Department of Computer Science
Permanent URI for this collection
Browse
Recent Submissions
Item A novel modeling in mathematical biology for classification of signal peptides(Scientific Reports, 2018) Asma Ehsan; Khalid Mahmood; Yaser Daanial Khan; Sher Afzal Khan; Chou, Kuo-ChenThe molecular structure of macromolecules in living cells is ambiguous unless we classify them in a scientifc manner. Signal peptides are of vital importance in determining the behavior of newly formed proteins towards their destined path in cellular and extracellular location in both eukaryotes and prokaryotes. In the present research work, a novel method is ofered to foreknow the behavior of signal peptides and determine their cleavage site. The proposed model employs neural networks using isolated sets of prokaryote and eukaryote primary sequences. Protein sequences are classifed as secretory or non-secretory in order to investigate secretory proteins and their signal peptides. In comparison with the previous prediction tools, the proposed algorithm is more rigorous, wellorganized, signifcantly appropriate and highly accurate for the examination of signal peptides even in extensive collection of protein sequences.Item Ad Hoc Collaboration space for distributed cross device mobile application development using WiFi direct (ACS)(University of Management & Technology, 2018) Khawaja, Imran AbbasOver the last few years, we have seen an enormous increase in the usage of electronic devices smart phones, tablets, laptops, TVs and wearables, which are developed by different manufacturer for different platforms. People surrounded by these devices need to interact with them during the meeting, presentation, class room and lots of other collaborative activities to share and receive information across the devices. However, the interaction among these devices is still device centric and dependent on the expensive fixed software and hardware infrastructure. In a situation, where fixed infrastructure service does not exist, suspended or disrupted due to some reasons, the interaction across these devices is not possible. In this study we have presented the framework that provides th network as well as facilitate the development of cross de without using any fixed expensive infrastructure. The n reduced the application development time by hiding the c to use API's for application developer to build distributed development takes extra time and distract the developer to to high complexity level. This framework supports dive of different manufacturer and all interactions are done the nearby devices to communicate with each other with point.Item A strategy for the design of introductory computer programming course in high school.(Journal of Elementary Education., 2015) Adnan Abid; Muhammad Shoaib Farooq; Uzma FarooqThe ever increasing involvement of electronic and programmable devices in life invites people to learn computer programming as an essential skill. Mathematics and computer programming are two inter-related and inter-dependent subjects. Several different concepts of mathematics are introduced at high school level, and usually the students do not feel comfortable with this subject. In this article, we propose an approach for introducing computer programming at high school level. We have argued that the programming skills should be enhanced with the help of mathematical concepts learned by the students. We present the main idea, and pave the way for its materialization with the help of mapping the constructs of computer programming onto the concepts of mathematics. We also discuss as to how we should customize the programming languages to make it easier to teach and learn computer programming and mathematics with the help of one another. In order to emphasize on our proposed methodology we present a mapping of concepts of mathematics onto the constructs of a widely used introductory computer programming language C++. We further discuss the customization of C++ for teaching and learning computer programming in a more seamless manner by introducing relevant abstractions in the language. Lastly, we also highlight the need of developing new tools, defining syllabus, writing new books, and preparing interesting exercises and exams are the next steps to achieve this goal.Item Impact of team structure on software development productivity and quality in Pakistani software houses(FAST-NU Research Journal, 2015) Sadia KhalidWe are living in the age of information technology and software has become the driving force behind almost everything being done all around the world. The people developing this software are, thus, the real assets in the present world; ordinary people whose brains are working day and night to bring the extraordinary technical touches in our day-to-day lives. Therefore, taking care of these valuable assets and organizing them in the right way is the key to success. Team structure is a critical aspect of the software-development process. Software houses all around the world follow certain team structures to make the best use of their employees’ working abilities. This research focuses on the team structures prevalent in software houses in Pakistan and their impact on the productivity of employees and quality of software. A number of surveys were conducted to see how teams are organized and managed in software houses in Pakistan and to gather views on what changes in the current structures would yield better productivity and quality. Then, based on the findings of the surveys, experiments were conducted to see how much the factors pointed out really affected the productivity and quality.Item Gait recognition progress in recognizing image characteristics.(VAWKUM Transactions on Computer Sciences., 2016) Yaser Daanial KhanWe present a humans credentials system centered on ambulation characteristics. This problem is as eminent as acoustic gait recognition. The objective of the scheme is to explore sounds radiated by walking persons (largely the musical note sounds) and identifies those folks. A cyclic model topology is engaged to denote individual gait cycles. This topology permits modeling and detecting individual steps, leading to very favorable identification rates.Item Pakistan Sign Language: Computer Vision Analysis & Recommendations.