Shahmurad Chandio - Academia.edu (original) (raw)
Papers by Shahmurad Chandio
Journal of applied engineering & technology, Dec 31, 2023
Deleted Journal, Jan 8, 2024
Engineering, Technology & Applied Science Research, 2021
The Three Phase Induction Motor (TIM) is one of the most widely used motors due to its low price,... more The Three Phase Induction Motor (TIM) is one of the most widely used motors due to its low price, robustness, low maintenance cost, and high efficiency. In this paper, a Support Vector Regression (SVR) based controller for TIM speed control using Indirect Vector Control (IVC) is presented. The IVC method is more frequently used because it enables better speed control of the TIM with higher dynamic performance. Artificial Neural Network (ANN) controllers have been widely used for TIM speed control for several reasons such as their ability to successfully train without prior knowledge of the mathematical model, their learning ability, and their fast implementation speed. The SVR-based controller overcomes the drawbacks of the ANN-based controller, i.e. its low accuracy, overfitting, and poor generalization ability. The speed response under the proposed controller is faster in terms of rising and settling time. The dynamic speed response of the proposed controller is also superior to t...
Deleted Journal, Mar 18, 2024
Parts-of-Speech (POS) tagging involves the assignment of the correct part of speech or lexical ca... more Parts-of-Speech (POS) tagging involves the assignment of the correct part of speech or lexical category to individual words within a sentence in a natural language. This procedure holds significant in the field of Natural Language Processing (NLP) and find utility across a variety of NLP applications. Commonly, it constitutes the initial phase of natural language processing. Subsequent stages may encompass additional tasks such as chunking, parsing and more. Balochi stands as the predominant language in Balochistan,, ranking as the fourth most prevalent language in Pakistan. The field of natural language processing for Balochi is still in its nascent stages. In this research, we introduce an algorithm for Balochi part-of-speech tagging, leveraging machine learning techniques. The core of our approach relies on a Conditional Random Field model as the machine learning component. Careful consideration is given to selecting appropriate features for the CRF, taking into account the linguistic characteristics of Balochi. Balochi is currently considered a resource poor language, and thus, the available manually tagged data consists of only approximately 1500 sentences. The tagset used in this study created for research purpose, consisting of 16 different tags. The learning process incorporates tagged data. The algorithm demonstrates a high accuracy rate of 86.78% when applied to Balochi texts. The training corpus comprises 40000 words, while the test corpus contains 10000 words.
An interrelated group of computer programmes that automates multiple library operations called in... more An interrelated group of computer programmes that automates multiple library operations called integrated library system. In Pakistan, the condition concerning library software cannot be associated with the that in developed countries, it’s not satisfactory due to absence of software systems used for making modern libraries, less budget, multilingual nature of library’s collection, software privacy and absence of provision from regional vendors are the key barriers in the impressive implementations of integrated library system. The Objective of this paper is to propose an open source integrated library system implementation framework to boost the academic library standard, provide capability to resource sharing and library users can able to access the information material at any time regardless of their geographical location. This research is grounded on comprehensive literature review that includes the journal articles, conference proceedings, thesis, books and libraries websites b...
2018 7th International Conference on Computer and Communication Engineering (ICCCE), 2018
Many approaches for modeling security requirements have been proposed, but software industry did ... more Many approaches for modeling security requirements have been proposed, but software industry did not reach on an agreement on how to express security requirements in a system model or software architecture. The main objective of this perspective paper is to summarize the problem space of representation of security patterns when designing security requirements. Many security patterns are proposed in the literature to help the developers who lack expertise in security to implement it. Application of security patterns has been hindered by the fact that they lack directions for their implementation in a specific scenario. This paper presents a technique for using mitigation use cases for representing solution provided by security patterns. Different challenges and issues were identified related to the application of security patterns in industry
To propose and develop a multicast routing protocol for MANETs it is a challenge for a researcher... more To propose and develop a multicast routing protocol for MANETs it is a challenge for a researcher to implement all possible characteristics of a multicast routing protocol to make it well performed. One of the major problem to cope with, is its scalability. It means if the number of nodes increases then the protocol should not intensely affected regarding the performance. For the transmission of live multimedia streaming or one-to-many type multicast applications in open-MANETs (any number of interested nodes which are in the transmission range may join in the network) a scalable multicast routing protocol is still in need by the researchers. SLIM+ (Advanced-Simple Lightweight Intuitive Multicast) which has a tree based distribution structure is introduced as a protocol to perform in open-MANETs for these type of multicast applications. SLIM+ ensures an advertisement mechanism that is much needed feature in open-MANETs (Vehicular Ad-Hoc Networks/VANETS and Local area social Networks...
