Aqeel-ur Rehman | Hamdard University (original) (raw)
Papers by Aqeel-ur Rehman
Abstract: Mobile Ad hoc Networks (MANET) are infrastructure less networks that are formed on the ... more Abstract: Mobile Ad hoc Networks (MANET) are infrastructure less networks that are formed on the fly between groups of mobile nodes. Due to the vigorous nature of such networks, service discovery in MANET is a very cumbersome job. In this paper, we have proposed an integrated approach to service discovery in MANET that works at network layer to discover services that also piggy-backs responses of possible future requests with current response. Due to this integrated approach, the scheme provides an appropriate route to access the service along with discovering a service provider. The proposed approach is based on a proactive component that periodically broadcasts service advertisements and a reactive component that discovers a service on-demand when a service request is not satisfied locally. To discover the services, the reactive component relies on service oriented routing algorithms to propagate services on the network. In this paper, we have discussed two service oriented routin...
Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, 2017
The world is getting smarter with the use of computing technologies. Many of the domains are now ... more The world is getting smarter with the use of computing technologies. Many of the domains are now based on intelligent solutions and taking their own decisions as per the requirement. For intelligent decision, real-time data gathering is the core requirement and that is only possible with the use of sensors. To keep up the sensors alive for longer period of time, there is a need of recharging of batteries. For that purpose, many of the methodologies are in practice that includes use of alternate energy resources, Energy harvesting etc. Energy harvesting is the process of capturing small amounts of energy from one or more of naturally occurring energy sources also known as ambient energy sources, collecting and storing such energy for later use. Energy harvesting in WSN refers to the collecting and storing energy from ambient energy sources through WSN hardware components which include energy harvesting devices and/or batteries. In this paper the issues and challenges regarding power ...
IEEE Access
Crop diseases have mainly affected crop production due to the lack of modern approaches for disea... more Crop diseases have mainly affected crop production due to the lack of modern approaches for disease identification. For many years, farmers have identified various crop diseases and have local knowledge about disease management. However, the local knowledge of one agricultural region is not utilized in other regions due to the unavailability of knowledge sharing platforms. Agricultural research also suggests that crop production has mainly decreased due to diseases, methods of cultivation, irrigation, and lack of local agricultural knowledge. In this research, the experience of agricultural experts, farmers, and cultivators is gathered through a crowd-sourced platform. The data is then processed for various disease identification. Hence, timely identification of various crop diseases can benefit farmers to apply relevant management methods. In literature, researchers have proposed various methods for disease management, mostly based on the classification of crop diseases using Machine Learning (ML) algorithms. However, these algorithms are unable to give trustful results due to static data provisioning and the dynamic nature of various diseases in different agricultural regions. Further, the agricultural expert's experience is also not considered in verifying the classification results. To identify the dynamic nature of wheat diseases, we acquired high-quality images and symptoms-based text data from farmers, domain experts, and users using a crowd-sourced platform. Different augmentation techniques were also used to enhance the size of training data. In this paper, a modern generic approach has been proposed for the identification and classification of wheat diseases using Decision Trees (DT) and different deep learning models. Also, results of both algorithms were then verified by domain experts that improved the decision trees accuracy by 28.5 %, CNN accuracy by 4.3 % (leading to 97.2 %), and resulted in decision rules for wheat diseases in a knowledge-based system. INDEX TERMS Agricultural DSS, artificial intelligence, agricultural knowledge management, classification of crop diseases, machine learning, wheat crop diseases.
Research Anthology on Privatizing and Securing Data
Security and privacy issues are the challenging areas in the field of internet of things (IoT) an... more Security and privacy issues are the challenging areas in the field of internet of things (IoT) and fog computing. IoT and fog has become an involving technology allowing major changes in the field of information systems and communication systems. This chapter provides the introduction of IoT and fog technology with a brief explanation of how fog is overcoming the challenges of cloud computing. Thereafter, the authors discuss the different security and privacy issues and its related solutions. Furthermore, they present six different case studies which will help the reader to understand the platform of IoT in fog.
