Muhammad Fahreza Pasha - Academia.edu (original) (raw)

Papers by Muhammad Fahreza Pasha

Research paper thumbnail of Neural network models selection scheme for health mobile app development

IAES International Journal of Artificial Intelligence (IJ-AI)

Mobile healthcare application (mHealth app) assists the frontline health worker in providing nece... more Mobile healthcare application (mHealth app) assists the frontline health worker in providing necessary health services to the patient. Unfortunately, existing mHealth apps continue to have accuracy issues and limited number of disease detection systems. Thus, an intelligent disease diagnostics system may help medical staff as well as people in poor communities in rural areas. This study proposes a scheme for simultaneously selecting the best neural network models for intelligent disease detection systems on mobile devices. To find the best models for a given dataset, the proposed scheme employs neural network models capable of evolving altered neural network architectures. Eight neural network models are developed simultaneously and then implemented on the Android Studio platform. Mobile health applications use pre-trained neural network models to provide users with disease prediction results. The performance of the mobile application is measured against the existing available datas...

Research paper thumbnail of A Lightweight Hybrid Deep Learning Privacy Preserving Model for FC-Based Industrial Internet of Medical Things

Sensors, 2022

The Industrial Internet of Things (IIoT) is gaining importance as most technologies and applicati... more The Industrial Internet of Things (IIoT) is gaining importance as most technologies and applications are integrated with the IIoT. Moreover, it consists of several tiny sensors to sense the environment and gather the information. These devices continuously monitor, collect, exchange, analyze, and transfer the captured data to nearby devices or servers using an open channel, i.e., internet. However, such centralized system based on IIoT provides more vulnerabilities to security and privacy in IIoT networks. In order to resolve these issues, we present a blockchain-based deep-learning framework that provides two levels of security and privacy. First a blockchain scheme is designed where each participating entities are registered, verified, and thereafter validated using smart contract based enhanced Proof of Work, to achieve the target of security and privacy. Second, a deep-learning scheme with a Variational AutoEncoder (VAE) technique for privacy and Bidirectional Long Short-Term Me...

Research paper thumbnail of Systematic Review Analysis on Smart Building: Challenges and Opportunities

Sustainability, 2022

Smart building technology incorporates efficient and automated controls and applications that use... more Smart building technology incorporates efficient and automated controls and applications that use smart energy products, networked sensors, and data analytics software to monitor environmental data and occupants’ energy consumption habits to improve buildings’ operation and energy performance. Smart technologies and controls are becoming increasingly important not only in research and development (R&D) but also in industrial and commercial domains, leading to a steady growth in their application in the building sector. This study examines the literature on SBEMS published between 2010 and 2020 with a systematic approach. It examines the trend with the annual number of the published studies before exploring the classification of publications in terms of factors such as domain of SBEMS, control approaches, smart technologies, and quality attributes. Recent developments around the smart building energy management systems (SBEMS) have focused on features that provide occupants with an i...

Research paper thumbnail of An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network

Sensors, 2022

The IoT refers to the interconnection of things to the physical network that is embedded with sof... more The IoT refers to the interconnection of things to the physical network that is embedded with software, sensors, and other devices to exchange information from one device to the other. The interconnection of devices means there is the possibility of challenges such as security, trustworthiness, reliability, confidentiality, and so on. To address these issues, we have proposed a novel group theory (GT)-based binary spring search (BSS) algorithm which consists of a hybrid deep neural network approach. The proposed approach effectively detects the intrusion within the IoT network. Initially, the privacy-preserving technology was implemented using a blockchain-based methodology. Security of patient health records (PHR) is the most critical aspect of cryptography over the Internet due to its value and importance, preferably in the Internet of Medical Things (IoMT). Search keywords access mechanism is one of the typical approaches used to access PHR from a database, but it is susceptible ...

Research paper thumbnail of A Novel Hybrid Trustworthy Decentralized Authentication and Data Preservation Model for Digital Healthcare IoT Based CPS

Sensors, 2022

Digital healthcare is a composite infrastructure of networking entities that includes the Interne... more Digital healthcare is a composite infrastructure of networking entities that includes the Internet of Medical Things (IoMT)-based Cyber-Physical Systems (CPS), base stations, services provider, and other concerned components. In the recent decade, it has been noted that the demand for this emerging technology is gradually increased with cost-effective results. Although this technology offers extraordinary results, but at the same time, it also offers multifarious security perils that need to be handled effectively to preserve the trust among all engaged stakeholders. For this, the literature proposes several authentications and data preservation schemes, but somehow they fail to tackle this issue with effectual results. Keeping in view, these constraints, in this paper, we proposed a lightweight authentication and data preservation scheme for IoT based-CPS utilizing deep learning (DL) to facilitate decentralized authentication among legal devices. With decentralized authentication, ...

