Yasir Javed | Prince Sultan University (original) (raw)

Papers by Yasir Javed

Research paper thumbnail of Relationship between IT Self-Efficacy and Personal Knowledge and Information Management for Sustainable Lifelong Learning and Organizational Performance: A Systematic Review from 2000 to 2022

Sustainability

This study aims to identify the relationship between IT self-efficacy and personal knowledge and ... more This study aims to identify the relationship between IT self-efficacy and personal knowledge and information management (PKIM) practices. It also intends to investigate trending tools and approaches being applied for PKIM for sustainable lifelong learning and organizational performance. It also reveals challenges for the development of an effective PKIM system. To meet the study’s objectives, a systematic literature review was carried out. Fifty research papers published in peer-reviewed journals were included to conduct a comprehensive systematic review. The findings of the study revealed that a significant positive relationship exists between IT self-efficacy and personal knowledge and information management for sustainable lifelong learning and innovative organizational performance. Social media tools, the adoption of emerging technologies, and artificial intelligence were trending techniques for the successful implementation of PKIM practices in academia and the field. This rese...

Research paper thumbnail of Attitudes for Improved Learning Knowledge in Archetypal Engineering Courses

Proceedings of the 7th Teaching & Education Conference, London, 2019

It has been reflected during teaching ETHC303 "Ethical and Social Aspects of Computing" at Prince... more It has been reflected during teaching ETHC303 "Ethical and Social Aspects of Computing" at Prince Sultan University, Riyadh that the students have a vague understanding about the subject at the beginning of the semester. They believe it as a second course and expecting higher grades in it, whereas the scenario is the other way around. The subject of this nature to be taught in final year class cannot be covered in the traditional way. As it is more towards practical practice rather than bookish approach. There were three techniques used to analyse this problem in this case study including Individual Interviews, Literature Review Task (LRT) as a Flipped Class Room (FCR) approach and Field Trip (FT). In the end, Visual Clips were also used as an experiment for learning objectives delivery. It is analysed that the literature review task as a flipped classroom approach could not produce satisfactory results for courses like ethics. Whereas field trips significantly produced satisfactory results for such a problem. It is also observed that visual clips are helpful for outline delivery within the subject of such typical nature. It is concluded that field trips, visual clips and individual counselling are quite supportive and helpful to increase learning and knowledge in the subjects such as ETHC303 "Ethical and Social Aspects of Computing".

Research paper thumbnail of Carbon Dioxide Footprint and Its Impacts: A Case of Academic Buildings

Sustainability, 2021

Carbon emissions have been considered a major reason behind climate change and global warming. Va... more Carbon emissions have been considered a major reason behind climate change and global warming. Various studies report that rapid urbanization and the changing demands of 21st century life have resulted in higher carbon emissions. This study aims to examine the carbon footprints in an academic building to observe the carbon dioxide (CO2) levels at crucial landmarks and offices. A sensor-based automated system was designed and implemented for the collection of CO2 concentrations at selected locations. In the final stage, a CO2 footprint map was generated to highlight the vulnerable areas of CO2 in the academic building. It was concluded that offices have higher CO2 concentrations at both intervals (morning and afternoon), followed by the laboratory, corridors, and praying area. The CO2 concentration did not exceed 500 ppm at any location. Thus, all locations other than offices had normal CO2 concentration levels. Similarly, the humidity level was also satisfactory. The average humidit...

Research paper thumbnail of Developer Companion: A Framework to Produce Secure Web Applications

Software engineering and development is a very complex endeavor that contends with limited resour... more Software engineering and development is a very complex endeavor that contends with limited resources, potentially causing software to behave in an unexpected manner. Software developers often lack secure coding skills and its a major reason behind development of insecure web applications. In this work, we propose a developer companion as an integrated framework that can be integrated to any IDE to educate and help developers produce more secure code. This framework can be adopted and can be made more intelligent by focusing on historical security flaws in the development team. expert developers practices to overcome the security vulnerabilities. Keywords—web applications, source code, security, static analysis

Research paper thumbnail of Vulnerability Detection Using Character N- Gram Embedding

Deep Learning (DL) techniques were successfully applied to solve challenging problems in the fiel... more Deep Learning (DL) techniques were successfully applied to solve challenging problems in the field of Natural Language Processing (NLP). Since source code and natural text share several similarities, it was possible to adopt text classification techniques, such as word embedding, to propose DL-based Automatic Vulnerabilities Prediction (AVP) approaches. Although the obtained results were interesting, they were not good enough compared to those obtained in NLP. In this paper, we propose an improved DL-based AVP approach based on the technique of character n-gram embedding. We evaluate the proposed approach for 4 types of vulnerabilities using a large c/c++ open-source codebase. The results show that our approach can yield a very excellent performance which outperforms the performances obtained by previous approaches.