Wireless Personal Communications
Medical Body Area Networks or MBANs are gaining popularity in healthcare circles because of the c... more Medical Body Area Networks or MBANs are gaining popularity in healthcare circles because of the convenience they provide to patients and caregivers and assist in chronic disease management. In order to provide prompt and efficient care to the patient, MBANs need to be designed in a way so that stringent QoS requirements are fulfilled. This is essential as MBANs carry vital sign data and any loss or delay in transmission can be fatal and life-threatening. Current research focus is to develop mechanisms and protocols that are focused to reduce delays, conserve energy and improve QoS parameters such as Reliability. An important aspect of MBANs is to give special attention to emergency traffic which is carried when a serious event is triggered such as heartbeat going above threshold or ECG status showing cardiac issues. Thus, the provision of QoS is a challenging task and must be addressed at various layers of the network. There are various techniques to cater to QoS requirements and one way of improving QoS is to reduce the packet loss so that transmission is reliable which is necessary for life-saving data. Research contributions have addressed this mostly at the MAC layer/network layer and through queuing techniques. However, none of these mechanisms do not consider the wireless channel dynamics and the impact of MAC layer and physical layer parameters together while focusing on Emergency data handling within an Intra-WBAN. In this paper, we have proposed a QoS aware Cross layered solution based on IEEE 802.15.6 that is adaptive, Relay based, multi metric and changes the routing scheme based on traffic type. We have selected AODV protocol over OLSR, DSR and other protocols because of its design simplicity. In this paper, we have reviewed the existing literature on WBAN Reliability enhancements’ techniques followed by a review of QoS aware enhancements for AODV. Our proposed protocol is designed and simulated for Intra-WBAN communication and is efficient in terms of end-to-end reliability.
Lecture Notes in Computer Science, 2016
Increasing importance of Open government, E-Participation and Cross-organizational coherence toda... more Increasing importance of Open government, E-Participation and Cross-organizational coherence today has clearly shifted the focus towards building and managing, integrated and coordinated government services. This shall not only satisfy citizens’ need but also improve governance issues automatically.
Home automation is one of the major growing industries that can change the way people live. Some ... more Home automation is one of the major growing industries that can change the way people live. Some of these home automation systems target those seeking luxury and sophisticated home automation platforms; others target those with special needs like the elderly and the disabled. Typical wireless home automation system allows one to control house hold appliances from a centralized control unit which is wireless. These appliances usually have to be specially designed to be compatible with each other and with the control unit for most commercially available home automation systems. The developed system can be integrated as a single portable unit and allows one to wirelessly control lights, fans, air conditioners, television sets, security cameras, electronic doors, computer systems, audio/visual equipment's etc. and turn ON or OFF any appliance that is plugged into a wall outlet, get the status of different sensors and take decision accordingly. The system is portable and constructed...
IEEE Access
Software models are core artifacts in model driven engineering (MDE) and processable by computer.... more Software models are core artifacts in model driven engineering (MDE) and processable by computer. They are automatically transformed into other models and in MDE, programming code is also produced by the models. The automatic transformation provides a systematic reuse of existing artifacts. However, sometimes models are developed with defects and the defects can implicitly shift into the code, which may be difficult to discover and repair. A promising solution to this problem is model verification. UML class model is a key ingredient of MDE. However, UML only offers graphical components without the support of reasoning, due to lack of the formal foundation. Therefore, the verification of formal properties, such as consistency and finite satisfiability is not possible in UML. This paper proposes an ontology-based optimized verification method for important correctness property ''finite satisfiability'' of UML class model.
IEEE Access
Generating intuitions from data using data mining and machine learning algorithms to predict outc... more Generating intuitions from data using data mining and machine learning algorithms to predict outcomes is useful area of computing. The application area of data mining techniques and machine learning is wide ranging including industries, healthcare, organizations, academics etc. A continuous improvement is witnessed due to an ongoing research, as seen particularly in healthcare. Several researchers have applied machine learning to develop decision support systems, perform analysis of dominant clinical factors, extraction of useful information from hideous patterns in historical data, making predictions and disease classification. Successful researches created opportunities for physicians to take appropriate decision at right time. In current study, we intend to utilize the learning capability of machine learning methods towards the classification of birth data using bagging and boosting classification algorithms. It is obvious that differences in living styles, medical assistances, religious implications and the region you live in collectively affect the residents of that society. This motive has encouraged the researchers to conduct studies at regional levels to comprehensively explore the associated medical factors that contribute towards complications among women during pregnancy. The current study is a comprehensive comparison of bagging and boosting classification algorithms performed on birth data collected from the government hospitals of city Muzaffarabad, Kashmir. The experimental tasks are carried out using caret package in R which is considered an inclusive framework for building machine learning models. Accuracy based results with different evaluation measures are presented. Bagging functions including Adabag and BagFda performed marginally better in terms of accuracy, precision and recall. Improvements are observed in comparison to previous study performed on same dataset.