Research paper thumbnail of Deep Learning Based Homomorphic Secure Search-Able Encryption for Keyword Search in Blockchain Healthcare System: A Novel Approach to Cryptography

Sensors, 2022

Due to the value and importance of patient health records (PHR), security is the most critical fe... more Due to the value and importance of patient health records (PHR), security is the most critical feature of encryption over the Internet. Users that perform keyword searches to gain access to the PHR stored in the database are more susceptible to security risks. Although a blockchain-based healthcare system can guarantee security, present schemes have several flaws. Existing techniques have concentrated exclusively on data storage and have utilized blockchain as a storage database. In this research, we developed a unique deep-learning-based secure search-able blockchain as a distributed database using homomorphic encryption to enable users to securely access data via search. Our suggested study will increasingly include secure key revocation and update policies. An IoT dataset was used in this research to evaluate our suggested access control strategies and compare them to benchmark models. The proposed algorithms are implemented using smart contracts in the hyperledger tool. The sugg...

Research paper thumbnail of Professional and Peer Social Support-Oriented mHealth App: A Platform for Adolescents with Depressive Symptomatology

Proceedings of the Annual Hawaii International Conference on System Sciences, 2022

Adolescent depression has been increasing worldwide and often there are no available platforms to... more Adolescent depression has been increasing worldwide and often there are no available platforms to support them. Being one of the largest age groups of smartphone users, we investigate and implement an extension framework for mobile health (mHealth) applications to alleviate depressive symptomatology and elevate psychological well-being in adolescents. In this paper, we discuss the design and development of incorporating and integrating social support provided by professionals and peers and its effective role in a mobile context.

Research paper thumbnail of Investigating the Regression Analysis Results for Classification in Test Case Prioritization: A Replicated Study

Research classification of software modules was done to validate the approaches proposed for addr... more Research classification of software modules was done to validate the approaches proposed for addressing limitations in existing classification approaches. The objective of this study was to replicate the experiments of a recently published research study and re-evaluate its results. The reason to repeat the experiment(s) and re-evaluate the results was to verify the approach to identify the faulty and non-faulty modules applied in the original study for the prioritization of test cases. As a methodology, we conducted this study to re-evaluate the results of the study. The results showed that binary logistic regression analysis remains helpful for researchers for predictions, as it provides an overall prediction of accuracy in percentage. Our study shows a prediction accuracy of 92.9% for the PureMVC Java open source program, while the original study showed an 82% prediction accuracy for the same Java program classes. It is believed by the authors that future research can refine the ...

Research paper thumbnail of Ontology-Based Regression Testing: A Systematic Literature Review

Applied Sciences, 2021

Web systems evolve by adding new functionalities or modifying them to meet users’ requirements. W... more Web systems evolve by adding new functionalities or modifying them to meet users’ requirements. Web systems require retesting to ensure that existing functionalities are according to users’ expectations. Retesting a web system is challenging due to high cost and time consumption. Existing ‘systematic literature review’ (SLR) studies do not comprehensively present the ontology-based regression testing approaches. Therefore, this study focuses on ontology-based regression testing approaches because ontologies have been a growing research solution in regression testing. Following this, a systematic search of studies was performed using the “Preferred Reporting Items for Systematic Reviews and Meta-Analyses” (PRISMA) guidelines. A total of 24 peer-reviewed studies covering ontologies (semantic and inference rules) and regression testing, published between 2007 and 2019, were selected. The results showed that mainly ontology-based regression testing approaches were published in 2011–2012...