Sindh University Research Journal, 2019
This paper proposes an automated extraction and segmentation of blood vessels to diagnose the sym... more This paper proposes an automated extraction and segmentation of blood vessels to diagnose the symptoms of diabetic retinopathy at early stage. The proposed method has been evaluated on two commonly used, publicly available benchmark datasets DRIVE, and STARE. The results show that the proposed method attains the best trade-off results in terms of effectiveness and efficiency and performs comparably better than state-of-the-art methods. The average accuracy on DRIVE, and STARE database turns out to be 0.973, and 0.952, respectively.
Indian Journal of Science and Technology, 2020
Background/Objectives Inclusion of security in software development from the initial design phase... more Background/Objectives Inclusion of security in software development from the initial design phase has not been consistently addressed by the software developers. As a result there is an abundance of software systems with weak security. The objective of this study is to find out factors influencing developer's intention to adopt secure software development practices. Methodology: This study is based on qualitative research methodology. Interviews were conducted from the professionals working at senior positions at Malaysian software development organization. All the interviews were first transcribed, as they were digitally recorded. Then transcribed data was analyzed in a way that all frequent words or repetitive concepts were highlighted, after which many similar or relevant concepts were grouped together and categorized as themes and sub themes. Findings: The data was analyzed using the thematic analysis method. The results revealed five main themes, whereas each main theme has subthemes. These subthemes are parameters to justify the main theme. Main themes were identified in the light of the interviewee's response. The main results include interviewee's demographic characteristics, and then the main themes identified include, Adoption of SSD practices
A collection of information, alongwith related services managed and stored in the digital formats... more A collection of information, alongwith related services managed and stored in the digital formats for accessing over a digital network is called digital library. The study aims to calculate the effectiveness of digital library program initiated by higher education commission of Pakistan. Higher education commission is monitoring body that overlooks the higher education institutions and provides them with required facilities, equipment’s and services. One of its biggest services is Digital library program, an outstanding national level digital library in Pakistan. For the sake of encourage the research culture and improve the digital infrastructure nation-wide, digital library is introduced. The study is based on a reviewing relevant literature on the subject to evaluate successes of digital library project and assessing its effectiveness in perspective of users particularly research students of various universities and to provide theoretical framework towards acceptance of digital l...
This ICT tools and technologies have become essential elements for the successful functioning of ... more This ICT tools and technologies have become essential elements for the successful functioning of organizations. Consequent to that push, Pakistan government has provided ICT infrastructure including labs, Internet services, computers for both staff and students, access to the digital library, and video conference rooms especially from the year 2002 in educational institutes. Yet, Pakistan has not improved it ranking among world standards for ICT readiness as well as higher education management. Therefore, we assessed and measured ICT usage with the goal to know the adoption of ICT in terms of implementation, acceptance, and management in universities. Specifically, we focused on universities in Sindh province of Pakistan. In this research, we used the qualitative approach and conducted face to face interviews. Our target population included experienced administrative staff at important administrative posts and teaching staff who were familiar with ICT infrastructure in higher educat...
2018 IEEE International Conference on Innovative Research and Development (ICIRD), 2018
A global, immersive, invisible, ambient network-computing environment built through the continued... more A global, immersive, invisible, ambient network-computing environment built through the continued proliferation of smart sensors, cameras, software, databases, and massive data centers in a world-spanning information fabric known as the Internet of Things. The idea is to live in connected world. Altogether varieties of connected objects from smart home appliances like televisions, laundry machines, thermostats, refrigerators to Industrial Internet of Things (IIoT) and Internet of Medical Things (IoMT) are going to conserve the potential of IoT connectivity in all paces of future smart world. However, it has high importance to preserve adherence of enormous benefits of IoT connectivity, which might lead to unseen security and privacy issues and vulnerabilities that will cause various malicious attacks including waterhole, ransomware, eavesdropping, and others to exploit the potential of smart objects. This paper will present and forecast advanced concepts for end-to end security and privacy issues in a highly distributed, heterogeneous and dynamic network of IoT devices, which may reveal a holistic approach of device identification, authentication, and management, security, and privacy concerns.
