Natash Mian - Academia.edu (original) (raw)

Papers by Natash Mian

Research paper thumbnail of Analysis Of Internet Addiction Amongst University Level Students

VFAST transactions on software engineering, Jan 31, 2014

Internet is a global computer network system that connects millions of people at a time. An Inter... more Internet is a global computer network system that connects millions of people at a time. An Internet is a combination of several networks that are interconnected by bridges and/or routers. It uses advanced technologies standards and protocols. Throughout the world, Internet is responsible for hosting and delivering of services. The transferring of gigantic Internet services is creating confidence for service providers and caused for the growth of Internet in all sectors. The key elements of Internet are hosts, network, LAN, WAN and routers. Hosts which are also called end systems include mainframes, servers, workstations and PCs. These hosts are mostly use Internet connected through the local area network (LAN) or wide area network (WAN). These two or more networks are connected directly or indirectly to a router. On the Internet a host sends data to another host anywhere and data breaks into the sequence of packets, called IP datagram's or IP packets. Each packet has unique numeric address which is called IP address [1]. The Advanced Research Projects Agency Network (ARPANET) created the history of computer network. In 1960s, United States, Department of Defense (DOD) gave birth to the Internet [2]. All the countries throughout the world almost use Internet in every field of life. This amazing communication system came into being in 1969 [3]. Since the mid 1990s, Internet has become very important due to its easy accessibility. In a study conducted in 2007 by Norton it was concluded that approximately one fourth of the world's resident's use the services of the Internet [4]. The Internet has grown up to be one of the most admired media for communication. This media have utilized excessively by young people and teenagers to communicate with each other. The weighty use of the Internet produces negative effects in all areas and causes for the problematic Internet

Research paper thumbnail of Enhanced Cloud Computing Model Using Systematic Approach Towards The Quality Of Service In A Cloud Computing

VFAST transactions on software engineering, Jan 30, 2014

Cloud computing is modrendevelopingtechnoloy which provides on-claim resources in cloud computing... more Cloud computing is modrendevelopingtechnoloy which provides on-claim resources in cloud computing envoirnment. Cloud computing is modern technology which guarantees to provide elastic Infrastructure, resources accessible via the Internet with low cost. Cloud refers to a huge bundle of computing and data resources which can be access to different protocols and interfaces. Cloud service model containsSoftware-as-a-service (SaaS),Infrastructure-as-a service (IaaS), and Platform-as-a-service (PaaS. Cloud users can enjoy these services without knowing the underlying technology behind the cloud. Quality of service playsa vital role in any network while providing efficient resourcesto users. To competitive gain, it is compulsory to cloud computing network operator to gain trust of users by providing the best quality of services. Resource virtualization, share pool of resources, on-demand network access, large datacentres, and highly-interactive web applications needs quality of services. In this paper we put an effort to enhance the cloud computing model to show the "Quality as-a-service(QaaS)"layer.

Research paper thumbnail of E-commerce in Pakistan: Growth Potentials and E-payment Solutions

In Pakistan, millions of people have access to internet and now it has become essential part of t... more In Pakistan, millions of people have access to internet and now it has become essential part of their lives. It is now a driving force for innovation of all industries. After arrival of wireless service providers, internet users are growing rapidly. On the other hand, internet is still just a source of information sharing and social interaction. Its role in trade and business is limited. Some business organizations have adopted partial ecommerce solutions but no pure-ecommerce business model is implemented throughout the country. E-Commerce plays an important role in economic development. It reduces cost of products and services and creates new job opportunities. Major obstacles in the way of ecommerce in Pakistan are absence of cyber law, poverty, illiteracy and lack of infrastructure. Apart from these, the most challenging one is lack of suitable electronic payments system. Existing systems are either unavailable in Pakistan or not suitable for local entrepreneurs. In this paper, current potentials for ecommerce growth are explored and a new protocol "Dual-Network E-Payments Protocol" is proposed. Protocol is based on combination of IP and GSM networks. It satisfies all desired characteristics of e-payment mechanism. The protocol is quite secure, trust worthy and suitable for local infrastructure.