Research paper thumbnail of Low Cost Road Health Monitoring System: A Case of Flexible Pavements

Sustainability, 2021

A healthy road network plays a significant role in the socio-economic development of any country.... more A healthy road network plays a significant role in the socio-economic development of any country. Road management authorities struggle with pavement repair approaches and the finances to keep the existing road network to its best functionality. It has been observed that real-time road condition monitoring can drastically reduce road and vehicle maintenance expenses. There are various methods to analyze road health, but most are either expensive, costly, time-consuming, labor-intensive, or imprecise. This study aims to design a low-cost smart road health monitoring system to identify the road section for maintenance. An automized sensor-based system is developed to assist the road sections for repair and rehabilitation. The proposed system is mounted in a vehicle and the data have been collected for a more than 1000 km road network. The data have been processed using SPSS, and it shows that the proposed system is adequate for detecting the road quality. It is concluded that the propo...

Research paper thumbnail of A Lightweight Secure and Energy-Efficient Fog-Based Routing Protocol for Constraint Sensors Network

Energies, 2020

The Wireless Sensor Network (WSN) has seen rapid growth in the development of real-time applicati... more The Wireless Sensor Network (WSN) has seen rapid growth in the development of real-time applications due to its ease of management and cost-effective attributes. However, the balance between optimization of network lifetime and load distribution between sensor nodes is a critical matter for the development of energy-efficient routing solutions. Recently, many solutions have been proposed for constraint-based networks using the cloud paradigm. However, they achieve network scalability with the additional cost of routing overheads and network latency. Moreover, the sensors’ data is transmitted towards application users over the uncertain medium, which leads to compromised data security and its integrity. Therefore, this work proposes a light-weight secure and energy-efficient fog-based routing (SEFR) protocol to minimize data latency and increase energy management. It exploits the Quality of Service (QoS) factors and facilitates time-sensitive applications with network edges. Moreover...

Research paper thumbnail of Security assessment of four open source software systems

Indonesian Journal of Electrical Engineering and Computer Science, 2019

Incorporating Open Source Software (OSS) tools in software development is increasing day by day d... more Incorporating Open Source Software (OSS) tools in software development is increasing day by day due to their accessibility on the internet. With the advantages of OSS comes disadvantages in terms of security vulnerabilities. Therefore, in this paper, we analyzed four famous open source software tools (i.e. Moodle, Joomla, Flask and VLC media player) which are used by software developers nowadays. For the analysis of each system, security vulnerabilities and weakness were identified, threat models were modeled,and code inspection was performed. The findings are discussed in more details.

Research paper thumbnail of Evaluating the Research Performance of Islamabad-Based Higher Education Institutes

SAGE Open, 2020

Research discovers new knowledge, ideas, and technologies essential in driving the future of soci... more Research discovers new knowledge, ideas, and technologies essential in driving the future of society and humanity. Without research, a relevant and modern country cannot exist. Similarly, the research output of universities and degree-awarding institutes (DAIs) plays a significant role in higher education and development of any country. Research fosters professional excellence in faculty, important for delivering outstanding student education and training. Therefore, this research is an evaluation of the research output of higher education DAIs in the capital of Pakistan. This research was conducted in four steps: (a) data collection: where the data were extracted from Scopus for the years 2008–2017; (b) data cleansing and labeling: which included removal of nonrequired contents and labeling of nonnumeric data to meaningful classes; (c) feature selection: useful features according to proposed research questions were selected; and (d) data analysis: data were analyzed according to re...

Research paper thumbnail of A Security Perspective on Adoption and Migration to Mobile Cloud Technology

JOIV : International Journal on Informatics Visualization, 2017

Security is one of the main concerns of those who want to adopt and migrate to cloud computing te... more Security is one of the main concerns of those who want to adopt and migrate to cloud computing technology. Security issues raised by cloud technology reveals that mobile cloud computing is raising the privacy and security issues such as identification and authentication issue, as sometimes the identity and the authentication of the owner of the device or the owner of the data contained in the cloud was not strictly remote. These are some examples that could be considered as major setbacks to the mobile cloud computing adaptation and the reason why some entities are still reluctant of embracing, adopting and migrating to this technology. This research reviews the phenomenon of mobile cloud computing, and the security and privacy issues intrinsic within the area of mobile application and cloud computing with more emphasis on the security and privacy considerations to embrace and migrate to Mobile Cloud Computing.