International Journal of Engineering & Technology, 2018
This paper examines the manner in which audits would be conducted in the future and how technolog... more This paper examines the manner in which audits would be conducted in the future and how technology has transformed and impacted the business processes of public, private sector entities and various organisations and the guidelines which need to be followed to ensure compliance with applicable laws and regulations. The tranperancy of financial statements is of paramount interest to shareholders and other significant stakeholders. This necessities that the financial statements are audited to acquire a certain level of confidence over the integrity of numbers and the validity of business rationale which thereby arises a need for auditor to be well equipped with all the tools and system essentials in carrying out an effective and efficient audit. Information Technology can act as an impediment or stimulant towards the achievement of the above discussed objective. Various organizations use automation tools and ERP applications which have become a vital cog in their internel control envir...
SINDH UNIVERSITY RESEARCH JOURNAL -SCIENCE SERIES, 2019
Agile software development methods can deliver quality software yet it perceived that adoption an... more Agile software development methods can deliver quality software yet it perceived that adoption and acceptance of agile methods by the consumers has been lower in Pakistan. However, this research study proposes an extended model of technology acceptance to understand the perception of the potential software practitioner teams towards adoption and acceptance of agile methods in software development. The theoretical research framework in this study incorporates determinants such as productivity, awareness of agile methods, and customer collaboration along with latent factors perceived ease of use and perceived usefulness. It is intended that the systematic research framework of integrated factors would be supportive enough to adopt agile software development solutions in software industry of Pakistan.
2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M), 2016
Information and Communication Technology (ICT) has changed the world scenario including business ... more Information and Communication Technology (ICT) has changed the world scenario including business and economies. There are new opportunities and challenges for every country to produce knowledge oriented citizens. Driven by these changes, numerous higher education institutions around the world are integrating and adopting latest ICT tools to deliver quality education. However, the Effectiveness of a new technologies introduced in educational institution depends on acceptance and utilization by academicians in the academic institutions. Thus realizing the importance of ICT availability and adoption in developed countries, this research is aimed to understand and assess the ICT adoption in Pakistan. This study also focuses on fundamental literature to investigate the critical success factors and propose a model for ICT adoption by academicians of higher education institutions in Pakistan. The contribution of this research improves the quality of education system in developing countries by effectively utilizing ICT in higher education institutions.
This paper has assessed the implementation and acceptance of information and communication techno... more This paper has assessed the implementation and acceptance of information and communication technology (ICT) at public sector universities in Pakistan. This research was conducted in three major public-sector universities based in one province of Pakistan. A total of 550 questionnaires were distributed and 325 were returned. In addition, three interviews were conducted from the administrative personnel of universities. The research was conducted to assess ICT implementation at universities and its acceptance by academicians. The base for this research was an integrated framework developed for this research called academicians acceptance and use of ICT (AAU-ICT). This framework was developed using; Unified theory of acceptance and use of technology (UTAUT) with an additional four constructs Culture, external incentives, perceived needs and job relevance. In order to make the results strong, a mixed method approach was adopted by incorporating both quantitative and qualitative methods....
Information and communication technology has become the integral part of education system. Worldw... more Information and communication technology has become the integral part of education system. Worldwide different studies are being conducted to evaluate ICT for better performance. This study focused on assessing the general adoption, acceptance and usage of the information and communication technology by the academicians at the University of Sindh, Pakistan. Though many established models are available to assess acceptance and use of ICT, for this research Unified Theory of Acceptance and Use of Technology (UTAUT) is used with some external factor like Culture, Incentives, Perceived needs and Job Relevance. The research used mix method approach by distributing 200 survey questionnaires among the academic staff and in addition, used interview method for making survey results stronger. The results revealed that all the constructs have significant effect on academicians towards their intention to use ICT in their academic work, on other side it was also found that there is lack of ICT i...