January 2019
Growing E-Participation services compel democratic governments to re-examine their E-Governance s... more Growing E-Participation services compel democratic governments to re-examine their E-Governance service system readiness assessment models with respect to their usability, effectiveness and participatory governance. In practice, the open government data, E-Participation initiatives, and their integration levels, are essential ingredients of E-Governance service systems. The debate about what constitutes E-Governance success, their quantifiable and qualitative variables, their divergent socio-technical dependencies, etc. is still on-going. E-Governance has emerged as a large-scale socio-technical and human centered problem space. We, therefore, assert that HCI (Human Computer Interaction) based system modeling and its supporting socio-technical tools and technologies can effectively be used to design and develop E-participatory governance systems. The research gap analysis highlights a stark paradox by showing a weak correlation between UN (United Nation) provided E-Participation Ind...
Wireless Personal Communications
October 2018
Software models describe structures, relationships and features of the software. Modern software ... more Software models describe structures, relationships and features of the software. Modern software development methodologies such as MDE (Model Driven Engineering) use models as core elements. In MDE, the code is automatically generated from the model and model errors can implicitly shift into the code, which are difficult to find and fix. Model verification is a promising solution to this problem. However, coverage of all facets of model verification is a painful job and existing formal/semi-formal verification methods are greatly inspired by mathematics and difficult to understand by the software practitioners. This work considers particularly UML Class/OCL (Unified Modeling Language Class/Object Constraint Language) model and presents an ontology-based verification method. In the proposed method, a class diagram is transformed into ontology specified in OWL (Web Ontology Language) and constraints into SPARQL NAF (Negation as Failure) queries. This work tries to demonstrate that the...
Wireless Personal Communications
International Journal of Hyperconnectivity and the Internet of Things
This article describes how in IoT, data management is a major issue because of communication amon... more This article describes how in IoT, data management is a major issue because of communication among billions of electronic devices, which generate the huge dataset. Due to the unavailability of any standard, data analysis on such a large amount of data is a complex task. There should be a definition of IoT-based data to find out what is available and its applicable solutions. Such a study also directs the need for new techniques to cope up with such challenges. Due to the heterogeneity of connected nodes, different data rates, and formats, it is a huge challenge to deal with such a variety of data. As IoT is providing processing nodes in the form of smart nodes; it is presenting a good platform to support the big data study. In this article, the characteristics of data mining requirements for data mining analysis are highlighted. The associated challenges of facts generation, as well as the plausible suitable platform of such huge data analysis is also underlined. The application of ...
Advances in Civil and Industrial Engineering, 2000
Image segmentation is a technique which divides an image into its constituent regions or objects.... more Image segmentation is a technique which divides an image into its constituent regions or objects. Segmentation continues till we reach our area of interest or the specified object of target. This field offers vast future scope and challenges for the researchers. This proposal uses the fuzzy c mean technique to segment the different MRI brain tumor images. This proposal also shows the comparative results of Thresholding, K-means clustering and Fuzzy c- means clustering. Dice coefficient and Jaccards measure is used for accuracy of the segmentation in this proposal. Experimental results demonstrate the performance of the designed method.
E-Manufacturing and E-Service Strategies in Contemporary Organizations
Internet of things (IoT) is a concept of providing uniquely identifiable objects connectivity to ... more Internet of things (IoT) is a concept of providing uniquely identifiable objects connectivity to the internet. Under the roof of IoT, it is predicted that above 28 billion devices will be connected to the internet by the year 2020. When billions of things connect, it will be difficult to manage and analyze huge amount of data as each object will send and retrieve data. Smart manufacturing is an emerging concept where the manufacturing process is supported by technology and the required information is made available during the manufacturing process to get the flexibility and the product as per customer changing needs. Internet of things (IoT) may provide a good platform to enhance the manufacturing process into smart manufacturing. The advantages of smart manufacturing include the higher quality of a product, improved productivity, increased energy efficiency, enhanced scalability in manufacturing process, etc. This chapter presents in depth the IoT and smart manufacturing concepts, ...
