
Malik Sikander Hayat Khiyal- Phd
- Professor (Full) at Preston University
Malik Sikander Hayat Khiyal
- Phd
- Professor (Full) at Preston University
About
202
Publications
135,797
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,036
Citations
Introduction
Current institution
Additional affiliations
September 2013 - present
August 2007 - December 2011
May 2002 - July 2007
Publications
Publications (202)
Speaker identification comes under the field of digital signal processing. The earliest systems were based on acoustic phonetics built for Automatic Speech Recognition. For recognition part these systems used pattern matching and spectrum analysis. With recent advancement in technology voice recognition has become one of the efficient measure that...
Wireless Body Area Network (WBAN) is a promising technology for providing intelligent healthcare services in remote locations. A review of the literature shows that researchers have primarily focused on Quality of Service (QoS)-aware energy-efficient routing techniques, network topology, and Medium Access Control (MAC) layers in WBANs. QoS-aware ro...
is a promising technology for providing intelligent healthcare services in remote locations. A review of the literature shows that researchers have primarily focused on Quality of Service (QoS)-aware energy-efficient routing techniques, network topology, and Medium Access Control (MAC) layers in WBANs. QoS-aware routing techniques are based on a se...
The process of choosing an appropriate university is a significant and complex decision for both students and academics. The challenge lies in efficiently navigating and interpreting the vast amount of unstructured and semi-structured data available online. To tackle this issue, this paper introduces a sophisticated decision support system designed...
There is an increasing demand for high-performance data center networks with resilient connectivity to support modern applications. Current approaches often lack robustness, particularly when seamlessly integrating wired and wireless technologies. To address this challenge and enhance flexibility, resilience, and programmability in data center arch...
Fog computing is a promising approach to address the challenges faced by traditional spatial data infrastructure when processing large-scale and real-time data. This chapter examined the opportunities and challenges of using fog computing in SDI through the service dominant logic framework. The study showed that fog computing can improve SDI by pro...
Wireless Body Area Network (WBAN) is a special purpose wireless sensors network designed to connect various self-autonomous medical sensors and appliances located inside and outside of human body. Interests in human Healthcare Monitoring System (HMS) are based on WBAN due to the increasing aging population and chronically ill patients at home. HMS...
Spatial data infrastructures (SDIs) have been implemented for the last four decades in most countries. One of the key objectives of SDIs is to ensure the quick availability and accessibility of spatial data. The success of SDI depends on the underlying spatial datasets. Many developing countries such as Pakistan are facing problems in implementing...
The process of assessing the scholarly output of academics is becoming increasingly challenging within the contemporary landscape of academia. Evaluation committees often extensively search multiple repositories to compile their evaluation summary report on an individual. Nevertheless, deriving performance metrics about a scholar's dynamics and pro...
Deoxyribonucleic Acid Computing (DNA) is a new computing technique. In this technique, the information is stored in DNA molecules and computational tools are available in the form of biochemistry operations. In computer science, different models of DNA computing are available, in which some are equivalent to a classic Turing Machine. The researcher...
Agile is grown up in web consultancy. Scrum is an agile product development framework that is mainly used for iterative and incremental software development. Web 3.0 is upcoming web revolution it’s also called the semantic web or web of things. It is the 3rd generation of web revolution. This research covers Web 3.0 design trends, effects of web 3....
Sustainable agriculture means that we have to fulfill our present needs as that, there is no bad effect on the next generations to meet their needs. The situation of agriculture has been changed since the end of world War World II. The productivity of food and fiber has rose due to modern equipment, methods and techniques. The concept of sustainabl...
The modern day advancement is increasingly digitizing our lives which has led to a rapid growth of data. Such multidimensional datasets are precious due to the potential of unearthing new knowledge and developing decision-making insights from them. Analyzing this huge amount of data from multiple sources can help organizations to plan for the futur...
Deoxyribonucleic Acid Computing (DNA) is a new computing technique. In this technique, the information is stored in DNA molecules and computational tool is available in the form of biochemistry operations. Computations are forming on string in DNA strand to produce results. In computer science, different models of DNA computing are available, in wh...