Journal of applied engineering & technology, Dec 31, 2023
Deleted Journal, Jan 8, 2024
Engineering, Technology & Applied Science Research, 2021
The Three Phase Induction Motor (TIM) is one of the most widely used motors due to its low price,... more The Three Phase Induction Motor (TIM) is one of the most widely used motors due to its low price, robustness, low maintenance cost, and high efficiency. In this paper, a Support Vector Regression (SVR) based controller for TIM speed control using Indirect Vector Control (IVC) is presented. The IVC method is more frequently used because it enables better speed control of the TIM with higher dynamic performance. Artificial Neural Network (ANN) controllers have been widely used for TIM speed control for several reasons such as their ability to successfully train without prior knowledge of the mathematical model, their learning ability, and their fast implementation speed. The SVR-based controller overcomes the drawbacks of the ANN-based controller, i.e. its low accuracy, overfitting, and poor generalization ability. The speed response under the proposed controller is faster in terms of rising and settling time. The dynamic speed response of the proposed controller is also superior to t...
Deleted Journal, Mar 18, 2024
Parts-of-Speech (POS) tagging involves the assignment of the correct part of speech or lexical ca... more Parts-of-Speech (POS) tagging involves the assignment of the correct part of speech or lexical category to individual words within a sentence in a natural language. This procedure holds significant in the field of Natural Language Processing (NLP) and find utility across a variety of NLP applications. Commonly, it constitutes the initial phase of natural language processing. Subsequent stages may encompass additional tasks such as chunking, parsing and more. Balochi stands as the predominant language in Balochistan,, ranking as the fourth most prevalent language in Pakistan. The field of natural language processing for Balochi is still in its nascent stages. In this research, we introduce an algorithm for Balochi part-of-speech tagging, leveraging machine learning techniques. The core of our approach relies on a Conditional Random Field model as the machine learning component. Careful consideration is given to selecting appropriate features for the CRF, taking into account the linguistic characteristics of Balochi. Balochi is currently considered a resource poor language, and thus, the available manually tagged data consists of only approximately 1500 sentences. The tagset used in this study created for research purpose, consisting of 16 different tags. The learning process incorporates tagged data. The algorithm demonstrates a high accuracy rate of 86.78% when applied to Balochi texts. The training corpus comprises 40000 words, while the test corpus contains 10000 words.
An interrelated group of computer programmes that automates multiple library operations called in... more An interrelated group of computer programmes that automates multiple library operations called integrated library system. In Pakistan, the condition concerning library software cannot be associated with the that in developed countries, it’s not satisfactory due to absence of software systems used for making modern libraries, less budget, multilingual nature of library’s collection, software privacy and absence of provision from regional vendors are the key barriers in the impressive implementations of integrated library system. The Objective of this paper is to propose an open source integrated library system implementation framework to boost the academic library standard, provide capability to resource sharing and library users can able to access the information material at any time regardless of their geographical location. This research is grounded on comprehensive literature review that includes the journal articles, conference proceedings, thesis, books and libraries websites b...
2018 7th International Conference on Computer and Communication Engineering (ICCCE), 2018
Many approaches for modeling security requirements have been proposed, but software industry did ... more Many approaches for modeling security requirements have been proposed, but software industry did not reach on an agreement on how to express security requirements in a system model or software architecture. The main objective of this perspective paper is to summarize the problem space of representation of security patterns when designing security requirements. Many security patterns are proposed in the literature to help the developers who lack expertise in security to implement it. Application of security patterns has been hindered by the fact that they lack directions for their implementation in a specific scenario. This paper presents a technique for using mitigation use cases for representing solution provided by security patterns. Different challenges and issues were identified related to the application of security patterns in industry
To propose and develop a multicast routing protocol for MANETs it is a challenge for a researcher... more To propose and develop a multicast routing protocol for MANETs it is a challenge for a researcher to implement all possible characteristics of a multicast routing protocol to make it well performed. One of the major problem to cope with, is its scalability. It means if the number of nodes increases then the protocol should not intensely affected regarding the performance. For the transmission of live multimedia streaming or one-to-many type multicast applications in open-MANETs (any number of interested nodes which are in the transmission range may join in the network) a scalable multicast routing protocol is still in need by the researchers. SLIM+ (Advanced-Simple Lightweight Intuitive Multicast) which has a tree based distribution structure is introduced as a protocol to perform in open-MANETs for these type of multicast applications. SLIM+ ensures an advertisement mechanism that is much needed feature in open-MANETs (Vehicular Ad-Hoc Networks/VANETS and Local area social Networks...
