Muhammad Ilyas

Muhammad Ilyas
University of Sargodha | UOS · Department of Computer Science and IT

PhD in Informatics

About

54
Publications
58,215
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
176
Citations
Citations since 2017
32 Research Items
150 Citations
2017201820192020202120222023051015202530
2017201820192020202120222023051015202530
2017201820192020202120222023051015202530
2017201820192020202120222023051015202530

Publications

Publications (54)
Article
Full-text available
Graph colouring problem (GCP) is an NP‐complete optimization problem. It is famous for its applications in scheduling, register allocation, and map colouring. In recent years, biological inspired and especially Swarm intelligence (SI) techniques have gained popularity for solving complex optimization problems. In this article, we have proposed blin...
Article
The trend toward global software development (GSD) has grown tremendously in recent years because of the rapid acceleration in information and communication technologies (ICTs). The reason for the changing trend toward GSD is to develop high‐quality software with minimum cost and time with round the clock. Despite the benefits gained from GSD, ther...
Article
Full-text available
Wikipedia information is extracted by DBpedia and linked to other web resources as Linked Open Data, which is an important contribution to the field of semantics. As part of its internationalisation endeavour, DBpedia now has 20 language chapters that have been mapped to it; nonetheless, there have been very few attempts from Urdu. This article out...
Article
Full-text available
Real-time strategy (RTS) games differ as they persist in varying scenarios and states. These games enable an integrated correspondence of non-player characters (NPCs) to appear as an autodidact in a dynamic environment, thereby resulting in a combined attack of NPCs on human-controlled character (HCC) with maximal damage. This research aims to empo...
Preprint
Convolutional Neural Network (CNN) is a deep learning approach to solve complex problems, and it has been widely used in image processing for image classification, object identification, semantic segmentation etc. It has overcome the constraint of traditional machine learning approaches. There has been a lot of effort done to improve the accuracy o...
Preprint
Full-text available
Randomization is a technique used in algorithms as a strategy that uses a random source as part of its logic. It is used in traditional algorithms to reduce time or space complexity. Many efforts have been made to increase the precision of convolutional neural networks (CNN) in various application domains, but less has been done to minimize the com...
Chapter
Object-oriented (OO) software systems present specific challenges to the testing teams. As the object-oriented software contains the OO methodology and its different components, it is hard for the testing teams to test the software with arbitrary software components and the chance of errors could be increased. So different techniques, models, and m...
Article
Full-text available
A lot of different methods are being opted for improving the educational standards through monitoring of the classrooms. The developed world uses Smart classrooms to enhance faculty efficiency based on accumulated learning outcomes and interests. Smart classroom boards, audio-visual aids, and multimedia are directly related to the Smart classroom e...
Article
A lot of different methods are being opted for improving the educational standards through monitoring of the classrooms. The developed world uses Smart classrooms to enhance faculty efficiency based on accumulated learning outcomes and interests. Smart classroom boards, audiovisual aids, and multimedia are directly related to the Smart classroom en...
Article
Full-text available
Artificial intelligence systems are becoming ubiquitous in everyday life as well as in high-risk environments, such as autonomous driving, medical treatment, and medicine. The opaque nature of the deep neural network raises concerns about its adoption in high-risk environments. It is important for researchers to explain how these models reach their...
Article
Artificial intelligence systems are becoming ubiquitous in everyday life as well as in high-risk environments, such as autonomous driving, medical treatment, and medicine. The opaque nature of the deep neural network raises concerns about its adoption in high-risk environments. It is important for researchers to explain how these models reach their...
Article
Full-text available
The use of the internet has increased significantly over the past couple of years. Access to the internet has become so common that a person without computer knowledge can also use this facility easily. This ease of availability has provided a lot of benefits to society but on the other hand misuse of the internet for personal or corporate benefits...
Article
Citrus family consists of a variety of eatable, consumable and usable items with varying nutritional contents. Naked eye citrus classification needs expert human effort, which provides poor decision reliability. The unreliable classification decision may be extremely hazardous when the citrus is being classified for exports or usage in pharmacy pro...
Article
Full-text available
