Department of Computer Science
Permanent URI for this collection
Browse
Browsing Department of Computer Science by Issue Date
Now showing 1 - 20 of 24
Results Per Page
Sort Options
Item Studio Applications and Software Development Kits for Microsoft Kinect: A Survey(Journal of Applied Environmental and Biological Sciences, 2014) Shoaib Farooq, Muhammad; Bilal Hassan; Mudassar Naseer; Adnan Abid; Khan, Yaser Daanial; Khan, Nabeel Sabir; Usman Akram, Muhammad; Saif UllahThe invention of Motion sensing camera “Microsoft Kinect for XBOX” opened new dimension for the research community. First objective of Kinect was to work with XBOX for playing games. However, people started using it for the recognition of human activities. Kinect for XBOX provided two types of information 1) RGB and 2) Depth. People developed tools, drivers and algorithms to work with it. Later, Microsoft itself released the Windows edition of Kinect with a software development kit (SDK). However, several open source and propriety vendors modified the performance of their existing tools and drivers to work with Kinect for Windows. It was now difficult for the newer one to select an appropriate set of studio application and SDK to work with Kinect for Windows. Keeping in view this point, we have presented a study for the Windows edition of Kinect based on several features like platform, file formats etc. Our study will definitely help the research community involved with Kinect for Windows to select an appropriate set of drivers and SDK’s for their work. This study will be a valuable contribution not only for the users of Kinect, also for the owners of various tools.Item What should be taught about arrays in cs2?(Journal of Applied Environmental and Biological Sciences, 2014) Muhammad Shoaib Farooq; Sher Afzal Khan; Aqsa Ali; Adnan AbidIn this article we have presented a thorough discussion on an important topic, the array which is taught in the fundamental courses in computer programming. To this end, we have presented taxonomy of arrays based on the following four main topics: i) Memory representations; ii) Mapping Functions; iii) Subscript type; and iv) Abstract data types. We also suggest a flow of teaching these topics to the students. We believe that this effort will be useful for the instructors to plan their courses, and will be a good source of learning in general.Item Feature Based Face Recognition Using Slopes(International Conference on Control, Automation and Information Sciences, Gwangju, Korea, 2014) Isra Anwar; Shah Nawaz; Ghulam Kibria; Farooq Ali, Syed; Tahir Hassan; Jeong-Bae KimFace recognition from an image is a popular problem in biometrics research. In the last decade, a lot of research has been done in this area. The advantage of face based identification over other biometrics is its wide acceptability as it does not require any keys, tokens, smart cards, PINs, plastic cards or passwords etc. In this work, face recognition has been done using several feature based approaches. Two new methods are presented in which simple yet useful new features are proposed and evaluated. The main contribution of this paper is usage of a slope table along with other features for face recognition. The slopes of different fiducial points of facial components (left eye, right eye, nose and lips) are computed to fill the slope table. These two methods are compared with the existing approaches based on popular features like principal components and ratios of facial components. The results show that our proposed methods Out perform these existing approaches.Item Exploring Causes of Requirement Change(Recep Tayyip Erdoğan University, Rize, Turkey, 2014) Ateeqa Naseer; Shoaib Farooq, MuhammadSoftware development process is dynamic in nature and it has contrasting impact on software development based on Return on Investment (ROI). It plays an important role in successful software development and can also create difficulties during the software construction in terms of increasing effort, schedule and cost. Factors of changing requirements, prediction of requirement change and the strategies to deal with them are needed to be analyzed for better management of requirement change. Regardless of all research efforts based on requirement change, there is still a need to analyze the factors of requirement change from industrial evidences to minimize its negative impact on software development. The aim of study is to highlight main and sub causes of requirement change that can disrupt software development process.Item A publicly available rgb-d data set of Muslim prayer postures recorded using microsoft kinect for windows(Journal of Basic and Applied Scientific Research, 2014) Bilal Hassan; Usman Akram; Saifullah; Mudassar Naseer; Faizan Ali; Shoaib Akhter; Muhammad AjmalIn computer vision applications, availability of dataset for the training and testing of any newly developed system is always a key requirement. Most of the time, people use dataset built by other researchers. In case of unavailability of particular type of dataset, they built the dataset by their own. The datasets for the evaluation of computer vision