There are several alternative life science techniques that are used to identify human, these tech... more There are several alternative life science techniques that are used to identify human, these techniques are namely eye recognition, face recognition, finger print recognition and currently a well-known signatures recognition and verification. The utilization of signatures is in all legal and financial documents. Verification of signatures now becomes necessary to distinguish between original and forged signature. A computer based technique is necessitated in this regard. Verification of signatures can be performed either offline or online. Under offline systems, signatures are taken as an image and recognition is performed using some artificial intelligence techniques including neural networks. We have worked on off-line Signature Recognition and Verification System (SRVS) by taking artificial neural network technique into account. Signatures are taken as image and after some necessary pre-processing (i.e. to isolate the signature area) training of system is done with some initial stored samples to which authentication is needed. MATLAB has been used to design the system. The system is tested for several scanned signatures and the results are found satisfactory (about approximately 95% success rate). Image quality plays an important role as poor quality of signature image may lead to the failure to recognize/verify a signature. Increase in the attributes/ features of signature will increase the verification ability of the system but it may lead to higher computational complexity
Journal of Computer Networks and Communications, 2016
Handbook of Research on Trends and Future Directions in Big Data and Web Intelligence, 2015
ABSTRACT Internet of Things (IoT) is a concept of providing uniquely identifiable objects connect... more ABSTRACT Internet of Things (IoT) is a concept of providing uniquely identifiable objects connectivity to Internet. When billions of things connect, it will be difficult to manage and analysis huge amount of data as each object will send and retrieve data. Many challenges are related with analysis of big data on IoT due to the heterogeneity, variable data formats, priorities and specifically numerous numbers of connected devices. Big data actually refers to huge amount of data. It includes all type of data. The data is traditionally collected and then processed and move to data warehouse for analysis. When a large amount data is collected from different sources, it may not necessarily relational data. This data can be treated as big data. As data is increasingly becoming more varied, more complex and less structured, it has become imperative to process it quickly. Meeting such demanding requirements poses an enormous challenge for traditional databases and scale-up infrastructures. Big Data refer to new scale-out architectures that address these needs. Big Data is fundamentally about massively distributed architectures and massively parallel processing using commodity building blocks to manage and analyze data. Big Data is about the growing challenge that organizations face as they deal with large and fast-growing sources of data or information that also present a complex range of analysis and use problems. These can include: • Having a computing infrastructure that can ingest, validate, and analyze high volumes (size and/or rate) of data • Assessing mixed data (structured and unstructured) from multiple sources • Dealing with unpredictable content with no apparent schema or structure • Enabling real-time or near real-time collection, analysis, and answers In IoT, data management is a big problem due to the connectivity of billions of devices, objects, processes generating big data. Since the Things are not following any specific (common) standard, so analysis of such data becomes a big challenge. There is a need to elaborate about the characteristics of IoT based data to find out the available and applicable solutions. Such kind of study also directs to realize the need of new techniques to cope up with such challenges.
Home automation is one of the major growing industries that can change the way people live. Some ... more Home automation is one of the major growing industries that can change the way people live. Some of these home automation systems target those seeking luxury and sophisticated home automation platforms; others target those with special needs like the elderly and the disabled. Typical wireless home automation system allows one to control house hold appliances from a centralized control unit which is wireless. These appliances usually have to be specially designed to be compatible with each other and with the control unit for most commercially available home automation systems. The developed system can be integrated as a single portable unit and allows one to wirelessly control lights, fans, air conditioners, television sets, security cameras, electronic doors, computer systems, audio/visual equipment's etc. and turn ON or OFF any appliance that is plugged into a wall outlet, get the status of different sensors and take decision accordingly. The system is portable and constructed in a way that is easy to install, configure, run, and maintain. The perfect user interface still does not exist at present and to build a good interface requires knowledge of both sociology and technology fields. According to major companies that are involved in speech recognition researches, voice will be the primary interface between humans and machines in the near future. The problem lies with the situation of the elderly or disabled people, who cannot usually help themselves to move around, and might require external assistance. People who live alone might also need a helping hand at home. Therefore a voice controlled home automation system is designed, so that the users can perform certain tasks by just the use of their voices, moreover, the system is designed to have a hand-held device(remote) so that the user can easily speak their commands, otherwise they would have to walk over to the microphone to speak. Having a remote will make the system more user-friendly and portable.
