-
YOLOv10 to Its Genesis: A Decadal and Comprehensive Review of The You Only Look Once Series
Authors:
Ranjan Sapkota,
Rizwan Qureshi,
Marco Flores Calero,
Chetan Badjugar,
Upesh Nepal,
Alwin Poulose,
Peter Zeno,
Uday Bhanu Prakash Vaddevolu,
Hong Yan,
Manoj Karkee
Abstract:
This review systematically examines the progression of the You Only Look Once (YOLO) object detection algorithms from YOLOv1 to the recently unveiled YOLOv10. Employing a reverse chronological analysis, this study examines the advancements introduced by YOLO algorithms, beginning with YOLOv10 and progressing through YOLOv9, YOLOv8, and subsequent versions to explore each version's contributions to…
▽ More
This review systematically examines the progression of the You Only Look Once (YOLO) object detection algorithms from YOLOv1 to the recently unveiled YOLOv10. Employing a reverse chronological analysis, this study examines the advancements introduced by YOLO algorithms, beginning with YOLOv10 and progressing through YOLOv9, YOLOv8, and subsequent versions to explore each version's contributions to enhancing speed, accuracy, and computational efficiency in real-time object detection. The study highlights the transformative impact of YOLO across five critical application areas: automotive safety, healthcare, industrial manufacturing, surveillance, and agriculture. By detailing the incremental technological advancements in subsequent YOLO versions, this review chronicles the evolution of YOLO, and discusses the challenges and limitations in each earlier versions. The evolution signifies a path towards integrating YOLO with multimodal, context-aware, and General Artificial Intelligence (AGI) systems for the next YOLO decade, promising significant implications for future developments in AI-driven applications.
△ Less
Submitted 1 July, 2024; v1 submitted 12 June, 2024;
originally announced June 2024.
-
The Balancing Act: Unmasking and Alleviating ASR Biases in Portuguese
Authors:
A**kya Kulkarni,
Anna Tokareva,
Rameez Qureshi,
Miguel Couceiro
Abstract:
In the field of spoken language understanding, systems like Whisper and Multilingual Massive Speech (MMS) have shown state-of-the-art performances. This study is dedicated to a comprehensive exploration of the Whisper and MMS systems, with a focus on assessing biases in automatic speech recognition (ASR) inherent to casual conversation speech specific to the Portuguese language. Our investigation…
▽ More
In the field of spoken language understanding, systems like Whisper and Multilingual Massive Speech (MMS) have shown state-of-the-art performances. This study is dedicated to a comprehensive exploration of the Whisper and MMS systems, with a focus on assessing biases in automatic speech recognition (ASR) inherent to casual conversation speech specific to the Portuguese language. Our investigation encompasses various categories, including gender, age, skin tone color, and geo-location. Alongside traditional ASR evaluation metrics such as Word Error Rate (WER), we have incorporated p-value statistical significance for gender bias analysis. Furthermore, we extensively examine the impact of data distribution and empirically show that oversampling techniques alleviate such stereotypical biases. This research represents a pioneering effort in quantifying biases in the Portuguese language context through the application of MMS and Whisper, contributing to a better understanding of ASR systems' performance in multilingual settings.
△ Less
Submitted 12 February, 2024;
originally announced February 2024.
-
Findings of the First Workshop on Simulating Conversational Intelligence in Chat
Authors:
Yvette Graham,
Mohammed Rameez Qureshi,
Haider Khalid,
Gerasimos Lampouras,
Ignacio Iacobacci,
Qun Liu
Abstract:
The aim of this workshop is to bring together experts working on open-domain dialogue research. In this speedily advancing research area many challenges still exist, such as learning information from conversations, engaging in realistic and convincing simulation of human intelligence and reasoning. SCI-CHAT follows previous workshops on open domain dialogue but with a focus on the simulation of in…
▽ More
The aim of this workshop is to bring together experts working on open-domain dialogue research. In this speedily advancing research area many challenges still exist, such as learning information from conversations, engaging in realistic and convincing simulation of human intelligence and reasoning. SCI-CHAT follows previous workshops on open domain dialogue but with a focus on the simulation of intelligent conversation as judged in a live human evaluation. Models aim to include the ability to follow a challenging topic over a multi-turn conversation, while positing, refuting and reasoning over arguments. The workshop included both a research track and shared task. The main goal of this paper is to provide an overview of the shared task and a link to an additional paper that will include an in depth analysis of the shared task results following presentation at the workshop.