systems could be of various types. These could be of thumb impressions, retinal scans or images of human activities/postures. The prayer performed by Muslim community also comprises of activities/postures which are the subset of the activities performed by an individual. In order to train and test the human activity recognition system on prayer activities/postures, the availability of prayer dataset is much needed. To the best of our knowledge, no such dataset is available in this area. In order to fulfill this requirement, we have recorded a dataset of prayer postures for an individual in a closed environment. The dataset comprises of RGB, Depth and skeleton frames of an individual from different pose and varying distance. We have recorded this dataset by using Microsoft Kinect for Windows sensor. We have captured more than 1700 RGB, Depth and skeleton frames of different actions comprises of positive and negative examples. We have labeled data and provided in various file formats like .xls, .mat and .arff. We are hopeful that the dataset developed by us will not only enforce the research community working on Human activity/posture recognition to test their system on this particular type of dataset but also to add more to the dataset. It will also help provide them understanding that how to record their own dataset using Kinect if need arises. Apart from that, this wills also a publicly available bench mark in this particular domain.Item Requirement Engineering Practices in Pakistan Software Industry: Major Problems(Journal Of Applied Environmental And Biological Sciences, 2014) Bilal Hassan; Shoaib Farooq, Muhammad; Adnan Abid; Khan, Yaser Daanial; Khan, Nabeel Sabir; Mudassar Naseer; Usman Akram, Muhammad; Saif UllahRequirement engineering is now an essential practice performed in almost every software manufacturing industry around the globe. It increases the amount of project success in a greater way. Sometimes this could be a labelled activity or sometimes not. However, almost every software development environment across the world is using some sort of basic requirement engineering process now days. The situation is not different in a developing country like Pakistan. A good number of software industries are following standard requirement engineering practices completely or partially. There are multiple reasons behind partial implementation such as lack of knowledge about processes, cost in terms of time and money and implementation of processes. In our study, we have collected factual data regarding current requirement engineering practices from Pakistan software industry. We have studied the organizations of varying size and types of projects. We also find out their success rate and problems which are due to partial or wrong implementation of requirement engineering practices. We are hopeful that this study will provide a cost effective solution for improving requirement engineering practices in Pakistan industry.Item Smart DSM: a layered model for development of demand side management in smart grids(3rd International Workshop on Software Engineering Challenges for the Smart Grid, 2014) Fahad Javed; Usman Ali; Muhammad Nabeel; Qasim Khalid; Naveed Arshad; Jahangir IkramGrowing power demand and carbon emissions is motivating utility providers to introduce smart power systems. One of the most promising technology to deliver cheaper and smarter electricity is demand side management. A DSM solution controls the devices at user premises in order to achieve overall goals of lower cost for consumer and utility. To achieve this various technologies from deferent domains come in to play from power electronics to sensor networks to machine learning and distributed systems design. The eventual system is a large, distributed software system over a heterogeneous environment and systems. Whereas various algorithms to plan the DSM schedule have been proposed, no concerted effort has been made to propose models and architectures to develop such a complex software system. This lack of models provides for a haphazard landscape for researchers and practitioners leading to confused requirements and overlapping concerns of domains. This was observed by the authors in developing a DSM system for their lab and faculty housing. To this end in this paper we present a model to develop software systems to deliver DSM. In addition to the model, we present a road map of software engineering research to aid development of future DSM systems. This is based on our observations and insights of the developed DSM systems.Item An Efficient Algorithm for Recognition of Human Actions(Hindawi Publishing Corporation, 2014) Khan, Yaser Daanial; Khan, Nabeel Sabir; Shoaib Farooq; Adnan Abid; Khan, Sher Afzal; Farooq Ahmad; KhalidMahmood, MuhammadRecognition of human actions is an emerging need. Various researchers have endeavored to provide a solution to this problem. Some of the current state-of-the-art solutions are either inaccurate or computationally intensive while others require human intervention. In this paper a sufficiently accurate while computationally inexpensive solution is provided for