Sabit Rahim - Academia.edu (original) (raw)
Papers by Sabit Rahim
International journal of economic and environment geology, Nov 16, 2021
Applied Intelligence, 2022
Proceedings of the Pakistan Academy of Sciences: A. Physical and Computational Sciences, 2020
Information and communication technologies brought-in tools and techniques in the field of educat... more Information and communication technologies brought-in tools and techniques in the field of education that introduced new concepts of teaching and learning. Learning management system is one of the key tools used in educational institutes to facilitate e-learning. There is remarkable digital divide among urban and rural areas. In this paper, we present a model for providing e-learning services to remote/rural areas in order to promote and facilitate modern education. A dedicated resource center, hosting the learning management system, facilitates e-learning centers through Internet. The overall goal of this model is to have a cost-effective learning environment equipped with latest technologies to provide learners an opportunity to get insight into new information and communication technologies and e-learning environment. The model offers new teaching methodology with enhance utilization of learning management system in teaching and learning. Basic characteristics and technical aspec...
Environmental Science and Pollution Research, 2022
Cultural ecosystem services are the non-material benefits that people obtain from ecosystems and ... more Cultural ecosystem services are the non-material benefits that people obtain from ecosystems and these services are subject to tremendous anthropogenic and climatic pressures. This study evaluates the spatiotemporal economic valuation of selected cultural and natural landscapes in Pakistan using net present value method. The results indicate that both cultural landscapes and mountain ecosystems are the most significant contributors to Pakistan’s cultural ecosystem services. The net present value of our study area was USD 96/ha, while this value is ranged from USD 0.000242/ha to USD 138,997/ha in the 42 previous studies selected for comparison. Service flow, population, and visitor numbers were the most significant indicators of cultural ecosystem services. The promotion of cultural ecosystem services as an inclusive service and the application of discounted rates are identified as key approaches for ensuring sustainable resource use and enhanced intergenerational benefits by incorporating cultural ecosystem services into the national policy framework.
Journal of Big Data, 2021
At present, voice biometrics are commonly used for identification and authentication of users thr... more At present, voice biometrics are commonly used for identification and authentication of users through their voice. Voice based services such as mobile banking, access to personal devices, and logging into social networks are the common examples of authenticating users through voice biometrics. In Pakistan, voice-based services are very common in banking and mobile/cellular sector, however, these services do not use voice features to recognize customers. Therefore, the chance to use these services with false identity is always high. It is essential to design a voice-based recognition system to minimize the risk of false identity. In this paper, we developed regional voice datasets for voice biometrics, by collecting voice data in different local accents of Pakistan. Although, there is a global need for voice biometrics especially when voice-based services are common, however, this paper uses Pakistan as a use case to show how to build regional voice dataset for voice biometrics. To b...
A variety of software reliability growth models have been proposed to analyze the reliability of ... more A variety of software reliability growth models have been proposed to analyze the reliability of software, such as stochastic process models, neural network models and grey theory models. When dealing with the limited amount of failure data, researchers tend to seek for non-stochastic approaches because stochastic models require large samples of data to determine underlying distributions. However non-stochastic approaches fail to deal with more fluctuating data sequences. In this paper, we have used Grey-Markov Chain Model (G-MCM) and show the effectiveness of model in handling dynamic software reliability data. G-MCM combines the advantages of both grey prediction model (GM(1,1) and Markov Chain Model. GM (1,1) can robustly deal with incomplete and imperfect information and gives excellent prediction outcomes. At the same time, it takes the advantage of predictive power of Markov chain which decreases the random variability of the data and zpositively effects the forecasting accura...
2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS), 2017
Software reliability is one of the key features of software quality assurance. It is primarily as... more Software reliability is one of the key features of software quality assurance. It is primarily associated with the defects of software, which indicates a major factor in software development. Software has become an indispensable investment for an organization. The users are more concerned about accurate and efficient failure prediction model. Early fault prediction model can reduce the cost of the test, increase reliability and improve the quality of software. Precise prediction is desired from the every model but no model has proved to be successful at efficiently and accurately developing software reliability model. In this paper, the authors have combined two most popular reliability prediction models and get the most accurate output from them by using Markov method based on their residual errors. Furthermore, experiment analysis and comparison carried out on U.S. Navy Tactical Data System, which shows the accuracy of the hybrid approach.