Abstract: Mobile Ad hoc Networks (MANET) are infrastructure less networks that are formed on the ... more Abstract: Mobile Ad hoc Networks (MANET) are infrastructure less networks that are formed on the fly between groups of mobile nodes. Due to the vigorous nature of such networks, service discovery in MANET is a very cumbersome job. In this paper, we have proposed an integrated approach to service discovery in MANET that works at network layer to discover services that also piggy-backs responses of possible future requests with current response. Due to this integrated approach, the scheme provides an appropriate route to access the service along with discovering a service provider. The proposed approach is based on a proactive component that periodically broadcasts service advertisements and a reactive component that discovers a service on-demand when a service request is not satisfied locally. To discover the services, the reactive component relies on service oriented routing algorithms to propagate services on the network. In this paper, we have discussed two service oriented routin...
Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, 2017
The world is getting smarter with the use of computing technologies. Many of the domains are now ... more The world is getting smarter with the use of computing technologies. Many of the domains are now based on intelligent solutions and taking their own decisions as per the requirement. For intelligent decision, real-time data gathering is the core requirement and that is only possible with the use of sensors. To keep up the sensors alive for longer period of time, there is a need of recharging of batteries. For that purpose, many of the methodologies are in practice that includes use of alternate energy resources, Energy harvesting etc. Energy harvesting is the process of capturing small amounts of energy from one or more of naturally occurring energy sources also known as ambient energy sources, collecting and storing such energy for later use. Energy harvesting in WSN refers to the collecting and storing energy from ambient energy sources through WSN hardware components which include energy harvesting devices and/or batteries. In this paper the issues and challenges regarding power ...
IEEE Access
Crop diseases have mainly affected crop production due to the lack of modern approaches for disea... more Crop diseases have mainly affected crop production due to the lack of modern approaches for disease identification. For many years, farmers have identified various crop diseases and have local knowledge about disease management. However, the local knowledge of one agricultural region is not utilized in other regions due to the unavailability of knowledge sharing platforms. Agricultural research also suggests that crop production has mainly decreased due to diseases, methods of cultivation, irrigation, and lack of local agricultural knowledge. In this research, the experience of agricultural experts, farmers, and cultivators is gathered through a crowd-sourced platform. The data is then processed for various disease identification. Hence, timely identification of various crop diseases can benefit farmers to apply relevant management methods. In literature, researchers have proposed various methods for disease management, mostly based on the classification of crop diseases using Machine Learning (ML) algorithms. However, these algorithms are unable to give trustful results due to static data provisioning and the dynamic nature of various diseases in different agricultural regions. Further, the agricultural expert's experience is also not considered in verifying the classification results. To identify the dynamic nature of wheat diseases, we acquired high-quality images and symptoms-based text data from farmers, domain experts, and users using a crowd-sourced platform. Different augmentation techniques were also used to enhance the size of training data. In this paper, a modern generic approach has been proposed for the identification and classification of wheat diseases using Decision Trees (DT) and different deep learning models. Also, results of both algorithms were then verified by domain experts that improved the decision trees accuracy by 28.5 %, CNN accuracy by 4.3 % (leading to 97.2 %), and resulted in decision rules for wheat diseases in a knowledge-based system. INDEX TERMS Agricultural DSS, artificial intelligence, agricultural knowledge management, classification of crop diseases, machine learning, wheat crop diseases.
Research Anthology on Privatizing and Securing Data
Security and privacy issues are the challenging areas in the field of internet of things (IoT) an... more Security and privacy issues are the challenging areas in the field of internet of things (IoT) and fog computing. IoT and fog has become an involving technology allowing major changes in the field of information systems and communication systems. This chapter provides the introduction of IoT and fog technology with a brief explanation of how fog is overcoming the challenges of cloud computing. Thereafter, the authors discuss the different security and privacy issues and its related solutions. Furthermore, they present six different case studies which will help the reader to understand the platform of IoT in fog.