the same problem. Image moments which are translation, rotation, and scale invariant are computed for a frame. A dynamic neural network is used to identify the patterns within the stream of image moments and hence recognize actions. Experiments show that the proposed model performs better than other competitive models.Item A study on re process models for offshore software development(TextRoad Publication, 2014) Bilal Hassan; Muhammad Usman Akram; Shahid Bhatti; Fahad Hassan; Jawad BashirIncreasing trends of cheap and quality software development have raised a great interest in offshore software development. Sub continental software houses are much cheaper than the European or American market. Due to cultural social and linguistic differences the requirement gathering has become difficult for offshore software developers. In this study the requirement gathering issues for offshore software houses are investigated and then the standard requirement engineering models are compared with each other according to different metrics and a comprehensive survey among the sub continental software engineers is carried out to suggest a proper requirement engineering model according to the nature of the project.Item Impact of team structure on software development productivity and quality in Pakistani software houses(FAST-NU Research Journal, 2015) Sadia KhalidWe are living in the age of information technology and software has become the driving force behind almost everything being done all around the world. The people developing this software are, thus, the real assets in the present world; ordinary people whose brains are working day and night to bring the extraordinary technical touches in our day-to-day lives. Therefore, taking care of these valuable assets and organizing them in the right way is the key to success. Team structure is a critical aspect of the software-development process. Software houses all around the world follow certain team structures to make the best use of their employees’ working abilities. This research focuses on the team structures prevalent in software houses in Pakistan and their impact on the productivity of employees and quality of software. A number of surveys were conducted to see how teams are organized and managed in software houses in Pakistan and to gather views on what changes in the current structures would yield better productivity and quality. Then, based on the findings of the surveys, experiments were conducted to see how much the factors pointed out really affected the productivity and quality.Item A survey on search results diversification techniques(Neural Comput & Applic, 2015) Adnan Abid; Naveed Hussain; Kamran Abid; Farooq Ahmad; Muhammad Shoaib Farooq; Uzma Farooq; Sher Afzal Khan; Yaser Daanial Khan; Muhammad Azhar Naeem; Nabeel SabirThe quantity of information placed on the web has been greater than before and is increasing rapidly day by day. Searching through the huge amount of data and finding the most relevant and useful result set involves searching, ranking, and presenting the results. Most of the users probe into the top few results and neglect the rest. In order to increase user’s satisfaction, the presented result set should not only be relevant to the search topic, but should also present a variety of perspectives, that is, the results should be different from one another. The effectiveness of web search and the satisfaction of users can be enhanced through providing various results of a search query in a certain order of relevance and concern. The technique used to avoid presenting similar, though relevant, results to the user is known as a diversification of search results. This article presents a survey of the approaches used for search result diversification. To this end, this article not only provides a technical survey of existing diversification techniques, but also presents a taxonomy of diversification algorithms with respect to the types of search queries.Item A strategy for the design of introductory computer programming course in high school.(Journal of Elementary Education., 2015) Adnan Abid; Muhammad Shoaib Farooq; Uzma FarooqThe ever increasing involvement of electronic and programmable devices in life invites people to learn computer programming as an essential skill. Mathematics and computer programming are two inter-related and inter-dependent subjects. Several different concepts of mathematics are introduced at high school level, and usually the students do not feel comfortable with this subject. In this article, we propose an approach for introducing computer programming at high school level. We have argued that the programming skills should be enhanced with the help of mathematical concepts learned by the students. We present the main idea, and pave the way for its materialization with the help of mapping the constructs of computer programming onto the concepts of mathematics. We also discuss as to how we should customize the programming languages to make it easier to teach and learn computer programming and mathematics with the help of one another. In order to emphasize on our proposed methodology we present a mapping of concepts of mathematics onto the constructs of a widely used introductory computer programming language C++. We further discuss the customization of C++ for teaching and learning computer programming in a more seamless manner by introducing relevant abstractions in the language. Lastly, we also highlight the need of developing new tools, defining syllabus, writing new books, and preparing interesting exercises and exams are the next steps to achieve this goal.Item Entropy production in the flow over a swirling stretchable cylinder.