Muhammad Iqbal, 01-243231-014(Computer Sciences, 2025)
Precise prediction of antigenic proteins (APs) is crucial for accelerating vaccine development, antibody engineering, and immunotherapeutic research. This study presents a novel and effective deep learning framework the ...
The rapid expansion of the Internet of Things (IoT) has significantly increased the cyber-attack surface, exposing infrastructures to adaptive and stealthy threats. Traditional Intrusion Detection Systems (IDS), whether ...
Muhammad Ahmed Raza, 01-247232-011(Computer Sciences, 2025)
The rise of stealthy and evasive mal ware particularly fileless mal ware and cryptojacking poses a significant challenge to traditional security mechanisms that rely on file-based signatures and static analysis. This thesis ...
Muhammad Junaid, 01-243232-004(Computer Sciences, 2025)
Drug-Drug Interactions (DDIs) cause major clinical challenges leading to adverse drug reactions, lower the therapeutic value of drugs, and increase the overall healthcare burden, especially in the otolaryngology domain ...
Anomaly detection involves identifying data points or patterns that significantly diverge from expected behavior within a system, often due to external disruptions, faults, or uncertainties during operation. In smart ...
This research explores the important difference between Functional Software Requirements (FRs) and Non-Functional Software Requirements (NFRs). FRs describe what a software system should do, such as user authentication and ...
Abdullah Khan, .01-247222-002(Computer Sciences, 2025)
Cryptojacking, the forbidden exploitation of computing resources solely for cryptocurrency mining, represents as a continually growing cybersecurity threat due to it’s real ability for operating covertly across all multiple ...
Raad Ali Hashmi, 01-247222-007(Computer Sciences, 2025)
The rising complexity of malware, particularly in environments of high security like air-gapped networks, requires sophisticated detection mechanisms that can detect sophisticated and obfuscated threats. This thesis proposes ...
Muhammad Haris Nawaz, 01-247232-008(Computer Sciences, 2025)
The detection of malware presents a serious concern in cybersecurity and classic techniques such as signature-based detection and heuristic analysis are not generally effective, being unable to effectively meet the changing ...
Muhammad Zeshan Malik, 01-247232-013(Computer Sciences, 2025)
The sophistication and number of cyber threats in the current era have exposed the limitations of traditional intrusion detection systems (IDS), which rely on signature-based methods and struggle with high false positive ...
Advanced persistent Threast are one of the largest threast in todays cybersecurity beacause they are defined by their stealty operation, longevity and purposeful goals. usually perpetrated by well funded, sophisticated ...
Zain Ul Abdeen, 01-247232-019(Computer Sciences, 2025)
Fast population growth and the use of personal vehicles in modern cities challenge the effective operation of traffic in urban centers, as it creates congestion and accident-related problems. Static traffic management ...
The growing integration of renewable energy sources and smart appliances into residential grids has increased the importance of Intelligent Home Energy Management Systems (HEMS). These systems aim to reduce electricity ...
Anomaly detection is a challenging task. Anomalies are deviant behavior from the normal pattern. However, unsupervised anomalies are mostly validated by domain experts. All-time experts are not available, and manually ...
Flood is growing problem in countries like Pakistan where thousands of people lose their lives and properties. Various disaster events are affecting people worldwide, especially in South Asia country like Pakistan where ...
Drug–Drug Interaction (DDI) prediction plays a critical role in computational pharmacology, where the accurate identification of potential adverse interactions can prevent harmful clinical outcomes and improve patient ...
Breast cancer is one of the most prevalent cancers worldwide and a leading cause of mortality among women. Personalized therapeutic strategies remain a pressing need due to the molecular heterogeneity of the disease, which ...
Abdul Qadeer, 01-249232-022(Computer Sciences, 2025)
Sickle Cell Anemia (SCA) is an inherited genetic blood disorder caused by mutations in hemoglobin genes. In this disorder, red blood cells become sickled and less flexible, leading to blocked blood flow in small vesicles, ...
Abdul Wahab, 01-249232-001(Computer Sciences, 2025)
The unprecedented growth and extreme volatility of the cryptocurrency market have created an urgent and persistent need for reliable and precise forecasting models that can assist investors, traders, and financial analysts ...
The use of immersive technologies in education has transformed the way complicated technical concepts are taught and understood. Immersive Virtual Reality (IVR), in particular, promotes interactive and experiential learning, ...