Research paper thumbnail of Key Analysis of Normalization Process Using Formal Techniques in DBRE

Database systems are considered as an integral part of any software system, therefore, all comple... more Database systems are considered as an integral part of any software system, therefore, all complex systems maintain a database in different formats. Relational database management systems are based on relational model for creation and storage of databases. Database reverse engineering (DBRE) is a process of extracting the database requirements from an operational database system. Objective of DBRE is to enhance

Research paper thumbnail of Coronavirus: A “Mild” Virus Turned Deadly Infection

Computers, materials & continua, 2021

Coronaviruses are a family of viruses that can be transmitted from one person to another. Earlier... more Coronaviruses are a family of viruses that can be transmitted from one person to another. Earlier strains have only been mild viruses, but the current form, known as coronavirus disease 2019 (COVID-19), has become a deadly infection. The outbreak originated in Wuhan, China, and has since spread worldwide. The symptoms of COVID-19 include a dry cough, sore throat, fever, and nasal congestion. Antimicrobial drugs, pathogen-host interaction, and 2 weeks of isolation have been recommended for the treatment of the infection. Safe operating procedures, such as the use of face masks, hand sanitizer, handwashing with soap, and social distancing, are also suggested. Moreover, travel bans for cities, states, and countries have been put in place, along with lockdowns to control the outbreak. Travel restrictions, mask use, sanitizer or soap use, and avoidance of touching the face and nose have produced encouraging results, whereas the effectiveness of antibiotics has not been proved. The results of isolation for the recovery of infected people have also been promising. Travel bans and lockdowns have caused a slump in economies, and unemployment has risen sharply, resulting in an increase in mental health cases globally. To date, vaccines have been developed and are in use in certain countries, but following standard operating procedures remain critical. The countries following the guidelines can eradicate this virus. New Zealand was the rst country to eliminate the virus from their territory.

Research paper thumbnail of Database reverse engineering tools

International Conference on Software Engineering, Feb 20, 2008

... 10. Maria de Lurdes Pedro-de-Jesus , Pedro Manuel Antunes Sousa, Selection of Reverse Enginee... more ... 10. Maria de Lurdes Pedro-de-Jesus , Pedro Manuel Antunes Sousa, Selection of Reverse Engineering Methods for Relational Databases, Proceedings of the Third European Conference on Software Maintenance and Reengineering, p.194, March 03-05, 1999. ...

Research paper thumbnail of Blind and Visually Impaired User Interface to Solve Accessibility Problems

Intelligent Automation and Soft Computing, 2021

Research paper thumbnail of Blind and Visually Impaired User Interface to Solve Accessibility Problems

Intelligent Automation & Soft Computing, 2021

Research paper thumbnail of Blind and Visually Impaired User Interface to Solve Accessibility Problems

Intelligent Automation & Soft Computing, 2021

Research paper thumbnail of A Concurrence Study on Interoperability Issues in IoT and Decision Making Based Model on Data and Services being used during Inter-Operability

Lahore Garrison University Research Journal of Computer Science and Information Technology, 2020

The Internet-of-Things (IoT) has become an important topic among researchers owing to its potenti... more The Internet-of-Things (IoT) has become an important topic among researchers owing to its potential to change the way we live and use smart devices. In recent years, many research work found in the world are interrelated and convey via the existing web structure which makes a worldwide system called IoT. This study focused on the significant improvement of answers for a wider scope of gadgets and the Internet of Things IoT stages in recent years. In any case, each arrangement gives its very own IoT framework, gadgets, APIs, and information configurations promoting interoperability issues. These issues are the outcome of numerous basic issues, difficulty to create IoT application uncovering cross-stage, and additionally cross-space, trouble in connecting non-interoperable IoT gadgets to various IoT stages, what's more, eventually averts the development of IoT innovation at an enormous scale. To authorize consistent data sharing between various IoT vendors, endeavors by a few acad...

Research paper thumbnail of Usability Evaluation of Online Educational Applications in COVID-19

Lahore Garrison University Research Journal of Computer Science and Information Technology, 2020

COVID-19 is a pandemic faced by almost every country in the world, this has resulted in health cr... more COVID-19 is a pandemic faced by almost every country in the world, this has resulted in health crisis. Due to COVID-19, all the countries around the world have decided to close all educational institutes to prevent this pandemic. Educational institutes have taken every possible measure to minimize the impact of the closure of schools and introduce the concept of an online education system which is not only a massive shock for parents but it also affects the children's learning process and social life. The educational applications (Apps) are very important, because they offer more opportunities for development and growth to society. In this pandemic situation, educational Apps like Zoom, HEC LMS, Google Classroom, and Skype, etc. are the need of the hour when everything goes online. In this paper, the usability features of online educational Apps are thoroughly discussed including the effectiveness and usability for students. Using the results obtained from the survey, this paper...

