Dr. Wasim Ahmad Khan | National College of Business Administration and Economics (original) (raw)
Uploads
Papers by Dr. Wasim Ahmad Khan
Journal of Energy Technologies and Policy, 2015
Smartphone technology is advancing at a rapid pace. They are able to run more applications at a t... more Smartphone technology is advancing at a rapid pace. They are able to run more applications at a time which needs proper management of running processes especially when the processes are accidently lost due to critical battery that causes the device switch off. Therefore data loss occurs and there is no option to retrieve the lost data. In this paper, Hibernation approach for smartphones mobile operating system has been considered. Initially working of smart phones has been analyzed in order to find out their working mechanism. Hibernation approach is also discussed along with its structure. A mechanism has been proposed for smartphones based on hibernation called Hibernation Mechanism in Smartphones (HMS). HMS has been proposed for Smartphones in order to prevent application losses, thereby, giving proper management to smartphone users.
Lahore Garrison University Research Journal of Computer Science and Information Technology, 2017
The research is to pronounce the socialization with humans after identification of relationships ... more The research is to pronounce the socialization with humans after identification of relationships between cognitive agents recognized with the perspective of focus, selective attention, intention and decision making. Machine learning is used to understand environment complexity, dynamic collaboration, noise, features, domain and range on different parameters. Range of view is an interesting approach for relationship identification with respect to time, distance and face direction in a settled boundary that are trying to answer socialized behavior between those multiple agents. In resultant, the system agent finds friend, best friend and stranger relationships between other agents by using top down approach. The application can play a wonderful role for security purposes, gaming, labs, and intelligence agencies etc.
VAWKUM Transactions on Computer Sciences
kids with Autism Spectrum problems (ASD) have conversation deficits and problems with social inte... more kids with Autism Spectrum problems (ASD) have conversation deficits and problems with social interaction. A lack of social conduct can bog down healing interventions and may lessen the potential to examine social talents. Robots had been shown to initiate proactive social conduct in youngsters with ASD. improvement of robot systems able to appearing as catalysts for social conduct in the context of ASD remedy is the need of contemporary era. A methodology and theoretical framework is being supplied here in this paper for a robotic system that can not only compare the effects and stage of ASD however can assist the victim consequently.
IJCSIS, 2017
An Emotion is a property of cognitive agent either human or artificial and is considered as a uni... more An Emotion is a property of cognitive agent either human or artificial and is considered as a unique mode of functioning shaped by natural choice. The adaptive temperament of emotions helps in abstracting the demanding situations that are caused by the environmental modifications and re-emerge along the track of evolution. Where, to infer these environmental changes an agent develops its sensory perception by sensing the stimuli unconsciously from the real world situations in terms of their properties by framing them with the orientation of the precedent experiences acquired implicitly. To bring the perceptual stimuli from unconscious to the conscious mode for the subjective experience of the perceptual content, emotional abstraction is required in artificial agents as a strong correlate of cognition. Therefore, this paper presents emotional abstraction modeling of sensory perceptual content for cognitive agent's interaction and synchronization to the situational properties using fuzzy logic that ultimately contributes to adaptation.
Purpose -The aim of every organization is to achieve its set goals and objectives as well as secu... more Purpose -The aim of every organization is to achieve its set goals and objectives as well as secure competitive advantage over its competitors. However, these cannot be achieved or actualized if staff or workers act independently and do not share ideas. Today prominent businesses are becoming more aware that the knowledge of their employees is one of their primary assets. Sometimes organizational decisions cannot be effectively made with information alone; there is need for knowledge application. An effective Knowledge Management System can give a company the competitive edge it needs to be successful, and, for that reason, knowledge Management projects should be high priority. This means that for any organization to be competitive in today"s global world there is need for combination or pooling together of ideas by employees in order to achieve teamwork; this is in support of the saying that "two good heads are better than one". Due to the advent of the knowledge-based economy and the developments in activity nature of the companies at international level, intellectual capital is taken to be one of the fundamental pillars of the companies for achieving efficiency. The aim of this study is to predict the amount and effectiveness of intellectual capital or intangible assets on the basis of innovation ability of the companies using an integrated artificial neural networks fuzzy logic analysis approach in order to cope with future challenges of strategic management. Design/methodology/approach -This paper suggests some guidelines for setting up the development of valuation approach based on application and adaption of selected financial and non-financial indicators by means of artificial neural networks and fuzzy logic. The artificial neural network model is highly accurate in predicting intellectual capital of the companies. This research paper presents the construction and design of Hybrid Application using Neural Network and Fuzzy Logic. This proposed system uses a simplified algorithmic design approach with wide range of input and output membership functions. In this research a hybrid Neuro-Fuzzy systems modelling methodology is developed and applied to an empirical data set in order to determine the hidden fuzzy if-then rules. Furthermore, the proposed methodology is a valuable tool for successful knowledge management. Findings -The findings show the opinion of that the complexity of development has been improved by expansion in the amount of knowledge available to organizations. Future research should contain of high degree of study to analytically examine the successful project knowledge management in different types of plans, companies and commences. Learning comes through creating and applying knowledge, whilst learning increases an individual's and organization's knowledge asset. Both learning and knowledge management feed off the same root: learning, improved capacity to perform work tasks, ability to make effective decisions, predict future parameters on the basis of some certain parameters and positively impact the world around us. Challenges -Identification and evaluation of the significant factors that create and determine enterprise value in industry is based on complex calculations involving many variables. Regardless of this reason, existing business valuation methods for such companies have to be improved with taking into account a numerous qualitative and even additional quantitative factors.