Sindh University Research Journal, 2019
This paper proposes an automated extraction and segmentation of blood vessels to diagnose the sym... more This paper proposes an automated extraction and segmentation of blood vessels to diagnose the symptoms of diabetic retinopathy at early stage. The proposed method has been evaluated on two commonly used, publicly available benchmark datasets DRIVE, and STARE. The results show that the proposed method attains the best trade-off results in terms of effectiveness and efficiency and performs comparably better than state-of-the-art methods. The average accuracy on DRIVE, and STARE database turns out to be 0.973, and 0.952, respectively.
Indian Journal of Science and Technology, 2020
Background/Objectives Inclusion of security in software development from the initial design phase... more Background/Objectives Inclusion of security in software development from the initial design phase has not been consistently addressed by the software developers. As a result there is an abundance of software systems with weak security. The objective of this study is to find out factors influencing developer's intention to adopt secure software development practices. Methodology: This study is based on qualitative research methodology. Interviews were conducted from the professionals working at senior positions at Malaysian software development organization. All the interviews were first transcribed, as they were digitally recorded. Then transcribed data was analyzed in a way that all frequent words or repetitive concepts were highlighted, after which many similar or relevant concepts were grouped together and categorized as themes and sub themes. Findings: The data was analyzed using the thematic analysis method. The results revealed five main themes, whereas each main theme has subthemes. These subthemes are parameters to justify the main theme. Main themes were identified in the light of the interviewee's response. The main results include interviewee's demographic characteristics, and then the main themes identified include, Adoption of SSD practices
A collection of information, alongwith related services managed and stored in the digital formats... more A collection of information, alongwith related services managed and stored in the digital formats for accessing over a digital network is called digital library. The study aims to calculate the effectiveness of digital library program initiated by higher education commission of Pakistan. Higher education commission is monitoring body that overlooks the higher education institutions and provides them with required facilities, equipment’s and services. One of its biggest services is Digital library program, an outstanding national level digital library in Pakistan. For the sake of encourage the research culture and improve the digital infrastructure nation-wide, digital library is introduced. The study is based on a reviewing relevant literature on the subject to evaluate successes of digital library project and assessing its effectiveness in perspective of users particularly research students of various universities and to provide theoretical framework towards acceptance of digital l...
This ICT tools and technologies have become essential elements for the successful functioning of ... more This ICT tools and technologies have become essential elements for the successful functioning of organizations. Consequent to that push, Pakistan government has provided ICT infrastructure including labs, Internet services, computers for both staff and students, access to the digital library, and video conference rooms especially from the year 2002 in educational institutes. Yet, Pakistan has not improved it ranking among world standards for ICT readiness as well as higher education management. Therefore, we assessed and measured ICT usage with the goal to know the adoption of ICT in terms of implementation, acceptance, and management in universities. Specifically, we focused on universities in Sindh province of Pakistan. In this research, we used the qualitative approach and conducted face to face interviews. Our target population included experienced administrative staff at important administrative posts and teaching staff who were familiar with ICT infrastructure in higher educat...
2018 IEEE International Conference on Innovative Research and Development (ICIRD), 2018
A global, immersive, invisible, ambient network-computing environment built through the continued... more A global, immersive, invisible, ambient network-computing environment built through the continued proliferation of smart sensors, cameras, software, databases, and massive data centers in a world-spanning information fabric known as the Internet of Things. The idea is to live in connected world. Altogether varieties of connected objects from smart home appliances like televisions, laundry machines, thermostats, refrigerators to Industrial Internet of Things (IIoT) and Internet of Medical Things (IoMT) are going to conserve the potential of IoT connectivity in all paces of future smart world. However, it has high importance to preserve adherence of enormous benefits of IoT connectivity, which might lead to unseen security and privacy issues and vulnerabilities that will cause various malicious attacks including waterhole, ransomware, eavesdropping, and others to exploit the potential of smart objects. This paper will present and forecast advanced concepts for end-to end security and privacy issues in a highly distributed, heterogeneous and dynamic network of IoT devices, which may reveal a holistic approach of device identification, authentication, and management, security, and privacy concerns.
