Fazal-e- Amin

Fazal-e- Amin
King Saud University | KKUH · Department of Software Engineering

PhD. IT

About

53
Publications
31,973
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
842
Citations
Additional affiliations
March 2019 - present
King Saud University
Position
  • Professor (Associate)
May 2013 - February 2019
King Saud University
Position
  • Professor (Assistant)
March 2012 - March 2013
Government College University Faisalabad
Position
  • Professor (Assistant)

Publications

Publications (53)
Article
Full-text available
Masses are one of the early signs of breast cancer, and the survival rate of women suffering from breast cancer can be improved if masses can be correctly identified as benign or malignant. However, their classification is challenging due to the similarity in texture patterns of both types of mass. The existing methods for this problem have low sen...
Article
Full-text available
Software risks are a common phenomenon in the software development lifecycle, and risks emerge into larger problems if they are not dealt with on time. Software risk management is a strategy that focuses on the identification, management, and mitigation of the risk factors in the software development lifecycle. The management itself depends on the...
Article
Full-text available
Requirements elicitation is a fundamental phase of software development in which an analyst discovers the needs of different stakeholders and transforms them into requirements. This phase is cost-and time-intensive, and a project may fail if there are excessive costs and schedule overruns. COVID-19 has affected the software industry by reducing int...
Article
Full-text available
Software development outsourcing is becoming more and more famous because of the advantages like cost abatement, process enhancement, and coping with the scarcity of needed resources. Studies confirm that unfortunately a large proportion of the software development outsourcing projects fails to realize anticipated benefits. Investigations into the...
Article
Full-text available
Currently, being deployed by organizations to develop high-quality software at a low cost, global software development (GSD) faces many challenges that make development activities more complex. These GSD challenges are mainly concerned with requirements change management (RCM). RCM plays a key role in the successful execution of software projects....
Article
Through the Industrial Internet of Things (IIoT), a smart factory has entered the booming period. However, as the number of nodes and network size become larger, the traditional IIoT architecture can no longer provide effective support for such enormous system. Therefore, we introduce the Blockchain architecture, which is an emerging scheme for con...
Article
Full-text available
Cooperative routing mitigates the adverse channel effects in the harsh underwater environment and ensures reliable delivery of packets from the bottom to the surface of water. Cooperative routing is analogous to sparse recovery in that faded copies of data packets are processed by the destination node to extract the desired information. However, it...
Article
Full-text available
Presently, global software development (GSD) is growing very rapidly. However, it is not an easy and straightforward process. Requirements engineering (RE) and requirements change management (RCM) both are considered as very challenging activities due to demanding rich communications. Because it is necessary to address geographical and cultural dif...
Article
Full-text available
Over the years, the research community has conducted a number of studies in order to identify the comorbidity patterns on the basis of various factors such as genetics, metabolites, microbes, Protein-Protein Interactions (PPIs), and microRNAs (miRNAs). However, to the best of our knowledge, no social network, that is, micro, meso and macro levels,...
Article
Full-text available
Quality is the most important factor for software development as it mainly defines customer satisfaction that is directly related to the success of a software project. The software process model is used to ensure software quality, represent a variety of task settings, manage project duration, improve the process and range to execute the process und...
Article
Full-text available
Traditionally, software development organizations relied on heavyweight development methodologies, such as waterfall, V-model, and others. Later, agile development methodologies known as lightweight methodologies were introduced. Many considered these to be more flexible and more effective than heavyweight methodologies. Both methodologies are equa...
Article
Remote healthcare monitoring (RHM) has been used in contemporary disease management to improve the quality of life. A Secure VANET-Assisted Remote Healthcare Monitoring System is very importance due to privacy and sensitivity of the health data. In wireless network different kind of attacks produce and involve the core functionality of VANET-Assist...
Article
Intrusions are critical issues in information system of healthcare sector because a sole intrusion can cause health issue due to any manipulation in the medical record of the patients. Several intrusion detection (ID) techniques have been used but their performance is the dilemma. The efficiency of intrusion detection systems (IDSs) depends on opti...
Article
Full-text available