Research paper thumbnail of Functional Requirement-Based Test Case Prioritization in Regression Testing: A Systematic Literature Review

SN Computer Science, 2021

Regression testing, as an important part of the software life cycle, ensures the validity of modi... more Regression testing, as an important part of the software life cycle, ensures the validity of modified software. Researchers' focus of this research is on functional requirement-based 'Test Case Prioritization' (TCP) because requirement specifications help keep the software correctness on customers' perceived priorities. This research study is aimed to investigate requirement-based TCP approaches, regression testing aspects, applications regarding the validation of proposed TCP approaches, systems' size under regression testing, test case size and relevant revealed faults, TCP related issues, TCP issues and types of primary studies. Researchers of this paper examined research publications, which have been published between 2009 and 2019, within the seven most significant digital repositories. These repositories are popular, and mostly used for searching papers on topics in software engineering domain. We have performed a meticulous screening of research studies and selected 35 research papers through which to investigate the answers to the proposed research questions. The final outcome of this paper showed that functional requirement-based TCP approaches have been widely covered in primary studies. The results indicated that fault size and the number of test cases are mostly discussed as regression testing aspects within primary studies. In this review paper, it has been identified that iTrust system is widely examined by researchers in primary studies. This paper's conclusion indicated that most of the primary studies have been demonstrated in the real-world settings by respective researchers of focused primary studies. The findings of this "Systematic Literature Review" (SLR) reveal some suggestions to be undertaken in future research works, such as improving the software quality, and conducting evaluations of larger systems.

Research paper thumbnail of A Novel Secure Blockchain Framework for Accessing Electronic Health Records Using Multiple Certificate Authority

Applied Sciences, 2021

Blockchain is a promising technology in the context of digital healthcare systems, but there are ... more Blockchain is a promising technology in the context of digital healthcare systems, but there are issues related to the control of accessing the electronic health records. In this paper, we propose a novel framework based on blockchain and multiple certificate authority that implement smart contracts and access health records securely. Our proposed solution provides the facilities of flexible policies to update a record or invoke the policy such that a patient has complete authority. A novel approach towards multiple certificate’s authority (CA) is introduced in the design through our proposed framework. Our proposed policies and methods overcome the shortcoming and security breaches faced by single certificate authority. Our proposed scheme provides a flexible access control mechanism for securing electronic health records as compared to the existing benchmark models. Moreover, our proposed method provides a re-enrolment facility in the case of a user lost enrolment.

Research paper thumbnail of Security, Privacy, and Reliability in Digital Healthcare Systems Using Blockchain

Electronics, 2021

According to the security breach level index, millions of records are stolen worldwide on every s... more According to the security breach level index, millions of records are stolen worldwide on every single day. Personal health records are the most targeted records on the internet, and they are considered sensitive, and valuable. Security and privacy are the most important parameters of cryptography and encryption. They reduce the availability of data on patients and healthcare to the appropriate personnel and ultimately lead to a barrier in the transfer of healthcare into a digital health system. Using a permission blockchain to share healthcare data can reduce security and privacy issues. According to the literature, most healthcare systems rely on a centralized system, which is more prone to security vulnerabilities. The existing blockchain-based healthcare schemes provide only a data-sharing framework, but they lack security and privacy. To cope with these kinds of security issues, we have designed a novel security algorithm that provides security as well as privacy with much bett...

Research paper thumbnail of Analysis of DICOM Image Compression Alternative Using Huffman Coding

Journal of Healthcare Engineering, 2019

Compression, in general, aims to reduce file size, with or without decreasing data quality of the... more Compression, in general, aims to reduce file size, with or without decreasing data quality of the original file. Digital Imaging and Communication in Medicine (DICOM) is a medical imaging file standard used to store multiple information such as patient data, imaging procedures, and the image itself. With the rising usage of medical imaging in clinical diagnosis, there is a need for a fast and secure method to share large number of medical images between healthcare practitioners, and compression has always been an option. This work analyses the Huffman coding compression method, one of the lossless compression techniques, as an alternative method to compress a DICOM file in open PACS settings. The idea of the Huffman coding compression method is to provide codeword with less number of bits for the symbol that has a higher value of byte frequency distribution. Experiments using different type of DICOM images are conducted, and the analysis on the performances in terms of compression r...