Research paper thumbnail of Defectiveness Evolution in Open Source Software Systems

Procedia Computer Science, 2016

One of the essential objectives of the software engineering is to develop techniques and tools fo... more One of the essential objectives of the software engineering is to develop techniques and tools for high-quality software solutions that are stable and maintainable. Software managers and developers use several measures to measure and improve the quality of a software solution throughout the development process. These measures assess the quality of different software attributes, such as product size, cohesion, coupling, and complexity. Researchers and practitioners use software metrics to understand and improve software solutions and the processes used to develop them. Determining the relationship between software metrics aids in clarifying practical issues with regard to the relationship between the quality of internal and external software attributes. We conducted an empirical study on two open source systems (JEDIT and ANT) to study the defectiveness Evolution in Open Source Software Systems. The result reveals that a good designed software has lesser defects and have high cohesion. Moreover the study also revealed that defects are higher in initial versions and most corrected errors are from major classes in initial version. Removal of defects also reveals that a good software is consistently improved and feed backs are important part of open source systems.

Research paper thumbnail of Estimating Diabetic cases in KSA through search trends and Creating Cyber Diabetic Community

Proceedings of the 2015 International Conference on Recent Advances in Computer Systems, 2016

Saudi Arabia is fastest developing nation enjoying stability and high per capita income, thus hig... more Saudi Arabia is fastest developing nation enjoying stability and high per capita income, thus highly influenced by urbanization inviting huge investments from international brands especially in food and clothing sector. Changes in life style have made Saudi society more prone towards disease like diabetes that is costing about 40% cases of the total population [1]. Higher diabetic cases have alarmed health care organizations (both government and private) in finding the exact number of diabetic cases in extremely timely manner. Creating a unified system among hospitals, laboratories and other health care organizations is time consuming and expensive inviting researchers to look for other options. Due to improvement in community awareness among stakeholders (patients, care taker, health researcher and others), has provided an opportunity to get a real time estimate about total number of patients and getting to know about patient problems etc. This study tends to create a diabetic prediction system that will gather information from multiple sources (news, health care records, social media, news feeds, search trends and tweets) in multiple languages (Arabic , English and French) to answer two questions (1) Can online search trends and tweets be related to exact number of diabetes patients (2) Can we extract common or new symptoms for diabetes cases from these trends (3) providing a predictive picture to health care professionals and managers for creating in-time policies to avoid epidemic.(4) Finding relationship in between diabetes related search terms and diabetic cases. This study reveals that real data figures are 85% correlated to search trend thus providing a cogent proof that both internet usage and real data figures can be related. It was also observed that search trends commonly symbolize common symptoms or disease name. A cyber diabetic community can be created that can be targeted by government agencies or health organization as to create awareness about diabetes. While usage of system by community will also help in better diagnosis from search trends and hospital information.

Research paper thumbnail of Secure Trust-Based Blockchain Architecture to Prevent Attacks in VANET

Sensors, 2019

Vehicular ad hoc networks (VANET) are also known as intelligent transportation systems. VANET ens... more Vehicular ad hoc networks (VANET) are also known as intelligent transportation systems. VANET ensures timely and accurate communications between vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) to improve road safety and enhance the efficiency of traffic flow. Due to its open wireless boundary and high mobility, VANET is vulnerable to malicious nodes that could gain access into the network and carry out serious medium access control (MAC) layer threats, such as denial of service (DoS) attacks, data modification attacks, impersonation attacks, Sybil attacks, and replay attacks. This could affect the network security and privacy, causing harm to the information exchange within the network by genuine nodes and increase fatal impacts on the road. Therefore, a novel secure trust-based architecture that utilizes blockchain technology has been proposed to increase security and privacy to mitigate the aforementioned MAC layer attacks. A series of experiment has been conducted us...

Research paper thumbnail of Poster: Dronemap - A Cloud-based Architecture for the Internet-of-Drones

international conference on embedded wireless systems and networks, Feb 15, 2016

Unmanned Aerial Vehicles (UAVs) are opening new horizon as a major Internet-of-Things (IoT) playe... more Unmanned Aerial Vehicles (UAVs) are opening new horizon as a major Internet-of-Things (IoT) player. UAVs are being used for several applications in surveillance, disaster management, search and rescue, environment monitoring, etc. Most of these solutions are limited to the point-to-point communication pattern, and are not suitable for applications in distributed multi-UAV scenarios. In addition, low-cost UAVs have limited processing and storage capabilities and cannot cope with massive computations requirements of certain applications. This paper proposes Dronemap, a cloudbased architecture for Internet-of-Drones (IoD), which integrates UAVs with the cloud to (1) virtualize access to UAVs, (2) offload heavy computations from the UAVs to the cloud.