— High level security is an essentially required in the communication and information sharing on ... more — High level security is an essentially required in the communication and information sharing on the network clouds. Intrusion detection system (IDS) is being used to detect violations and malicious behavior over networks and hosts. Purpose of our paper is to provide an Intrusion detection system to detect and prevent the malicious behavior on the cloud computing. We propose an intrusion detection system which is based on the cloud computing to reduce the risk of intrusion on the cloud networks and cover up the deficiency of already in use intrusion detection systems. Our design is based on cloud computing Software-as-a service (Saas) model for detection and prevention of intrusion cloud based users. Our System set up a hardware layer which forwarded the request to a service layer which analyzes the request patterns and further forwards to the intrusion detection layers which checks the request and provides the alerts against the malicious requests by applying genetic algorithm. Already existing Intrusion detection systems provides the detection in a single unit and use of genetic algorithm is rear in the already existing systems..
The paper suggested a fuzzy logic based flood adaptive control system for flood water management ... more The paper suggested a fuzzy logic based flood adaptive control system for flood
water management and to use this water for agriculture and generating electric power in Punjab, by
using an online survey conducted in the month of August, 2013. The online survey, data about soil and
water was collected in flood areas i.e. Mianwali, Chiniot and Bahawalpur. The collected data was in
the form of soil which included EC, P, S and PH and samples of water included ECw, SAR and RSE.
In fuzzy logic based flood adaptive control system, two spilled fuzzy logic controller, fuzzy logic
controller-1 and fuzzy logic controller-2 were used. Fuzzy logic controller -1 was used to take four
input parameters i.e. reservoir opening, reservoir opening time, water flow rate and water pressure to
generate one output i.e. reservoir depth. Similarly, Fuzzy logic controller-2 was used to take three
input parameters from fuzzy logic controller-2 i.e. reservoir depth, reservoir depth output and reservoir
depth output time to generate two output variables i.e. cultivation and power generation. For validation
of flood adaptive control system data, we developed a graphical user interface.
As cognitive systems become gradually adept at performing simple jobs like moving itself, picking... more As cognitive systems become gradually adept at performing simple jobs like moving itself, picking up and
delivering the objects. In the context of building the “Cognitive System for Objects Serving in Industry” has
ability to learn placement of geographical entities from environment of industries by spatial reference systems,
objects identifications, human face detections and image processing. This paper presents the iterative design of a
systemic system that uses a computational model for identifying and delivering objects on the basis of a range of
spatial reference systems.
High level security is an essentially required in the communication and information sharing on th... more High level security is an essentially required in the communication and information sharing on the network clouds. Intrusion detection system (IDS) is being used to detect violations and malicious behavior over networks and hosts. Purpose of our paper is to provide an Intrusion detection system to detect and prevent the malicious behavior on the cloud computing. We propose an intrusion detection system which is based on the cloud computing to reduce the risk of intrusion on the cloud networks and cover up the deficiency of already in use intrusion detection systems. Our design is based on cloud computing Software-as-a service (Saas) model for detection and prevention of intrusion cloud based users. Our System set up a hardware layer which forwarded the request to a service layer which analyzes the request patterns and further forwards to the intrusion detection layers which checks the request and provides the alerts against the malicious requests by applying genetic algorithm. Already existing Intrusion detection systems provides the detection in a single unit and use of genetic algorithm is rear in the already existing systems..
Smartphone technology is advancing at a rapid pace. They are able to run more applications at a t... more Smartphone technology is advancing at a rapid pace. They are able to run more applications at a time which
needs proper management of running processes especially when the processes are accidently lost due to critical
battery that causes the device switch off. Therefore data loss occurs and there is no option to retrieve the lost data.
In this paper, Hibernation approach for smartphones mobile operating system has been considered. Initially
working of smart phones has been analyzed in order to find out their working mechanism. Hibernation approach
is also discussed along with its structure. A mechanism has been proposed for smartphones based on hibernation
called Hibernation Mechanism in Smartphones (HMS). HMS has been proposed for Smartphones in order to
prevent application losses, thereby, giving proper management to smartphone users.