Research paper thumbnail of Indoor Positioning Using Visible LED Lights

ACM Computing Surveys, 2015

Visible light LEDs, due to their numerous advantages, are expected to become the dominant indoor ... more Visible light LEDs, due to their numerous advantages, are expected to become the dominant indoor lighting technology. These lights can also be switched ON/OFF at high frequency, enabling their additional use for wireless communication and indoor positioning. In this article, visible LED light--based indoor positioning systems are surveyed and classified into two broad categories based on the receiver structure. The basic principle and architecture of each design category, along with various position computation algorithms, are discussed and compared. Finally, several new research, implementation, commercialization, and standardization challenges are identified and highlighted for this relatively novel and interesting indoor localization technology.

Research paper thumbnail of Developing Online Adaptive Engine for Profiling Network Traffic using Evolving Connectionist Systems

Research paper thumbnail of Neocortex Inspired Hybrid Gene-Controlled Machine Intelligence Approach for Recognition and Identification

Research paper thumbnail of CEV-DW: Creation & Evolution of Versions in Data Warehouse

Asian Journal of Information Technology

This study formalizes schema and Version Evaluation Operations (VEO), creation and Management of ... more This study formalizes schema and Version Evaluation Operations (VEO), creation and Management of multiple versions capable of simulating various alternatives business scenarios. Also versioning-algebra (V-algebra) to handle VEO’s is also proposed in this study. It is expected that system developed based on proposed solution will not only keep multiple versions but also provide easy way of investing various versions.

Research paper thumbnail of Profiling the features of pre-segmented healthy liver CT scans: Towards fast detection of liver lesions in emergency scenario

2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

Automating the detection of lesions in liver CT scans requires a high performance and robust solu... more Automating the detection of lesions in liver CT scans requires a high performance and robust solution. With CT-scan start to become the norm in emergency department, the need for a fast and efficient liver lesions detection method is arising. In this paper, we propose a fast and evolvable method to profile the features of pre-segmented healthy liver and use it to detect the presence of liver lesions in emergency scenario. Our preliminary experiment with the MICCAI 2007 grand challenge datasets shows promising results of a fast training time, ability to evolve the produced healthy liver profiles, and accurate detection of the liver lesions. Lastly, the future work directions are also presented.

Research paper thumbnail of High Performance Network Worm Detection Engine Using Memory Efficient Circular Buffer

This paper presents the implementation of a memory efficient circular bufer to ensure a high perf... more This paper presents the implementation of a memory efficient circular bufer to ensure a high performance network worm detection engine. A worm detection engine's primary function is to detect the existence of worms in a particular network. The method of worm identification may vary depending on the engine. However, all approaches to worrn detection share the same need to receive and process vast amounts of data in their quest for woftns This demands the existence of a bulfer to store the data as it is being processed in order to avoid bottlenecks, memory overloading, and eventually packet loss. This paper proposes the implementation of a highly efficient circular buffer technologt to support a high performance network worm detection engine. It is demonstrated, through expeiments, that our proposed circular buffer technologt is better compare to conventional memory bulfers due to its ability to work in parallel and rotate incoming and outgoing data througlt an affay ofJile buffer locations. l.Introduction Recently, wonns have emerged as a serious threat to networks worldwide. Worms are basically computer programs which posses the ability to self-replicate and send multiple copies of themselves to all nodes inhabiting a network. They mainly spread by exploiting inherent vulnerabilities in our operating systems. Realizing this state of affairs, many worm detection engines have been conceptualized to combat this rise in worm atiacks. They function by analyzing

Research paper thumbnail of Architectures de contrôleurs ultra-faible consommation pour noeuds de réseau de capteurs sans fil

-Cet article traite de la conception d'architectures de contrôle pour les noeuds d'un réseau de c... more -Cet article traite de la conception d'architectures de contrôle pour les noeuds d'un réseau de capteurs. En utilisant conjointement la spécialisation du matériel pour réduire la consommation dynamique et la coupure d'alimentation pour les phases de veille, nous proposons un paradigme d'architecture original ainsi que son flot de conception fonctionnel depuis des spécifications de haut-niveau (langage C associéà un langage spécifiquement conçu). Nous illustrons les gains apportés par un flot complet de génération de micro-tâches matérielles par rapportà des implantations logicielles classiques ciblant des micro-contrôleurs. En combinant la spécialisation matérielle avec des techniques de réduction de puissance statique (power gating), nous réduisons de façon très significative la puissance globale (et l'énergie) dissipée par le système. Les résultats sur des benchmarks issus du domaine des réseaux de capteurs montrent des gains enénergie allant jusqu'à deux ordres de grandeur par rapport aux meilleurs micro-contrôleurs faible consommation du domaine.

