The notion of cooperation in wireless communication has got significant attention from both acade... more The notion of cooperation in wireless communication has got significant attention from both academia and industrial persons towards to address the performance drawbacks of wireless sensor network due to reason of user’s high mobility and lack of resources of network. The future wireless systems should be highly heterogeneous and interconnected because motivating cooperative relaying has to apply on the future mobile network for efficient results and future demand. As currently the mobile computing is facing latency and battery drainage issues which need to address and solve hence in this work we are proposed mobile-centric and opportunistic communication architecture. In this work mobile devices which are in the range of Wi-Fi of each other can create cluster with each other and can create an ad-hoc cooperative cloud using Relay Spot[1-4]. The Collaboration between these devices can enable them to resourcefully use the augmentation without any infrastructure.
Asia Pacific Journal of Multidisciplinary Research, 2017
Agile has invented to improve and overcome Draw backs of software development. Now agile model is... more Agile has invented to improve and overcome Draw backs of software development. Now agile model is using in software development very vastly. It is facilitating the developer and client both very resourcefully. It is getting popularity than the other Software Development Life Cycle models because of its characteristics and most owing to allow change request at any level of the project. The client in the software development is the main part and asset of the company. The software house always focuses on its client because client is an asset. Thus developer has major concern with the client's requirement and change request. Agile is getting popularity because of allow change request at any stage of project, on the other hand it is also a drawback in agile model because when project starts the project's completion time and cost is decided. But due to frequent change of requests come from client the cost and completion time both increase eventually which is not good for software house's business and reputation. So there is need a cost and time estimation technique to solve change request issue in agile model.
Malicious activities in cyberspace have gone further than simply hacking machines and spreading v... more Malicious activities in cyberspace have gone further than simply hacking machines and spreading viruses. It has become a challenge for a nations’ survival and hence has evolved to cyber warfare. Malware is a key component of cyber-crime, and its analysis is the first line of defence against attack. This work proposes a novel deep boosted hybrid learning-based malware classification framework and named as Deep boosted Feature Space-based Malware classification (DFS-MC). In the proposed framework, the discrimination power is enhanced by fusing the feature spaces of the best performing customized CNN architectures models and its discrimination by an SVM for classification. The discrimination capacity of the proposed classification framework is assessed by comparing it against the standard customized CNNs. The customized CNN models are implemented in two ways: softmax classifier and deep hybrid learning-based malware classification. In the hybrid learning, Deep features are extracted fr...
Wireless Body Area Network (WBAN) refers to short-range, wireless communications near or inside a... more Wireless Body Area Network (WBAN) refers to short-range, wireless communications near or inside a human body. WBAN is emerging solution to cater the needs of local and remote health care related facility. Medical and non-medical applications have been revolutionarily under consideration for providing a healthy and gratify service to the humanity. Being very critical in communication from body it faces a lot of challenges which are to be tackled for the safety of life and benefit of the user. There is variety of challenges faced by WBANs. WBAN is favorite playground for attackers due to its usability in various applications. This article provides systematic overview of main challenges in WBANs in security perspectives.
Throughout the history of the Internet, several technologies and networking architectures have em... more Throughout the history of the Internet, several technologies and networking architectures have emerged, some of which have been widely deployed, and others have only made its reach to niche markets. Some generic cases that can be cited are multicast, IPv6, java, or ...
Healthcare systems defines the standards for health facilities to communities. Therefore, it is o... more Healthcare systems defines the standards for health facilities to communities. Therefore, it is of equal importance to everyone. In addition, it included in every fields of technology such as Internet of Things (IoT), Body Area Networks (BANs), Big Data, Context Aware Computing as well as Machine Learning. Therefore, researchers have opportunity to contribute towards well-being smart society easily. E-health on other hand is trying to provide remote access and availability of Wireless BANs (WBANs) facilities. Since, the tiny economical sensors are attached to body (either by implant or wearable fashion) to monitor the health parameters and act accordingly. Therefore, WBAN standards need special attention for optimization. In our previous work, we have proposed relaying protocol, while in this work we aim to extend the relaying protocol to WBANs in order to achieve better performance and safeguard the Master Node (MN). In order to make ubiquity, we propose to extend this work to smal...