△ Less
Submitted 9 February, 2024;
originally announced February 2024.
-
Brain Tumor Synthetic Data Generation with Adaptive StyleGANs
Authors:
Usama Tariq,
Rizwan Qureshi,
Anas Zafar,
Danyal Aftab,
Jia Wu,
Tanvir Alam,
Zubair Shah,
Hazrat Ali
Abstract:
Generative models have been very successful over the years and have received significant attention for synthetic data generation. As deep learning models are getting more and more complex, they require large amounts of data to perform accurately. In medical image analysis, such generative models play a crucial role as the available data is limited due to challenges related to data privacy, lack of…
▽ More
Generative models have been very successful over the years and have received significant attention for synthetic data generation. As deep learning models are getting more and more complex, they require large amounts of data to perform accurately. In medical image analysis, such generative models play a crucial role as the available data is limited due to challenges related to data privacy, lack of data diversity, or uneven data distributions. In this paper, we present a method to generate brain tumor MRI images using generative adversarial networks. We have utilized StyleGAN2 with ADA methodology to generate high-quality brain MRI with tumors while using a significantly smaller amount of training data when compared to the existing approaches. We use three pre-trained models for transfer learning. Results demonstrate that the proposed method can learn the distributions of brain tumors. Furthermore, the model can generate high-quality synthetic brain MRI with a tumor that can limit the small sample size issues. The approach can addresses the limited data availability by generating realistic-looking brain MRI with tumors. The code is available at: ~\url{https://github.com/rizwanqureshi123/Brain-Tumor-Synthetic-Data}.
△ Less
Submitted 4 December, 2022;
originally announced December 2022.
-
Guiding Attention using Partial-Order Relationships for Image Captioning
Authors:
Murad Popattia,
Muhammad Rafi,
Rizwan Qureshi,
Shah Nawaz
Abstract:
The use of attention models for automated image captioning has enabled many systems to produce accurate and meaningful descriptions for images. Over the years, many novel approaches have been proposed to enhance the attention process using different feature representations. In this paper, we extend this approach by creating a guided attention network mechanism, that exploits the relationship betwe…
▽ More
The use of attention models for automated image captioning has enabled many systems to produce accurate and meaningful descriptions for images. Over the years, many novel approaches have been proposed to enhance the attention process using different feature representations. In this paper, we extend this approach by creating a guided attention network mechanism, that exploits the relationship between the visual scene and text-descriptions using spatial features from the image, high-level information from the topics, and temporal context from caption generation, which are embedded together in an ordered embedding space. A pairwise ranking objective is used for training this embedding space which allows similar images, topics and captions in the shared semantic space to maintain a partial order in the visual-semantic hierarchy and hence, helps the model to produce more visually accurate captions. The experimental results based on MSCOCO dataset shows the competitiveness of our approach, with many state-of-the-art models on various evaluation metrics.
△ Less
Submitted 15 April, 2022;
originally announced April 2022.
-
Measuring the Effect of CMMI Quality Standard on Agile Scrum Model
Authors:
Munawar Hayat,
M. Rizwan Jameel Qureshi
Abstract:
Agile development gets more appreciation from the market due to the flexible nature and more productivity. Among the Agile processes, Scrum gives better management of the processes, which are practiced in an organization. Though Scrum process model have several features and strengths but it still lacks in management and quality. This research deals with the improvement of Scrum processes for bette…
▽ More
Agile development gets more appreciation from the market due to the flexible nature and more productivity. Among the Agile processes, Scrum gives better management of the processes, which are practiced in an organization. Though Scrum process model have several features and strengths but it still lacks in management and quality. This research deals with the improvement of Scrum processes for better management and to improve the quality of the software using the infusion of different practices from internationally renowned quality standards. Survey is used to validate the proposed framework. Statistical analysis shows that the proposed research has a profound effect on Scrum model to develop high quality software.