Research paper thumbnail of Neural network models selection scheme for health mobile app development

IAES International Journal of Artificial Intelligence (IJ-AI)

Mobile healthcare application (mHealth app) assists the frontline health worker in providing nece... more Mobile healthcare application (mHealth app) assists the frontline health worker in providing necessary health services to the patient. Unfortunately, existing mHealth apps continue to have accuracy issues and limited number of disease detection systems. Thus, an intelligent disease diagnostics system may help medical staff as well as people in poor communities in rural areas. This study proposes a scheme for simultaneously selecting the best neural network models for intelligent disease detection systems on mobile devices. To find the best models for a given dataset, the proposed scheme employs neural network models capable of evolving altered neural network architectures. Eight neural network models are developed simultaneously and then implemented on the Android Studio platform. Mobile health applications use pre-trained neural network models to provide users with disease prediction results. The performance of the mobile application is measured against the existing available datas...

Research paper thumbnail of A Lightweight Hybrid Deep Learning Privacy Preserving Model for FC-Based Industrial Internet of Medical Things

Sensors, 2022

The Industrial Internet of Things (IIoT) is gaining importance as most technologies and applicati... more The Industrial Internet of Things (IIoT) is gaining importance as most technologies and applications are integrated with the IIoT. Moreover, it consists of several tiny sensors to sense the environment and gather the information. These devices continuously monitor, collect, exchange, analyze, and transfer the captured data to nearby devices or servers using an open channel, i.e., internet. However, such centralized system based on IIoT provides more vulnerabilities to security and privacy in IIoT networks. In order to resolve these issues, we present a blockchain-based deep-learning framework that provides two levels of security and privacy. First a blockchain scheme is designed where each participating entities are registered, verified, and thereafter validated using smart contract based enhanced Proof of Work, to achieve the target of security and privacy. Second, a deep-learning scheme with a Variational AutoEncoder (VAE) technique for privacy and Bidirectional Long Short-Term Me...

Research paper thumbnail of Systematic Review Analysis on Smart Building: Challenges and Opportunities

Sustainability, 2022

Smart building technology incorporates efficient and automated controls and applications that use... more Smart building technology incorporates efficient and automated controls and applications that use smart energy products, networked sensors, and data analytics software to monitor environmental data and occupants’ energy consumption habits to improve buildings’ operation and energy performance. Smart technologies and controls are becoming increasingly important not only in research and development (R&D) but also in industrial and commercial domains, leading to a steady growth in their application in the building sector. This study examines the literature on SBEMS published between 2010 and 2020 with a systematic approach. It examines the trend with the annual number of the published studies before exploring the classification of publications in terms of factors such as domain of SBEMS, control approaches, smart technologies, and quality attributes. Recent developments around the smart building energy management systems (SBEMS) have focused on features that provide occupants with an i...

Research paper thumbnail of An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network

Sensors, 2022

The IoT refers to the interconnection of things to the physical network that is embedded with sof... more The IoT refers to the interconnection of things to the physical network that is embedded with software, sensors, and other devices to exchange information from one device to the other. The interconnection of devices means there is the possibility of challenges such as security, trustworthiness, reliability, confidentiality, and so on. To address these issues, we have proposed a novel group theory (GT)-based binary spring search (BSS) algorithm which consists of a hybrid deep neural network approach. The proposed approach effectively detects the intrusion within the IoT network. Initially, the privacy-preserving technology was implemented using a blockchain-based methodology. Security of patient health records (PHR) is the most critical aspect of cryptography over the Internet due to its value and importance, preferably in the Internet of Medical Things (IoMT). Search keywords access mechanism is one of the typical approaches used to access PHR from a database, but it is susceptible ...

Research paper thumbnail of A Novel Hybrid Trustworthy Decentralized Authentication and Data Preservation Model for Digital Healthcare IoT Based CPS

Sensors, 2022

Digital healthcare is a composite infrastructure of networking entities that includes the Interne... more Digital healthcare is a composite infrastructure of networking entities that includes the Internet of Medical Things (IoMT)-based Cyber-Physical Systems (CPS), base stations, services provider, and other concerned components. In the recent decade, it has been noted that the demand for this emerging technology is gradually increased with cost-effective results. Although this technology offers extraordinary results, but at the same time, it also offers multifarious security perils that need to be handled effectively to preserve the trust among all engaged stakeholders. For this, the literature proposes several authentications and data preservation schemes, but somehow they fail to tackle this issue with effectual results. Keeping in view, these constraints, in this paper, we proposed a lightweight authentication and data preservation scheme for IoT based-CPS utilizing deep learning (DL) to facilitate decentralized authentication among legal devices. With decentralized authentication, ...