Research paper thumbnail of Agent Based Information Security Threat Management Framework for Hybrid Cloud Computing

Cloud computing is an effective, fast growing, and low cost way for today's businesses organi... more Cloud computing is an effective, fast growing, and low cost way for today's businesses organizations to provide professional and IT services over the Internet. Cloud computing has variety of service and deployment models providing both solid support to organizations to secure their business interests and flexibility to deliver new services. Security threats are associated with each service and deployment model, vary and depend on wide range of factors including the sensitivity of information, resources and architectures. Over time, business and cloud organizations tend to tight their security posture. For effective threat management, cloud service provider must perform threat assessments on regular basis. Threat Agent is an individual or group that exploit vulnerabilities, manifest a threat and conduct damaging activities. An alerting position arises when threat agent breach security and leaks confidential and sensitive information of organization. To cater this situation, we ha...

Research paper thumbnail of Comparative Analysis Of Cloud Computing Security Issues

Almost all the organizations are seriously thinking to adopt the cloud computingservices, seeing ... more Almost all the organizations are seriously thinking to adopt the cloud computingservices, seeing its benefits in terms of cost, accessibility, availability, flexibility andhighly automated process of updation. Cloud Computing enhance the current capabilitiesdynamically without further investment. Cloud Computing is a band of resources, applicationsand services. In cloud computing customer’s access IT related services in terms of infrastructure platform and software without getting knowledge of underlying technologies. With the executionof cloud computing, organizations have strong concerns about the security of their data.Organizations are hesitating to take initiatives in the deployment of their businesses due to data security problem. This paper gives an overview of cloud computing and analysis of security issues in cloud computing.

Research paper thumbnail of Course Coordination In Academic Sector: An Expert System Foundation

Artificial Intelligence (AI) has come out from science fiction movies and it is now enabling mach... more Artificial Intelligence (AI) has come out from science fiction movies and it is now enabling machines to behave like human experts. Computers have some advantages over human beings because of their immunity toward perturbation factors. These factors include fatigue, stress and diminished attention. This ability makes computers more efficient and reliable in decision making. The real goal of AI is to computerize human intelligence. In this paper we explored “Expert Systems” that is one of the most important branches of AI. In expert systems, we simulate expertise of domain experts in computer systems. Machines can work like doctors, engineers and consultants and can be able to learn and use their judgmental power to conclude the situations. In academia, many subjects are being offering in every degree programs. A course coordinator is an expert who allot related subject to instructors by using some factual and heuristic knowledge. The real task is to simulate the judgment ability tha...

Research paper thumbnail of A Concurrence Study on Interoperability Issues in IoT and Decision Making Based Model on Data and Services being used during Inter-Operability

Lahore Garrison University Research Journal of Computer Science and Information Technology, 2020

The Internet-of-Things (IoT) has become an important topic among researchers owing to its potenti... more The Internet-of-Things (IoT) has become an important topic among researchers owing to its potential to change the way we live and use smart devices. In recent years, many research work found in the world are interrelated and convey via the existing web structure which makes a worldwide system called IoT. This study focused on the significant improvement of answers for a wider scope of gadgets and the Internet of Things IoT stages in recent years. In any case, each arrangement gives its very own IoT framework, gadgets, APIs, and information configurations promoting interoperability issues. These issues are the outcome of numerous basic issues, difficulty to create IoT application uncovering cross-stage, and additionally cross-space, trouble in connecting non-interoperable IoT gadgets to various IoT stages, what's more, eventually averts the development of IoT innovation at an enormous scale. To authorize consistent data sharing between various IoT vendors, endeavors by a few acad...