Research paper thumbnail of Robot Path Planning and Cooperation

Studies in Computational Intelligence, 2018

This book presents extensive research on two main problems in robotics: the path planning problem... more This book presents extensive research on two main problems in robotics: the path planning problem and the multirobot task allocation problem. It is the first book to provide a comprehensive solution for using these techniques in large-scale environments containing randomly scattered obstacles. The research conducted resulted in tangible results both in theory and in practice. For path planning, new algorithms for large-scale problems are devised and implemented and integrated into the Robot Operating System (ROS). The book also discusses the parallelism advantage of cloud computing techniques to solve the path planning problem, and, for multi-robot task allocation, it addresses the task assignment problem and the multiple traveling salesman problem for mobile robots applications. In addition, four new algorithms have been devised to investigate the cooperation issues with extensive simulations and comparative performance evaluation. The algorithms are implemented and simulated in MATLAB and Webots.

Research paper thumbnail of Introduction to Mobile Robot Path Planning

Robot Path Planning and Cooperation, 2018

Robotic is now gaining a lot of space in our daily life and in several areas in modern industry a... more Robotic is now gaining a lot of space in our daily life and in several areas in modern industry automation and cyber-physical applications. This requires embedding intelligence into these robots for ensuring (near)-optimal solutions to task execution. Thus, a lot of research problems that pertain to robotic applications have arisen such as planning (path, motion, and mission), task allocation problems, navigation, tracking. In this chapter, we focused on the path planning research problem.

Research paper thumbnail of MyBot: Cloud-Based Service Robot using Service-Oriented Architecture

Robotica, 2017

This paper presents a viable solution for the development of service robots by leveraging cloud a... more This paper presents a viable solution for the development of service robots by leveraging cloud and Web services technologies, modular software architecture design, and Robot Operating System (ROS). The contributions of this paper are twofolded (1) Design of ROS Web services to provide new abstract interfaces to service robots that makes easier the interaction with and the development of service robots applications, and (2) Integration of the service robot to the cloud using the ROSLink protocol. We demonstrate through real-world implementation on the MyBot robot the effectiveness of these software abstraction layers in developing applications for service robots through the Internet and the cloud, and in accessing them through Internet. We believe that this work represents an important step towards a more popular use of service robots.

Research paper thumbnail of Different Approaches to Solve the MRTA Problem

The multi-robot task allocation problem is a fundamental problem in robotics research area. The p... more The multi-robot task allocation problem is a fundamental problem in robotics research area. The problem roughly consists of finding an optimal allocation of tasks among several robots to reduce the mission cost to a minimum. As mentioned in Chap. 6, extensive research has been conducted in the area for answering the following question: Which robot should execute which task? In this chapter, we design different solutions to solve the MRTA problem. We propose four different approaches: an improved distributed market-based approach (IDMB), a clustering market-based approach (CM-MTSP), a fuzzy logic-based approach (FL-MTSP), and Move-and-Improve approach. These approaches must define how tasks are assigned to the robots. The IDBM, CM-MTSP, and Move-and-Improve approaches are based on the use of an auction process where bids are used to evaluate the assignment. The FL-MTSP is based on the use of the fuzzy logic algebra to combine objectives to be optimized.

Research paper thumbnail of Integration of Global Path Planners in ROS

Robot Path Planning and Cooperation, 2018

Global path planning consists in finding a path between two locations in a global map. It is a cr... more Global path planning consists in finding a path between two locations in a global map. It is a crucial component for any map-based robot navigation. The navigation stack of the Robot Operating System (ROS) open-source middleware incorporates both global and local path planners to support ROS-enabled robot navigation. Only two basic algorithms are defined for the global path planner including Dijkstra and carrot planners. However, more intelligent global planners have been defined in the literature but were not integrated in ROS distributions. The contribution of this work consists in integrating the \(RA^{*}\) path planner, defined in Chap. 3, into the ROS global path planning component as a plugin. We demonstrate how to integrate new planner into ROS and present their benefits. Extensive experimentations are performed on simulated and real robots to show the effectiveness of the newly integrated planner as compared to ROS default planner.

Research paper thumbnail of A service-oriented Cloud-based management system for the Internet-of-Drones

2017 IEEE International Conference on Autonomous Robot Systems and Competitions (ICARSC), 2017

Deploying drones over the Cloud is an emerging research area motivated by the emergence of Cloud ... more Deploying drones over the Cloud is an emerging research area motivated by the emergence of Cloud Robotics and the Internet-of-Drones (IoD) paradigms. This paper contributes to IoD and to the deployment of drones over the cloud. It presents, Dronemap Planner, an innovative service-oriented cloud based drone management system that provides access to drones through web services (SOAP and REST), schedule missions and promotes collaboration between drones. A modular cloud proxy server was developed; it acts as a moderator between drones and users. Communication between drones, users and the Dronemap Planner cloud is provided through the MAVLink protocol, which is supported by commodity drones. To demonstrate the effectiveness of Dronemap Planner, we implemented and validated it using simulated and real MAVLink-enabled drones, and deployed it on a public cloud server. Experimental results show that Dronemap Planner is efficient in virtualizing the access to drones over the Internet, and provides developers with appropriate APIs to easily program drones 19 applications.