The well-known solid-state reaction method is used for the synthesis of Tb doped LuGd2Ga2Al3O12 p... more The well-known solid-state reaction method is used for the synthesis of Tb doped LuGd2Ga2Al3O12 phosphor. XRD and SEM techniques are used for the phase and structural morphology of the synthesized phosphor. UV, X-ray and proton induced spectroscopy is used to study the luminescence properties. LuGd2Ga2Al3O12:Tb3+ phosphor shows its highest peak in green and blue region. The two major emission peaks correspond to 5D3→7FJ (at 480 to 510 nm, blue region) and 5D4→7FJ (at 535 to 565 nm, green region). Green emission is dominant; therefore, it may be used as an efficient green phosphor. The absorption spectra of the synthesized material matches well with the spectra of light emitting diodes (LEDs); therefore, it may have applications in LEDs. X-ray spectroscopic study suggests that this phosphor may have uses in medical applications, such as X-ray imaging. The synthesized phosphor exhibits 81% efficacy in comparison to the commercial plasma display panel material (Gd2O2S:Tb3+). The Commis...
In WSN, the main purpose of regression is to locate the nodes by prediction on the basis of readi... more In WSN, the main purpose of regression is to locate the nodes by prediction on the basis of readings. This article explains the concept of regression according to WSN perspective and on the basic of these concepts the clustering of nodes through multi-linear regression originates by combing the ideas of locating the nodes through regression and how to utilize nodes parameters in multilinear regression formula.
Extensive research has been done to achieve better throughput and reliability in wireless network... more Extensive research has been done to achieve better throughput and reliability in wireless networks, with focus on multiple-input multiple-output systems. Recently, cooperative networking techniques have been investigated to increase the performance of low-cost wireless systems by using the diversity created by different single antenna devices. However, cooperative networking requires a medium access control layer able to handle source-relay-destination communications. Wireless cooperative relaying poses several challenges, being the most important one related to the relay selection mechanism, especially in the presence of mobile nodes. This position paper aims to describe our findings towards development of an efficient relay selection algorithm.
Vehicular networks are a cornerstone of the envisioned Intelligent Transportation Systems (ITS). ... more Vehicular networks are a cornerstone of the envisioned Intelligent Transportation Systems (ITS). By enabling vehicles to communicate with each other as well as with roadside base stations, vehicular networks will contribute to safer and more efficient roads by providing timely information to drivers and concerned authorities. Vehicular networking is one of those important uprising technologies that will help us to implement a bunch of applications related to vehicles, vehicle traffic, drivers, passengers and pedestrians.
Malware is a key component of cyber-crime, and its analysis is the first line of defence against ... more Malware is a key component of cyber-crime, and its analysis is the first line of defence against cyber-attack. This study proposes two new malware classification frameworks: Deep Feature Space-based Malware classification (DFS-MC) and Deep Boosted Feature Space-based Malware classification (DBFS-MC). In the proposed DFS-MC framework, deep features are generated from the customized CNN architectures and are fed to a support vector machine (SVM) algorithm for malware classification, while, in the DBFS-MC framework, the discrimination power is enhanced by first combining deep feature spaces of two customized CNN architectures to achieve boosted feature spaces. Further, the detection of exceptional malware is performed by providing the deep boosted feature space to SVM. The performance of the proposed malware classification frameworks is evaluated on the MalImg malware dataset using the hold-out cross-validation technique. Malware variants like Autorun.K, Swizzor.gen!I, Wintrim.BX and Y...
Cloud Computing Applications and Techniques for E-Commerce
The software industries follow some patterns (i.e., process model to develop any software product... more The software industries follow some patterns (i.e., process model to develop any software product). Agile methodology is the most famous and used process model. It is a trend to develop efficient software products with high client satisfaction. In this chapter, the authors discuss agile methodology and its components, benefits, and drawbacks while using the cloud computing in agile software development, existing frameworks for agile-cloud combination, and some security measures.
The agile model is a very vast and popular model in use in the software industry currently. It ch... more The agile model is a very vast and popular model in use in the software industry currently. It changes the way software is developed. It was introduced in 2001 to overcome deficiencies of software development in a workshop arranged by researchers and practitioners who were involved with the agile concept. They introduced the complete agile manifesto. The agile model has main components that make it more viable for use in well-organized software development. One of these is scrum methodology. The reason for the agile-scrum popularity is its use for small-scale projects, making small teams and allows change requests at any stage of a project from the client. It works for client satisfaction. Instead of so much popularity and distinctive features, agile-scrum also has some limitations when used for large scale projects development that makes it less efficient for development. This article discusses the agile-scrum methodology and its limitations when using for large-scale project organ...