The impact of Deoxyribonucleic Acid computation is increasing on the researcher due to fabulous potentials it contains, the storage capacity is massive, and parallelism in processing is incredible. This research is aimed at investigating cost of DNA based computing in contrast to the traditional approach. Different attributes of both techniques are...
Cloud computing offers a variety of services like computational platform, computational power, storage and applications by means of the web. The cloud services have brought business supporting technology that attracts different companies around the globe. Despite the fact that Cloud computing has been deployed and utilized in part of the world, sec...
The last few years have seen an increase in the growth of face recognition for computer aided identification. Many of the processes and products developed are applicable to frontal face images only. The traditional Viola Jones algorithm coupled with re ranking is successfully being applied on all frontal faces. Despite the plethora of systems avail...
Network Availability is backbone of every network. Every Chief Technology Officer always tries to reduce downtime in their network. Different people use different methods to keep up their networks. This depends upon type, topology and applications running on the network. There are different techniques and protocols for network reliability and avail...
Security of data is an important task till from the beginning of internet to the current era. Currently main concern is over the transmitting of sensitive or high value data through open or non-secure channel to the destination point in such a way that neither confidentiality nor the integrity of data has to be compromised. Conversion of actual inf...
Computation with Deoxyribonucleic Acid (DNA) is getting popular day by day in the computational world. Its impact on the researcher increases due to fabulous potentials it contains, the storage capacity is massive, parallelism in processing is incredible. Unfortunately in Pakistan as a developing nation, much less attention has been given to this n...
After risk analysis it is concluded that heart disease is much diagnosed disease in Pakistan. From surveys, conducted by different scholars/professionals it has been found that the ratio is about 200,000 per year. This high rate confirms that heart diseases causes major deaths. Heart disease cases are leading death all over the world and death rati...
Tourism industry had global economic contribution of almost 7.6 trillion US dollars in 2014. To protect the valued heritage landmarks, tourism and heritage management when integrated together lead to the rise of a new form of tourism i.e. heritage tourism that includes cultural, historic and natural resources. It is learned that climate change has...
Climate change is a spatiotemporal phenomenon and global issue, too. It challenges sustainable environment and development. It is anticipated that climate change will affect almost all important sectors like agriculture and food security, water and energy resources, physical infrastructure, forest, biodiversity and marine environment.In order to de...
Obviously like rest of the world, Pakistan is facing numerous environmental challenges that include but are not limited to noise, air and water pollution, deforestation and emission of Greenhouse Gases (GHGs), dumping of ever increasing urban and rural waste. Moreover, the recently published UN and World Bank reports show that Pakistan is among the...
Similarity estimation among publications is very important in classification and clustering techniques for grouping, indexing, citation matching and Author Name Disambiguation (AND) purposes. Publication attributes are basic sources of information and play important role in similarity estimation. Most of the works in AND use title, co-authors and v...
One of the recently emerging areas in cloud computing is deployment of virtual machines across multiple clouds based on providers' ranking. This involves benchmarking of different cloud providers, development of different techniques for selection of candidate providers and frameworks for ranking cloud providers. Existing benchmarking studies are mo...
Researchers have tried to find out the pattern of rising and fall of Pakistani software industry and also the reasons for what is going exactly wrong with this industry. Different studies have witnessed that in Pakistan, the software industry is not following the international standards. Another surprising fact, being observed in the past analysis,...
Mobile healthcare systems are currently considered as key research areas in the domain of software engineering. The adoption of modern technologies, for mobile healthcare systems, is a quick option for industry professionals. Software architecture is a key feature that contributes towards a software product, solution, or services. Software architec...
Pattern recognition is growing very fast for last two decades. It started with the statistical pattern recognition theories and problems and now has the vast applications in data retrieval, expression recognition, behavior recognition and artificial intelligence. This study has been made to recognize pattern recognition. It starts from the definiti...
Cloud computing has emerged as a new paradigm for delivery of applications, platforms and computing resources to customers in a pay-as-you-go-model. In cloud, provisioning of computing resources is performed in the form of Virtual Machines (VMs), being deployed on physical computing nodes. Most cloud providers offer these resources on-demand and re...
