Vol. 4 No. 4 (2024): The Asian Bulletin of Big Data Management

Published: 2024-10-25

Business Analytics

  • Designing for Interaction: The role of Architecture in Bridging Tourists and Local Communities, Case study of Kalasha Valley, Pakistan

    Shazia Hanif, Shariyeh Hosseininasab, Muhammad Asim Munir, Talha Tajik, Sundas Abid
    1-12
    DOI: https://doi.org/10.62019/abbdm.v4i4.237
  • Advancing NLP for Underrepresented Languages: A Data-Driven Study on Shahmukhi Punjabi to Retrieve NER, Using RNN and LSTM

    Syed Muhammad Hassan Zaidi , Syeda Nazia Ashraf , Adnan Ahmed, Basit Hasan, Irfan M. Leghari
    25-37
    DOI: https://doi.org/10.62019/abbdm.v4i4.238
  • Board Gender Diversity and Tax Avoidance in Pakistan: A Comparison of Shariah Compliant and Non-Shariah Compliant Firms

    Shabbir Hussain, Alia Ahmed, Muhammad Sarfraz Khan
    13-24
    DOI: https://doi.org/10.62019/abbdm.v4i4.241
  • THE EFFECT OF TECHNOLOGICAL COMPETENCE AND KNOWLEDGE MANAGEMENT ON SUSTAINABLE ORGANIZATIONAL PERFORMANCE

    Syed Shahid Hussain, Dr. Alia Amed, Dr. Abdul Rauf Qureshi
    38-59
    DOI: https://doi.org/10.62019/abbdm.v4i4.245
  • The Role of Education in Prevailing Extremism and Promoting Peace

    Zarina Rashid, Shahir Rashid, Minahil Rashid
    60-72
    DOI: https://doi.org/10.62019/abbdm.v4i4.254
  • Investigating the Role of Government and Economic Factors in Sustainable Housing Development in Swabi, Pakistan

    Aman Ullah, Syeda Arfa Quddusi, Mir Wali Shah, Demet Irkli Eryildiz
    73-89
    DOI: https://doi.org/10.62019/abbdm.v4i4.258
  • Impact of Sensory Branding and Brand Awareness on Consumer Buying Behavior

    Sohaib Uz Zaman, Maryam Tahir, Syed Hasnain Alam, Muhammad Furqan
    90-113
    DOI: https://doi.org/10.62019/vsk6m466
  • Customer Experience and Satisfaction in Anti-Dandruff Shampoo Consumption: Standpoint of Customer Behavioral Outcomes

    Syed Muhammad Waqar Alam, Sohaib Uz Zaman, Syed Hasnain Alam, Shaikh Muhammad Osama Ali
    114-131
    DOI: https://doi.org/10.62019/p70m9850

Data science

  • Machine Learning Model for Content Protection from Cyber security Threats

    Saba Yousha, Shahzad Nasim, Zulfiqar Ali Zardari
    1-16
    DOI: https://doi.org/10.62019/abbdm.v4i4.230
  • Investigating Quantum Machine Learning Frameworks and Simulating Quantum Approaches

    Muhammad Jawad Khan, Sumeera Bibi, Muzammil Ahmad Khan , Hozaifah Shahadat Ali , Aysha Ijaz Khan, Rajia Anwar , Fariha Islam
    34-43
    DOI: https://doi.org/10.62019/abbdm.v4i4.232
  • Learning, Integration, and Re-Configuration: Dynamic Capabilities as Drivers of Data-Driven Insights and Decision Quality

    Arab ul Mateen, Sumaira Rehman, Qasim Ali Nisar
    17-33
    DOI: https://doi.org/10.62019/abbdm.v4i4.233
  • Unlocking the Power of Social Media: Enhancing Customer Engagement in the Apparel Industry

    Saira Atta, Afshan Ali, Bushra Abbas
  • Optimizing Agricultural Outcomes: Machine Learning in Crop Yield Prediction

    Sana Alam , Muhammad Abbas, Muhammad Asghar Khan, Abdul Khaliq
    44-54
    DOI: https://doi.org/10.62019/abbdm.v4i4.240
  • Towards a Unified Model of Narrative Memory in Conscious Agents: From Human Cognition to Artificial Consciousness

    Tanveer Rafiq, Muhammad Azam, Muhammad Khalid, Salman Akber, Muhammad Sohaib Naseem, Mian Mohsin Sattar
    55-68
    DOI: https://doi.org/10.62019/abbdm.v4i4.243
  • A Deep Learning Based Attack Classification on IoMT Devices