(VFAST Transactions on Software Engineering, 2016) Hassan, Bilal; Farooq, Muhammad Shoaib; Abid, Adnan; Sabir Khan, NabeelPakistan sign language (PSL) is one of the sign languages of the world used by the Pakistani deaf community. Unfortunately, PSL has developed over the years without any greater attention from the state institutions. Most of the efforts for the development of PSL are done at the individual or group level, which is mostly impressed by regional or traditional norms. That’s why, the learning and teaching PSL is being done in various regions as per their developed version of PSL. A communications barrier occurs when the deaf of two different regions interact with each other as they are trained on their own version of PSL. Another major problem is related to the communication with normal people. The normal people in our society are completely unaware from the signs/gestures of PSL. This communication barrier seizes the basic right of communication between a deaf and a normal. Our contribution in this regard is actually two tiers. First, to the best of our knowledge, we have tried to combine all the efforts made for the development of PSL till date. Second, as a computer vision researcher, we have tried to analyze all the imaging systems developed to aid deaf to deaf and deaf to normal communication of PSL. We are hopeful that this effort will surely help to develop the systems for reducing gap between deaf to deaf, deaf to normal and Pakistan deaf to any other deaf communication.Item Entropy production in the flow over a swirling stretchable cylinder.(Thermophysics and Aeromechanics., 2015) Sufian MunawarIn the present work, the entropy generation due to the heat transfer and fluid friction irreversibility is investigated numerically for a three-dimensional flow induced by rotating and stretching motion of a cylinder. The isothermal boundary conditions are taken into account for the heat transfer analysis. The similarity transformations are utilized to convert the governing partial differential equations to ordinary differential equations. Resulting nonlinear differential equations are solved using a numerical scheme. Expressions for the entropy generation number, the Nusselt number and the Bejan number are obtained and discussed through graphs for various physical parameters. An analysis has been made to compare the heat transfer irreversibility with fluid friction irreversibility using the expression of the Bejan number. It is found that the surface is a durable source of irreversibility and the curvature of cylinder is to enhance the fluid friction irreversibility.Item Terms-based discriminative information space for robust text classification.(Information Sciences, Elsevier, 2016-08-22) Karim, Asim; Hassan, Malik TahirWith the popularity of Web 2.0, there has been a phenomenal increase in the utility of text classification in applications like document filtering and sentiment categorization. Many of these applications demand that the classification method be efficient and robust, yet produce accurate categorizations by using the terms in the documents only. In this paper, we propose a novel and efficient method using terms-based discriminative information space for robust text classification. Terms in the documents are assigned weights according to the discrimination information they provide for one category over the others. These weights also serve to partition the terms into category sets. A linear opinion pool is adopted for combining the discrimination information provided by each set of terms to yield a feature space (discriminative information space) having dimensions equal to the number of classes. Subsequently, a discriminant function is learned to categorize the documents in the feature space. This classification methodology relies upon corpus information only, and is robust to distribution shifts and noise. We develop theoretical parallels of our methodology with generative, discriminative, and hybrid classifiers. We evaluate our methodology extensively with five different discriminative term weighting schemes on six data sets from different application areas. We give a side-by-side comparison with four well-known text classification techniques. The results show that our methodology consistently outperforms the rest, especially when there is a distribution shift from training to test sets. Moreover, our methodology is simple and effective for different application domains and training set sizes. It is also fast with a small and tunable memory footprint.Item UMT bits and bites(University of Management and Technolog, 2017) Arslan Ahmad; Waqar Akbar; Muhammad Muneeb MunirThis project “Bits and Bites” concentrates on the development of a website for university of management and technology cafeteria. By visiting this website users can view food items and only faculty members can place orders. There will be an admin panel in this website where an admin can add different items. The purpose of this project is to digitize that manual food ordering system (for faculty). However; the administrator will manage the accounts of faculty members. He receives orders and he will respond to these orders either by approving the order or by rejecting the order according to the situation. This system is developed on the basis of software development lifecycle. The languages that are used are HTML and PHP. MySQL server is used as the database of the system for containing records. PHP programming language is used because of its numerous benefits. PHP is stable, open source and secure programming language. Is is easily connected to database because it has built-in database connection modules. The admin panel will be developed by wordpress because it is easy to manage the websiteItem Constructive alignment:(University of Management and Technology, 2017) Anum ArshadThe purpose of the present study was to inspect the impact of information and communication technologies (ICTs), while attempting to learn from real-time university classroom lectures. The numerous adoptions of mobile phones are one aspect of ICT pleasant appearance. Mobile usage is banned in most classrooms globally. However, students