△ Less
Submitted 9 October, 2016;
originally announced October 2016.
-
On Feature based Delaunay Triangulation for Palmprint Recognition
Authors:
Zanobya N. Khan,
Rashid Jalal Qureshi,
Jamil Ahmad
Abstract:
Authentication of individuals via palmprint based biometric system is becoming very popular due to its reliability as it contains unique and stable features. In this paper, we present a novel approach for palmprint recognition and its representation. To extract the palm lines, local thresholding technique Niblack binarization algorithm is adopted. The endpoints of these lines are determined and a…
▽ More
Authentication of individuals via palmprint based biometric system is becoming very popular due to its reliability as it contains unique and stable features. In this paper, we present a novel approach for palmprint recognition and its representation. To extract the palm lines, local thresholding technique Niblack binarization algorithm is adopted. The endpoints of these lines are determined and a connection is created among them using the Delaunay triangulation thereby generating a distinct topological structure of each palmprint. Next, we extract different geometric as well as quantitative features from the triangles of the Delaunay triangulation that assist in identifying different individuals. To ensure that the proposed approach is invariant to rotation and scaling, features were made relative to topological and geometrical structure of the palmprint. The similarity of the two palmprints is computed using the weighted sum approach and compared with the k-nearest neighbor. The experimental results obtained reflect the effectiveness of the proposed approach to discriminate between different palmprint images and thus achieved a recognition rate of 90% over large databases.
△ Less
Submitted 5 February, 2016;
originally announced February 2016.
-
A Secure Cyclic Steganographic Technique for Color Images using Randomization
Authors:
Khan Muhammad,
Jamil Ahmad,
Naeem Ur Rehman,
Zahoor Jan,
Rashid Jalal Qureshi
Abstract:
Information Security is a major concern in today's modern era. Almost all the communicating bodies want the security, confidentiality and integrity of their personal data. But this security goal cannot be achieved easily when we are using an open network like Internet. Steganography provides one of the best solutions to this problem. This paper represents a new Cyclic Steganographic T echnique (CS…
▽ More
Information Security is a major concern in today's modern era. Almost all the communicating bodies want the security, confidentiality and integrity of their personal data. But this security goal cannot be achieved easily when we are using an open network like Internet. Steganography provides one of the best solutions to this problem. This paper represents a new Cyclic Steganographic T echnique (CST) based on Least Significant Bit (LSB) for true color (RGB) images. The proposed method hides the secret data in the LSBs of cover image pixels in a randomized cyclic manner. The proposed technique is evaluated using both subjective and objective analysis using histograms changeability, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MSE). Experimentally it is found that the proposed method gives promising results in terms of security, imperceptibility and robustness as compared to some existent methods and vindicates this new algorithm.
△ Less
Submitted 26 February, 2015;
originally announced February 2015.
-
IMS-based mobile learning system
Authors:
M. Rizwan Jameel Qureshi
Abstract:
Electronic (E) learning management system is not a novel idea in the educational domain. Learning management systems are used to deal with academic activities such as course syllabi, time table scheduling, assessments and project discussion forums. Almost, all the top universities of world are using general purpose/customized solutions to manage learning management systems like SAP, Oracle, Moodle…
▽ More
Electronic (E) learning management system is not a novel idea in the educational domain. Learning management systems are used to deal with academic activities such as course syllabi, time table scheduling, assessments and project discussion forums. Almost, all the top universities of world are using general purpose/customized solutions to manage learning management systems like SAP, Oracle, Moodle and Blackboard. The aim of this paper i.e., Mobile (M) Learning System (MLS) is not to substitute the traditional web based E learning applications but to enhance it by amalgamating both web and mobile technologies. This idea justifies the proposal of M learning system to use some of the services of E learning system from mobiles. MLS will use state-of-the-art IP Multimedia Sub System technology. The emphasis in this research will be on the technical implementation of the Session Initiation Protocol (SIP) using IP Multimedia Subsystem (IMS) to develop an MLS not only for the students of the King Abdulaziz University but it will be beneficial for the students of other universities at Kingdom of Saudi Arabia. A customized CBD is proposed as per the nature of MLS project. MLS case study is used as a research design to validate the customized CBD model. Multi-tier applications architecture (client, web, and business) will be adopted during the development of MLS case study. An MLS will be developed and tested using IMS platform to check its practicality for the students of King Abdulaziz University. It is anticipated that the proposed system will significantly facilitate to both the students and teachers of KAU during their off campus activities.
