Skip to main content

and
  1. No Access

    Article

    An improved 3D U-Net-based deep learning system for brain tumor segmentation using multi-modal MRI

    Cancer is a lethal illness that requires an initial stage prognosis to enhance patient survival rate. Accurate brain tumor and their sub-structure segmentation through Magnetic Resonance Images (MRIs) is a tou...

    Saqib Ali, Rooha Khurram, Khalil ur Rehman, Anaa Yasin in Multimedia Tools and Applications (2024)

  2. Article

    Open Access

    Aneuploidy is Linked to Neurological Phenotypes Through Oxidative Stress

    Aneuploidy, having an aberrant genome, is gaining increasing attention in neurodegenerative diseases. It gives rise to proteotoxic stress as well as a stereotypical oxidative shift which makes these cells sens...

    Anowarul Islam, Zeeshan Shaukat, Rashid Hussain in Journal of Molecular Neuroscience (2024)

  3. No Access

    Article

    Efficient scheme to perform semantic segmentation on 3-D brain tumor using 3-D u-net architecture

    Glioma is the most common type of brain tumor with varying level of malignancies and projection. Designing personalized therapy and to foresee response towards the therapy needs better understanding of tumor b...

    Zeeshan Shaukat, Qurratul Ain Farooq, Chuangbai **ao in Multimedia Tools and Applications (2024)

  4. Article

    Open Access

    Drosophila expressing mutant human KCNT1 transgenes make an effective tool for targeted drug screening in a whole animal model of KCNT1-epilepsy

    Mutations in the KCNT1 potassium channel cause severe forms of epilepsy which are poorly controlled with current treatments. In vitro studies have shown that KCNT1-epilepsy mutations are gain of function, signifi...

    Rashid Hussain, Chiao **n Lim, Zeeshan Shaukat, Anowarul Islam in Scientific Reports (2024)

  5. No Access

    Article

    A recognition model for handwritten Persian/Arabic numbers based on optimized deep convolutional neural network

    Recently, artificial intelligence-based applications are universally acknowledged. Digit recognition, particularly Persian/Arabic handwritten digits, has many applications in today’s commercial contexts for ex...

    Saqib Ali, Sana Sahiba, Muhammad Azeem in Multimedia Tools and Applications (2023)

  6. Article

    Open Access

    A state-of-the-art technique to perform cloud-based semantic segmentation using deep learning 3D U-Net architecture

    Glioma is the most aggressive and dangerous primary brain tumor with a survival time of less than 14 months. Segmentation of tumors is a necessary task in the image processing of the gliomas and is important f...

    Zeeshan Shaukat, Qurat ul Ain Farooq, Shanshan Tu, Chuangbai **ao in BMC Bioinformatics (2022)

  7. Article

    Open Access

    Prophylactic potential of honey and Nigella sativa L. against hospital and community-based SARS-CoV-2 spread: a structured summary of a study protocol for a randomised controlled trial

    Considering the therapeutic potential of honey and Nigella sativa (HNS) in coronavirus disease 2019 (COVID-19) patients, the objective of the study is defined to evaluate the prophylactic role of HNS.

    Sohaib Ashraf, Shoaib Ashraf, Rutaba Akmal, Moneeb Ashraf, Larab Kalsoom in Trials (2021)

  8. No Access

    Article

    Cloud-based efficient scheme for handwritten digit recognition

    Handwritten character recognition has been acknowledged and achieved more prominent attention in pattern recognition research community due to enormous applications & vagueness in application methods, while cl...

    Zeeshan Shaukat, Saqib Ali, Qurat ul Ain Farooq in Multimedia Tools and Applications (2020)

  9. Article

    Open Access

    A systems biology-driven approach to construct a comprehensive protein interaction network of influenza A virus with its host

    Influenza A virus (IAV) infection is a serious public health problem not only in South East Asia but also in European and African countries. Scientists are using network biology to dig deep into the essential ...

    Qurat ul Ain Farooq, Zeeshan Shaukat, Sara Aiman, Tong Zhou in BMC Infectious Diseases (2020)

  10. Article

    Open Access

    Inferring Virus-Host relationship between HPV and its host Homo sapiens using protein interaction network

    Human papilloma virus (HPV) is a serious threat to human life globally with over 100 genotypes including cancer causing high risk HPVs. Study on protein interaction maps of pathogens with their host is a recen...

    Qurat ul Ain Farooq, Zeeshan Shaukat, Tong Zhou, Sara Aiman in Scientific Reports (2020)

  11. Article

    Sentiment analysis on IMDB using lexicon and neural networks

    To find out what other people think has been an essential part of information-gathering behaviors. And in the case of movies, the movie reviews can provide an intricate insight into the movie and can help deci...

    Zeeshan Shaukat, Abdul Ahad Zulfiqar, Chuangbai **ao, Muhammad Azeem in SN Applied Sciences (2020)

  12. No Access

    Chapter and Conference Paper

    Facial Recognition on Cloud for Android Based Wearable Devices

    Facial recognition applications for Android Based Wearable Devices (ABWD) can benefit from cloud computing as they become easy to acquire and widely available. There are several applications of facial recognit...

    Zeeshan Shaukat, Chuangbai **ao in Advances in Human Factors in Wearable Tech… (2020)

  13. No Access

    Chapter and Conference Paper

    Macrosomia Fetus Prediction with Cluster-Based Feature Selection Scheme

    We propose a cluster-based feature selection (CFS) scheme to establish an efficient prognosis process for the identification of a Macrosomia fetus. Macrosomia fetus adheres numerous complications during and af...

    Faheem Akhtar, Jianqiang Li, Yan Pei, Shafaq Siraj, Zeeshan Shaukat in Frontier Computing (2020)

  14. Article

    An efficient and improved scheme for handwritten digit recognition based on convolutional neural network

    Character recognition from handwritten images has received greater attention in research community of pattern recognition due to vast applications and ambiguity in learning methods. Primarily, two steps includ...

    Saqib Ali, Zeeshan Shaukat, Muhammad Azeem, Zareen Sakhawat in SN Applied Sciences (2019)

  15. No Access

    Chapter and Conference Paper

    Cloud Computing: Virtual Web Hosting on Infrastructure as a Service (IaaS)

    Cloud computing is an Information Technology (IT) model that provides convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, ...

    Juan Fang, Zeeshan Shaukat, Saqib Ali in Mobile Ad-hoc and Sensor Networks (2018)

  16. Article

    Open Access

    Phosphoenolpyruvate Carboxykinase Maintains Glycolysis-driven Growth in Drosophila Tumors

    Tumors frequently fail to pass on all their chromosomes correctly during cell division, and this chromosomal instability (CIN) causes irregular aneuploidy and oxidative stress in cancer cells. Our objective wa...

    Rashid Hussain, Zeeshan Shaukat, Mahwish Khan, Robert Saint in Scientific Reports (2017)

  17. Article

    Open Access

    Three novel F8 mutations in sporadic haemophilia A cases

    Rashid Hussain, Noman Bin Abid, Sajjad Hussain, Zeeshan Shaukat in SpringerPlus (2012)