Journal of Energy Technologies and Policy, 2015
Smartphone technology is advancing at a rapid pace. They are able to run more applications at a t... more Smartphone technology is advancing at a rapid pace. They are able to run more applications at a time which needs proper management of running processes especially when the processes are accidently lost due to critical battery that causes the device switch off. Therefore data loss occurs and there is no option to retrieve the lost data. In this paper, Hibernation approach for smartphones mobile operating system has been considered. Initially working of smart phones has been analyzed in order to find out their working mechanism. Hibernation approach is also discussed along with its structure. A mechanism has been proposed for smartphones based on hibernation called Hibernation Mechanism in Smartphones (HMS). HMS has been proposed for Smartphones in order to prevent application losses, thereby, giving proper management to smartphone users.
Lahore Garrison University Research Journal of Computer Science and Information Technology, 2017
The research is to pronounce the socialization with humans after identification of relationships ... more The research is to pronounce the socialization with humans after identification of relationships between cognitive agents recognized with the perspective of focus, selective attention, intention and decision making. Machine learning is used to understand environment complexity, dynamic collaboration, noise, features, domain and range on different parameters. Range of view is an interesting approach for relationship identification with respect to time, distance and face direction in a settled boundary that are trying to answer socialized behavior between those multiple agents. In resultant, the system agent finds friend, best friend and stranger relationships between other agents by using top down approach. The application can play a wonderful role for security purposes, gaming, labs, and intelligence agencies etc.
VAWKUM Transactions on Computer Sciences
kids with Autism Spectrum problems (ASD) have conversation deficits and problems with social inte... more kids with Autism Spectrum problems (ASD) have conversation deficits and problems with social interaction. A lack of social conduct can bog down healing interventions and may lessen the potential to examine social talents. Robots had been shown to initiate proactive social conduct in youngsters with ASD. improvement of robot systems able to appearing as catalysts for social conduct in the context of ASD remedy is the need of contemporary era. A methodology and theoretical framework is being supplied here in this paper for a robotic system that can not only compare the effects and stage of ASD however can assist the victim consequently.
IJCSIS, 2017
An Emotion is a property of cognitive agent either human or artificial and is considered as a uni... more An Emotion is a property of cognitive agent either human or artificial and is considered as a unique mode of functioning shaped by natural choice. The adaptive temperament of emotions helps in abstracting the demanding situations that are caused by the environmental modifications and re-emerge along the track of evolution. Where, to infer these environmental changes an agent develops its sensory perception by sensing the stimuli unconsciously from the real world situations in terms of their properties by framing them with the orientation of the precedent experiences acquired implicitly. To bring the perceptual stimuli from unconscious to the conscious mode for the subjective experience of the perceptual content, emotional abstraction is required in artificial agents as a strong correlate of cognition. Therefore, this paper presents emotional abstraction modeling of sensory perceptual content for cognitive agent's interaction and synchronization to the situational properties using fuzzy logic that ultimately contributes to adaptation.
Purpose -The aim of every organization is to achieve its set goals and objectives as well as secu... more Purpose -The aim of every organization is to achieve its set goals and objectives as well as secure competitive advantage over its competitors. However, these cannot be achieved or actualized if staff or workers act independently and do not share ideas. Today prominent businesses are becoming more aware that the knowledge of their employees is one of their primary assets. Sometimes organizational decisions cannot be effectively made with information alone; there is need for knowledge application. An effective Knowledge Management System can give a company the competitive edge it needs to be successful, and, for that reason, knowledge Management projects should be high priority. This means that for any organization to be competitive in today"s global world there is need for combination or pooling together of ideas by employees in order to achieve teamwork; this is in support of the saying that "two good heads are better than one". Due to the advent of the knowledge-based economy and the developments in activity nature of the companies at international level, intellectual capital is taken to be one of the fundamental pillars of the companies for achieving efficiency. The aim of this study is to predict the amount and effectiveness of intellectual capital or intangible assets on the basis of innovation ability of the companies using an integrated artificial neural networks fuzzy logic analysis approach in order to cope with future challenges of strategic management. Design/methodology/approach -This paper suggests some guidelines for setting up the development of valuation approach based on application and adaption of selected financial and non-financial indicators by means of artificial neural networks and fuzzy logic. The artificial neural network model is highly accurate in predicting intellectual capital of the companies. This research paper presents the construction and design of Hybrid Application using Neural Network and Fuzzy Logic. This proposed system uses a simplified algorithmic design approach with wide range of input and output membership functions. In this research a hybrid Neuro-Fuzzy systems modelling methodology is developed and applied to an empirical data set in order to determine the hidden fuzzy if-then rules. Furthermore, the proposed methodology is a valuable tool for successful knowledge management. Findings -The findings show the opinion of that the complexity of development has been improved by expansion in the amount of knowledge available to organizations. Future research should contain of high degree of study to analytically examine the successful project knowledge management in different types of plans, companies and commences. Learning comes through creating and applying knowledge, whilst learning increases an individual's and organization's knowledge asset. Both learning and knowledge management feed off the same root: learning, improved capacity to perform work tasks, ability to make effective decisions, predict future parameters on the basis of some certain parameters and positively impact the world around us. Challenges -Identification and evaluation of the significant factors that create and determine enterprise value in industry is based on complex calculations involving many variables. Regardless of this reason, existing business valuation methods for such companies have to be improved with taking into account a numerous qualitative and even additional quantitative factors.