Research paper thumbnail of Relationship between IT Self-Efficacy and Personal Knowledge and Information Management for Sustainable Lifelong Learning and Organizational Performance: A Systematic Review from 2000 to 2022

Sustainability

This study aims to identify the relationship between IT self-efficacy and personal knowledge and ... more This study aims to identify the relationship between IT self-efficacy and personal knowledge and information management (PKIM) practices. It also intends to investigate trending tools and approaches being applied for PKIM for sustainable lifelong learning and organizational performance. It also reveals challenges for the development of an effective PKIM system. To meet the study’s objectives, a systematic literature review was carried out. Fifty research papers published in peer-reviewed journals were included to conduct a comprehensive systematic review. The findings of the study revealed that a significant positive relationship exists between IT self-efficacy and personal knowledge and information management for sustainable lifelong learning and innovative organizational performance. Social media tools, the adoption of emerging technologies, and artificial intelligence were trending techniques for the successful implementation of PKIM practices in academia and the field. This rese...

Research paper thumbnail of Attitudes for Improved Learning Knowledge in Archetypal Engineering Courses

Proceedings of the 7th Teaching & Education Conference, London, 2019

It has been reflected during teaching ETHC303 "Ethical and Social Aspects of Computing" at Prince... more It has been reflected during teaching ETHC303 "Ethical and Social Aspects of Computing" at Prince Sultan University, Riyadh that the students have a vague understanding about the subject at the beginning of the semester. They believe it as a second course and expecting higher grades in it, whereas the scenario is the other way around. The subject of this nature to be taught in final year class cannot be covered in the traditional way. As it is more towards practical practice rather than bookish approach. There were three techniques used to analyse this problem in this case study including Individual Interviews, Literature Review Task (LRT) as a Flipped Class Room (FCR) approach and Field Trip (FT). In the end, Visual Clips were also used as an experiment for learning objectives delivery. It is analysed that the literature review task as a flipped classroom approach could not produce satisfactory results for courses like ethics. Whereas field trips significantly produced satisfactory results for such a problem. It is also observed that visual clips are helpful for outline delivery within the subject of such typical nature. It is concluded that field trips, visual clips and individual counselling are quite supportive and helpful to increase learning and knowledge in the subjects such as ETHC303 "Ethical and Social Aspects of Computing".

Research paper thumbnail of Carbon Dioxide Footprint and Its Impacts: A Case of Academic Buildings

Sustainability, 2021

Carbon emissions have been considered a major reason behind climate change and global warming. Va... more Carbon emissions have been considered a major reason behind climate change and global warming. Various studies report that rapid urbanization and the changing demands of 21st century life have resulted in higher carbon emissions. This study aims to examine the carbon footprints in an academic building to observe the carbon dioxide (CO2) levels at crucial landmarks and offices. A sensor-based automated system was designed and implemented for the collection of CO2 concentrations at selected locations. In the final stage, a CO2 footprint map was generated to highlight the vulnerable areas of CO2 in the academic building. It was concluded that offices have higher CO2 concentrations at both intervals (morning and afternoon), followed by the laboratory, corridors, and praying area. The CO2 concentration did not exceed 500 ppm at any location. Thus, all locations other than offices had normal CO2 concentration levels. Similarly, the humidity level was also satisfactory. The average humidit...

Research paper thumbnail of Developer Companion: A Framework to Produce Secure Web Applications

Software engineering and development is a very complex endeavor that contends with limited resour... more Software engineering and development is a very complex endeavor that contends with limited resources, potentially causing software to behave in an unexpected manner. Software developers often lack secure coding skills and its a major reason behind development of insecure web applications. In this work, we propose a developer companion as an integrated framework that can be integrated to any IDE to educate and help developers produce more secure code. This framework can be adopted and can be made more intelligent by focusing on historical security flaws in the development team. expert developers practices to overcome the security vulnerabilities. Keywords—web applications, source code, security, static analysis

Research paper thumbnail of Vulnerability Detection Using Character N- Gram Embedding

Deep Learning (DL) techniques were successfully applied to solve challenging problems in the fiel... more Deep Learning (DL) techniques were successfully applied to solve challenging problems in the field of Natural Language Processing (NLP). Since source code and natural text share several similarities, it was possible to adopt text classification techniques, such as word embedding, to propose DL-based Automatic Vulnerabilities Prediction (AVP) approaches. Although the obtained results were interesting, they were not good enough compared to those obtained in NLP. In this paper, we propose an improved DL-based AVP approach based on the technique of character n-gram embedding. We evaluate the proposed approach for 4 types of vulnerabilities using a large c/c++ open-source codebase. The results show that our approach can yield a very excellent performance which outperforms the performances obtained by previous approaches.