Research paper thumbnail of Prediction of Cloud Ranking in a Hyperconverged Cloud Ecosystem Using Machine Learning

Computers, Materials & Continua, 2021

Research paper thumbnail of Coronavirus: A “Mild” Virus Turned Deadly Infection

Computers, Materials & Continua, 2021

Coronaviruses are a family of viruses that can be transmitted from one person to another. Earlier... more Coronaviruses are a family of viruses that can be transmitted from one person to another. Earlier strains have only been mild viruses, but the current form, known as coronavirus disease 2019 (COVID-19), has become a deadly infection. The outbreak originated in Wuhan, China, and has since spread worldwide. The symptoms of COVID-19 include a dry cough, sore throat, fever, and nasal congestion. Antimicrobial drugs, pathogen-host interaction, and 2 weeks of isolation have been recommended for the treatment of the infection. Safe operating procedures, such as the use of face masks, hand sanitizer, handwashing with soap, and social distancing, are also suggested. Moreover, travel bans for cities, states, and countries have been put in place, along with lockdowns to control the outbreak. Travel restrictions, mask use, sanitizer or soap use, and avoidance of touching the face and nose have produced encouraging results, whereas the effectiveness of antibiotics has not been proved. The results of isolation for the recovery of infected people have also been promising. Travel bans and lockdowns have caused a slump in economies, and unemployment has risen sharply, resulting in an increase in mental health cases globally. To date, vaccines have been developed and are in use in certain countries, but following standard operating procedures remain critical. The countries following the guidelines can eradicate this virus. New Zealand was the rst country to eliminate the virus from their territory.

Research paper thumbnail of A Review of Deep Learning Security and Privacy Defensive Techniques

Mobile Information Systems, 2020

In recent past years, Deep Learning presented an excellent performance in different areas like im... more In recent past years, Deep Learning presented an excellent performance in different areas like image recognition, pattern matching, and even in cybersecurity. The Deep Learning has numerous advantages including fast solving complex problems, huge automation, maximum application of unstructured data, ability to give high quality of results, reduction of high costs, no need for data labeling, and identification of complex interactions, but it also has limitations like opaqueness, computationally intensive, need for abundant data, and more complex algorithms. In our daily life, we used many applications that use Deep Learning models to make decisions based on predictions, and if Deep Learning models became the cause of misprediction due to internal/external malicious effects, it may create difficulties in our real life. Furthermore, the Deep Learning training models often have sensitive information of the users and those models should not be vulnerable and expose security and privacy. ...

Research paper thumbnail of Usability Evaluation of Online Educational Applications in COVID-19

Lahore Garrison University Research Journal of Computer Science and Information Technology, 2020

COVID-19 is a pandemic faced by almost every country in the world, this has resulted in health cr... more COVID-19 is a pandemic faced by almost every country in the world, this has resulted in health crisis. Due to COVID-19, all the countries around the world have decided to close all educational institutes to prevent this pandemic. Educational institutes have taken every possible measure to minimize the impact of the closure of schools and introduce the concept of an online education system which is not only a massive shock for parents but it also affects the children's learning process and social life. The educational applications (Apps) are very important, because they offer more opportunities for development and growth to society. In this pandemic situation, educational Apps like Zoom, HEC LMS, Google Classroom, and Skype, etc. are the need of the hour when everything goes online. In this paper, the usability features of online educational Apps are thoroughly discussed including the effectiveness and usability for students. Using the results obtained from the survey, this paper...

Research paper thumbnail of An analysis of the application of fuzzy logic in cloud computing

Journal of Intelligent & Fuzzy Systems, 2020

Fuzzy logic has wide adoption in every field of study due to its immense advantages and technique... more Fuzzy logic has wide adoption in every field of study due to its immense advantages and techniques. In cloud computing, there are many challenges that can be resolved with the help of fuzzy logic. The core objective of this paper is to analyze the application of fuzzy logic in most demanding research areas of cloud computing. We also analyzed the fuzzy methods that were used in the solving of problems relates to cloud computing. A systematic literature review was conducted to enlist the all the challenging areas of research relates to cloud computing, categorized the most critical and challenging areas of cloud research, studied existing problem-solving techniques of each challenging cloud area, and finally studied the application of fuzzy logic in each aforementioned areas to redress different problems. The authors concluded that fuzzy logic can be used in every area of research including cloud computing to solve the problems and optimized the performance, as well as fuzzy logic techniques, were opted by many cloud computing researchers to conduct their study to optimize the performance of the system.