Programming designers are favored Green IT now a day’s same like Agile, Green Software. Everybody is keen on feasible advancement where somebody does not have issues in sustainable development they emphasize in and for programming designing. Customary programming, building routines does not help the green programming, designing improvement most nor...
This study describes the person thinking that how brain communicates through handwriting styles, thinking behavior using brainwaves and brain activity models. Everything put on paper is a response of two way circuit between brain and motor reflex muscles of hand. Brain can work on different layers and multiple voxel. Different layers communication...
Creating gestural recognition system is a challenging task which requires skills and updated applications. It is required for designer to be skillful and innovative in order to create interesting and acceptable gestures. Gesture Recognition Design Toolkit (GRDT) is set of tools designed to simplify the gesture creation process for non experts. From...
Cell phones are now powerful enough to support and visualize maps, image and other complex information however screen is still small to support its portability. Exploring geographical information on small s screen is still a big challenge and one can’t conceptualize and get all information at once on small screen.Overview + detail technique is comm...
Security is a key issue to both computer and computer networks. Intrusion detection System (IDS) is one of the major research problems in network security. IDSs are developed to detect both known and unknown attacks. There are many techniques used in IDS for protecting computers and networks from network based and host based attacks. Various Machin...
In many real-life text mining applications such as clustering academic documents, citation matching and author name disambiguation (AND), similar publications are grouped together by exploiting similarity among them. Most of AND approaches, especially unsupervised ones, focus on either proposing new/alternate algorithms and/or using new/alternate s...
Cloud computing has grasped the attention of scientific community and business industry towards the provisioning of computing resources as a utility and software as a service over a network. Access to software or hardware resources are seamless to cloud consumers in a way that provider of the service could be anywhere in the world by providing serv...
Cloud computing has grasped the attention of scientific community and business industry towards the provisioning of computing resources as utility and software as a service over a network. Profitability and revenue maximization are the most important goals for any cloud service provider which can be employed through different pricing models. Histor...
Every educational institution around the globe maintain student result repository which contain information about student marks, grade in different subjects and examinations. This repository contains important hidden pattern/knowledge which can be uncovered through data mining. A decision tree classifier based on divide and conquer rules is widely...
Sorting network problem seems to be a very simple, yet very complex but still maintains an attractive field for the researchers. The focus of the study is to review relevant work towards migration of smallest value to the uppermost horizontal output, while the largest to the lowest output signal in an iterative manner. The network depth, total numb...
Security is a key issue to both computer and computer networks. Intrusion detection System (IDS) is one of the major research problems in network security. IDSs are developed to detect both known and unknown attacks. There are many techniques used in IDS for protecting computers and networks from network based and host based attacks.
VoIP users are concerned about quality of voice communication. Voice quality depends upon many factors like delay, packet loss. Such factors consequently bring in congestion. Congestion occurs when sender do not decrease sending rate or there is delay or packet loss. A smooth flow of traffic is needed for VoIP to maintain its quality. It is also im...
The advancements in the information and communication (ICT) technologies have made it possible to test and verify any sort of system before deploying it into the real time environment. The verification and validation (V&V) tools and techniques have also helped in minimizing the risk of the project failure or application. In the recent year, it has...
The advancement in the information and communication (ICT) technologies have
resulted in the improvement of number of time consuming tasks and activities.
These tasks have been automated with the help of advance information and
communication (ICT) technologies. The artificial intelligence and multi-agents
systems have made possible to automate...
In ancient times goods and services were exchanged through barter system1 Gold, valuable metals and other tangibles like stones and shells were also exploited as medium of exchange. Now Paper Currency (PC) is country-wide accepted common medium of trade. It has three major flaws. First, the holder of currency is always at risk due to theft and robb...
Bluetooth (BT) is presently the primary wireless technology for short range Personal Area Network (PAN). Piconet is the basic unit of networking in BT that contains one master and from one to seven active slave devices. Piconets can be interconnected to form a scatternet. Scatternet formation and routing are the important areas on which considerabl...