The substantial focus on achieving corporate sustainability has necessitated the implementation o... more The substantial focus on achieving corporate sustainability has necessitated the implementation of green human resource management (GHRM) practices. The purpose of this paper is to reveal the industries’ perspective of the impact of GHRM practices (i.e., green recruitment and selection, green pay and rewards, and green employee involvement and green training) on corporate sustainability practices. Data were collected from 200 human resource professionals in major industrial sectors of a developing country. Partial least squares structural equation modelling was used to test the study hypotheses and multigroup analysis (MGA) between industrial sectors. The findings show a positive impact of three GHRM practices, i.e., green recruitment and selection, green pay and rewards, and green employee involvement on corporate sustainability. However, green training has no significant association with corporate sustainability, which is interesting. Furthermore, the multigroup analysis (MGA) rev...
The work is original and uploading for secure it from any kind of copy of intruders. Copy right l... more The work is original and uploading for secure it from any kind of copy of intruders. Copy right licensed by 1st author.
Proceedings 2019 19th International Conference on Computational Science and Its Applications (ICCSA), 2019
The Internet of things (IoT) is an active area in the current research community due to the impro... more The Internet of things (IoT) is an active area in the current research community due to the improvement in mobile computing and wireless networks. Currently, the IoT is involved in many fields like smart cities, smart health monitoring, smart tracking, and smart factory; therefore, it is introducing new research opportunities and industrial revolutions. Smart health, in particular, is very important and trendy domain for researchers and practitioners due to its continuous monitoring of health of patients. The objective of smart health is to provide medical facilities to patients at anytime and anywhere. The smart health monitoring systems are mostly connected with the wireless network medium that is extremely vulnerable for threats. However various attacks are observed that can endanger these health monitoring applications and systems. These attacks include Denial of Service (DoS) Attack, Fingerprint and Timing-based Snooping, Router Attack, Select and Forwarding attack, Sensor atta...
The notion of cooperation in wireless communication has got significant attention from both acade... more The notion of cooperation in wireless communication has got significant attention from both academia and industrial persons towards to address the performance drawbacks of wireless sensor network due to reason of user’s high mobility and lack of resources of network. The future wireless systems should be highly heterogeneous and interconnected because motivating cooperative relaying has to apply on the future mobile network for efficient results and future demand. As currently the mobile computing is facing latency and battery drainage issues which need to address and solve hence in this work we are proposed mobile-centric and opportunistic communication architecture. In this work mobile devices which are in the range of Wi-Fi of each other can create cluster with each other and can create an ad-hoc cooperative cloud using Relay Spot[1-4]. The Collaboration between these devices can enable them to resourcefully use the augmentation without any infrastructure.
Asia Pacific Journal of Multidisciplinary Research, 2017
Agile has invented to improve and overcome Draw backs of software development. Now agile model is... more Agile has invented to improve and overcome Draw backs of software development. Now agile model is using in software development very vastly. It is facilitating the developer and client both very resourcefully. It is getting popularity than the other Software Development Life Cycle models because of its characteristics and most owing to allow change request at any level of the project. The client in the software development is the main part and asset of the company. The software house always focuses on its client because client is an asset. Thus developer has major concern with the client's requirement and change request. Agile is getting popularity because of allow change request at any stage of project, on the other hand it is also a drawback in agile model because when project starts the project's completion time and cost is decided. But due to frequent change of requests come from client the cost and completion time both increase eventually which is not good for software house's business and reputation. So there is need a cost and time estimation technique to solve change request issue in agile model.
Malicious activities in cyberspace have gone further than simply hacking machines and spreading v... more Malicious activities in cyberspace have gone further than simply hacking machines and spreading viruses. It has become a challenge for a nations’ survival and hence has evolved to cyber warfare. Malware is a key component of cyber-crime, and its analysis is the first line of defence against attack. This work proposes a novel deep boosted hybrid learning-based malware classification framework and named as Deep boosted Feature Space-based Malware classification (DFS-MC). In the proposed framework, the discrimination power is enhanced by fusing the feature spaces of the best performing customized CNN architectures models and its discrimination by an SVM for classification. The discrimination capacity of the proposed classification framework is assessed by comparing it against the standard customized CNNs. The customized CNN models are implemented in two ways: softmax classifier and deep hybrid learning-based malware classification. In the hybrid learning, Deep features are extracted fr...