△ Less
Submitted 26 August, 2014;
originally announced August 2014.
-
Estimation of the new agile XP process model for medium-scale projects using industrial case studies
Authors:
M. Rizwan Jameel Qureshi
Abstract:
Agile is one of the terms with which software professionals are quite familiar. Agile models promote fast development to develop high quality software. XP process model is one of the most widely used and most documented agile models. XP model is meant for small-scale projects. Since XP model is a good model, therefore there is need of its extension for the development of medium and large-scale pro…
▽ More
Agile is one of the terms with which software professionals are quite familiar. Agile models promote fast development to develop high quality software. XP process model is one of the most widely used and most documented agile models. XP model is meant for small-scale projects. Since XP model is a good model, therefore there is need of its extension for the development of medium and large-scale projects. XP model has certain drawbacks such as weak documentation and poor performance while adapting it for the development of medium and large-scale projects having large teams. A new XP model is proposed in this paper to cater the needs of software development companies for medium-scale projects having large teams. This research may prove to be step forward for adaptation of the proposed new XP model for the development of large-scale projects. Two independent industrial case studies are conducted to validate the proposed new XP model handling for small and medium scale software projects, one case study for each type of project.
△ Less
Submitted 26 August, 2014;
originally announced August 2014.
-
The proposal of improved inexact isomorphic graph algorithm to detect design patterns
Authors:
Afnan Salem Ba-Brahem,
M. Rizwan Jameel Qureshi
Abstract:
Design patterns being applied more and more to solve the software engineering difficulties in the object oriented software design procedures. So, the design pattern detection is widely used by software industries. Currently, many solutions presented to detect the design pattern in the system design. In this paper, we will propose a new one which first; we will use the graph implementation to imple…
▽ More
Design patterns being applied more and more to solve the software engineering difficulties in the object oriented software design procedures. So, the design pattern detection is widely used by software industries. Currently, many solutions presented to detect the design pattern in the system design. In this paper, we will propose a new one which first; we will use the graph implementation to implement both the system design UML diagram and the design pattern UML diagram. Second, we will implement the edges for each one of the both two graphs in a set of 4-tuple elements. Then, we will apply a new inexact graph isomorphic algorithm to detect the design pattern in the system design.
△ Less
Submitted 26 August, 2014;
originally announced August 2014.
-
Scrum of scrums solution for large size teams using scrum methodology
Authors:
Saja Al Qurashi,
M. Rizwan Jameel Qureshi
Abstract:
Scrum is a structured framework to support complex product development. However, Scrum methodology faces a challenge of managing large teams. To address this challenge, in this paper we propose a solution called Scrum of Scrums. In Scrum of Scrums, we divide the Scrum team into teams of the right size, and then organize them hierarchically into a Scrum of Scrums. The main goals of the proposed sol…
▽ More
Scrum is a structured framework to support complex product development. However, Scrum methodology faces a challenge of managing large teams. To address this challenge, in this paper we propose a solution called Scrum of Scrums. In Scrum of Scrums, we divide the Scrum team into teams of the right size, and then organize them hierarchically into a Scrum of Scrums. The main goals of the proposed solution are to optimize communication between teams in Scrum of Scrums; to make the system work after integration of all parts; to reduce the dependencies between the parts of system; and to prevent the duplication of parts in the system.
