
Muhammad IlyasUniversity of Sargodha | UOS · Department of Computer Science and IT
Muhammad Ilyas
PhD in Informatics
About
54
Publications
58,215
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
176
Citations
Citations since 2017
Publications
Publications (54)
Graph colouring problem (GCP) is an NP‐complete optimization problem. It is famous for its applications in scheduling, register allocation, and map colouring. In recent years, biological inspired and especially Swarm intelligence (SI) techniques have gained popularity for solving complex optimization problems. In this article, we have proposed blin...
The trend toward global software development (GSD) has grown tremendously in recent years because of the rapid acceleration in information and communication technologies (ICTs). The reason for the changing trend toward GSD is to develop high‐quality software with minimum cost and time with round the clock. Despite the benefits gained from GSD, ther...
Wikipedia information is extracted by DBpedia and linked to other web resources as Linked Open Data, which is an important contribution to the field of semantics. As part of its internationalisation endeavour, DBpedia now has 20 language chapters that have been mapped to it; nonetheless, there have been very few attempts from Urdu. This article out...
Real-time strategy (RTS) games differ as they persist in varying scenarios and states. These games enable an integrated correspondence of non-player characters (NPCs) to appear as an autodidact in a dynamic environment, thereby resulting in a combined attack of NPCs on human-controlled character (HCC) with maximal damage. This research aims to empo...
Convolutional Neural Network (CNN) is a deep learning approach to solve complex problems, and it has been widely used in image processing for image classification, object identification, semantic segmentation etc. It has overcome the constraint of traditional machine learning approaches. There has been a lot of effort done to improve the accuracy o...
Randomization is a technique used in algorithms as a strategy that uses a random source as part of its logic. It is used in traditional algorithms to reduce time or space complexity. Many efforts have been made to increase the precision of convolutional neural networks (CNN) in various application domains, but less has been done to minimize the com...
Object-oriented (OO) software systems present specific challenges to the testing teams. As the object-oriented software contains the OO methodology and its different components, it is hard for the testing teams to test the software with arbitrary software components and the chance of errors could be increased. So different techniques, models, and m...
A lot of different methods are being opted for improving the educational standards through monitoring of the classrooms. The developed world uses Smart classrooms to enhance faculty efficiency based on accumulated learning outcomes and interests. Smart classroom boards, audio-visual aids, and multimedia are directly related to the Smart classroom e...
A lot of different methods are being opted for improving the educational standards through monitoring of the classrooms. The developed world uses Smart classrooms to enhance faculty efficiency based on accumulated learning outcomes and interests. Smart classroom boards, audiovisual aids, and multimedia are directly related to the Smart classroom en...
Artificial intelligence systems are becoming ubiquitous in everyday life as well as in high-risk environments, such as autonomous driving, medical treatment, and medicine. The opaque nature of the deep neural network raises concerns about its adoption in high-risk environments. It is important for researchers to explain how these models reach their...
Artificial intelligence systems are becoming ubiquitous in everyday life as well as in high-risk environments, such as autonomous driving, medical treatment, and medicine. The opaque nature of the deep neural network raises concerns about its adoption in high-risk environments. It is important for researchers to explain how these models reach their...
The use of the internet has increased significantly over the past couple of years. Access to the internet has become so common that a person without computer knowledge can also use this facility easily. This ease of availability has provided a lot of benefits to society but on the other hand misuse of the internet for personal or corporate benefits...
Citrus family consists of a variety of eatable, consumable and usable items with
varying nutritional contents. Naked eye citrus classification needs expert human
effort, which provides poor decision reliability. The unreliable classification decision
may be extremely hazardous when the citrus is being classified for exports or usage
in pharmacy pro...
The information security domain focuses on security needs at all levels in a computing environment in either the Internet of Things, Cloud Computing, Cloud of Things, or any other implementation. Data, devices, services, or applications and communication are required to be protected and provided by information security shields at all levels and in...
Password is basically a word, or a string of characters used to gain admittance, or to login to a system or a network. Passwords are usually tending to be alphanumeric or based on some graphics, often have considerable drawbacks. Guessing attacks or shoulder surfing is a well-known threat in which an authentication session is observed or record to...
Nowadays, plagiarism became very common in many fields of life, such as research and educational fields. Due to the advancement in plagiarism techniques adopted by plagiarists, it is challenging to detect plagiarism accurately by the existing techniques. Different features are observed while checking plagiarism, such as syntactic, lexical, semantic...
Code transformation is the best option while switching from farmer to next technology. Our paper presents a comparative analysis of code transformation tools based on 18 different factors. These factors are Classes, pointers, Access Specifiers, Functions and Exceptions, etc. For this purpose, we have selected varyCode, Telerik, Multi-online convert...
An increase has been seen in the crime rate in the last two decades, consequently, automatic video surveillance systems have gained significant importance. Automatic baggage detection through surveillance cameras can help to achieve the potential objective of security and monitoring in public places. For such keen observations, this research propos...
Building new software by using existing software that has been developed by using reusability principles is known as software reuse. It results in reduction of effort and time to develop software. It also increases reliability, portability, maintainability and productivity of software product. But the problem is a lack to symmetric way to store reu...
Social networking has elevated the human life to
the heights of interaction, response and content sharing. It has
been offering state of the art facilities to its users for a long time.
Though, over the period of time, the systems have become quite
matured yet alongside the benefits, multiple concerns of the user
with regard to the privacy and info...