Software development organizations are globalizing their activities by adopting the phenomenon of global software development (GSD), mainly due to the significant return on investment it offers. Various challenges are associated with software process improvement (SPI). The aim of this work is to develop a software process improvement implementation...
Article
Testbeds are common in engineering education. Testbeds provides a platform for learning and simulation of complex engineering tasks. C4I (Command, Control, Communication, Computer and Intelligence) systems are critical systems of systems. These systems are used in different domains like battlefield management, emergency response, and in disaster/re...
Article
Open Source Software (OSS) is one of the emerging areas in software engineering. Reuse of OSS is employed in reuse-intensive software development such as Component Based Software Development and Software Product Lines. OSS is gaining the interest of the software development community due to its enormous benefits. The context of this study is the id...
Article
Command, Control, Communications, Computers, and Intelligence (C4I) systems have been used in different organizations so the security of such systems is very essential. One of the solutions is a best intrusion detection system because the detection is the first step to prevent such intrusions. Several Intrusion Detection Systems (IDSs) with differe...
Article
With the advent of increasing availability and usage of defense simulation packages it has become cumbersome to decide which package will suit a given application? Therefore, the need of a mechanism to facilitate the selection of an appropriate package is inevitable. This paper provides an evaluation for defense simulation tools based on Analytical...
Conference Paper
C4I (Command, Control, Communication, Computer and Intelligence) systems became the core of the command and control operations in military, emergency response, disaster management etc. The data sets used by these systems are large and complex to analyze and analysis process take long time. In today’s scenario the quantity of information or data tha...
Conference Paper
Intrusion is a serious issue in computer and network systems because a single intrusion can cause a heavy loss in few seconds. To prevent an intrusion, a robust intrusion detection system is highly needed. Existing intrusion detection techniques are not robust; the number of false alarms is high. One of the reasons of false alarms is due to the use...
Article
Browsing web through smartphone browsers is gaining popularity due to the convenience and availability of infrastructure at almost all places. On the other hand the capabilities of smartphone browsers are also improved to a great extent and many browsers are available to users. One can perform almost all of his information seeking and web related t...
Article
Full-text available
Cooperative spectrum sensing exploits spatial diversity of secondary-users (SUs), to reliably detect the availability of a spectrum. Soft energy combining schemes have optimal detection performance at the cost of high cooperation overhead, since actual sensed data is required at the fusion center. To reduce cooperation overhead, in hard combining o...
Article
Full-text available
In cognitive radio networks, cooperative spectrum sensing is used to exploit spatial diversity of secondary users, in order to reliably detect an unoccupied licensed spectrum. Since each secondary user experience different channel conditions, therefore observations of secondary users are weighted according to the reliability factor (weight) of indi...
Article
The increased use of smartphones has established a trend of web browsing through smartphone browsers. On one hand many of the smartphone web browsers are available and on the other hand many of the websites are customized for mobile browsing. This paper presents the results of a study conducted to reveal the usage patterns of smartphones web browse...
Article
The advancement in communication technology has reshaped the idea of mobile phone. Mobile phones are transformed into smart phones and their capabilities are enhanced far beyond the level of a phone. Almost all information seeking and communication tasks can be efficiently done by using smart phones. People remain connected and access information t...
Conference Paper
C4I (Command, Control, Communication, Computer and Intelligence) systems are critical systems of systems. These systems are used in military, emergency response, and in disaster management etc. Due to the sensitive nature of domains and applications of these systems, quality could never be compromised. C4I systems are resource demanding system, the...
Article
Full-text available
Cloud computing is an Internet-based computing and next stage in evolution of the internet. It has received significant attention in recent years but security issue is one of the major inhibitor in decreasing the growth of cloud computing. It essentially shifts the user data and application software to large datacenters i.e, cloud, which is remotel...
Article
Full-text available
Presently, most of software development companies are trying to globalize their work throughout the world in order to get the various benefits. The phenomenon of this software globalization is called Global Software Development (GSD). However, GSD is not a simple job and the software companies face various challenges. In GSD Communication is a main...