Wireless body area networks (WBANs) a special type of wireless sensor networks (WSNs) in which se... more Wireless body area networks (WBANs) a special type of wireless sensor networks (WSNs) in which sensor nodes to actualize continuous wearable wellbeing observing of patients are able to provide improved healthcare services in a distributed infrastructure less environments. However, the mobile node, due to less battery power, can easily suffer from the problem of energy level when control packets are transfer among nodes—a problem that can occurs by the fact that some sensor nodes may select wrong cluster head with inappropriate path and waste the resources. Although many energy efficient methods have been designed for the traditional sensor networks, there has been limited focus on incorporating WBANs into energy efficient schemes. Therefore, in order to incorporate above issue we revisit the already designed traditional energy efficient methods with cluster head selection protocols and optimal path transformation. Therefore, we encourage researchers to insert WBANs with existing met...
Introduction: Qualitative case study aims to explore the perceived practices of teacher educator... more Introduction: Qualitative case study aims to explore the perceived practices of teacher educators about technology integration in their pedagogical engagement in B. Ed (Hons), elementary program offered by a public sector mountainous university in Pakistan. Objective: To explore the practices perceived by university teachers on the Integration of Computer Technology in Teacher Education to achieve the learning outcomes of the new four-year model B. Ed, to enable educators to improve their academic competence, and related professional competence, in the current, ongoing climate of educational reform. Methods: Qualitative case study research, theoretical and empirical methods were used; semi-structured and open Skype interviews were applied, based on an intentional sample of two teachers. Results: the teachers integrated computer technology in their teaching but the nature of integration was superficial. Conclusions: The new four-year model B. Ed used, was based in teacher-cent...
Haramosh valley is located in eastern side of Gilgit city (Fig. 1). Geographically it is located ... more Haramosh valley is located in eastern side of Gilgit city (Fig. 1). Geographically it is located between 74°44' 17.37 " E and 35° 51 '8.97 " N. The area is a sub range of Karakoram in the south-central region of the Rakaposhi–Haramosh mountains. Haramosh valley is famous for its gemstones which are well known in the world. The first gem mine was discovered in 1951 in the area of Haramosh valley in Gilgit. The prominent four localities of gem-bearing pegmatites occur in the vicinity of the Haramosh peak, Shengus along Indus river, Haramosh Bulachi village, and the setting of Khaltoro pasture. Along with glaciers, Hindukush Karakorum and Himalayan ranges host a variety of precious stones (Agheem et al., 2014). In recent decade Haramosh valley received more attention because of the occurrence of a variety of gems in pegmatite veins. Gemstone varieties related to pegmatites are also found in other parts of Gilgit Baltistan, like Shigar, Shengus, and Stuk Nala (Kazmi et...
Technologies, 2021
Wireless sensor networks (WSNs) are considered producers of large amounts of rich data. Four type... more Wireless sensor networks (WSNs) are considered producers of large amounts of rich data. Four types of data-driven models that correspond with various applications are identified as WSNs: query-driven, event-driven, time-driven, and hybrid-driven. The aim of the classification of data-driven models is to get real-time applications of specific data. Many challenges occur during data collection. Therefore, the main objective of these data-driven models is to save the WSN’s energy for processing and functioning during the data collection of any application. In this survey article, the recent advancement of data-driven models and application types for WSNs is presented in detail. Each type of WSN is elaborated with the help of its routing protocols, related applications, and issues. Furthermore, each data model is described in detail according to current studies. The open issues of each data model are highlighted with their challenges in order to encourage and give directions for further...