Research paper thumbnail of Analysis Of Internet Addiction Amongst University Level Students

VFAST transactions on software engineering, Jan 31, 2014

Internet is a global computer network system that connects millions of people at a time. An Inter... more Internet is a global computer network system that connects millions of people at a time. An Internet is a combination of several networks that are interconnected by bridges and/or routers. It uses advanced technologies standards and protocols. Throughout the world, Internet is responsible for hosting and delivering of services. The transferring of gigantic Internet services is creating confidence for service providers and caused for the growth of Internet in all sectors. The key elements of Internet are hosts, network, LAN, WAN and routers. Hosts which are also called end systems include mainframes, servers, workstations and PCs. These hosts are mostly use Internet connected through the local area network (LAN) or wide area network (WAN). These two or more networks are connected directly or indirectly to a router. On the Internet a host sends data to another host anywhere and data breaks into the sequence of packets, called IP datagram's or IP packets. Each packet has unique numeric address which is called IP address [1]. The Advanced Research Projects Agency Network (ARPANET) created the history of computer network. In 1960s, United States, Department of Defense (DOD) gave birth to the Internet [2]. All the countries throughout the world almost use Internet in every field of life. This amazing communication system came into being in 1969 [3]. Since the mid 1990s, Internet has become very important due to its easy accessibility. In a study conducted in 2007 by Norton it was concluded that approximately one fourth of the world's resident's use the services of the Internet [4]. The Internet has grown up to be one of the most admired media for communication. This media have utilized excessively by young people and teenagers to communicate with each other. The weighty use of the Internet produces negative effects in all areas and causes for the problematic Internet

Research paper thumbnail of Enhanced Cloud Computing Model Using Systematic Approach Towards The Quality Of Service In A Cloud Computing

VFAST transactions on software engineering, Jan 30, 2014

Cloud computing is modrendevelopingtechnoloy which provides on-claim resources in cloud computing... more Cloud computing is modrendevelopingtechnoloy which provides on-claim resources in cloud computing envoirnment. Cloud computing is modern technology which guarantees to provide elastic Infrastructure, resources accessible via the Internet with low cost. Cloud refers to a huge bundle of computing and data resources which can be access to different protocols and interfaces. Cloud service model containsSoftware-as-a-service (SaaS),Infrastructure-as-a service (IaaS), and Platform-as-a-service (PaaS. Cloud users can enjoy these services without knowing the underlying technology behind the cloud. Quality of service playsa vital role in any network while providing efficient resourcesto users. To competitive gain, it is compulsory to cloud computing network operator to gain trust of users by providing the best quality of services. Resource virtualization, share pool of resources, on-demand network access, large datacentres, and highly-interactive web applications needs quality of services. In this paper we put an effort to enhance the cloud computing model to show the "Quality as-a-service(QaaS)"layer.

Research paper thumbnail of E-commerce in Pakistan: Growth Potentials and E-payment Solutions

In Pakistan, millions of people have access to internet and now it has become essential part of t... more In Pakistan, millions of people have access to internet and now it has become essential part of their lives. It is now a driving force for innovation of all industries. After arrival of wireless service providers, internet users are growing rapidly. On the other hand, internet is still just a source of information sharing and social interaction. Its role in trade and business is limited. Some business organizations have adopted partial ecommerce solutions but no pure-ecommerce business model is implemented throughout the country. E-Commerce plays an important role in economic development. It reduces cost of products and services and creates new job opportunities. Major obstacles in the way of ecommerce in Pakistan are absence of cyber law, poverty, illiteracy and lack of infrastructure. Apart from these, the most challenging one is lack of suitable electronic payments system. Existing systems are either unavailable in Pakistan or not suitable for local entrepreneurs. In this paper, current potentials for ecommerce growth are explored and a new protocol "Dual-Network E-Payments Protocol" is proposed. Protocol is based on combination of IP and GSM networks. It satisfies all desired characteristics of e-payment mechanism. The protocol is quite secure, trust worthy and suitable for local infrastructure.

