Publications by authors named "Munam Ali Shah"

Location privacy is an important parameter to be addressed in the case of vehicular ad hoc networks. Each vehicle frequently communicates with location-based services to find the nearest location of interest. The location messages communicated with the location server may contain sensitive information like vehicle identity, location, direction, and other headings.

View Article and Find Full Text PDF

Intracranial hemorrhage (ICH) can lead to death or disability, which requires immediate action from radiologists. Due to the heavy workload, less experienced staff, and the complexity of subtle hemorrhages, a more intelligent and automated system is necessary to detect ICH. In literature, many artificial-intelligence-based methods are proposed.

View Article and Find Full Text PDF

Machine Learning and computer vision have been the frontiers of the war against the COVID-19 Pandemic. Radiology has vastly improved the diagnosis of diseases, especially lung diseases, through the early assessment of key disease factors. Chest X-rays have thus become among the commonly used radiological tests to detect and diagnose many lung diseases.

View Article and Find Full Text PDF

Protecting the privacy of individuals is of utmost concern in today's society, as inscribed and governed by the prevailing privacy laws, such as GDPR. In serial data, bits of data are continuously released, but their combined effect may result in a privacy breach in the whole serial publication. Protecting serial data is crucial for preserving them from adversaries.

View Article and Find Full Text PDF

The world is suffering from a new pandemic of Covid-19 that is affecting human lives. The collection of records for Covid-19 patients is necessary to tackle that situation. The decision support systems (DSS) are used to gather that records.

View Article and Find Full Text PDF
Article Synopsis
  • The COVID-19 outbreak has drastically impacted the world, causing human distress, economic damage, and significant changes in health and social sectors.
  • This study focuses on analyzing social and economic trends of COVID-19 specifically in Pakistan using machine learning techniques and data from an online survey of 410 respondents.
  • The research also includes sentiment analysis of tweets from Pakistani users to gauge public attitudes towards the pandemic, identifying both positive and negative sentiments.
View Article and Find Full Text PDF

Location privacy is a critical problem in the vehicular communication networks. Vehicles broadcast their road status information to other entities in the network through beacon messages to inform other entities in the network. The beacon message content consists of the vehicle ID, speed, direction, position, and other information.

View Article and Find Full Text PDF

Computation offloading is a process that provides computing services to vehicles with computation sensitive jobs. Volunteer Computing-Based Vehicular Ad-hoc Networking (VCBV) is envisioned as a promising solution to perform task executions in vehicular networks using an emerging concept known as vehicle-as-a-resource (VaaR). In VCBV systems, offloading is the primary technique used for the execution of delay-sensitive applications which rely on surplus resource utilization.

View Article and Find Full Text PDF

Internet of Things-enabled Intelligent Transportation Systems (ITS) are gaining significant attention in academic literature and industry, and are seen as a solution to enhancing road safety in smart cities. Due to the ever increasing number of vehicles, a significant rise in the number of road accidents has been observed. Vehicles embedded with a plethora of sensors enable us to not only monitor the current situation of the vehicle and its surroundings but also facilitates the detection of incidents.

View Article and Find Full Text PDF

Traffic accidents have become an important problem for governments, researchers and vehicle manufacturers over the last few decades. However, accidents are unfortunate and frequently occur on the road and cause death, damage to infrastructure, and health injuries. Therefore, there is a need to develop a protocol to avoid or prevent traffic accidents at the extreme level in order to reduce human loss.

View Article and Find Full Text PDF