IEEE Sensors Journal, 2021
In Surveillance Wireless Sensor Networks (SWSN), the nodes are distributed at the borders to dete... more In Surveillance Wireless Sensor Networks (SWSN), the nodes are distributed at the borders to detect unauthorized intrusions. In such applications, as the nodes are usually equipped with limited batteries and the network area is harsh to be accessible for humans, energy efficiency is considered as one of the main issues in designing the sensor networks. In the last years, Wireless Rechargeable Sensor Networks (WRSN) provides valuable insights into solving the energy constraint problem in WSNs. In a WRSN, Wireless Mobile Chargers (WMC) are responsible to recharge the batteries of the sensor nodes in order to enhance the operation time of the network. In most of the previous WRSN based schemes, the WMCs recharge the nodes singly and directly, which results in increasing the travel time of WMC and waiting time of sensor nodes. In addition, despite of using WMC, the permanent network lifetime has not been addressed in most of the previous schemes. Therefore, to overcome the limitations of existing literature, this research work focuses on the design and development of Broker-based Nodes Recharging Scheme (BNRS) which significantly contributes to improved lifetime and performance of SWSN. In the proposed scheme, power banks are employed as brokers between sensor nodes and WMC. The main duty of a power bank is to receive energy from WMC and transfer to the sensor nodes. Based on the simulation experiments the proposed BNRS achieves the permanent network operation which results in increasing security in the border of countries.
Information, 2020
The study, through the lens of school principals’ views, investigates the challenges and opportun... more The study, through the lens of school principals’ views, investigates the challenges and opportunities to formulate an information and communications technology (ICT) policy in order to integrate it in teaching and learning practices at the schools of mountainous rural areas of Gilgit-Baltistan (GB). This quantitative research approach focuses on three different educational systems (Regional, National, and International), as a source of data collection, which operate in GB, Pakistan. To collect the required data, questionnaires with principals and policy document reviews were used. Applying SPSS, the data were analyzed. The results show that both groups (male and female) strongly agree to formulate a policy on ICT in order to integrate it in teaching and learning to improve at the school level. The results also show that the school heads face a number of challenges (e.g., lack of infrastructure, finance, Internet, technical staff, time, awareness, and training facilities, etc.) in t...
Mobile Information Systems, 2020
This study aims to investigate the access to a mobile phone, usage pattern, and its impact on mou... more This study aims to investigate the access to a mobile phone, usage pattern, and its impact on mountainous rural women of two districts, i.e., Hunza and Nagar districts of Gilgit-Baltistan, Pakistan. To attain the objective of the research, the researchers have employed various statistic methods, and data were collected through a questionnaire from 190 respondents in the study area (200 respondents were selected). Initially, Kaiser–Meyer–Olkin (KMO) and Bartlett’s tests were used for sampling adequacy, and factor analysis technique was used to explain correlations among multiple outcomes. The results revealed that 80% of women in the Hunza and Nagar districts own mobile phones (access) and 63% have good skills of mobile phone usage for a variety of purposes. Moreover, 56.4% of women use mobile phones in their daily life activities; however, 23.6% disagreed with the statements. On the contrary, the results show that 71.8% women use mobile phones for security purposes. Therefore, the s...
IEEE Systems Journal, 2020
Mobile Information Systems, 2020
The study aims to explore the access of mobile phone, emerging technologies, and use of the mobil... more The study aims to explore the access of mobile phone, emerging technologies, and use of the mobile phone by the youth of Gilgit-Baltistan (GB), Pakistan, for learning and safety and security purposes. Structured questionnaires were used to collect the data. The descriptive statistics was employed to test the research model. Among the 300 distributed sample size, 272 participants responded back including 133 male and 139 female students of Karakoram International University (KIU) from eight districts of GB as research participants for data collection. Only 1 male and 6 females responded that they do not have their own mobile phone, comprising of 90.6% response rate. The results show that 97% of students of rural mountainous areas own a mobile phone. The study contributes valuable findings about the access and positive use of mobile phones for learning and safety and security purposes. The result also shows that the youth of GB have enough skills of mobile phone technologies to cope w...