Research paper thumbnail of Deep Learning Based Homomorphic Secure Search-Able Encryption for Keyword Search in Blockchain Healthcare System: A Novel Approach to Cryptography

Sensors, 2022

Due to the value and importance of patient health records (PHR), security is the most critical fe... more Due to the value and importance of patient health records (PHR), security is the most critical feature of encryption over the Internet. Users that perform keyword searches to gain access to the PHR stored in the database are more susceptible to security risks. Although a blockchain-based healthcare system can guarantee security, present schemes have several flaws. Existing techniques have concentrated exclusively on data storage and have utilized blockchain as a storage database. In this research, we developed a unique deep-learning-based secure search-able blockchain as a distributed database using homomorphic encryption to enable users to securely access data via search. Our suggested study will increasingly include secure key revocation and update policies. An IoT dataset was used in this research to evaluate our suggested access control strategies and compare them to benchmark models. The proposed algorithms are implemented using smart contracts in the hyperledger tool. The sugg...

Research paper thumbnail of Professional and Peer Social Support-Oriented mHealth App: A Platform for Adolescents with Depressive Symptomatology

Proceedings of the Annual Hawaii International Conference on System Sciences, 2022

Adolescent depression has been increasing worldwide and often there are no available platforms to... more Adolescent depression has been increasing worldwide and often there are no available platforms to support them. Being one of the largest age groups of smartphone users, we investigate and implement an extension framework for mobile health (mHealth) applications to alleviate depressive symptomatology and elevate psychological well-being in adolescents. In this paper, we discuss the design and development of incorporating and integrating social support provided by professionals and peers and its effective role in a mobile context.

Research paper thumbnail of Investigating the Regression Analysis Results for Classification in Test Case Prioritization: A Replicated Study

Research classification of software modules was done to validate the approaches proposed for addr... more Research classification of software modules was done to validate the approaches proposed for addressing limitations in existing classification approaches. The objective of this study was to replicate the experiments of a recently published research study and re-evaluate its results. The reason to repeat the experiment(s) and re-evaluate the results was to verify the approach to identify the faulty and non-faulty modules applied in the original study for the prioritization of test cases. As a methodology, we conducted this study to re-evaluate the results of the study. The results showed that binary logistic regression analysis remains helpful for researchers for predictions, as it provides an overall prediction of accuracy in percentage. Our study shows a prediction accuracy of 92.9% for the PureMVC Java open source program, while the original study showed an 82% prediction accuracy for the same Java program classes. It is believed by the authors that future research can refine the ...

Research paper thumbnail of Ontology-Based Regression Testing: A Systematic Literature Review

Applied Sciences, 2021

Web systems evolve by adding new functionalities or modifying them to meet users’ requirements. W... more Web systems evolve by adding new functionalities or modifying them to meet users’ requirements. Web systems require retesting to ensure that existing functionalities are according to users’ expectations. Retesting a web system is challenging due to high cost and time consumption. Existing ‘systematic literature review’ (SLR) studies do not comprehensively present the ontology-based regression testing approaches. Therefore, this study focuses on ontology-based regression testing approaches because ontologies have been a growing research solution in regression testing. Following this, a systematic search of studies was performed using the “Preferred Reporting Items for Systematic Reviews and Meta-Analyses” (PRISMA) guidelines. A total of 24 peer-reviewed studies covering ontologies (semantic and inference rules) and regression testing, published between 2007 and 2019, were selected. The results showed that mainly ontology-based regression testing approaches were published in 2011–2012...