Wireless Personal Communications
Medical Body Area Networks or MBANs are gaining popularity in healthcare circles because of the c... more Medical Body Area Networks or MBANs are gaining popularity in healthcare circles because of the convenience they provide to patients and caregivers and assist in chronic disease management. In order to provide prompt and efficient care to the patient, MBANs need to be designed in a way so that stringent QoS requirements are fulfilled. This is essential as MBANs carry vital sign data and any loss or delay in transmission can be fatal and life-threatening. Current research focus is to develop mechanisms and protocols that are focused to reduce delays, conserve energy and improve QoS parameters such as Reliability. An important aspect of MBANs is to give special attention to emergency traffic which is carried when a serious event is triggered such as heartbeat going above threshold or ECG status showing cardiac issues. Thus, the provision of QoS is a challenging task and must be addressed at various layers of the network. There are various techniques to cater to QoS requirements and one way of improving QoS is to reduce the packet loss so that transmission is reliable which is necessary for life-saving data. Research contributions have addressed this mostly at the MAC layer/network layer and through queuing techniques. However, none of these mechanisms do not consider the wireless channel dynamics and the impact of MAC layer and physical layer parameters together while focusing on Emergency data handling within an Intra-WBAN. In this paper, we have proposed a QoS aware Cross layered solution based on IEEE 802.15.6 that is adaptive, Relay based, multi metric and changes the routing scheme based on traffic type. We have selected AODV protocol over OLSR, DSR and other protocols because of its design simplicity. In this paper, we have reviewed the existing literature on WBAN Reliability enhancements’ techniques followed by a review of QoS aware enhancements for AODV. Our proposed protocol is designed and simulated for Intra-WBAN communication and is efficient in terms of end-to-end reliability.
Lecture Notes in Computer Science, 2016
Increasing importance of Open government, E-Participation and Cross-organizational coherence toda... more Increasing importance of Open government, E-Participation and Cross-organizational coherence today has clearly shifted the focus towards building and managing, integrated and coordinated government services. This shall not only satisfy citizens’ need but also improve governance issues automatically.
Home automation is one of the major growing industries that can change the way people live. Some ... more Home automation is one of the major growing industries that can change the way people live. Some of these home automation systems target those seeking luxury and sophisticated home automation platforms; others target those with special needs like the elderly and the disabled. Typical wireless home automation system allows one to control house hold appliances from a centralized control unit which is wireless. These appliances usually have to be specially designed to be compatible with each other and with the control unit for most commercially available home automation systems. The developed system can be integrated as a single portable unit and allows one to wirelessly control lights, fans, air conditioners, television sets, security cameras, electronic doors, computer systems, audio/visual equipment's etc. and turn ON or OFF any appliance that is plugged into a wall outlet, get the status of different sensors and take decision accordingly. The system is portable and constructed...
IEEE Access
Software models are core artifacts in model driven engineering (MDE) and processable by computer.... more Software models are core artifacts in model driven engineering (MDE) and processable by computer. They are automatically transformed into other models and in MDE, programming code is also produced by the models. The automatic transformation provides a systematic reuse of existing artifacts. However, sometimes models are developed with defects and the defects can implicitly shift into the code, which may be difficult to discover and repair. A promising solution to this problem is model verification. UML class model is a key ingredient of MDE. However, UML only offers graphical components without the support of reasoning, due to lack of the formal foundation. Therefore, the verification of formal properties, such as consistency and finite satisfiability is not possible in UML. This paper proposes an ontology-based optimized verification method for important correctness property ''finite satisfiability'' of UML class model.
IEEE Access
Generating intuitions from data using data mining and machine learning algorithms to predict outc... more Generating intuitions from data using data mining and machine learning algorithms to predict outcomes is useful area of computing. The application area of data mining techniques and machine learning is wide ranging including industries, healthcare, organizations, academics etc. A continuous improvement is witnessed due to an ongoing research, as seen particularly in healthcare. Several researchers have applied machine learning to develop decision support systems, perform analysis of dominant clinical factors, extraction of useful information from hideous patterns in historical data, making predictions and disease classification. Successful researches created opportunities for physicians to take appropriate decision at right time. In current study, we intend to utilize the learning capability of machine learning methods towards the classification of birth data using bagging and boosting classification algorithms. It is obvious that differences in living styles, medical assistances, religious implications and the region you live in collectively affect the residents of that society. This motive has encouraged the researchers to conduct studies at regional levels to comprehensively explore the associated medical factors that contribute towards complications among women during pregnancy. The current study is a comprehensive comparison of bagging and boosting classification algorithms performed on birth data collected from the government hospitals of city Muzaffarabad, Kashmir. The experimental tasks are carried out using caret package in R which is considered an inclusive framework for building machine learning models. Accuracy based results with different evaluation measures are presented. Bagging functions including Adabag and BagFda performed marginally better in terms of accuracy, precision and recall. Improvements are observed in comparison to previous study performed on same dataset.