The information security domain focuses on security needs at all levels in a computing environment in either the Internet of Things, Cloud Computing, Cloud of Things, or any other implementation. Data, devices, services, or applications and communication are required to be protected and provided by information security shields at all levels and in...
Article
Full-text available
Password is basically a word, or a string of characters used to gain admittance, or to login to a system or a network. Passwords are usually tending to be alphanumeric or based on some graphics, often have considerable drawbacks. Guessing attacks or shoulder surfing is a well-known threat in which an authentication session is observed or record to...
Article
Nowadays, plagiarism became very common in many fields of life, such as research and educational fields. Due to the advancement in plagiarism techniques adopted by plagiarists, it is challenging to detect plagiarism accurately by the existing techniques. Different features are observed while checking plagiarism, such as syntactic, lexical, semantic...
Article
Code transformation is the best option while switching from farmer to next technology. Our paper presents a comparative analysis of code transformation tools based on 18 different factors. These factors are Classes, pointers, Access Specifiers, Functions and Exceptions, etc. For this purpose, we have selected varyCode, Telerik, Multi-online convert...
Article
An increase has been seen in the crime rate in the last two decades, consequently, automatic video surveillance systems have gained significant importance. Automatic baggage detection through surveillance cameras can help to achieve the potential objective of security and monitoring in public places. For such keen observations, this research propos...
Article
Full-text available
Building new software by using existing software that has been developed by using reusability principles is known as software reuse. It results in reduction of effort and time to develop software. It also increases reliability, portability, maintainability and productivity of software product. But the problem is a lack to symmetric way to store reu...
Article
Full-text available
Social networking has elevated the human life to the heights of interaction, response and content sharing. It has been offering state of the art facilities to its users for a long time. Though, over the period of time, the systems have become quite matured yet alongside the benefits, multiple concerns of the user with regard to the privacy and info...
Article
Full-text available
With rapidly increasing information and data available online, end users are not satisfied with search results of even renowned search engines. Most of the time search engines results in irrelevant pages to the users. Semantic search aims to improve search results by retrieving data on the basis of keywords and its synonyms as well. It focuses on i...
Article
Full-text available
Augmented Reality (AR) is a discipline having less cognizance but it is the door to new advance technologies. Accustomed games doesn’t facilitate user to physically interact with the surroundings which resulted into reduced learning capabilities. Our objective is to develop AR based first person shooter game (FPS) empowering Reinforcement Learning...
Conference Paper
Full-text available
Inheritance is a key feature of object oriented paradigm. It is actually the sharing of attributes and operations among classes based on a hierarchical relationship. Software reusability is the basic concept of software engineering that is affected by the sophistication of inheritance hierarchy so in order to determine complexity of inheritance whi...
Conference Paper
Full-text available
Cloud computing is now among the most extensively used mean for resource sharing as SaaS, PaaS, and IaaS. Computing Scenarios have been emerged into cloud computing instead of distributed computing. It has provided an efficient and flexible way for dynamic services meeting needs and challenges of the time in cost effective manners. Virtual environm...
Article
Full-text available
For the last few years, Global Software Development (GSD) has been gaining the attention of experts and researchers. Because of distance, communication, and cultural issues, GSD is creating hurdles for performing effective project management. In this regard, GSD provides a large number of tools and technologies to facilitate and simplify the work f...
Conference Paper
Full-text available
Distributed computing environments merged into cloud computing architecture which is being used extensively for resource sharing. It has provided efficient and flexible ways for the provision of services meeting resource sharing needs and challenges of the time. Cloud computing has become a cost effective solution as compared to traditional systems...
Article
Full-text available
Source code is an intellectual property and using it without author's permission is a violation of property right. Source code authorship attribution is vital for dealing with software theft, copyright issues and piracies. Characterizing author's signature for identifying their footprints is the core task of authorship attribution. Different aspect...
Article
Full-text available
There are several tools available for code clones detection and removal. Over the last few years much research has been done on assessment of these tools. Every tool has its efficiencies and deficiencies which researchers tried to evaluate. But the imperative point that we observed while analyzing these assessments is that there is no benchmark def...