Research paper thumbnail of Functional Requirement-Based Test Case Prioritization in Regression Testing: A Systematic Literature Review

SN Computer Science, 2021

Regression testing, as an important part of the software life cycle, ensures the validity of modi... more Regression testing, as an important part of the software life cycle, ensures the validity of modified software. Researchers' focus of this research is on functional requirement-based 'Test Case Prioritization' (TCP) because requirement specifications help keep the software correctness on customers' perceived priorities. This research study is aimed to investigate requirement-based TCP approaches, regression testing aspects, applications regarding the validation of proposed TCP approaches, systems' size under regression testing, test case size and relevant revealed faults, TCP related issues, TCP issues and types of primary studies. Researchers of this paper examined research publications, which have been published between 2009 and 2019, within the seven most significant digital repositories. These repositories are popular, and mostly used for searching papers on topics in software engineering domain. We have performed a meticulous screening of research studies and selected 35 research papers through which to investigate the answers to the proposed research questions. The final outcome of this paper showed that functional requirement-based TCP approaches have been widely covered in primary studies. The results indicated that fault size and the number of test cases are mostly discussed as regression testing aspects within primary studies. In this review paper, it has been identified that iTrust system is widely examined by researchers in primary studies. This paper's conclusion indicated that most of the primary studies have been demonstrated in the real-world settings by respective researchers of focused primary studies. The findings of this "Systematic Literature Review" (SLR) reveal some suggestions to be undertaken in future research works, such as improving the software quality, and conducting evaluations of larger systems.

Research paper thumbnail of A Novel Secure Blockchain Framework for Accessing Electronic Health Records Using Multiple Certificate Authority

Applied Sciences, 2021

Blockchain is a promising technology in the context of digital healthcare systems, but there are ... more Blockchain is a promising technology in the context of digital healthcare systems, but there are issues related to the control of accessing the electronic health records. In this paper, we propose a novel framework based on blockchain and multiple certificate authority that implement smart contracts and access health records securely. Our proposed solution provides the facilities of flexible policies to update a record or invoke the policy such that a patient has complete authority. A novel approach towards multiple certificate’s authority (CA) is introduced in the design through our proposed framework. Our proposed policies and methods overcome the shortcoming and security breaches faced by single certificate authority. Our proposed scheme provides a flexible access control mechanism for securing electronic health records as compared to the existing benchmark models. Moreover, our proposed method provides a re-enrolment facility in the case of a user lost enrolment.

Research paper thumbnail of Security, Privacy, and Reliability in Digital Healthcare Systems Using Blockchain

Electronics, 2021

According to the security breach level index, millions of records are stolen worldwide on every s... more According to the security breach level index, millions of records are stolen worldwide on every single day. Personal health records are the most targeted records on the internet, and they are considered sensitive, and valuable. Security and privacy are the most important parameters of cryptography and encryption. They reduce the availability of data on patients and healthcare to the appropriate personnel and ultimately lead to a barrier in the transfer of healthcare into a digital health system. Using a permission blockchain to share healthcare data can reduce security and privacy issues. According to the literature, most healthcare systems rely on a centralized system, which is more prone to security vulnerabilities. The existing blockchain-based healthcare schemes provide only a data-sharing framework, but they lack security and privacy. To cope with these kinds of security issues, we have designed a novel security algorithm that provides security as well as privacy with much bett...

Research paper thumbnail of Analysis of DICOM Image Compression Alternative Using Huffman Coding

Journal of Healthcare Engineering, 2019

Compression, in general, aims to reduce file size, with or without decreasing data quality of the... more Compression, in general, aims to reduce file size, with or without decreasing data quality of the original file. Digital Imaging and Communication in Medicine (DICOM) is a medical imaging file standard used to store multiple information such as patient data, imaging procedures, and the image itself. With the rising usage of medical imaging in clinical diagnosis, there is a need for a fast and secure method to share large number of medical images between healthcare practitioners, and compression has always been an option. This work analyses the Huffman coding compression method, one of the lossless compression techniques, as an alternative method to compress a DICOM file in open PACS settings. The idea of the Huffman coding compression method is to provide codeword with less number of bits for the symbol that has a higher value of byte frequency distribution. Experiments using different type of DICOM images are conducted, and the analysis on the performances in terms of compression r...

Research paper thumbnail of Indoor Positioning Using Visible LED Lights

ACM Computing Surveys, 2015

Visible light LEDs, due to their numerous advantages, are expected to become the dominant indoor ... more Visible light LEDs, due to their numerous advantages, are expected to become the dominant indoor lighting technology. These lights can also be switched ON/OFF at high frequency, enabling their additional use for wireless communication and indoor positioning. In this article, visible LED light--based indoor positioning systems are surveyed and classified into two broad categories based on the receiver structure. The basic principle and architecture of each design category, along with various position computation algorithms, are discussed and compared. Finally, several new research, implementation, commercialization, and standardization challenges are identified and highlighted for this relatively novel and interesting indoor localization technology.