△ Less
Submitted 26 August, 2014;
originally announced August 2014.
-
Significance of the teamwork in agile software engineering
Authors:
M. Rizwan Jameel Qureshi,
Sohayp Abo Alshamat,
Fatima Sabir
Abstract:
A Software Engineering project depends significantly on team performance, as does any activity that involves human interaction. In the last years, the traditional perspective on software development is changing and agile methods have received considerable attention. Among other attributes, the ageists claim that fostering creativity is one of the keys to response to common problems and challenges…
▽ More
A Software Engineering project depends significantly on team performance, as does any activity that involves human interaction. In the last years, the traditional perspective on software development is changing and agile methods have received considerable attention. Among other attributes, the ageists claim that fostering creativity is one of the keys to response to common problems and challenges of software development today. The development of new software products requires the generation of novel and useful ideas. It is a conceptual framework introduced in the Agile Manifesto in 2001. This paper is written in support of agile practices in terms of significance of teamwork for the success of software projects. Survey is used as a research method to know the significance of teamwork.
△ Less
Submitted 26 August, 2014;
originally announced August 2014.
-
The proposal of improved component selection framework
Authors:
Weam Gaoud Alghabban,
M. Rizwan Jameel Qureshi
Abstract:
Component selection is considered one of hard tasks in Component Based Software Engineering (CBSE). It is difficult to find the optimal component selection. CBSE is an approach that is used to develop a software system from pre-existing software components. Appropriate software component selection plays an important role in CBSE. Many approaches were suggested to solve component selection problem.…
▽ More
Component selection is considered one of hard tasks in Component Based Software Engineering (CBSE). It is difficult to find the optimal component selection. CBSE is an approach that is used to develop a software system from pre-existing software components. Appropriate software component selection plays an important role in CBSE. Many approaches were suggested to solve component selection problem. In this paper the component selection is done by improving the integrated component selection framework by including the pliability metric. Pliability is a flexible measure that assesses software quality in terms of its components quality. The validation of this proposed solution is done through collecting a sample of people who answer an electronic questionnaire that composed of 20 questions. The questionnaire is distributed through social sites such as Twitter, Facebook and emails. The result of the validation showed that using the integrated component selection framework with pliability metric is suitable for component selection.
△ Less
Submitted 26 August, 2014;
originally announced August 2014.
-
The proposal of a novel software testing framework
Authors:
Munib Ahmad,
Fuad Bajaber,
M. Rizwan Jameel Qureshi
Abstract:
Software testing is normally used to check the validity of a program. Test oracle performs an important role in software testing. The focus in this research is to perform class level test by introducing a testing framework. A technique is developed to generate test oracle for specification-based software testing using Vienna Development Method (VDM++) formal language. A three stage translation pro…
▽ More
Software testing is normally used to check the validity of a program. Test oracle performs an important role in software testing. The focus in this research is to perform class level test by introducing a testing framework. A technique is developed to generate test oracle for specification-based software testing using Vienna Development Method (VDM++) formal language. A three stage translation process, of VDM++ specifications of container classes to C++ test oracle classes, is described in this paper. It is also presented that how derived test oracle is integrated into a proposed functional testing framework. This technique caters object oriented features such as inheritance and aggregation, but concurrency is not considered in this work. Translation issues, limitations and evaluation of the technique are also discussed. The proposed approach is illustrated with the help of popular triangle problem case study.
△ Less
Submitted 26 August, 2014;
originally announced August 2014.