Research paper thumbnail of Low Cost Road Health Monitoring System: A Case of Flexible Pavements

Sustainability, 2021

A healthy road network plays a significant role in the socio-economic development of any country.... more A healthy road network plays a significant role in the socio-economic development of any country. Road management authorities struggle with pavement repair approaches and the finances to keep the existing road network to its best functionality. It has been observed that real-time road condition monitoring can drastically reduce road and vehicle maintenance expenses. There are various methods to analyze road health, but most are either expensive, costly, time-consuming, labor-intensive, or imprecise. This study aims to design a low-cost smart road health monitoring system to identify the road section for maintenance. An automized sensor-based system is developed to assist the road sections for repair and rehabilitation. The proposed system is mounted in a vehicle and the data have been collected for a more than 1000 km road network. The data have been processed using SPSS, and it shows that the proposed system is adequate for detecting the road quality. It is concluded that the propo...

Research paper thumbnail of A Lightweight Secure and Energy-Efficient Fog-Based Routing Protocol for Constraint Sensors Network

Energies, 2020

The Wireless Sensor Network (WSN) has seen rapid growth in the development of real-time applicati... more The Wireless Sensor Network (WSN) has seen rapid growth in the development of real-time applications due to its ease of management and cost-effective attributes. However, the balance between optimization of network lifetime and load distribution between sensor nodes is a critical matter for the development of energy-efficient routing solutions. Recently, many solutions have been proposed for constraint-based networks using the cloud paradigm. However, they achieve network scalability with the additional cost of routing overheads and network latency. Moreover, the sensors’ data is transmitted towards application users over the uncertain medium, which leads to compromised data security and its integrity. Therefore, this work proposes a light-weight secure and energy-efficient fog-based routing (SEFR) protocol to minimize data latency and increase energy management. It exploits the Quality of Service (QoS) factors and facilitates time-sensitive applications with network edges. Moreover...

Research paper thumbnail of Security assessment of four open source software systems

Indonesian Journal of Electrical Engineering and Computer Science, 2019

Incorporating Open Source Software (OSS) tools in software development is increasing day by day d... more Incorporating Open Source Software (OSS) tools in software development is increasing day by day due to their accessibility on the internet. With the advantages of OSS comes disadvantages in terms of security vulnerabilities. Therefore, in this paper, we analyzed four famous open source software tools (i.e. Moodle, Joomla, Flask and VLC media player) which are used by software developers nowadays. For the analysis of each system, security vulnerabilities and weakness were identified, threat models were modeled,and code inspection was performed. The findings are discussed in more details.

Research paper thumbnail of Evaluating the Research Performance of Islamabad-Based Higher Education Institutes

SAGE Open, 2020

Research discovers new knowledge, ideas, and technologies essential in driving the future of soci... more Research discovers new knowledge, ideas, and technologies essential in driving the future of society and humanity. Without research, a relevant and modern country cannot exist. Similarly, the research output of universities and degree-awarding institutes (DAIs) plays a significant role in higher education and development of any country. Research fosters professional excellence in faculty, important for delivering outstanding student education and training. Therefore, this research is an evaluation of the research output of higher education DAIs in the capital of Pakistan. This research was conducted in four steps: (a) data collection: where the data were extracted from Scopus for the years 2008–2017; (b) data cleansing and labeling: which included removal of nonrequired contents and labeling of nonnumeric data to meaningful classes; (c) feature selection: useful features according to proposed research questions were selected; and (d) data analysis: data were analyzed according to re...

Research paper thumbnail of A Security Perspective on Adoption and Migration to Mobile Cloud Technology

JOIV : International Journal on Informatics Visualization, 2017

Security is one of the main concerns of those who want to adopt and migrate to cloud computing te... more Security is one of the main concerns of those who want to adopt and migrate to cloud computing technology. Security issues raised by cloud technology reveals that mobile cloud computing is raising the privacy and security issues such as identification and authentication issue, as sometimes the identity and the authentication of the owner of the device or the owner of the data contained in the cloud was not strictly remote. These are some examples that could be considered as major setbacks to the mobile cloud computing adaptation and the reason why some entities are still reluctant of embracing, adopting and migrating to this technology. This research reviews the phenomenon of mobile cloud computing, and the security and privacy issues intrinsic within the area of mobile application and cloud computing with more emphasis on the security and privacy considerations to embrace and migrate to Mobile Cloud Computing.