(Thermophysics and Aeromechanics., 2015) Sufian MunawarIn the present work, the entropy generation due to the heat transfer and fluid friction irreversibility is investigated numerically for a three-dimensional flow induced by rotating and stretching motion of a cylinder. The isothermal boundary conditions are taken into account for the heat transfer analysis. The similarity transformations are utilized to convert the governing partial differential equations to ordinary differential equations. Resulting nonlinear differential equations are solved using a numerical scheme. Expressions for the entropy generation number, the Nusselt number and the Bejan number are obtained and discussed through graphs for various physical parameters. An analysis has been made to compare the heat transfer irreversibility with fluid friction irreversibility using the expression of the Bejan number. It is found that the surface is a durable source of irreversibility and the curvature of cylinder is to enhance the fluid friction irreversibility.Item Gait recognition progress in recognizing image characteristics.(VAWKUM Transactions on Computer Sciences., 2016) Yaser Daanial KhanWe present a humans credentials system centered on ambulation characteristics. This problem is as eminent as acoustic gait recognition. The objective of the scheme is to explore sounds radiated by walking persons (largely the musical note sounds) and identifies those folks. A cyclic model topology is engaged to denote individual gait cycles. This topology permits modeling and detecting individual steps, leading to very favorable identification rates.Item Data preservation and digital forensics for virtual machines(University of Management and Technology, 2016) Taimour NazarCloud computing is an emerging trend these days. It offers computation and storage at a relatively low-cost due to its pay per use policy. However, it has created new concerns regarding security, as all the conventional methodologies and tools for investigation fall short for cloud computing investigation. Study of recent research papers has shown that no definite strategy exists to cater this issue. Certain methodologies have been proposed by researchers but a major issue, i.e., loss of records which is vital for digital forensics due to termination of virtual machines, remains unsolved and unaddressed. Our main aim is to address this issue and propose a possible and practical solution for it. All terminating virtual machines cannot be stored for forensic because of high cost of storing huge amount of data. In our solution only relevant data of virtual machines will be stored as an XML file. Further a list of software is extracted from this XML file and it is used to find out how much risky is this virtual machine and it can give an idea to forensics experts that what type of malicious activity could have been conducted with it before it was terminated.Item Pakistan Sign Language: Computer Vision Analysis & Recommendations.(VFAST Transactions on Software Engineering, 2016) Hassan, Bilal; Farooq, Muhammad Shoaib; Abid, Adnan; Sabir Khan, NabeelPakistan sign language (PSL) is one of the sign languages of the world used by the Pakistani deaf community. Unfortunately, PSL has developed over the years without any greater attention from the state institutions. Most of the efforts for the development of PSL are done at the individual or group level, which is mostly impressed by regional or traditional norms. That’s why, the learning and teaching PSL is being done in various regions as per their developed version of PSL. A communications barrier occurs when the deaf of two different regions interact with each other as they are trained on their own version of PSL. Another major problem is related to the communication with normal people. The normal people in our society are completely unaware from the signs/gestures of PSL. This communication barrier seizes the basic right of communication between a deaf and a normal. Our contribution in this regard is actually two tiers. First, to the best of our knowledge, we have tried to combine all the efforts made for the development of PSL till date. Second, as a computer vision researcher, we have tried to analyze all the imaging systems developed to aid deaf to deaf and deaf to normal communication of PSL. We are hopeful that this effort will surely help to develop the systems for reducing gap between deaf to deaf, deaf to normal and Pakistan deaf to any other deaf communication.Item Design as you desire wear as you wish(University of Management and Technology Lahore, 2016) Raheel Ahmed Qureshi; Farqalit Nasir; Mohammad Abdul HayeAs we all know fashion industry of Pakistan growing day-by-day. people love to buy their personal favorite fashion designer’s dresses. So, we are providing them the online platform to design their own dresses. In just three steps design your dress, place an order and get delivery at home. The purpose of this web based application is exactly to make shopping easy. Customer don’t need to go to boutique to buy their favorite dress, customer just need to visit our site, design his/her dress, place order and get delivery.Item Terms-based discriminative information space for robust text classification.