— High level security is an essentially required in the communication and information sharing on ... more — High level security is an essentially required in the communication and information sharing on the network clouds. Intrusion detection system (IDS) is being used to detect violations and malicious behavior over networks and hosts. Purpose of our paper is to provide an Intrusion detection system to detect and prevent the malicious behavior on the cloud computing. We propose an intrusion detection system which is based on the cloud computing to reduce the risk of intrusion on the cloud networks and cover up the deficiency of already in use intrusion detection systems. Our design is based on cloud computing Software-as-a service (Saas) model for detection and prevention of intrusion cloud based users. Our System set up a hardware layer which forwarded the request to a service layer which analyzes the request patterns and further forwards to the intrusion detection layers which checks the request and provides the alerts against the malicious requests by applying genetic algorithm. Already existing Intrusion detection systems provides the detection in a single unit and use of genetic algorithm is rear in the already existing systems..
The paper suggested a fuzzy logic based flood adaptive control system for flood water management ... more The paper suggested a fuzzy logic based flood adaptive control system for flood
water management and to use this water for agriculture and generating electric power in Punjab, by
using an online survey conducted in the month of August, 2013. The online survey, data about soil and
water was collected in flood areas i.e. Mianwali, Chiniot and Bahawalpur. The collected data was in
the form of soil which included EC, P, S and PH and samples of water included ECw, SAR and RSE.
In fuzzy logic based flood adaptive control system, two spilled fuzzy logic controller, fuzzy logic
controller-1 and fuzzy logic controller-2 were used. Fuzzy logic controller -1 was used to take four
input parameters i.e. reservoir opening, reservoir opening time, water flow rate and water pressure to
generate one output i.e. reservoir depth. Similarly, Fuzzy logic controller-2 was used to take three
input parameters from fuzzy logic controller-2 i.e. reservoir depth, reservoir depth output and reservoir
depth output time to generate two output variables i.e. cultivation and power generation. For validation
of flood adaptive control system data, we developed a graphical user interface.
As cognitive systems become gradually adept at performing simple jobs like moving itself, picking... more As cognitive systems become gradually adept at performing simple jobs like moving itself, picking up and
delivering the objects. In the context of building the “Cognitive System for Objects Serving in Industry” has
ability to learn placement of geographical entities from environment of industries by spatial reference systems,
objects identifications, human face detections and image processing. This paper presents the iterative design of a
systemic system that uses a computational model for identifying and delivering objects on the basis of a range of
spatial reference systems.
High level security is an essentially required in the communication and information sharing on th... more High level security is an essentially required in the communication and information sharing on the network clouds. Intrusion detection system (IDS) is being used to detect violations and malicious behavior over networks and hosts. Purpose of our paper is to provide an Intrusion detection system to detect and prevent the malicious behavior on the cloud computing. We propose an intrusion detection system which is based on the cloud computing to reduce the risk of intrusion on the cloud networks and cover up the deficiency of already in use intrusion detection systems. Our design is based on cloud computing Software-as-a service (Saas) model for detection and prevention of intrusion cloud based users. Our System set up a hardware layer which forwarded the request to a service layer which analyzes the request patterns and further forwards to the intrusion detection layers which checks the request and provides the alerts against the malicious requests by applying genetic algorithm. Already existing Intrusion detection systems provides the detection in a single unit and use of genetic algorithm is rear in the already existing systems..
Smartphone technology is advancing at a rapid pace. They are able to run more applications at a t... more Smartphone technology is advancing at a rapid pace. They are able to run more applications at a time which
needs proper management of running processes especially when the processes are accidently lost due to critical
battery that causes the device switch off. Therefore data loss occurs and there is no option to retrieve the lost data.
In this paper, Hibernation approach for smartphones mobile operating system has been considered. Initially
working of smart phones has been analyzed in order to find out their working mechanism. Hibernation approach
is also discussed along with its structure. A mechanism has been proposed for smartphones based on hibernation
called Hibernation Mechanism in Smartphones (HMS). HMS has been proposed for Smartphones in order to
prevent application losses, thereby, giving proper management to smartphone users.