With rapidly increasing information and data available online, end users are not satisfied with search results of even renowned search engines. Most of the time search engines results in irrelevant pages to the users. Semantic search aims to improve search results by retrieving data on the basis of keywords and its synonyms as well. It focuses on i...
Augmented Reality (AR) is a discipline having less cognizance but it is the door to new advance technologies. Accustomed games doesn’t facilitate user to physically interact with the surroundings which resulted into reduced learning capabilities. Our objective is to develop AR based first person shooter game (FPS) empowering Reinforcement Learning...
Inheritance is a key feature of object oriented paradigm. It is actually the sharing of attributes and operations among classes based on a hierarchical relationship. Software reusability is the basic concept of software engineering that is affected by the sophistication of inheritance hierarchy so in order to determine complexity of inheritance whi...
Cloud computing is now among the most extensively used mean for resource sharing as SaaS, PaaS, and IaaS. Computing Scenarios have been emerged into cloud computing instead of distributed computing. It has provided an efficient and flexible way for dynamic services meeting needs and challenges of the time in cost effective manners. Virtual environm...
For the last few years, Global Software Development (GSD) has been gaining the attention of experts and researchers. Because of distance, communication, and cultural issues, GSD is creating hurdles for performing effective project management. In this regard, GSD provides a large number of tools and technologies to facilitate and simplify the work f...
Distributed computing environments merged into cloud computing architecture which is being used extensively for resource sharing. It has provided efficient and flexible ways for the provision of services meeting resource sharing needs and challenges of the time. Cloud computing has become a cost effective solution as compared to traditional systems...
Source code is an intellectual property and using it without author's permission is a violation of property right. Source code authorship attribution is vital for dealing with software theft, copyright issues and piracies. Characterizing author's signature for identifying their footprints is the core task of authorship attribution. Different aspect...
There are several tools available for code clones detection and
removal. Over the last few years much research has been
done on assessment of these tools. Every tool has its
efficiencies and deficiencies which researchers tried to
evaluate. But the imperative point that we observed while
analyzing these assessments is that there is no benchmark
def...
Requirements validation makes sure that the requirements
written in software requirements specification (SRS) must be
complete and consistent and are according to the customer’s
needs. It ensures the validity of user requirements by
eliminating ambiguities and inconsistencies from SRS.
Several techniques for requirements validation have been
discus...
User interfaces are the most important part of interactive software applications; being the entities which serve as a communication bridge between users and applications. Furthermore the user experience provided by any software application is the only factor to measure its success. Therefore an application can only be successful if besides having a...
Recently, usage of text similarity has increased rapidly to be involved in different areas such as document clustering, information retrieval, short answer grading, text summarization, machine learning and natural language processing. Lexical-based similarity and semantic-based similarity are the two main categories of text similarity. Reusability...
Software reuse is the process of implementing
or updating software systems using existing software
components. A good software reuse process facilitates
the increase of productivity, quality and reliability. It
decreases the cost and implementation time as compared
to develop new system. Despite its many benefits we
cannot achieve its full be...
Reusability of software is found to be a key feature of quality. The most obvious outcomes of software reuse are overcoming the software crisis, advancing in software quality and improving productivity. The issue of spotting reusable software components from given existing system is very important but yet it is not much cultivated. For identificati...
Refactoring is a technique to make a computer program more readable and maintainable. A bad smell is an indication of some setback in the code, which requires refactoring to deal with. Many tools are available for detection and removal of these code smells. These tools vary greatly in detection methodologies and acquire different competencies. In t...
Primary reason for IT project failures remains ineffective requirements specification. The "code-only" mindset is greatly to be blamed. Requirement Management has its own dimensions even though its primary existence remains intertwined within the Software lifecycle. As it is a novel management discipline it faces and suffers from issues and challen...
Design patterns are problem-solution pairs that provide proven solutions for commonly occurring design problems. They are used to increase maintainability, reusability, comprehensibility and code quality. However, some studies have indicated relationship between design patterns and defects that doubts the claimed benefits of design patterns. In thi...
Requirements Engineering (RE) becomes one of an important aspect in Software Development Life Cycle (SDLC). To improve the overall process of requirements engineering, different techniques, models and practices are available. Semantic based requirements analysis and verification is one of the techniques to improve the overall quality of software. A...
Multi-site software engineering is one of the most extensively used mean of sharing and communicating information of “software projects” to remotely located stake holders. It involves different domains and large number of users. This requires different security measures, to interact and protect relevant data sources. That is why, the issue of secur...
The study of similarity measurement has long been a fundamental part of natural language processing. Similarity measurement usage is increasing day by day in Information Extraction. Moreover, determining similarity measurement between two or more sets of information is facing problem in web mining. Traditional information retrieval approaches may n...
High quality software products and services play an important role in organization's success, but high quality does not mean that its goes beyond buyers purchasing power. High quality with effective cost is a great combination for all organizations. With a complete understanding of the costs related to quality, this goal can be achieved. Due to exc...
The study of semantic similarity has long been an essential part of natural language processing. In informational retrieval, usage of similarity measurement is getting popularity day by day, but usage of similarity measurements in requirements engineering is not very common. Previously, we have presented SimReq, a Similarity Measurement Framework f...
Researches show that a reasonable number of projects failed to achieve their desired goals. There could be many different reasons like managing requirements, excessive documentation of code, difficulty to deliver the software with all required functions on time etc. Through proper management of requirements and concept of reusability, an effort cou...
Projects
Projects (5)
Comparison of Local Lora, national lora, international lora Size and Shapes from Porn Movies