Research paper thumbnail of Key Analysis of Normalization Process Using Formal Techniques in DBRE

Database systems are considered as an integral part of any software system, therefore, all comple... more Database systems are considered as an integral part of any software system, therefore, all complex systems maintain a database in different formats. Relational database management systems are based on relational model for creation and storage of databases. Database reverse engineering (DBRE) is a process of extracting the database requirements from an operational database system. Objective of DBRE is to enhance

Research paper thumbnail of Coronavirus: A “Mild” Virus Turned Deadly Infection

Computers, materials & continua, 2021

Coronaviruses are a family of viruses that can be transmitted from one person to another. Earlier... more Coronaviruses are a family of viruses that can be transmitted from one person to another. Earlier strains have only been mild viruses, but the current form, known as coronavirus disease 2019 (COVID-19), has become a deadly infection. The outbreak originated in Wuhan, China, and has since spread worldwide. The symptoms of COVID-19 include a dry cough, sore throat, fever, and nasal congestion. Antimicrobial drugs, pathogen-host interaction, and 2 weeks of isolation have been recommended for the treatment of the infection. Safe operating procedures, such as the use of face masks, hand sanitizer, handwashing with soap, and social distancing, are also suggested. Moreover, travel bans for cities, states, and countries have been put in place, along with lockdowns to control the outbreak. Travel restrictions, mask use, sanitizer or soap use, and avoidance of touching the face and nose have produced encouraging results, whereas the effectiveness of antibiotics has not been proved. The results of isolation for the recovery of infected people have also been promising. Travel bans and lockdowns have caused a slump in economies, and unemployment has risen sharply, resulting in an increase in mental health cases globally. To date, vaccines have been developed and are in use in certain countries, but following standard operating procedures remain critical. The countries following the guidelines can eradicate this virus. New Zealand was the rst country to eliminate the virus from their territory.

Research paper thumbnail of Database reverse engineering tools

International Conference on Software Engineering, Feb 20, 2008

... 10. Maria de Lurdes Pedro-de-Jesus , Pedro Manuel Antunes Sousa, Selection of Reverse Enginee... more ... 10. Maria de Lurdes Pedro-de-Jesus , Pedro Manuel Antunes Sousa, Selection of Reverse Engineering Methods for Relational Databases, Proceedings of the Third European Conference on Software Maintenance and Reengineering, p.194, March 03-05, 1999. ...

Research paper thumbnail of Blind and Visually Impaired User Interface to Solve Accessibility Problems

Intelligent Automation and Soft Computing, 2021

Research paper thumbnail of Blind and Visually Impaired User Interface to Solve Accessibility Problems

Intelligent Automation & Soft Computing, 2021

Research paper thumbnail of Blind and Visually Impaired User Interface to Solve Accessibility Problems

Intelligent Automation & Soft Computing, 2021

Research paper thumbnail of A Concurrence Study on Interoperability Issues in IoT and Decision Making Based Model on Data and Services being used during Inter-Operability

Lahore Garrison University Research Journal of Computer Science and Information Technology, 2020

The Internet-of-Things (IoT) has become an important topic among researchers owing to its potenti... more The Internet-of-Things (IoT) has become an important topic among researchers owing to its potential to change the way we live and use smart devices. In recent years, many research work found in the world are interrelated and convey via the existing web structure which makes a worldwide system called IoT. This study focused on the significant improvement of answers for a wider scope of gadgets and the Internet of Things IoT stages in recent years. In any case, each arrangement gives its very own IoT framework, gadgets, APIs, and information configurations promoting interoperability issues. These issues are the outcome of numerous basic issues, difficulty to create IoT application uncovering cross-stage, and additionally cross-space, trouble in connecting non-interoperable IoT gadgets to various IoT stages, what's more, eventually averts the development of IoT innovation at an enormous scale. To authorize consistent data sharing between various IoT vendors, endeavors by a few acad...

Research paper thumbnail of Usability Evaluation of Online Educational Applications in COVID-19

Lahore Garrison University Research Journal of Computer Science and Information Technology, 2020

COVID-19 is a pandemic faced by almost every country in the world, this has resulted in health cr... more COVID-19 is a pandemic faced by almost every country in the world, this has resulted in health crisis. Due to COVID-19, all the countries around the world have decided to close all educational institutes to prevent this pandemic. Educational institutes have taken every possible measure to minimize the impact of the closure of schools and introduce the concept of an online education system which is not only a massive shock for parents but it also affects the children's learning process and social life. The educational applications (Apps) are very important, because they offer more opportunities for development and growth to society. In this pandemic situation, educational Apps like Zoom, HEC LMS, Google Classroom, and Skype, etc. are the need of the hour when everything goes online. In this paper, the usability features of online educational Apps are thoroughly discussed including the effectiveness and usability for students. Using the results obtained from the survey, this paper...

