
Sikandar AliChina University of Petroleum - Beijing | CUPB · Computer Science and Information Engineering
Sikandar Ali
PhD
Academic Editor at Mobile Information System and Scientific Programming
About
97
Publications
39,826
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
933
Citations
Citations since 2017
Introduction
A faculty member at the Department of Computer Science and Technology, College of Information Science and Engineering, China University of Petroleum-Beijing
Skills and Expertise
Additional affiliations
September 2016 - August 2019
Publications
Publications (97)
Mobile edge computing (MEC) uses multiple mobiles to compute several complex tasks that are unable to compute on a single device. Taking advantage of all abundant mobile resources and making a mobile cloud from them will be useful. This study aims to propose and implement a novel framework to cover challenges raised by application execution on reso...
Internet of Things (IoT) is considered the upcoming industrial and academic revolution in the technological world having billions of things and devices connected to the Internet. These connected devices are heterogeneous. They have different standards and technologies which communicate through different protocols. Therefore, the implementation of I...
The process of pneumonia detection has been the focus of researchers as it has proved itself to be one of the most dangerous and life-threatening disorders. In recent years, many machine learning and deep learning algorithms have been applied in an attempt to automate this process but none of them has been successful significantly to achieve the hi...
Containers have evolved to support microservice architecture as a low-cost alternative to virtual machines. Containers are increasingly prevalent in the virtualization landscape because of better working; containers can bear considerably less overhead than the conventional hypervisor-based component virtual machines. However, containers directly co...
To reduce costs and improve organizational efficiency, the adoption of innovative services such as Cloud services is the current trend in today’s highly competitive global business venture. The aim of the study is to guide the software development organization for Cloud-based testing adoption. Therefore, the objective is to develop a two-stage Inte...
Accident detection in autonomous vehicles could save lives by reducing the time it takes for information to reach emergency responder. One of the most common reason for the death of humans is accident. Indeed, it was determined throughout the survey that road accidents are indeed the second greatest cause of death in the United States for people ag...
Process-driven applications evolve rapidly through the interaction between executable BPMN (Business Process Modeling and Notation) models, business tasks, and external services. Given these components operate on some shared process data, it is imperative to recover the latent data by visiting relation, which is known as data flow among these tasks...
In industry, sensor-based monitoring of equipment or environment has become a necessity. Instead of using a single sensor, multi-sensor system is used to fully detect abnormalities in complex scenarios. Recently, physical models, signal processing technology, and various machine learning models have improved the performance. However, these methods...
Manual investigation is warranted in traditional approaches for estimating the bug severity level, which adds to the effort and time required. For bug severity report prediction, numerous automated strategies have been proposed in addition to manual ones. However, the current bug report predictors by facing several issues, such as overfitting and w...
Android is one of the leading operating systems for smartphones in terms of market share and usage. Unfortunately, it is also an appealing target for attackers to compromise its security through malicious applications. To tackle this issue, domain experts and researchers are trying different techniques to stop such attacks. All the attempts of secu...
Requirement's elicitation is the process of gathering requirements from users, customers, and stakeholders using traditional or collaborative elicitation techniques. Software requirement gathering is a challenging task particularly in a Global Software Development (GSD) paradigm due to geographical distance, limited face to face meetings, time zone...
Indoor air pollution is more dangerous for residents. So, it is necessary to monitor the quality of indoor air and take some preventive steps to reduce the possible dangers to the health of the inhabitants. The cost and maintenance factors of air quality (AQI) systems lead the researchers to model, design, and implement low-cost indoor AQI monitori...
Information and technology have witnessed significant improvement with the introduction of Internet of things (IoT) applications, and most of the IoT applications are dependent on the cloud. Cloud computing is assisting IoT applications by providing storage, analysis, and processing services on the cloud. However, Fog computing is the new paradigm...
Diabetes mellitus is a hyperglycemia-like chronic condition that is a troublesome disease. It is estimated that, according to the growing morbidity, by 2040, the world will cross 642 million diabetic patients. This means that each one of the ten adults will be diabetes-affected. Diabetes can also lead to other illnesses such as heart attacks, kidne...
FEM solver is designed for shared memory architectures using an object-oriented paradigm. The FEM solver is divided into five major sections; these are a collection of mesh data, creating an object for each finite element, application of boundary conditions, assembly of a linear system of equations, and lastly a solver to calculate the solution for...
Nowadays, millions of telecommunication devices, IoT sensors, and web services, especially social media sites, are producing big data every second. Such applications with massive data-generating capabilities need to access these data quickly. Among other approaches, cloud computing provides content delivery networks, which utilize data replication...