still use them during their lectures and tutorials. It is anticipated that this usage is askew from the motivation of the lectures and classrooms. Synchronizing students’ mobile usage in classrooms with the incentives of their academic activities remains a significant avenue of research. A sample of undergraduate and graduate Computer Science (CS) students and another sample of undergraduate and graduate English literature students were surveyed to establish their frequency of mobile ICT use in the classrooms and the students' motivations and basis for undertaking those activities unrelated to classrooms culture, in UMT Lahore , Pakistan . In spite of mobile usage being banned in class rooms, it was determined that a large number of students use mobile phones during lectures and tutorials. This study helped to revamp classroom activities, to actively involve digital technologies to lend a hand in valuable coalition with the learning outcomes and widen the student learning awareness.Item Data preservation and digital forensics for virtual machines(University of Management and Technology, 2016) Taimour NazarCloud computing is an emerging trend these days. It offers computation and storage at a relatively low-cost due to its pay per use policy. However, it has created new concerns regarding security, as all the conventional methodologies and tools for investigation fall short for cloud computing investigation. Study of recent research papers has shown that no definite strategy exists to cater this issue. Certain methodologies have been proposed by researchers but a major issue, i.e., loss of records which is vital for digital forensics due to termination of virtual machines, remains unsolved and unaddressed. Our main aim is to address this issue and propose a possible and practical solution for it. All terminating virtual machines cannot be stored for forensic because of high cost of storing huge amount of data. In our solution only relevant data of virtual machines will be stored as an XML file. Further a list of software is extracted from this XML file and it is used to find out how much risky is this virtual machine and it can give an idea to forensics experts that what type of malicious activity could have been conducted with it before it was terminated.Item Design as you desire wear as you wish(University of Management and Technology Lahore, 2016) Raheel Ahmed Qureshi; Farqalit Nasir; Mohammad Abdul HayeAs we all know fashion industry of Pakistan growing day-by-day. people love to buy their personal favorite fashion designer’s dresses. So, we are providing them the online platform to design their own dresses. In just three steps design your dress, place an order and get delivery at home. The purpose of this web based application is exactly to make shopping easy. Customer don’t need to go to boutique to buy their favorite dress, customer just need to visit our site, design his/her dress, place order and get delivery.Item Online Job Portal(2017-04-05) Muhammad Sabeeh, Khan; Muhammad Shaff, KhanThe thought of this project is to add to a stage for the graduates to have the job ideas of their related field. Through this application folks or and additionally universities can instruct their students, to get the jobs. This Web Application gives an extremely fun approach to take and apply for the available jobs quick and easily. Students & Graduates will discover this application so fascinating that they can easily search for all the available jobs across the country. This Application is as necessary as well as important in every field. One of the greater difficulties that the general public faces is guaranteeing that students to get job(s) properly, so that they may build up their aptitudes and thus, add to the general public. The target of this is to outline a framework that will help folks in getting new and better job(s).Item Property Dealing Application(2017-04-05) Saddam, Ali; Rana Faisal, MehmoodOur project “Property Dealing application” is madein jquery mobile by using android studio. It is basically a application which deals in sale purchase of plots, flats or bungalows in residential, commercial and in industrial areas. This application reduce manual work and helps people to find a property using this mobile app with consulting property dealers and other ex parte involvement Saler and Buyer of the property can deal directly face to face using the information that app have about property.This application provides the simplest, cheapest and a less time and energy consuming way of searching a property.Item A survey on search results diversification techniques(Neural Comput & Applic, 2015) Adnan Abid; Naveed Hussain; Kamran Abid; Farooq Ahmad; Muhammad Shoaib Farooq; Uzma Farooq; Sher Afzal Khan; Yaser Daanial Khan; Muhammad Azhar Naeem; Nabeel SabirThe quantity of information placed on the web has been greater than before and is increasing rapidly day by day. Searching through the huge amount of data and finding the most relevant and useful result set involves searching, ranking, and presenting the results. Most of the users probe into the top few results and neglect the rest. In order to increase user’s satisfaction, the presented result set should not only be relevant to the search topic, but should also present a variety of perspectives, that is, the results should be different from one another. The effectiveness of web search and the satisfaction of users can be enhanced through providing various results of a search query in a certain order of relevance and concern. The technique used to avoid presenting similar, though relevant, results to the user is known as a diversification of search results. This article presents a survey of the approaches used for search result diversification. To this end, this article not only provides a technical survey of existing diversification techniques, but also presents a taxonomy of diversification algorithms with respect to the types of search queries.Item What should be taught about arrays in cs2?