International journal of economic and environment geology, Nov 16, 2021
Applied Intelligence, 2022
Proceedings of the Pakistan Academy of Sciences: A. Physical and Computational Sciences, 2020
Information and communication technologies brought-in tools and techniques in the field of educat... more Information and communication technologies brought-in tools and techniques in the field of education that introduced new concepts of teaching and learning. Learning management system is one of the key tools used in educational institutes to facilitate e-learning. There is remarkable digital divide among urban and rural areas. In this paper, we present a model for providing e-learning services to remote/rural areas in order to promote and facilitate modern education. A dedicated resource center, hosting the learning management system, facilitates e-learning centers through Internet. The overall goal of this model is to have a cost-effective learning environment equipped with latest technologies to provide learners an opportunity to get insight into new information and communication technologies and e-learning environment. The model offers new teaching methodology with enhance utilization of learning management system in teaching and learning. Basic characteristics and technical aspec...
Environmental Science and Pollution Research, 2022
Cultural ecosystem services are the non-material benefits that people obtain from ecosystems and ... more Cultural ecosystem services are the non-material benefits that people obtain from ecosystems and these services are subject to tremendous anthropogenic and climatic pressures. This study evaluates the spatiotemporal economic valuation of selected cultural and natural landscapes in Pakistan using net present value method. The results indicate that both cultural landscapes and mountain ecosystems are the most significant contributors to Pakistan’s cultural ecosystem services. The net present value of our study area was USD 96/ha, while this value is ranged from USD 0.000242/ha to USD 138,997/ha in the 42 previous studies selected for comparison. Service flow, population, and visitor numbers were the most significant indicators of cultural ecosystem services. The promotion of cultural ecosystem services as an inclusive service and the application of discounted rates are identified as key approaches for ensuring sustainable resource use and enhanced intergenerational benefits by incorporating cultural ecosystem services into the national policy framework.
Journal of Big Data, 2021
At present, voice biometrics are commonly used for identification and authentication of users thr... more At present, voice biometrics are commonly used for identification and authentication of users through their voice. Voice based services such as mobile banking, access to personal devices, and logging into social networks are the common examples of authenticating users through voice biometrics. In Pakistan, voice-based services are very common in banking and mobile/cellular sector, however, these services do not use voice features to recognize customers. Therefore, the chance to use these services with false identity is always high. It is essential to design a voice-based recognition system to minimize the risk of false identity. In this paper, we developed regional voice datasets for voice biometrics, by collecting voice data in different local accents of Pakistan. Although, there is a global need for voice biometrics especially when voice-based services are common, however, this paper uses Pakistan as a use case to show how to build regional voice dataset for voice biometrics. To b...
A variety of software reliability growth models have been proposed to analyze the reliability of ... more A variety of software reliability growth models have been proposed to analyze the reliability of software, such as stochastic process models, neural network models and grey theory models. When dealing with the limited amount of failure data, researchers tend to seek for non-stochastic approaches because stochastic models require large samples of data to determine underlying distributions. However non-stochastic approaches fail to deal with more fluctuating data sequences. In this paper, we have used Grey-Markov Chain Model (G-MCM) and show the effectiveness of model in handling dynamic software reliability data. G-MCM combines the advantages of both grey prediction model (GM(1,1) and Markov Chain Model. GM (1,1) can robustly deal with incomplete and imperfect information and gives excellent prediction outcomes. At the same time, it takes the advantage of predictive power of Markov chain which decreases the random variability of the data and zpositively effects the forecasting accura...
2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS), 2017
Software reliability is one of the key features of software quality assurance. It is primarily as... more Software reliability is one of the key features of software quality assurance. It is primarily associated with the defects of software, which indicates a major factor in software development. Software has become an indispensable investment for an organization. The users are more concerned about accurate and efficient failure prediction model. Early fault prediction model can reduce the cost of the test, increase reliability and improve the quality of software. Precise prediction is desired from the every model but no model has proved to be successful at efficiently and accurately developing software reliability model. In this paper, the authors have combined two most popular reliability prediction models and get the most accurate output from them by using Markov method based on their residual errors. Furthermore, experiment analysis and comparison carried out on U.S. Navy Tactical Data System, which shows the accuracy of the hybrid approach.