Research paper thumbnail of Developing Online Adaptive Engine for Profiling Network Traffic using Evolving Connectionist Systems

Research paper thumbnail of Neocortex Inspired Hybrid Gene-Controlled Machine Intelligence Approach for Recognition and Identification

Research paper thumbnail of CEV-DW: Creation & Evolution of Versions in Data Warehouse

Asian Journal of Information Technology

This study formalizes schema and Version Evaluation Operations (VEO), creation and Management of ... more This study formalizes schema and Version Evaluation Operations (VEO), creation and Management of multiple versions capable of simulating various alternatives business scenarios. Also versioning-algebra (V-algebra) to handle VEO’s is also proposed in this study. It is expected that system developed based on proposed solution will not only keep multiple versions but also provide easy way of investing various versions.

Research paper thumbnail of Profiling the features of pre-segmented healthy liver CT scans: Towards fast detection of liver lesions in emergency scenario

2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

Automating the detection of lesions in liver CT scans requires a high performance and robust solu... more Automating the detection of lesions in liver CT scans requires a high performance and robust solution. With CT-scan start to become the norm in emergency department, the need for a fast and efficient liver lesions detection method is arising. In this paper, we propose a fast and evolvable method to profile the features of pre-segmented healthy liver and use it to detect the presence of liver lesions in emergency scenario. Our preliminary experiment with the MICCAI 2007 grand challenge datasets shows promising results of a fast training time, ability to evolve the produced healthy liver profiles, and accurate detection of the liver lesions. Lastly, the future work directions are also presented.

Research paper thumbnail of High Performance Network Worm Detection Engine Using Memory Efficient Circular Buffer

This paper presents the implementation of a memory efficient circular bufer to ensure a high perf... more This paper presents the implementation of a memory efficient circular bufer to ensure a high performance network worm detection engine. A worm detection engine's primary function is to detect the existence of worms in a particular network. The method of worm identification may vary depending on the engine. However, all approaches to worrn detection share the same need to receive and process vast amounts of data in their quest for woftns This demands the existence of a bulfer to store the data as it is being processed in order to avoid bottlenecks, memory overloading, and eventually packet loss. This paper proposes the implementation of a highly efficient circular buffer technologt to support a high performance network worm detection engine. It is demonstrated, through expeiments, that our proposed circular buffer technologt is better compare to conventional memory bulfers due to its ability to work in parallel and rotate incoming and outgoing data througlt an affay ofJile buffer locations. l.Introduction Recently, wonns have emerged as a serious threat to networks worldwide. Worms are basically computer programs which posses the ability to self-replicate and send multiple copies of themselves to all nodes inhabiting a network. They mainly spread by exploiting inherent vulnerabilities in our operating systems. Realizing this state of affairs, many worm detection engines have been conceptualized to combat this rise in worm atiacks. They function by analyzing

Research paper thumbnail of Architectures de contrôleurs ultra-faible consommation pour noeuds de réseau de capteurs sans fil

-Cet article traite de la conception d'architectures de contrôle pour les noeuds d'un réseau de c... more -Cet article traite de la conception d'architectures de contrôle pour les noeuds d'un réseau de capteurs. En utilisant conjointement la spécialisation du matériel pour réduire la consommation dynamique et la coupure d'alimentation pour les phases de veille, nous proposons un paradigme d'architecture original ainsi que son flot de conception fonctionnel depuis des spécifications de haut-niveau (langage C associéà un langage spécifiquement conçu). Nous illustrons les gains apportés par un flot complet de génération de micro-tâches matérielles par rapportà des implantations logicielles classiques ciblant des micro-contrôleurs. En combinant la spécialisation matérielle avec des techniques de réduction de puissance statique (power gating), nous réduisons de façon très significative la puissance globale (et l'énergie) dissipée par le système. Les résultats sur des benchmarks issus du domaine des réseaux de capteurs montrent des gains enénergie allant jusqu'à deux ordres de grandeur par rapport aux meilleurs micro-contrôleurs faible consommation du domaine.