hanif; Haq, Amin Ul; Celik, Erkan... more authors ... less authors ( Hindawi , 2020 , Article)Requirement engineering is the first phase of software engineering. In requirement engineering, the first phase is requirement elicitation (RE), which is the most critical and error-prone activity. In this phase, the ... -
Augmented Reality Interface for Complex Anatomy Learning in the Central Nervous System: A Systematic Review
Wirza, Rahmita; Nazir, Shah; Khan, Habib Ullah; García-Magariño, Iván; Amin, Rohul ( Hindawi , 2020 , Article)The medical system is facing the transformations with augmentation in the use of medical information systems, electronic records, smart, wearable devices, and handheld. The central nervous system function is to control the ... -
Automated Detection of Brain Tumor through Magnetic Resonance Images Using Convolutional Neural Network
Gull, Sahar; Akbar, Shahzad; Khan, Habib Ullah ( Hindawi , 2021 , Article)Brain tumor is a fatal disease, caused by the growth of abnormal cells in the brain tissues. Therefore, early and accurate detection of this disease can save patient's life. This paper proposes a novel framework for the ... -
Betalogger: Smartphone Sensor-based Side-channel Attack Detection and Text Inference Using Language Modeling and Dense MultiLayer Neural Network
Javed, Abdul Rehman; Rehman, Saif Ur; Khan, Mohib Ullah; Alazab, Mamoun; Khan, Habib Ullah ( Association for Computing Machinery (ACM) , 2021 , Article)With the recent advancement of smartphone technology in the past few years, smartphone usage has increased on a tremendous scale due to its portability and ability to perform many daily life tasks. As a result, smartphones ... -
Bidirectional Language Modeling: A Systematic Literature Review
Shah Jahan, Muhammad; Khan, Habib Ullah; Akbar, Shahzad; Umar Farooq, Muhammad; Gul, Sarah; Amjad, Anam... more authors ... less authors ( Hindawi , 2021 , Article)In transfer learning, two major activities, i.e., pretraining and fine-tuning, are carried out to perform downstream tasks. The advent of transformer architecture and bidirectional language models, e.g., bidirectional ... -
Big data velocity management-from stream to warehouse via high performance memory optimized index join
Naeem, M. Asif; Mirza, Farhaan; Khan, Habib Ullah; Sundaram, David; Jamil, Noreen; Weber, Gerald... more authors ... less authors ( IEEE , 2020 , Article)Efficient resource optimization is critical to manage the velocity and volume of real-time streaming data in near-real-time data warehousing and business intelligence. This article presents a memory optimisation algorithm ... -
Blockchain-Based Automated System for Identification and Storage of Networks
Prashar, Deepak; Jha, Nishant; Shafiq, Muhammad; Ahmad, Nazir; Rashid, Mamoon; Amin Banday, Shoeib; Khan, Habib Ullah... more authors ... less authors ( Hindawi , 2021 , Article)Network topology is one of the major factors in defining the behavior of a network. In the present scenario, the demand for network security has increased due to an increase in the possibility of attacks by malicious users. ... -
Challenges and practices identification in complex outsourcing relationships: A systematic literature review
Khan, Ghulam Murtaza; Khan, Siffat Ullah; Khan, Habib Ullah; Ilyas, Muhammad ( PLOS , 2022 , Article)Complex IT outsourcing relationships aptitude several benefits such as increased cost likelihood and lowered costs, higher scalability and flexibility upon demand. However, by virtue of its complexity, the complex outsourcing ... -
Challenges And Practices Identification Via A Systematic Literature Review In The Adoption Of Green Cloud Computing: Client’s Side Approach
Ahmad, Ashfaq; Khan, Siffat Ullah; Khan, Habib Ullah; Khan, Ghulam Murtaza; Ilyas, Muhammad ( IEEE , 2021 , Article)Green cloud computing gains popularity over the last decade due to the extensive use of cloud computing. The trend towards cloud computing is spreading at a fast rate. Cloud computing providers extend their data centers ... -
Challenges and Their Practices in Adoption of Hybrid Cloud Computing: An Analytical Hierarchy Approach
Khan, Siffat Ullah; Khan, Habib Ullah; Ullah, Naeem; Khan, Rafiq Ahmad ( Hindawi , 2021 , Article)Cloud computing adoption provides various advantages for companies. In particular, hybrid cloud shares the advantages of both the public and private cloud technologies because it combines the private in-house cloud with ... -
Complexity of Deep Convolutional Neural Networks in Mobile Computing
Naeem, Saad; Jamil, Noreen; Khan, Habib Ullah; Nazir, Shah ( Hindawi , 2020 , Article)Neural networks employ massive interconnection of simple computing units called neurons to compute the problems that are highly nonlinear and could not be hard coded into a program. These neural networks are computation-intensive, ... -
A comprehensive analysis of healthcare big data management, analytics and scientific programming
Nazir, Shah; Khan, Sulaiman; Khan, Habib Ullah; Ali, Shaukat; Garcia-Magarino, Ivan; Atan, Rodziah Binti; Nawaz, Muhammad... more authors ... less authors ( IEEE , 2020 , Article)Healthcare systems are transformed digitally with the help of medical technology, information systems, electronic medical records, wearable and smart devices, and handheld devices. The advancement in the medical big data, ... -
Container Performance and Vulnerability Management for Container Security Using Docker Engine
Alyas, Tahir; Ali, Sikandar; Khan, Habib Ullah; Samad, Ali; Alissa, Khalid; Saleem, Muhammad Asif... more authors ... less authors ( Wiley , 2022 , Article)Containers have evolved to support microservice architecture as a low-cost alternative to virtual machines. Containers are increasingly prevalent in the virtualization landscape because of better working; containers can ...