Wireless body area networks (WBANs) a special type of wireless sensor networks (WSNs) in which se... more Wireless body area networks (WBANs) a special type of wireless sensor networks (WSNs) in which sensor nodes to actualize continuous wearable wellbeing observing of patients are able to provide improved healthcare services in a distributed infrastructure less environments. However, the mobile node, due to less battery power, can easily suffer from the problem of energy level when control packets are transfer among nodes—a problem that can occurs by the fact that some sensor nodes may select wrong cluster head with inappropriate path and waste the resources. Although many energy efficient methods have been designed for the traditional sensor networks, there has been limited focus on incorporating WBANs into energy efficient schemes. Therefore, in order to incorporate above issue we revisit the already designed traditional energy efficient methods with cluster head selection protocols and optimal path transformation. Therefore, we encourage researchers to insert WBANs with existing met...
Introduction: Qualitative case study aims to explore the perceived practices of teacher educator... more Introduction: Qualitative case study aims to explore the perceived practices of teacher educators about technology integration in their pedagogical engagement in B. Ed (Hons), elementary program offered by a public sector mountainous university in Pakistan. Objective: To explore the practices perceived by university teachers on the Integration of Computer Technology in Teacher Education to achieve the learning outcomes of the new four-year model B. Ed, to enable educators to improve their academic competence, and related professional competence, in the current, ongoing climate of educational reform. Methods: Qualitative case study research, theoretical and empirical methods were used; semi-structured and open Skype interviews were applied, based on an intentional sample of two teachers. Results: the teachers integrated computer technology in their teaching but the nature of integration was superficial. Conclusions: The new four-year model B. Ed used, was based in teacher-cent...
Haramosh valley is located in eastern side of Gilgit city (Fig. 1). Geographically it is located ... more Haramosh valley is located in eastern side of Gilgit city (Fig. 1). Geographically it is located between 74°44' 17.37 " E and 35° 51 '8.97 " N. The area is a sub range of Karakoram in the south-central region of the Rakaposhi–Haramosh mountains. Haramosh valley is famous for its gemstones which are well known in the world. The first gem mine was discovered in 1951 in the area of Haramosh valley in Gilgit. The prominent four localities of gem-bearing pegmatites occur in the vicinity of the Haramosh peak, Shengus along Indus river, Haramosh Bulachi village, and the setting of Khaltoro pasture. Along with glaciers, Hindukush Karakorum and Himalayan ranges host a variety of precious stones (Agheem et al., 2014). In recent decade Haramosh valley received more attention because of the occurrence of a variety of gems in pegmatite veins. Gemstone varieties related to pegmatites are also found in other parts of Gilgit Baltistan, like Shigar, Shengus, and Stuk Nala (Kazmi et...
Technologies, 2021
Wireless sensor networks (WSNs) are considered producers of large amounts of rich data. Four type... more Wireless sensor networks (WSNs) are considered producers of large amounts of rich data. Four types of data-driven models that correspond with various applications are identified as WSNs: query-driven, event-driven, time-driven, and hybrid-driven. The aim of the classification of data-driven models is to get real-time applications of specific data. Many challenges occur during data collection. Therefore, the main objective of these data-driven models is to save the WSN’s energy for processing and functioning during the data collection of any application. In this survey article, the recent advancement of data-driven models and application types for WSNs is presented in detail. Each type of WSN is elaborated with the help of its routing protocols, related applications, and issues. Furthermore, each data model is described in detail according to current studies. The open issues of each data model are highlighted with their challenges in order to encourage and give directions for further...