    Muhammad Awais, Tajummal Hussain, Tayyab Rehman
    85-104
    DOI: https://doi.org/10.62019/abbdm.v4i4.247
  • Automated Image Forensics Based on Deep Learning for Discriminating Photorealistic Computer Graphic and Photographic Images

    Misbah Akram, Maya Bint Yousaf, Muhammad Hassan Nafees , Burhan Ahmed, Muhammad Abbas, Tabeer Arif
    69-84
    DOI: https://doi.org/10.62019/abbdm.v4i4.248
  • ENHANCING SURVEILLANCE SECURITY: USING GENERATIVE ADVERSARIAL NETWORKS AND COMPUTER VISION TO PREVENT IDENTITY SPOOFING IN FACIAL RECOGNITION SYSTEMS

    Alyha Mahmood , Fatima Zahid
    105-116
    DOI: https://doi.org/10.62019/abbdm.v4i4.251
  • Android Security Vulnerabilities, Malware, Anti-Malware Solutions, and Evasion Techniques Security

    Mahtab Khalid, Ahthasham Sajid, Muhammad Usman, Mehak Saeed, Malik Muhammad Nadeem, Ishu Sharma
    129-145
    DOI: https://doi.org/10.62019/abbdm.v4i4.252
  • Deep Learning Based Effective Rice Leaf Disease Classification using MobileNet- Attention

    Dr.Muhammad Suleman Memon, Dr.Mumtaz Qabulio, Ms.Asia Khatoon Soomro
    117-128
    DOI: https://doi.org/10.62019/abbdm.v4i4.255
  • Socio Fuzzy Based Performance Evaluation of Cloud Computing Service Model (IaaS)

    Syed Younus Ali, Maya Bint Yousaf, Tabeer Arif, Fariha Ashraf, Muhammad Hassan Nafees
    146-170
    DOI: https://doi.org/10.62019/abbdm.v4i4.256
  • Advancing Sustainable Housing and Infrastructure Development in Swabi District, Pakistan

    Aman Ullah, Syeda Arfa Quddusi, Mir Wali Shah , Demet Irkli Eryildiz
    181-215
    DOI: https://doi.org/10.62019/abbdm.v4i4.259
  • PREDICTION OF GRADES ANALYSIS AT PRIMARY SCHOOL LEVEL PAKISTAN

    Fouzia Arshad; Samreen Javed; Fouzia Naz, Syed Muhammad Hassan, Basit Hasan
    238-254
    DOI: https://doi.org/10.62019/abbdm.v4i4.260
  • Analysis of the Effects of Cyber Attacks on Battery-Powered Internet of Things Devices Cyber Attacks on Battery-Powered Internet of Things Devices

    Iqra Javaid, Arshad Mehmood, Ahthasham Sajid, Mahtab Khalid, Muhammad Khurram Ameer, Wajid Ali, Ishu Sharma
    227-237
    DOI: https://doi.org/10.62019/abbdm.v4i4.261
  • Text Summarization using Deep Learning: A Study on Automatic Summarization

    Anwar Ali Sanjrani, Muhammad Saqib, Saira Rehman, Muhammad Saeed Ahmad
    216-226
    DOI: https://doi.org/10.62019/abbdm.v4i4.263
  • Advancements in Transformer-Based Music Generation: Exploring Applications in Personalized Composition and Music Therapy

    Yahya khan, Hafiz Waheed ud Din, Rizwan Ullah
    255-263
    DOI: https://doi.org/10.62019/abbdm.v4i4.264
  • Analyzing Social Enterprise Case Studies and Their Metrics/Challenges Using Graph Neural Networks

    Rizwan Ullah , Yahya khan , Hafiz Waheed ud Din
    264-273
    DOI: https://doi.org/10.62019/abbdm.v4i4.265
  • Improved Capacity and Security in Text Steganography Using the Double Secure Algorithm (DSTS)

    Rizwan Ullah , Alameen Abdalrahman, Yahya khan
    274-283
    DOI: https://doi.org/10.62019/abbdm.v4i4.266
  • A Comparative Analysis of One-Time Pad and Contemporary Cryptographic Algorithms: Security, Quantum Resistance, and Practical Usability

    Hafiz Waheed ud Din, Yahya khan , Alameen Abdalrahman
    284-292
    DOI: https://doi.org/10.62019/abbdm.v4i4.267
  • Psychology Behind Social Engineering: Importance of Training/Awareness

    Muhammad Sajid Iqbal, Ahthasham Sajid, Saqib Rasheed, Syed Bilal Ahmed, Muhammad Usman, Hadia Khatoon
    4(4),293-312
    DOI: https://doi.org/10.62019/abbdm.v4i4.270
  • The important aspects of Blockchain Technology and Big Data in Healthcare System