(Journal of Applied Environmental and Biological Sciences, 2014) Muhammad Shoaib Farooq; Sher Afzal Khan; Aqsa Ali; Adnan AbidIn this article we have presented a thorough discussion on an important topic, the array which is taught in the fundamental courses in computer programming. To this end, we have presented taxonomy of arrays based on the following four main topics: i) Memory representations; ii) Mapping Functions; iii) Subscript type; and iv) Abstract data types. We also suggest a flow of teaching these topics to the students. We believe that this effort will be useful for the instructors to plan their courses, and will be a good source of learning in general.Item Studio Applications and Software Development Kits for Microsoft Kinect: A Survey(Journal of Applied Environmental and Biological Sciences, 2014) Shoaib Farooq, Muhammad; Bilal Hassan; Mudassar Naseer; Adnan Abid; Khan, Yaser Daanial; Khan, Nabeel Sabir; Usman Akram, Muhammad; Saif UllahThe invention of Motion sensing camera “Microsoft Kinect for XBOX” opened new dimension for the research community. First objective of Kinect was to work with XBOX for playing games. However, people started using it for the recognition of human activities. Kinect for XBOX provided two types of information 1) RGB and 2) Depth. People developed tools, drivers and algorithms to work with it. Later, Microsoft itself released the Windows edition of Kinect with a software development kit (SDK). However, several open source and propriety vendors modified the performance of their existing tools and drivers to work with Kinect for Windows. It was now difficult for the newer one to select an appropriate set of studio application and SDK to work with Kinect for Windows. Keeping in view this point, we have presented a study for the Windows edition of Kinect based on several features like platform, file formats etc. Our study will definitely help the research community involved with Kinect for Windows to select an appropriate set of drivers and SDK’s for their work. This study will be a valuable contribution not only for the users of Kinect, also for the owners of various tools.Item Smart DSM: a layered model for development of demand side management in smart grids(3rd International Workshop on Software Engineering Challenges for the Smart Grid, 2014) Fahad Javed; Usman Ali; Muhammad Nabeel; Qasim Khalid; Naveed Arshad; Jahangir IkramGrowing power demand and carbon emissions is motivating utility providers to introduce smart power systems. One of the most promising technology to deliver cheaper and smarter electricity is demand side management. A DSM solution controls the devices at user premises in order to achieve overall goals of lower cost for consumer and utility. To achieve this various technologies from deferent domains come in to play from power electronics to sensor networks to machine learning and distributed systems design. The eventual system is a large, distributed software system over a heterogeneous environment and systems. Whereas various algorithms to plan the DSM schedule have been proposed, no concerted effort has been made to propose models and architectures to develop such a complex software system. This lack of models provides for a haphazard landscape for researchers and practitioners leading to confused requirements and overlapping concerns of domains. This was observed by the authors in developing a DSM system for their lab and faculty housing. To this end in this paper we present a model to develop software systems to deliver DSM. In addition to the model, we present a road map of software engineering research to aid development of future DSM systems. This is based on our observations and insights of the developed DSM systems.Item Requirement Engineering Practices in Pakistan Software Industry: Major Problems(Journal Of Applied Environmental And Biological Sciences, 2014) Bilal Hassan; Shoaib Farooq, Muhammad; Adnan Abid; Khan, Yaser Daanial; Khan, Nabeel Sabir; Mudassar Naseer; Usman Akram, Muhammad; Saif UllahRequirement engineering is now an essential practice performed in almost every software manufacturing industry around the globe. It increases the amount of project success in a greater way. Sometimes this could be a labelled activity or sometimes not. However, almost every software development environment across the world is using some sort of basic requirement engineering process now days. The situation is not different in a developing country like Pakistan. A good number of software industries are following standard requirement engineering practices completely or partially. There are multiple reasons behind partial implementation such as lack of knowledge about processes, cost in terms of time and money and implementation of processes. In our study, we have collected factual data regarding current requirement engineering practices from Pakistan software industry. We have studied the organizations of varying size and types of projects. We also find out their success rate and problems which are due to partial or wrong implementation of requirement engineering practices. We are hopeful that this study will provide a cost effective solution for improving requirement engineering practices in Pakistan industry.Item Feature Based Face Recognition Using Slopes(International Conference on Control, Automation and Information Sciences, Gwangju, Korea, 2014) Isra Anwar; Shah Nawaz; Ghulam Kibria; Farooq Ali, Syed; Tahir Hassan; Jeong-Bae KimFace recognition from an image is a popular problem in biometrics research. In the last decade, a lot of research has been done in this area. The advantage of face based identification over other biometrics is its wide acceptability as it does not require any keys, tokens, smart cards, PINs, plastic cards or passwords etc. In this work, face recognition has been done using several feature based approaches. Two new methods are presented in which simple yet useful new features are proposed and evaluated. The main contribution of this paper is usage of a slope table along with other features for face recognition. The slopes of different fiducial points of facial components (left eye, right eye, nose and lips) are computed to fill the slope table. These two methods are compared with the existing approaches based on popular features like principal components and ratios of facial components. The results show that our proposed methods Out perform these existing approaches.