Research paper thumbnail of Agent Based Information Security Threat Management Framework for Hybrid Cloud Computing

Cloud computing is an effective, fast growing, and low cost way for today's businesses organi... more Cloud computing is an effective, fast growing, and low cost way for today's businesses organizations to provide professional and IT services over the Internet. Cloud computing has variety of service and deployment models providing both solid support to organizations to secure their business interests and flexibility to deliver new services. Security threats are associated with each service and deployment model, vary and depend on wide range of factors including the sensitivity of information, resources and architectures. Over time, business and cloud organizations tend to tight their security posture. For effective threat management, cloud service provider must perform threat assessments on regular basis. Threat Agent is an individual or group that exploit vulnerabilities, manifest a threat and conduct damaging activities. An alerting position arises when threat agent breach security and leaks confidential and sensitive information of organization. To cater this situation, we ha...

Research paper thumbnail of Comparative Analysis Of Cloud Computing Security Issues

Almost all the organizations are seriously thinking to adopt the cloud computingservices, seeing ... more Almost all the organizations are seriously thinking to adopt the cloud computingservices, seeing its benefits in terms of cost, accessibility, availability, flexibility andhighly automated process of updation. Cloud Computing enhance the current capabilitiesdynamically without further investment. Cloud Computing is a band of resources, applicationsand services. In cloud computing customer’s access IT related services in terms of infrastructure platform and software without getting knowledge of underlying technologies. With the executionof cloud computing, organizations have strong concerns about the security of their data.Organizations are hesitating to take initiatives in the deployment of their businesses due to data security problem. This paper gives an overview of cloud computing and analysis of security issues in cloud computing.

Research paper thumbnail of Course Coordination In Academic Sector: An Expert System Foundation

Artificial Intelligence (AI) has come out from science fiction movies and it is now enabling mach... more Artificial Intelligence (AI) has come out from science fiction movies and it is now enabling machines to behave like human experts. Computers have some advantages over human beings because of their immunity toward perturbation factors. These factors include fatigue, stress and diminished attention. This ability makes computers more efficient and reliable in decision making. The real goal of AI is to computerize human intelligence. In this paper we explored “Expert Systems” that is one of the most important branches of AI. In expert systems, we simulate expertise of domain experts in computer systems. Machines can work like doctors, engineers and consultants and can be able to learn and use their judgmental power to conclude the situations. In academia, many subjects are being offering in every degree programs. A course coordinator is an expert who allot related subject to instructors by using some factual and heuristic knowledge. The real task is to simulate the judgment ability tha...

Research paper thumbnail of A Concurrence Study on Interoperability Issues in IoT and Decision Making Based Model on Data and Services being used during Inter-Operability

Lahore Garrison University Research Journal of Computer Science and Information Technology, 2020

The Internet-of-Things (IoT) has become an important topic among researchers owing to its potenti... more The Internet-of-Things (IoT) has become an important topic among researchers owing to its potential to change the way we live and use smart devices. In recent years, many research work found in the world are interrelated and convey via the existing web structure which makes a worldwide system called IoT. This study focused on the significant improvement of answers for a wider scope of gadgets and the Internet of Things IoT stages in recent years. In any case, each arrangement gives its very own IoT framework, gadgets, APIs, and information configurations promoting interoperability issues. These issues are the outcome of numerous basic issues, difficulty to create IoT application uncovering cross-stage, and additionally cross-space, trouble in connecting non-interoperable IoT gadgets to various IoT stages, what's more, eventually averts the development of IoT innovation at an enormous scale. To authorize consistent data sharing between various IoT vendors, endeavors by a few acad...