January 2019
Growing E-Participation services compel democratic governments to re-examine their E-Governance s... more Growing E-Participation services compel democratic governments to re-examine their E-Governance service system readiness assessment models with respect to their usability, effectiveness and participatory governance. In practice, the open government data, E-Participation initiatives, and their integration levels, are essential ingredients of E-Governance service systems. The debate about what constitutes E-Governance success, their quantifiable and qualitative variables, their divergent socio-technical dependencies, etc. is still on-going. E-Governance has emerged as a large-scale socio-technical and human centered problem space. We, therefore, assert that HCI (Human Computer Interaction) based system modeling and its supporting socio-technical tools and technologies can effectively be used to design and develop E-participatory governance systems. The research gap analysis highlights a stark paradox by showing a weak correlation between UN (United Nation) provided E-Participation Ind...
Wireless Personal Communications
October 2018
Software models describe structures, relationships and features of the software. Modern software ... more Software models describe structures, relationships and features of the software. Modern software development methodologies such as MDE (Model Driven Engineering) use models as core elements. In MDE, the code is automatically generated from the model and model errors can implicitly shift into the code, which are difficult to find and fix. Model verification is a promising solution to this problem. However, coverage of all facets of model verification is a painful job and existing formal/semi-formal verification methods are greatly inspired by mathematics and difficult to understand by the software practitioners. This work considers particularly UML Class/OCL (Unified Modeling Language Class/Object Constraint Language) model and presents an ontology-based verification method. In the proposed method, a class diagram is transformed into ontology specified in OWL (Web Ontology Language) and constraints into SPARQL NAF (Negation as Failure) queries. This work tries to demonstrate that the...
Wireless Personal Communications
International Journal of Hyperconnectivity and the Internet of Things
This article describes how in IoT, data management is a major issue because of communication amon... more This article describes how in IoT, data management is a major issue because of communication among billions of electronic devices, which generate the huge dataset. Due to the unavailability of any standard, data analysis on such a large amount of data is a complex task. There should be a definition of IoT-based data to find out what is available and its applicable solutions. Such a study also directs the need for new techniques to cope up with such challenges. Due to the heterogeneity of connected nodes, different data rates, and formats, it is a huge challenge to deal with such a variety of data. As IoT is providing processing nodes in the form of smart nodes; it is presenting a good platform to support the big data study. In this article, the characteristics of data mining requirements for data mining analysis are highlighted. The associated challenges of facts generation, as well as the plausible suitable platform of such huge data analysis is also underlined. The application of ...
Advances in Civil and Industrial Engineering, 2000
Image segmentation is a technique which divides an image into its constituent regions or objects.... more Image segmentation is a technique which divides an image into its constituent regions or objects. Segmentation continues till we reach our area of interest or the specified object of target. This field offers vast future scope and challenges for the researchers. This proposal uses the fuzzy c mean technique to segment the different MRI brain tumor images. This proposal also shows the comparative results of Thresholding, K-means clustering and Fuzzy c- means clustering. Dice coefficient and Jaccards measure is used for accuracy of the segmentation in this proposal. Experimental results demonstrate the performance of the designed method.
E-Manufacturing and E-Service Strategies in Contemporary Organizations
Internet of things (IoT) is a concept of providing uniquely identifiable objects connectivity to ... more Internet of things (IoT) is a concept of providing uniquely identifiable objects connectivity to the internet. Under the roof of IoT, it is predicted that above 28 billion devices will be connected to the internet by the year 2020. When billions of things connect, it will be difficult to manage and analyze huge amount of data as each object will send and retrieve data. Smart manufacturing is an emerging concept where the manufacturing process is supported by technology and the required information is made available during the manufacturing process to get the flexibility and the product as per customer changing needs. Internet of things (IoT) may provide a good platform to enhance the manufacturing process into smart manufacturing. The advantages of smart manufacturing include the higher quality of a product, improved productivity, increased energy efficiency, enhanced scalability in manufacturing process, etc. This chapter presents in depth the IoT and smart manufacturing concepts, ...