(Information Sciences, Elsevier, 2016-08-22) Karim, Asim; Hassan, Malik TahirWith the popularity of Web 2.0, there has been a phenomenal increase in the utility of text classification in applications like document filtering and sentiment categorization. Many of these applications demand that the classification method be efficient and robust, yet produce accurate categorizations by using the terms in the documents only. In this paper, we propose a novel and efficient method using terms-based discriminative information space for robust text classification. Terms in the documents are assigned weights according to the discrimination information they provide for one category over the others. These weights also serve to partition the terms into category sets. A linear opinion pool is adopted for combining the discrimination information provided by each set of terms to yield a feature space (discriminative information space) having dimensions equal to the number of classes. Subsequently, a discriminant function is learned to categorize the documents in the feature space. This classification methodology relies upon corpus information only, and is robust to distribution shifts and noise. We develop theoretical parallels of our methodology with generative, discriminative, and hybrid classifiers. We evaluate our methodology extensively with five different discriminative term weighting schemes on six data sets from different application areas. We give a side-by-side comparison with four well-known text classification techniques. The results show that our methodology consistently outperforms the rest, especially when there is a distribution shift from training to test sets. Moreover, our methodology is simple and effective for different application domains and training set sizes. It is also fast with a small and tunable memory footprint.Item Constructive alignment:(University of Management and Technology, 2017) Anum ArshadThe purpose of the present study was to inspect the impact of information and communication technologies (ICTs), while attempting to learn from real-time university classroom lectures. The numerous adoptions of mobile phones are one aspect of ICT pleasant appearance. Mobile usage is banned in most classrooms globally. However, students still use them during their lectures and tutorials. It is anticipated that this usage is askew from the motivation of the lectures and classrooms. Synchronizing students’ mobile usage in classrooms with the incentives of their academic activities remains a significant avenue of research. A sample of undergraduate and graduate Computer Science (CS) students and another sample of undergraduate and graduate English literature students were surveyed to establish their frequency of mobile ICT use in the classrooms and the students' motivations and basis for undertaking those activities unrelated to classrooms culture, in UMT Lahore , Pakistan . In spite of mobile usage being banned in class rooms, it was determined that a large number of students use mobile phones during lectures and tutorials. This study helped to revamp classroom activities, to actively involve digital technologies to lend a hand in valuable coalition with the learning outcomes and widen the student learning awareness.Item UMT bits and bites(University of Management and Technolog, 2017) Arslan Ahmad; Waqar Akbar; Muhammad Muneeb MunirThis project “Bits and Bites” concentrates on the development of a website for university of management and technology cafeteria. By visiting this website users can view food items and only faculty members can place orders. There will be an admin panel in this website where an admin can add different items. The purpose of this project is to digitize that manual food ordering system (for faculty). However; the administrator will manage the accounts of faculty members. He receives orders and he will respond to these orders either by approving the order or by rejecting the order according to the situation. This system is developed on the basis of software development lifecycle. The languages that are used are HTML and PHP. MySQL server is used as the database of the system for containing records. PHP programming language is used because of its numerous benefits. PHP is stable, open source and secure programming language. Is is easily connected to database because it has built-in database connection modules. The admin panel will be developed by wordpress because it is easy to manage the website