International Journal of Engineering & Technology, 2018
This paper examines the manner in which audits would be conducted in the future and how technolog... more This paper examines the manner in which audits would be conducted in the future and how technology has transformed and impacted the business processes of public, private sector entities and various organisations and the guidelines which need to be followed to ensure compliance with applicable laws and regulations. The tranperancy of financial statements is of paramount interest to shareholders and other significant stakeholders. This necessities that the financial statements are audited to acquire a certain level of confidence over the integrity of numbers and the validity of business rationale which thereby arises a need for auditor to be well equipped with all the tools and system essentials in carrying out an effective and efficient audit. Information Technology can act as an impediment or stimulant towards the achievement of the above discussed objective. Various organizations use automation tools and ERP applications which have become a vital cog in their internel control envir...
SINDH UNIVERSITY RESEARCH JOURNAL -SCIENCE SERIES, 2019
Agile software development methods can deliver quality software yet it perceived that adoption an... more Agile software development methods can deliver quality software yet it perceived that adoption and acceptance of agile methods by the consumers has been lower in Pakistan. However, this research study proposes an extended model of technology acceptance to understand the perception of the potential software practitioner teams towards adoption and acceptance of agile methods in software development. The theoretical research framework in this study incorporates determinants such as productivity, awareness of agile methods, and customer collaboration along with latent factors perceived ease of use and perceived usefulness. It is intended that the systematic research framework of integrated factors would be supportive enough to adopt agile software development solutions in software industry of Pakistan.
2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M), 2016
Information and Communication Technology (ICT) has changed the world scenario including business ... more Information and Communication Technology (ICT) has changed the world scenario including business and economies. There are new opportunities and challenges for every country to produce knowledge oriented citizens. Driven by these changes, numerous higher education institutions around the world are integrating and adopting latest ICT tools to deliver quality education. However, the Effectiveness of a new technologies introduced in educational institution depends on acceptance and utilization by academicians in the academic institutions. Thus realizing the importance of ICT availability and adoption in developed countries, this research is aimed to understand and assess the ICT adoption in Pakistan. This study also focuses on fundamental literature to investigate the critical success factors and propose a model for ICT adoption by academicians of higher education institutions in Pakistan. The contribution of this research improves the quality of education system in developing countries by effectively utilizing ICT in higher education institutions.
This paper has assessed the implementation and acceptance of information and communication techno... more This paper has assessed the implementation and acceptance of information and communication technology (ICT) at public sector universities in Pakistan. This research was conducted in three major public-sector universities based in one province of Pakistan. A total of 550 questionnaires were distributed and 325 were returned. In addition, three interviews were conducted from the administrative personnel of universities. The research was conducted to assess ICT implementation at universities and its acceptance by academicians. The base for this research was an integrated framework developed for this research called academicians acceptance and use of ICT (AAU-ICT). This framework was developed using; Unified theory of acceptance and use of technology (UTAUT) with an additional four constructs Culture, external incentives, perceived needs and job relevance. In order to make the results strong, a mixed method approach was adopted by incorporating both quantitative and qualitative methods....
Information and communication technology has become the integral part of education system. Worldw... more Information and communication technology has become the integral part of education system. Worldwide different studies are being conducted to evaluate ICT for better performance. This study focused on assessing the general adoption, acceptance and usage of the information and communication technology by the academicians at the University of Sindh, Pakistan. Though many established models are available to assess acceptance and use of ICT, for this research Unified Theory of Acceptance and Use of Technology (UTAUT) is used with some external factor like Culture, Incentives, Perceived needs and Job Relevance. The research used mix method approach by distributing 200 survey questionnaires among the academic staff and in addition, used interview method for making survey results stronger. The results revealed that all the constructs have significant effect on academicians towards their intention to use ICT in their academic work, on other side it was also found that there is lack of ICT i...