Research paper thumbnail of Defectiveness Evolution in Open Source Software Systems

Procedia Computer Science, 2016

One of the essential objectives of the software engineering is to develop techniques and tools fo... more One of the essential objectives of the software engineering is to develop techniques and tools for high-quality software solutions that are stable and maintainable. Software managers and developers use several measures to measure and improve the quality of a software solution throughout the development process. These measures assess the quality of different software attributes, such as product size, cohesion, coupling, and complexity. Researchers and practitioners use software metrics to understand and improve software solutions and the processes used to develop them. Determining the relationship between software metrics aids in clarifying practical issues with regard to the relationship between the quality of internal and external software attributes. We conducted an empirical study on two open source systems (JEDIT and ANT) to study the defectiveness Evolution in Open Source Software Systems. The result reveals that a good designed software has lesser defects and have high cohesion. Moreover the study also revealed that defects are higher in initial versions and most corrected errors are from major classes in initial version. Removal of defects also reveals that a good software is consistently improved and feed backs are important part of open source systems.

Research paper thumbnail of Estimating Diabetic cases in KSA through search trends and Creating Cyber Diabetic Community

Proceedings of the 2015 International Conference on Recent Advances in Computer Systems, 2016

Saudi Arabia is fastest developing nation enjoying stability and high per capita income, thus hig... more Saudi Arabia is fastest developing nation enjoying stability and high per capita income, thus highly influenced by urbanization inviting huge investments from international brands especially in food and clothing sector. Changes in life style have made Saudi society more prone towards disease like diabetes that is costing about 40% cases of the total population [1]. Higher diabetic cases have alarmed health care organizations (both government and private) in finding the exact number of diabetic cases in extremely timely manner. Creating a unified system among hospitals, laboratories and other health care organizations is time consuming and expensive inviting researchers to look for other options. Due to improvement in community awareness among stakeholders (patients, care taker, health researcher and others), has provided an opportunity to get a real time estimate about total number of patients and getting to know about patient problems etc. This study tends to create a diabetic prediction system that will gather information from multiple sources (news, health care records, social media, news feeds, search trends and tweets) in multiple languages (Arabic , English and French) to answer two questions (1) Can online search trends and tweets be related to exact number of diabetes patients (2) Can we extract common or new symptoms for diabetes cases from these trends (3) providing a predictive picture to health care professionals and managers for creating in-time policies to avoid epidemic.(4) Finding relationship in between diabetes related search terms and diabetic cases. This study reveals that real data figures are 85% correlated to search trend thus providing a cogent proof that both internet usage and real data figures can be related. It was also observed that search trends commonly symbolize common symptoms or disease name. A cyber diabetic community can be created that can be targeted by government agencies or health organization as to create awareness about diabetes. While usage of system by community will also help in better diagnosis from search trends and hospital information.

Research paper thumbnail of Secure Trust-Based Blockchain Architecture to Prevent Attacks in VANET

Sensors, 2019

Vehicular ad hoc networks (VANET) are also known as intelligent transportation systems. VANET ens... more Vehicular ad hoc networks (VANET) are also known as intelligent transportation systems. VANET ensures timely and accurate communications between vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) to improve road safety and enhance the efficiency of traffic flow. Due to its open wireless boundary and high mobility, VANET is vulnerable to malicious nodes that could gain access into the network and carry out serious medium access control (MAC) layer threats, such as denial of service (DoS) attacks, data modification attacks, impersonation attacks, Sybil attacks, and replay attacks. This could affect the network security and privacy, causing harm to the information exchange within the network by genuine nodes and increase fatal impacts on the road. Therefore, a novel secure trust-based architecture that utilizes blockchain technology has been proposed to increase security and privacy to mitigate the aforementioned MAC layer attacks. A series of experiment has been conducted us...

Research paper thumbnail of Poster: Dronemap - A Cloud-based Architecture for the Internet-of-Drones

international conference on embedded wireless systems and networks, Feb 15, 2016

Unmanned Aerial Vehicles (UAVs) are opening new horizon as a major Internet-of-Things (IoT) playe... more Unmanned Aerial Vehicles (UAVs) are opening new horizon as a major Internet-of-Things (IoT) player. UAVs are being used for several applications in surveillance, disaster management, search and rescue, environment monitoring, etc. Most of these solutions are limited to the point-to-point communication pattern, and are not suitable for applications in distributed multi-UAV scenarios. In addition, low-cost UAVs have limited processing and storage capabilities and cannot cope with massive computations requirements of certain applications. This paper proposes Dronemap, a cloudbased architecture for Internet-of-Drones (IoD), which integrates UAVs with the cloud to (1) virtualize access to UAVs, (2) offload heavy computations from the UAVs to the cloud.

Research paper thumbnail of Robot Path Planning and Cooperation

Studies in Computational Intelligence, 2018

This book presents extensive research on two main problems in robotics: the path planning problem... more This book presents extensive research on two main problems in robotics: the path planning problem and the multirobot task allocation problem. It is the first book to provide a comprehensive solution for using these techniques in large-scale environments containing randomly scattered obstacles. The research conducted resulted in tangible results both in theory and in practice. For path planning, new algorithms for large-scale problems are devised and implemented and integrated into the Robot Operating System (ROS). The book also discusses the parallelism advantage of cloud computing techniques to solve the path planning problem, and, for multi-robot task allocation, it addresses the task assignment problem and the multiple traveling salesman problem for mobile robots applications. In addition, four new algorithms have been devised to investigate the cooperation issues with extensive simulations and comparative performance evaluation. The algorithms are implemented and simulated in MATLAB and Webots.