IEEE Sensors Journal, 2021
In Surveillance Wireless Sensor Networks (SWSN), the nodes are distributed at the borders to dete... more In Surveillance Wireless Sensor Networks (SWSN), the nodes are distributed at the borders to detect unauthorized intrusions. In such applications, as the nodes are usually equipped with limited batteries and the network area is harsh to be accessible for humans, energy efficiency is considered as one of the main issues in designing the sensor networks. In the last years, Wireless Rechargeable Sensor Networks (WRSN) provides valuable insights into solving the energy constraint problem in WSNs. In a WRSN, Wireless Mobile Chargers (WMC) are responsible to recharge the batteries of the sensor nodes in order to enhance the operation time of the network. In most of the previous WRSN based schemes, the WMCs recharge the nodes singly and directly, which results in increasing the travel time of WMC and waiting time of sensor nodes. In addition, despite of using WMC, the permanent network lifetime has not been addressed in most of the previous schemes. Therefore, to overcome the limitations of existing literature, this research work focuses on the design and development of Broker-based Nodes Recharging Scheme (BNRS) which significantly contributes to improved lifetime and performance of SWSN. In the proposed scheme, power banks are employed as brokers between sensor nodes and WMC. The main duty of a power bank is to receive energy from WMC and transfer to the sensor nodes. Based on the simulation experiments the proposed BNRS achieves the permanent network operation which results in increasing security in the border of countries.
Information, 2020
The study, through the lens of school principals’ views, investigates the challenges and opportun... more The study, through the lens of school principals’ views, investigates the challenges and opportunities to formulate an information and communications technology (ICT) policy in order to integrate it in teaching and learning practices at the schools of mountainous rural areas of Gilgit-Baltistan (GB). This quantitative research approach focuses on three different educational systems (Regional, National, and International), as a source of data collection, which operate in GB, Pakistan. To collect the required data, questionnaires with principals and policy document reviews were used. Applying SPSS, the data were analyzed. The results show that both groups (male and female) strongly agree to formulate a policy on ICT in order to integrate it in teaching and learning to improve at the school level. The results also show that the school heads face a number of challenges (e.g., lack of infrastructure, finance, Internet, technical staff, time, awareness, and training facilities, etc.) in t...
Mobile Information Systems, 2020
This study aims to investigate the access to a mobile phone, usage pattern, and its impact on mou... more This study aims to investigate the access to a mobile phone, usage pattern, and its impact on mountainous rural women of two districts, i.e., Hunza and Nagar districts of Gilgit-Baltistan, Pakistan. To attain the objective of the research, the researchers have employed various statistic methods, and data were collected through a questionnaire from 190 respondents in the study area (200 respondents were selected). Initially, Kaiser–Meyer–Olkin (KMO) and Bartlett’s tests were used for sampling adequacy, and factor analysis technique was used to explain correlations among multiple outcomes. The results revealed that 80% of women in the Hunza and Nagar districts own mobile phones (access) and 63% have good skills of mobile phone usage for a variety of purposes. Moreover, 56.4% of women use mobile phones in their daily life activities; however, 23.6% disagreed with the statements. On the contrary, the results show that 71.8% women use mobile phones for security purposes. Therefore, the s...
IEEE Systems Journal, 2020
Mobile Information Systems, 2020
The study aims to explore the access of mobile phone, emerging technologies, and use of the mobil... more The study aims to explore the access of mobile phone, emerging technologies, and use of the mobile phone by the youth of Gilgit-Baltistan (GB), Pakistan, for learning and safety and security purposes. Structured questionnaires were used to collect the data. The descriptive statistics was employed to test the research model. Among the 300 distributed sample size, 272 participants responded back including 133 male and 139 female students of Karakoram International University (KIU) from eight districts of GB as research participants for data collection. Only 1 male and 6 females responded that they do not have their own mobile phone, comprising of 90.6% response rate. The results show that 97% of students of rural mountainous areas own a mobile phone. The study contributes valuable findings about the access and positive use of mobile phones for learning and safety and security purposes. The result also shows that the youth of GB have enough skills of mobile phone technologies to cope w...