A great diversity comes in the field of medical sciences because of computing capabilities and improvements in techniques, especially in the identification of human heart diseases. Nowadays, it is one of the world’s most dangerous human heart diseases and has very serious effects the human life. Accurate and timely identification of human heart dis...
Data have multiplied at an exponential rate in the age of the Internet. Large amounts of data can be combined at this science hotspot. Making sense of big data has become increasingly difficult due to its volume, velocity, precision, and variety (sometimes referred to as heterogeneity). Many data sources are employed to create data heterogeneity. B...
Software Outsourcing Partnership (SOP) is a client-vendor relationship focused solely on mutual trust and dedication that achieves mutually beneficial objectives. Often, a well-established outsourcing relationship may be converted into outsourcing partnerships. The development of SOP depends on various success factors. The research method attempts...
There are a large number of real-time streaming data task processing workflows in online anomaly detection and intelligent transportation systems. Real-time data transmission is required between these processing tasks. To ensure real-time performance, it is inevitable for real-time workflow scheduling. However, due to the connected sensor data bein...
Indoor navigation has remained an active research area for the last decade. Unlike outdoor environments, indoor environments have additional challenges, such as weak signals, low light, and complex scenarios. Different technologies are used for indoor navigation, including WiFi, Bluetooth, inertial sensors, and computer cameras. Vision-based method...
Due to recent advances in computer technology and the accessibility of large datasets, deep learning has become at the forefront of artificial intelligence and on various tasks, especially those related to image classification and modelling, its performance is often equal to or even better than human appreciation. Ophthalmology has always been in a...
It is quite natural that the crops may be affected from a number of diseases due to many factors namely, change in climate, variations in environmental changings, deficiency of urea etc. Among these factors, the deficiency of the natural nutrients is one of the common reasons that may effect on the overall production of a certain crop. The grape le...
A personalized recommender system is broadly accepted as a helpful tool to handle the information overload issue while recommending a related piece of information. This work proposes a hybrid personalized recommender system based on affinity propagation (AP), namely, APHPRS. Affinity propagation is a semisupervised machine learning algorithm used t...
An incident, in the perception of information technology, is an event that is not part of a normal process and disrupts operational procedure. This research work particularly focuses on software failure incidents. In any operational environment, software failure can put the quality and performance of services at risk. Many efforts are made to overc...
With the latest technology, smartphone's profound impact may be valuable for the users in different age groups, but the elders always face difficulties while adopting the technology. The usability of a smartphone application is essential when the target audience is elderly users, as the designer did not satisfy the specific requirements. The import...
Euler path is one of the most interesting and widely discussed topics in graph theory. An Euler path (or Euler trail) is a path that visits every edge of a graph exactly once. Similarly, an Euler circuit (or Euler cycle) is an Euler trail that starts and ends on the same node of a graph. A graph having Euler path is called Euler graph. While tracin...
The rapid development of mobile communication technology has promoted the emergence of mobile edge computing (MEC), which allows mobile users to transfer their computing tasks to nearby edge servers to reduce access latency. In the actual MEC environment, the signal coverage areas of edge servers usually overlap partially, and users in the overlapp...
The usage of local languages is being common in social media and news channels. The people share the worthy insights about various topics related to their lives in different languages. A bulk of text in various local languages exists on the Internet that contains invaluable information. The analysis of such type of stuff (local language’s text) wil...
Video summarization is applied to reduce redundancy and develop a concise representation of key frames in the video, more recently, video summaries have been used through visual attention modeling. In these schemes, the frames that stand out visually are extracted as key frames based on human attention modeling theories. The schemes for modeling vi...
Lane level traffic data such as average waiting time and flow data at each turn direction not only enable navigation systems to provide users with more detailed and finer-grained information; it can also pave the way for future traffic congestion prediction. Although few studies considered extracting traffic flow data from a video at the lane level...
Agile methodology has been noted as the mostly used method for software development over the past few years. This methodology guarantees the rapid delivery of software products with lower cost and greater customer contentment. The adoption of agile methods was initially applied in the software development industry for single, small project teams fo...
With the fast development of Sensor Network, Internet of Things, mobile devices, and pervasive computing, enormous amounts of sensor devices are deployed in physical world. Data streams produced by these sensor devices, deployed broadly, can be used to create various value-added applications. Facing continuous, real-time, high-frequency, low-valued...