Wireless Body Area Network (WBAN) refers to short-range, wireless communications near or inside a... more Wireless Body Area Network (WBAN) refers to short-range, wireless communications near or inside a human body. WBAN is emerging solution to cater the needs of local and remote health care related facility. Medical and non-medical applications have been revolutionarily under consideration for providing a healthy and gratify service to the humanity. Being very critical in communication from body it faces a lot of challenges which are to be tackled for the safety of life and benefit of the user. There is variety of challenges faced by WBANs. WBAN is favorite playground for attackers due to its usability in various applications. This article provides systematic overview of main challenges in WBANs in security perspectives.
Throughout the history of the Internet, several technologies and networking architectures have em... more Throughout the history of the Internet, several technologies and networking architectures have emerged, some of which have been widely deployed, and others have only made its reach to niche markets. Some generic cases that can be cited are multicast, IPv6, java, or ...
Healthcare systems defines the standards for health facilities to communities. Therefore, it is o... more Healthcare systems defines the standards for health facilities to communities. Therefore, it is of equal importance to everyone. In addition, it included in every fields of technology such as Internet of Things (IoT), Body Area Networks (BANs), Big Data, Context Aware Computing as well as Machine Learning. Therefore, researchers have opportunity to contribute towards well-being smart society easily. E-health on other hand is trying to provide remote access and availability of Wireless BANs (WBANs) facilities. Since, the tiny economical sensors are attached to body (either by implant or wearable fashion) to monitor the health parameters and act accordingly. Therefore, WBAN standards need special attention for optimization. In our previous work, we have proposed relaying protocol, while in this work we aim to extend the relaying protocol to WBANs in order to achieve better performance and safeguard the Master Node (MN). In order to make ubiquity, we propose to extend this work to smal...
The well-known solid-state reaction method is used for the synthesis of Tb doped LuGd2Ga2Al3O12 p... more The well-known solid-state reaction method is used for the synthesis of Tb doped LuGd2Ga2Al3O12 phosphor. XRD and SEM techniques are used for the phase and structural morphology of the synthesized phosphor. UV, X-ray and proton induced spectroscopy is used to study the luminescence properties. LuGd2Ga2Al3O12:Tb3+ phosphor shows its highest peak in green and blue region. The two major emission peaks correspond to 5D3→7FJ (at 480 to 510 nm, blue region) and 5D4→7FJ (at 535 to 565 nm, green region). Green emission is dominant; therefore, it may be used as an efficient green phosphor. The absorption spectra of the synthesized material matches well with the spectra of light emitting diodes (LEDs); therefore, it may have applications in LEDs. X-ray spectroscopic study suggests that this phosphor may have uses in medical applications, such as X-ray imaging. The synthesized phosphor exhibits 81% efficacy in comparison to the commercial plasma display panel material (Gd2O2S:Tb3+). The Commis...
In WSN, the main purpose of regression is to locate the nodes by prediction on the basis of readi... more In WSN, the main purpose of regression is to locate the nodes by prediction on the basis of readings. This article explains the concept of regression according to WSN perspective and on the basic of these concepts the clustering of nodes through multi-linear regression originates by combing the ideas of locating the nodes through regression and how to utilize nodes parameters in multilinear regression formula.
Extensive research has been done to achieve better throughput and reliability in wireless network... more Extensive research has been done to achieve better throughput and reliability in wireless networks, with focus on multiple-input multiple-output systems. Recently, cooperative networking techniques have been investigated to increase the performance of low-cost wireless systems by using the diversity created by different single antenna devices. However, cooperative networking requires a medium access control layer able to handle source-relay-destination communications. Wireless cooperative relaying poses several challenges, being the most important one related to the relay selection mechanism, especially in the presence of mobile nodes. This position paper aims to describe our findings towards development of an efficient relay selection algorithm.