Article
Full-text available
Presently, most of software development companies are trying to globalize their work throughout the world in order to get the various benefits. The phenomenon of this software globalization is called Global Software Development (GSD). However, GSD is not a simple job and the software companies face various challenges. In GSD Communication is a main...
Article
Full-text available
Currently, software systems are becoming an essential part of business in the world. The majority of the software production companies are adopting Global Software Development (GSD) and it is incessantly getting faster. Most of the software development organisations are trying to globalize their study worldwide in order to get the different benefit...
Conference Paper
Full-text available
Requirements Change Management (RCM) could occur at any phase of the software development life cycle. Therefore, RCM is considered to be a difficult task in software development organizations. The purpose of this study is to propose a model for RCM that will be implemented in collocated software development organizations. The model is based on the...
Conference Paper
Full-text available
The phenomenon of evolution is closely related to Open Source Software (OSS) as there is a frequent release of versions. Improvements to the software are due to the enormous contributions made by developers. Software reusability is also seen as a necessary characteristic of OSS. In this paper, a conceptual model for reusability assessment is presen...
Conference Paper
Full-text available
The objectives of reusing software are to reduce the cost and amount of resources used to produce quality software that is on time. These objectives are achieved by reusing software artefacts. The reuse insensitive software development approaches, such as component based software development (CBSD) and software product lines (SPL) development, make...
Conference Paper
Full-text available
The software engineering community has been continuously discussing the concepts of software reuse since the community's inception. The emergence of a reuse-intense development methodology, i.e. software product lines (SPLs), and the advances in open source software (OSS) have made reuse a current research topic. There are several studies available...
Conference Paper
Full-text available
The potential benefits of software reuse motivate the use of component based software development and software product lines. In these software development methodologies software assets are being reused. Variability management is a tenet of software reuse. Variability is the capacity of software to satisfy variant requirements. Variability, being t...
Article
Full-text available
Software variability is the capacity of software to satisfy variant requirements. Component based software engineering and reuseintense software development, such as software product line engineering, demand software components with high variability. Increased variability influences a component's utility as it can be reused in multiple applications...
Article
Software product lines and open source software are two emerging paradigms in software engineering. A common theme in both of these paradigms is "reuse". Software product lines are a reuse centered approach that makes use of existing assets to develop new products. At the moment, a motivation for using open source software is so as to gain access t...
Article
Full-text available
Software reuse yields benefits such as a reduction in the development time, cost and effort required and an increase in the productivity and quality. One of the ways to attain these reuse benefits is the use of components to develop software and is termed component-based software development. Reuse is facilitated by employing a systematic reuse met...
Article
Full-text available
Software engineering, as an engineering discipline, is still quite young as compared to other engineering disciplines. The software engineering research community has made enormous contributions in past decades to lay down its foundations. However, the research methodologies in software engineering are still not mature. One of the reasons in this r...
Conference Paper
Full-text available
Reusability assessment is vital for software product line due to reusable nature of its core components. Reusability being a high level quality attribute is more relevant to the software product lines as the entire set of individual products depend on the software product line core assets. Recent research proposes the use of aspect oriented techniq...
Article
Full-text available
Aspect orientation is an emerging technique which provides a solution to the implementation of concerns that span more than one module, thus enhancing modularity. Modularity is directly related to reusability. The whole point of having a software product line is so that software assets can be reused to develop multiple individual products. This co-...
Conference Paper
Full-text available
Software Product Lines (SPL) emerged to promote the strategic, planned reuse that yields predictable results. Aspect Oriented Software Development (AOSD) provides efficient solution for modularity and handling of crosscutting concerns. Recent research proposes use of AOSD in SPL for better separation of concerns and modularity to increase variabili...

Network

Cited By