Research paper thumbnail of Introduction to Mobile Robot Path Planning

Robot Path Planning and Cooperation, 2018

Robotic is now gaining a lot of space in our daily life and in several areas in modern industry a... more Robotic is now gaining a lot of space in our daily life and in several areas in modern industry automation and cyber-physical applications. This requires embedding intelligence into these robots for ensuring (near)-optimal solutions to task execution. Thus, a lot of research problems that pertain to robotic applications have arisen such as planning (path, motion, and mission), task allocation problems, navigation, tracking. In this chapter, we focused on the path planning research problem.

Research paper thumbnail of MyBot: Cloud-Based Service Robot using Service-Oriented Architecture

Robotica, 2017

This paper presents a viable solution for the development of service robots by leveraging cloud a... more This paper presents a viable solution for the development of service robots by leveraging cloud and Web services technologies, modular software architecture design, and Robot Operating System (ROS). The contributions of this paper are twofolded (1) Design of ROS Web services to provide new abstract interfaces to service robots that makes easier the interaction with and the development of service robots applications, and (2) Integration of the service robot to the cloud using the ROSLink protocol. We demonstrate through real-world implementation on the MyBot robot the effectiveness of these software abstraction layers in developing applications for service robots through the Internet and the cloud, and in accessing them through Internet. We believe that this work represents an important step towards a more popular use of service robots.

Research paper thumbnail of Different Approaches to Solve the MRTA Problem

The multi-robot task allocation problem is a fundamental problem in robotics research area. The p... more The multi-robot task allocation problem is a fundamental problem in robotics research area. The problem roughly consists of finding an optimal allocation of tasks among several robots to reduce the mission cost to a minimum. As mentioned in Chap. 6, extensive research has been conducted in the area for answering the following question: Which robot should execute which task? In this chapter, we design different solutions to solve the MRTA problem. We propose four different approaches: an improved distributed market-based approach (IDMB), a clustering market-based approach (CM-MTSP), a fuzzy logic-based approach (FL-MTSP), and Move-and-Improve approach. These approaches must define how tasks are assigned to the robots. The IDBM, CM-MTSP, and Move-and-Improve approaches are based on the use of an auction process where bids are used to evaluate the assignment. The FL-MTSP is based on the use of the fuzzy logic algebra to combine objectives to be optimized.

Research paper thumbnail of Integration of Global Path Planners in ROS

Robot Path Planning and Cooperation, 2018

Global path planning consists in finding a path between two locations in a global map. It is a cr... more Global path planning consists in finding a path between two locations in a global map. It is a crucial component for any map-based robot navigation. The navigation stack of the Robot Operating System (ROS) open-source middleware incorporates both global and local path planners to support ROS-enabled robot navigation. Only two basic algorithms are defined for the global path planner including Dijkstra and carrot planners. However, more intelligent global planners have been defined in the literature but were not integrated in ROS distributions. The contribution of this work consists in integrating the \(RA^{*}\) path planner, defined in Chap. 3, into the ROS global path planning component as a plugin. We demonstrate how to integrate new planner into ROS and present their benefits. Extensive experimentations are performed on simulated and real robots to show the effectiveness of the newly integrated planner as compared to ROS default planner.

Research paper thumbnail of A service-oriented Cloud-based management system for the Internet-of-Drones

2017 IEEE International Conference on Autonomous Robot Systems and Competitions (ICARSC), 2017

Deploying drones over the Cloud is an emerging research area motivated by the emergence of Cloud ... more Deploying drones over the Cloud is an emerging research area motivated by the emergence of Cloud Robotics and the Internet-of-Drones (IoD) paradigms. This paper contributes to IoD and to the deployment of drones over the cloud. It presents, Dronemap Planner, an innovative service-oriented cloud based drone management system that provides access to drones through web services (SOAP and REST), schedule missions and promotes collaboration between drones. A modular cloud proxy server was developed; it acts as a moderator between drones and users. Communication between drones, users and the Dronemap Planner cloud is provided through the MAVLink protocol, which is supported by commodity drones. To demonstrate the effectiveness of Dronemap Planner, we implemented and validated it using simulated and real MAVLink-enabled drones, and deployed it on a public cloud server. Experimental results show that Dronemap Planner is efficient in virtualizing the access to drones over the Internet, and provides developers with appropriate APIs to easily program drones 19 applications.