Article
Full-text available
Requirements validation makes sure that the requirements written in software requirements specification (SRS) must be complete and consistent and are according to the customer’s needs. It ensures the validity of user requirements by eliminating ambiguities and inconsistencies from SRS. Several techniques for requirements validation have been discus...
Article
Full-text available
User interfaces are the most important part of interactive software applications; being the entities which serve as a communication bridge between users and applications. Furthermore the user experience provided by any software application is the only factor to measure its success. Therefore an application can only be successful if besides having a...
Conference Paper
Full-text available
Recently, usage of text similarity has increased rapidly to be involved in different areas such as document clustering, information retrieval, short answer grading, text summarization, machine learning and natural language processing. Lexical-based similarity and semantic-based similarity are the two main categories of text similarity. Reusability...
Article
Full-text available
Software reuse is the process of implementing or updating software systems using existing software components. A good software reuse process facilitates the increase of productivity, quality and reliability. It decreases the cost and implementation time as compared to develop new system. Despite its many benefits we cannot achieve its full be...
Conference Paper
Full-text available
Reusability of software is found to be a key feature of quality. The most obvious outcomes of software reuse are overcoming the software crisis, advancing in software quality and improving productivity. The issue of spotting reusable software components from given existing system is very important but yet it is not much cultivated. For identificati...
Article
Full-text available
Refactoring is a technique to make a computer program more readable and maintainable. A bad smell is an indication of some setback in the code, which requires refactoring to deal with. Many tools are available for detection and removal of these code smells. These tools vary greatly in detection methodologies and acquire different competencies. In t...
Article
Full-text available
Primary reason for IT project failures remains ineffective requirements specification. The "code-only" mindset is greatly to be blamed. Requirement Management has its own dimensions even though its primary existence remains intertwined within the Software lifecycle. As it is a novel management discipline it faces and suffers from issues and challen...
Article
Full-text available
Design patterns are problem-solution pairs that provide proven solutions for commonly occurring design problems. They are used to increase maintainability, reusability, comprehensibility and code quality. However, some studies have indicated relationship between design patterns and defects that doubts the claimed benefits of design patterns. In thi...
Article
Full-text available
Requirements Engineering (RE) becomes one of an important aspect in Software Development Life Cycle (SDLC). To improve the overall process of requirements engineering, different techniques, models and practices are available. Semantic based requirements analysis and verification is one of the techniques to improve the overall quality of software. A...
Conference Paper
Multi-site software engineering is one of the most extensively used mean of sharing and communicating information of “software projects” to remotely located stake holders. It involves different domains and large number of users. This requires different security measures, to interact and protect relevant data sources. That is why, the issue of secur...
Conference Paper
The study of similarity measurement has long been a fundamental part of natural language processing. Similarity measurement usage is increasing day by day in Information Extraction. Moreover, determining similarity measurement between two or more sets of information is facing problem in web mining. Traditional information retrieval approaches may n...
Conference Paper
High quality software products and services play an important role in organization's success, but high quality does not mean that its goes beyond buyers purchasing power. High quality with effective cost is a great combination for all organizations. With a complete understanding of the costs related to quality, this goal can be achieved. Due to exc...
Conference Paper
Full-text available
The study of semantic similarity has long been an essential part of natural language processing. In informational retrieval, usage of similarity measurement is getting popularity day by day, but usage of similarity measurements in requirements engineering is not very common. Previously, we have presented SimReq, a Similarity Measurement Framework f...
Conference Paper
Full-text available
Researches show that a reasonable number of projects failed to achieve their desired goals. There could be many different reasons like managing requirements, excessive documentation of code, difficulty to deliver the software with all required functions on time etc. Through proper management of requirements and concept of reusability, an effort cou...

Network

Cited By

Projects

Projects (5)
Project
Comparison of Local Lora, national lora, international lora Size and Shapes from Porn Movies
Archived project