In applied software engineering, the algorithms for selecting the appropriate test cases are used to perform regression testing. The key objective of this activity is to make sure that modification in the system under test (SUT) has no impact on the overall functioning of the updated software. It is concluded from the literature that the efficacy o...
In this paper, we make use of the 2-dimensional data obtained through t-Stochastic Neighborhood Embedding (t-SNE) when applied on high-dimensional data of Urdu handwritten characters and numerals. The instances of the dataset used for experimental work are classified in multiple classes depending on the shape similarity. We performed three tasks in...
According to the Pakistan Bureau of Statistics, Pakistan is amongst the top ten onion-producing countries in the world. Though in Pakistan, most of the districts of Khyber Pakhtunkhwa produce onions, Malakand division lonely contributes 60% of the total onion production of the country. In onion farming, bolting is an insidious phenomenon that occur...
Biosensor is a means to transmit some physical phenomena, like body temperature, pulse, respiratory rate, electroencephalogram (EEG), electrocardiogram (ECG), and blood pressure. Such transmission is performed via Wireless Medical Sensor Network (WMSN) while diagnosing patients remotely through Internet-of-Medical-Things (IoMT). The sensitive data...
A challenged network is one where traditional hypotheses such as reduced data transfer error rates, end-to-end connectivity, or short transmissions have not gained much significance. A wide range of application scenarios are associated with such networks. Delay tolerant networking (DTN) is an approach that pursues to report the problems which reduc...
Usage of agile methods for software development has increased in recent times. Rapid delivery of software products is ensured by these methods with less expense and high user gratification. Application of these methods on a large scale causes many De-Motivators or challenges as initially these methods were aimed at those developmental teams that wo...
Microscopic examination of peripheral blood smears and bone marrow is the preliminary step for the diagnosis of several life-threatening diseases. Acute lymphocytic leukemia (ALL) is the most common disease in children that also needs an early diagnosis for on-time treatment as it spreads rapidly in the blood and forms immature lymphocytes. This mi...
Cloud-based ERP solutions offer many benefits to small and medium enterprises (SMEs) and help them to integrate their activities, such as improve communications and reduce operational and maintenance costs. Primarily, it was only adopted by large organizations, but now SMEs are also keen on adoption. However, the motivation regarding the adoption o...
Information service is always a hot topic especially when the Web is accessible anywhere. In university, lecture information is very important for students and teachers who want to take part in academic meetings. Therefore, lecture news extraction is an important and imperative task. Many open information extraction methods have been proposed, but...
Nowadays, an Internet of Things (IoT) device consists of algorithms, datasets, and models. Due to good performance of deep learning methods, many devices integrated well-trained models in them. IoT empowers users to communicate and control physical devices to achieve vital information. However, these models are vulnerable to adversarial attacks, wh...
Cloud computing has emerged as an attractive platform for individuals and businesses to augment their basic processing capabilities. Mobile devices with access to Internet are also turning towards clouds for resource-intensive tasks by working out a trade-off between resources required for performing computation on-device against those required for...
Digital divide means unequal access to the people for information and communication technology (ICT) facilities. The developed countries are comparatively less digitally divided as compared to developing countries. This study focuses on District Chitral considering its geographical conditions and high mountainous topography which plays a significan...
Anomaly detection algorithms (ADA) have been widely used as services in many maintenance monitoring platforms. However, there are numerous algorithms that could be applied to these fast changing stream data. Furthermore, in IoT stream data due to its dynamic nature, the phenomena of conception drift happened. Therefore, it is a challenging task to...
Healthcare system facilitates the treatment of patients with the support of wearable, smart, and handheld devices, as well as many other devices. These devices are producing a huge bulk of data that need to be moulded for extracting meaningful insights from them for the useful use of researchers and practitioners. Various approaches, methods, and t...
Mobile edge computing is beneficial to reduce service response time by pushing cloud functionalities to the network edge. However, it is necessary to consider whether to conduct service migration to ensure the quality of service as users migrate to new locations. It is challenging to make migration decisions optimally due to the mobility of the use...
Mobile edge computing (MEC) is an emerging paradigm to meet the increasing real-time performance demands for Internet of Things and mobile applications. By offloading the computationally intensive workloads to edge servers, the quality of service (QoS) could be greatly improved. However, with the growing popularity of MEC, the MEC systems grow extr...
Edge computing moves part of the computing tasks to the edge of the network to improve service capabilities while reducing latency. It has been successfully applied in Internet of Things (IoT) and mobile computing systems. With the increasing popularity of edge computing, the ability of an edge computing system continuously providing services to us...