    Mumtaz Qabulio, Muhammad Suleman Memon, Asia Khatoon Soomro
    313-320
    DOI: https://doi.org/10.62019/abbdm.v4i4.271
  • The Perspective of Reading in the Digital Age: Insight from a Study of Digital Literacy Skills at Liaquat Memorial Library Karachi

    Naseem Ullah Khan
    428-449
    DOI: https://doi.org/10.62019/abbdm.v4i4.272
  • An insightful Machine Learning based Privacy-Preserving Technique for Federated Learning

    Ammar Ahmed , M. Aetsam Javed , Junaid Nasir Qureshi , Hamayun Khan , Hoor Fatima Yousaf
    332-343
    DOI: https://doi.org/10.62019/abbdm.v4i4.277
  • A Learning Framework for Predicting Badminton Players Performance: Focusing Leadership, Mental and Fitness Attributes

    Yahya Khan, Bushra Fatima, Rizwan Ullah
    344-354
    DOI: https://doi.org/10.62019/abbdm.v4i4.278
  • A Survey on the Internet of Medical Things (IOMT) Privacy and Security: Challenges Solutions and Future from a New Perspective

    Mubbara Maqsood, Muhammad Mohtisham Dar , Syed khawar Hussain Shah, M. Aetsam Javed, Hamayun Khan
    355-368
    DOI: https://doi.org/10.62019/abbdm.v4i4.279
  • A Systematic Literature review: Role of Deep Learning in Big Data Applications

    Sana Gul, Ahthasham Sajid, Aqsa Zafar, Shakaib Nawaz, Danish Irfan, Mahtab Khalid
    481-499
    DOI: https://doi.org/10.62019/abbdm.v4i4.283
  • Enhancing Alzheimer's Disease Diagnosis through Magnetic Resonance Imaging: An Analysis using VGG19 Architectures

    Shakir Ali, Kashif Saghar, Syed Zaffar Iqbal, Syed Ainullah Agha, Azeem Ullah, Muhammad Essa Siddique
    461-480
    DOI: https://doi.org/10.62019/abbdm.v4i4.284
  • Role of Machine Learning and Immersive Technologies in Modern Management with Trends, Applications, and Risks

    Muhammad Hammad u Salam, Shujaat Ali Rathore, Nasrullah, Sayyid Kamran Hussain, Tahir Abbas
    523-540
    DOI: https://doi.org/10.62019/abbdm.v4i4.296
  • An Enhanced Analysis of Social Engineering in Cyber Security Research Challenges, Countermeasures: A Survey

    Muhammad Umar Adil , Sajjad Ali , Ali Haider, M. Aetsam Javed , Hamayun Khan
    321-331
    DOI: https://doi.org/10.62019/abbdm.v4i4.274
  • Soft ideals via regular AG-groupoids

    Rohi Naz, Imtiaz Ahmad , Muhammad Yousaf, Muhammad Rashad , Wajahat Ali khan
    561-569
    DOI: https://doi.org/10.62019/cg6qa952
  • Decomposition of Stein AG-groupoid via congruence relations

    Muhammad Yousaf, Wajahat Ali Khan, Imtiaz Ahmad, Muhammad Rashad
    541-560
    DOI: https://doi.org/10.62019/ares8708
  • Enhancing Patient Survival Prediction via Cutting-Edge Data Mining Techniques and Future Prospects

    Asad Iqbal, Khawaja Qasim Maqbool, Muhammad Zulkifl Hasan, Muhammad Zunnurain Hussain, Nadeem Sarwar
    369-406
  • Adaptive Q-Learning for Fair and Dynamic Server Selection in Edge Computing: Addressing Latency Variability in Real-Time Applications

    Muhammad Akhtar Nadeem, Muhammad Zunnurain Hussain, Usama Imran, Muhammad Zulkifl Hasan, Usama Nasir, Hoor Fatima
    407-427
  • Using the Algorithms of Machine Learning to Propose Techniques for the Prediction Analysis in Data Mining

    Jahangeer Ali , Atif Hussain, Hafiz Rao Bilal Ahmed, Muhammad Irshad Javed , Asim Khurshid, Abdul Shakoor
    450-460
    DOI: https://doi.org/10.62019/abbdm.v4i4.282
  • Enhanced Classification of Networks Encrypted Traffic: A Conceptual Analysis of Security Assessments, Implementation, Trends and Future Directions

    Irfan Farooq, Syed Aale Ahmed, Asfar Ali, Muhammad Ali Warraich , Muhammad Aqeel, Hamayun Khan
    500-522
    DOI: https://doi.org/10.62019/abbdm.v4i4.287