Vehicular networks are a cornerstone of the envisioned Intelligent Transportation Systems (ITS). ... more Vehicular networks are a cornerstone of the envisioned Intelligent Transportation Systems (ITS). By enabling vehicles to communicate with each other as well as with roadside base stations, vehicular networks will contribute to safer and more efficient roads by providing timely information to drivers and concerned authorities. Vehicular networking is one of those important uprising technologies that will help us to implement a bunch of applications related to vehicles, vehicle traffic, drivers, passengers and pedestrians.
Malware is a key component of cyber-crime, and its analysis is the first line of defence against ... more Malware is a key component of cyber-crime, and its analysis is the first line of defence against cyber-attack. This study proposes two new malware classification frameworks: Deep Feature Space-based Malware classification (DFS-MC) and Deep Boosted Feature Space-based Malware classification (DBFS-MC). In the proposed DFS-MC framework, deep features are generated from the customized CNN architectures and are fed to a support vector machine (SVM) algorithm for malware classification, while, in the DBFS-MC framework, the discrimination power is enhanced by first combining deep feature spaces of two customized CNN architectures to achieve boosted feature spaces. Further, the detection of exceptional malware is performed by providing the deep boosted feature space to SVM. The performance of the proposed malware classification frameworks is evaluated on the MalImg malware dataset using the hold-out cross-validation technique. Malware variants like Autorun.K, Swizzor.gen!I, Wintrim.BX and Y...
Cloud Computing Applications and Techniques for E-Commerce
The software industries follow some patterns (i.e., process model to develop any software product... more The software industries follow some patterns (i.e., process model to develop any software product). Agile methodology is the most famous and used process model. It is a trend to develop efficient software products with high client satisfaction. In this chapter, the authors discuss agile methodology and its components, benefits, and drawbacks while using the cloud computing in agile software development, existing frameworks for agile-cloud combination, and some security measures.
The agile model is a very vast and popular model in use in the software industry currently. It ch... more The agile model is a very vast and popular model in use in the software industry currently. It changes the way software is developed. It was introduced in 2001 to overcome deficiencies of software development in a workshop arranged by researchers and practitioners who were involved with the agile concept. They introduced the complete agile manifesto. The agile model has main components that make it more viable for use in well-organized software development. One of these is scrum methodology. The reason for the agile-scrum popularity is its use for small-scale projects, making small teams and allows change requests at any stage of a project from the client. It works for client satisfaction. Instead of so much popularity and distinctive features, agile-scrum also has some limitations when used for large scale projects development that makes it less efficient for development. This article discusses the agile-scrum methodology and its limitations when using for large-scale project organ...
The substantial focus on achieving corporate sustainability has necessitated the implementation o... more The substantial focus on achieving corporate sustainability has necessitated the implementation of green human resource management (GHRM) practices. The purpose of this paper is to reveal the industries’ perspective of the impact of GHRM practices (i.e., green recruitment and selection, green pay and rewards, and green employee involvement and green training) on corporate sustainability practices. Data were collected from 200 human resource professionals in major industrial sectors of a developing country. Partial least squares structural equation modelling was used to test the study hypotheses and multigroup analysis (MGA) between industrial sectors. The findings show a positive impact of three GHRM practices, i.e., green recruitment and selection, green pay and rewards, and green employee involvement on corporate sustainability. However, green training has no significant association with corporate sustainability, which is interesting. Furthermore, the multigroup analysis (MGA) rev...
The work is original and uploading for secure it from any kind of copy of intruders. Copy right l... more The work is original and uploading for secure it from any kind of copy of intruders. Copy right licensed by 1st author.
Proceedings 2019 19th International Conference on Computational Science and Its Applications (ICCSA), 2019
The Internet of things (IoT) is an active area in the current research community due to the impro... more The Internet of things (IoT) is an active area in the current research community due to the improvement in mobile computing and wireless networks. Currently, the IoT is involved in many fields like smart cities, smart health monitoring, smart tracking, and smart factory; therefore, it is introducing new research opportunities and industrial revolutions. Smart health, in particular, is very important and trendy domain for researchers and practitioners due to its continuous monitoring of health of patients. The objective of smart health is to provide medical facilities to patients at anytime and anywhere. The smart health monitoring systems are mostly connected with the wireless network medium that is extremely vulnerable for threats. However various attacks are observed that can endanger these health monitoring applications and systems. These attacks include Denial of Service (DoS) Attack, Fingerprint and Timing-based Snooping, Router Attack, Select and Forwarding attack, Sensor atta...
Uploads
Papers by Tauseef Jamal