Recent literature has presented various watermarking techniques for copyright protection of digital assets. These watermarking techniques focus on algorithms along with proof of robustness against various malicious attacks but do not evaluate these techniques for effectiveness. Datasets, obtained after watermarking, from relational databases are av...
In this era of advanced technology, mobile commerce is going to become popular due to rapid development of technology but this technology needs a lot of struggle for maintaining secure communication and protection from threats. In this research, a mechanism for secure and authentic communication in mobile commerce based on joint signature scheme is...
This research focuses on providing integrity in mobile transactions. The main contribution for this paper is to develop mechanism which can provide integrity in mobile payment methods by using joint signature scheme, as it uses fewer resources. Different hash functions and time stamping is used for providing integrity of data. The result obtained b...
Finding frequent patterns play an important role in mining association rules, sequences, episodes, Web log mining and many
other interesting relationships among data. Frequent pattern mining methods often produce a huge number of frequent itemsets
that is not feasible for effective usage. The number of highly correlated patterns is usually very sma...
Security is an essential part of human life. In this era
security is a huge issue that is reliable and efficient if it is
unique by any mean. Voice recognition is one of the
security measures that are used to provide protection to
human’s computerized and electronic belongings by his
voice. In this paper voice sample is observed with MFCC
for extra...
This paper presents a Decision Support System for Outdoor Sports. Outdoor Sports are greatly affected by the weather condition so basically the support provided by the system proposed is the decision whether to carry out the game or not based on the weather and field conditions. The weather attributes taken into consideration are Outlook, Temperatu...
Working people employee the use of technology in such very effective natural ways that permit them to do what they want: they can communicate with anyone as per need, in the time and space that suits them the best. Easily accessible and user-friendly, collaboration tools allow them to explore, share, engage, and connect with people and content in m...
GPRS and Bluetooth Based Devices/Mobile Connectivity
Shifting From Manual To Automation For Performance
Optimization
Nazia Bibi
1
,
Tahira Mahboob
2
and
Malik Sikander Hayat Khiyal
3
1
Software Engineering, Fatima Jinnah Women University
Rawalpindi, Pakist
an
2
Software Engineering, Fatima Jinnah Women University
Rawalpindi, Pakistan
3
Software E...
in cryptography stream ciphers used to encrypt plain text data bits one by one. The security of stream ciphers depend upon randomness of key stream, good linear span and low probability of finding the initial states of pseudorandom generators. In this paper we propose a new stream cipher model use Feed back with carry shift registers (FCSRs) as bui...
stream ciphers encrypt the data bit by bit. In this research a new model of stream cipher SNOW 2.0 has been proposed i.e. Non linear modified SNOW 2.0 using one Linear Feedback Shift Register (LFSR) with the embedding of non linear function in the model. The analysis of Guess and Determined (GD) attack has been done to check its security with respe...
This research paper has presented a data hiding technique for binary document images. Entropy measure method is used to minimize the perceptual distortion due to embedding. The watermark extraction is a blind system because neither the original image nor the watermark is required for extraction. The document image is similar to any other image. The...
the main concern in systems development is the integration of technologies to increase customer satisfaction. Research presented in this paper focuses mainly in three things first to understand the speech or voice of user second is to control the home appliances through voice call and third is to finds intrusion in the house. The user can make a vo...
In this paper, we propose a model for alternating step shrinking generator (ASSG) by combining models of shrinking generator (SG) and alternating step generator(ASG) for improved security and analysis of correlation attack is performed. This research also compares for alternating step shrinking generator with shrinking generator and alternating ste...
Object extraction is very useful due to great momentum in computer technology and especially in the field of image processing. It is used in many object related image processing applications such as object recognition. Printed data becomes discolored with the passage of time and graphical data gets deteriorated. Recognition and then redrawing throu...
Seed filling is basic technique of image morphology. The goal of the seed filling operations is to find the seed point and fill the object contours starting from that seed point. In image processing area, the main and most important problem is region filling. This technique is used for image analysis. There are many algorithms for filling but the p...