Research paper thumbnail of Prediction of Cloud Ranking in a Hyperconverged Cloud Ecosystem Using Machine Learning

Computers, Materials & Continua, 2021

Research paper thumbnail of Coronavirus: A “Mild” Virus Turned Deadly Infection

Computers, Materials & Continua, 2021

Coronaviruses are a family of viruses that can be transmitted from one person to another. Earlier... more Coronaviruses are a family of viruses that can be transmitted from one person to another. Earlier strains have only been mild viruses, but the current form, known as coronavirus disease 2019 (COVID-19), has become a deadly infection. The outbreak originated in Wuhan, China, and has since spread worldwide. The symptoms of COVID-19 include a dry cough, sore throat, fever, and nasal congestion. Antimicrobial drugs, pathogen-host interaction, and 2 weeks of isolation have been recommended for the treatment of the infection. Safe operating procedures, such as the use of face masks, hand sanitizer, handwashing with soap, and social distancing, are also suggested. Moreover, travel bans for cities, states, and countries have been put in place, along with lockdowns to control the outbreak. Travel restrictions, mask use, sanitizer or soap use, and avoidance of touching the face and nose have produced encouraging results, whereas the effectiveness of antibiotics has not been proved. The results of isolation for the recovery of infected people have also been promising. Travel bans and lockdowns have caused a slump in economies, and unemployment has risen sharply, resulting in an increase in mental health cases globally. To date, vaccines have been developed and are in use in certain countries, but following standard operating procedures remain critical. The countries following the guidelines can eradicate this virus. New Zealand was the rst country to eliminate the virus from their territory.

Research paper thumbnail of A Review of Deep Learning Security and Privacy Defensive Techniques

Mobile Information Systems, 2020

In recent past years, Deep Learning presented an excellent performance in different areas like im... more In recent past years, Deep Learning presented an excellent performance in different areas like image recognition, pattern matching, and even in cybersecurity. The Deep Learning has numerous advantages including fast solving complex problems, huge automation, maximum application of unstructured data, ability to give high quality of results, reduction of high costs, no need for data labeling, and identification of complex interactions, but it also has limitations like opaqueness, computationally intensive, need for abundant data, and more complex algorithms. In our daily life, we used many applications that use Deep Learning models to make decisions based on predictions, and if Deep Learning models became the cause of misprediction due to internal/external malicious effects, it may create difficulties in our real life. Furthermore, the Deep Learning training models often have sensitive information of the users and those models should not be vulnerable and expose security and privacy. ...

Research paper thumbnail of Usability Evaluation of Online Educational Applications in COVID-19

Lahore Garrison University Research Journal of Computer Science and Information Technology, 2020

COVID-19 is a pandemic faced by almost every country in the world, this has resulted in health cr... more COVID-19 is a pandemic faced by almost every country in the world, this has resulted in health crisis. Due to COVID-19, all the countries around the world have decided to close all educational institutes to prevent this pandemic. Educational institutes have taken every possible measure to minimize the impact of the closure of schools and introduce the concept of an online education system which is not only a massive shock for parents but it also affects the children's learning process and social life. The educational applications (Apps) are very important, because they offer more opportunities for development and growth to society. In this pandemic situation, educational Apps like Zoom, HEC LMS, Google Classroom, and Skype, etc. are the need of the hour when everything goes online. In this paper, the usability features of online educational Apps are thoroughly discussed including the effectiveness and usability for students. Using the results obtained from the survey, this paper...

Research paper thumbnail of An analysis of the application of fuzzy logic in cloud computing

Journal of Intelligent & Fuzzy Systems, 2020

Fuzzy logic has wide adoption in every field of study due to its immense advantages and technique... more Fuzzy logic has wide adoption in every field of study due to its immense advantages and techniques. In cloud computing, there are many challenges that can be resolved with the help of fuzzy logic. The core objective of this paper is to analyze the application of fuzzy logic in most demanding research areas of cloud computing. We also analyzed the fuzzy methods that were used in the solving of problems relates to cloud computing. A systematic literature review was conducted to enlist the all the challenging areas of research relates to cloud computing, categorized the most critical and challenging areas of cloud research, studied existing problem-solving techniques of each challenging cloud area, and finally studied the application of fuzzy logic in each aforementioned areas to redress different problems. The authors concluded that fuzzy logic can be used in every area of research including cloud computing to solve the problems and optimized the performance, as well as fuzzy logic techniques, were opted by many cloud computing researchers to conduct their study to optimize the performance of the system.