There are several alternative life science techniques that are used to identify human, these tech... more There are several alternative life science techniques that are used to identify human, these techniques are namely eye recognition, face recognition, finger print recognition and currently a well-known signatures recognition and verification. The utilization of signatures is in all legal and financial documents. Verification of signatures now becomes necessary to distinguish between original and forged signature. A computer based technique is necessitated in this regard. Verification of signatures can be performed either offline or online. Under offline systems, signatures are taken as an image and recognition is performed using some artificial intelligence techniques including neural networks. We have worked on off-line Signature Recognition and Verification System (SRVS) by taking artificial neural network technique into account. Signatures are taken as image and after some necessary pre-processing (i.e. to isolate the signature area) training of system is done with some initial stored samples to which authentication is needed. MATLAB has been used to design the system. The system is tested for several scanned signatures and the results are found satisfactory (about approximately 95% success rate). Image quality plays an important role as poor quality of signature image may lead to the failure to recognize/verify a signature. Increase in the attributes/ features of signature will increase the verification ability of the system but it may lead to higher computational complexity
Journal of Computer Networks and Communications, 2016
Handbook of Research on Trends and Future Directions in Big Data and Web Intelligence, 2015
ABSTRACT Internet of Things (IoT) is a concept of providing uniquely identifiable objects connect... more ABSTRACT Internet of Things (IoT) is a concept of providing uniquely identifiable objects connectivity to Internet. When billions of things connect, it will be difficult to manage and analysis huge amount of data as each object will send and retrieve data. Many challenges are related with analysis of big data on IoT due to the heterogeneity, variable data formats, priorities and specifically numerous numbers of connected devices. Big data actually refers to huge amount of data. It includes all type of data. The data is traditionally collected and then processed and move to data warehouse for analysis. When a large amount data is collected from different sources, it may not necessarily relational data. This data can be treated as big data. As data is increasingly becoming more varied, more complex and less structured, it has become imperative to process it quickly. Meeting such demanding requirements poses an enormous challenge for traditional databases and scale-up infrastructures. Big Data refer to new scale-out architectures that address these needs. Big Data is fundamentally about massively distributed architectures and massively parallel processing using commodity building blocks to manage and analyze data. Big Data is about the growing challenge that organizations face as they deal with large and fast-growing sources of data or information that also present a complex range of analysis and use problems. These can include: • Having a computing infrastructure that can ingest, validate, and analyze high volumes (size and/or rate) of data • Assessing mixed data (structured and unstructured) from multiple sources • Dealing with unpredictable content with no apparent schema or structure • Enabling real-time or near real-time collection, analysis, and answers In IoT, data management is a big problem due to the connectivity of billions of devices, objects, processes generating big data. Since the Things are not following any specific (common) standard, so analysis of such data becomes a big challenge. There is a need to elaborate about the characteristics of IoT based data to find out the available and applicable solutions. Such kind of study also directs to realize the need of new techniques to cope up with such challenges.
Home automation is one of the major growing industries that can change the way people live. Some ... more Home automation is one of the major growing industries that can change the way people live. Some of these home automation systems target those seeking luxury and sophisticated home automation platforms; others target those with special needs like the elderly and the disabled. Typical wireless home automation system allows one to control house hold appliances from a centralized control unit which is wireless. These appliances usually have to be specially designed to be compatible with each other and with the control unit for most commercially available home automation systems. The developed system can be integrated as a single portable unit and allows one to wirelessly control lights, fans, air conditioners, television sets, security cameras, electronic doors, computer systems, audio/visual equipment's etc. and turn ON or OFF any appliance that is plugged into a wall outlet, get the status of different sensors and take decision accordingly. The system is portable and constructed in a way that is easy to install, configure, run, and maintain. The perfect user interface still does not exist at present and to build a good interface requires knowledge of both sociology and technology fields. According to major companies that are involved in speech recognition researches, voice will be the primary interface between humans and machines in the near future. The problem lies with the situation of the elderly or disabled people, who cannot usually help themselves to move around, and might require external assistance. People who live alone might also need a helping hand at home. Therefore a voice controlled home automation system is designed, so that the users can perform certain tasks by just the use of their voices, moreover, the system is designed to have a hand-held device(remote) so that the user can easily speak their commands, otherwise they would have to walk over to the microphone to speak. Having a remote will make the system more user-friendly and portable.