-
A comparison of model view controller and model view presenter
Authors:
M. Rizwan Jameel Qureshi,
Fatima Sabir
Abstract:
Web application frameworks are managed by using different design strategies. Design strategies are applied by using different design processes. In each design process, requirement specifications are changed in to different design model that describe the detail of different data structure, system architecture, interface and components. Web application frame work is implemented by using Model View C…
▽ More
Web application frameworks are managed by using different design strategies. Design strategies are applied by using different design processes. In each design process, requirement specifications are changed in to different design model that describe the detail of different data structure, system architecture, interface and components. Web application frame work is implemented by using Model View Controller (MVC) and Model View Presenter (MVP). These web application models are used to provide standardized view for web applications. This paper mainly focuses on different design aspect of MVC and MVP. Generally we present different methodologies that are related to the implementation of MVC and MVP and implementation of appropriate platform and suitable environment for MVC and MVP.
△ Less
Submitted 25 August, 2014;
originally announced August 2014.
-
AMCTD: Adaptive Mobility of Courier nodes in Threshold-optimized DBR Protocol for Underwater Wireless Sensor Networks
Authors:
M. R. Jafri,
S. Ahmed,
N. Javaid,
Z. Ahmad,
R. J. Qureshi
Abstract:
In dense underwater sensor networks (UWSN), the major confronts are high error probability, incessant variation in topology of sensor nodes, and much energy consumption for data transmission. However, there are some remarkable applications of UWSN such as management of seabed and oil reservoirs, exploration of deep sea situation and prevention of aqueous disasters. In order to accomplish these app…
▽ More
In dense underwater sensor networks (UWSN), the major confronts are high error probability, incessant variation in topology of sensor nodes, and much energy consumption for data transmission. However, there are some remarkable applications of UWSN such as management of seabed and oil reservoirs, exploration of deep sea situation and prevention of aqueous disasters. In order to accomplish these applications, ignorance of the limitations of acoustic communications such as high delay and low bandwidth is not feasible. In this paper, we propose Adaptive mobility of Courier nodes in Threshold-optimized Depth-based routing (AMCTD), exploring the proficient amendments in depth threshold and implementing the optimal weight function to achieve longer network lifetime. We segregate our scheme in 3 major phases of weight updating, depth threshold variation and adaptive mobility of courier nodes. During data forwarding, we provide the framework for alterations in threshold to cope with the sparse condition of network. We ultimately perform detailed simulations to scrutinize the performance of our proposed scheme and its comparison with other two notable routing protocols in term of network lifetime and other essential parameters. The simulations results verify that our scheme performs better than the other techniques and near to optimal in the field of UWSN.
△ Less
Submitted 26 July, 2013;
originally announced July 2013.
-
Transparent Data Encryption -- Solution for Security of Database Contents
Authors:
Dr. Anwar Pasha Deshmukh,
Dr. Riyazuddin Qureshi
Abstract:
The present study deals with Transparent Data Encryption which is a technology used to solve the problems of security of data. Transparent Data Encryption means encrypting databases on hard disk and on any backup media. Present day global business environment presents numerous security threats and compliance challenges. To protect against data thefts and frauds we require security solutions that a…
▽ More
The present study deals with Transparent Data Encryption which is a technology used to solve the problems of security of data. Transparent Data Encryption means encrypting databases on hard disk and on any backup media. Present day global business environment presents numerous security threats and compliance challenges. To protect against data thefts and frauds we require security solutions that are transparent by design.
△ Less
Submitted 2 March, 2013;
originally announced March 2013.
-
Evaluation of the Design Metric to Reduce the Number of Defects in Software Development
Authors:
M. Rizwan Jameel Qureshi,
Waseem Qureshi
Abstract:
Software design is one of the most important and key activities in the system development life cycle (SDLC) phase that ensures the quality of software. Different key areas of design are very vital to be taken into consideration while designing software. Software design describes how the software system is decomposed and managed in smaller components. Object-oriented (OO) paradigm has facilitated s…
▽ More
Software design is one of the most important and key activities in the system development life cycle (SDLC) phase that ensures the quality of software. Different key areas of design are very vital to be taken into consideration while designing software. Software design describes how the software system is decomposed and managed in smaller components. Object-oriented (OO) paradigm has facilitated software industry with more reliable and manageable software and its design. The quality of the software design can be measured through different metrics such as Chidamber and Kemerer (CK) design metrics, Mood Metrics & Lorenz and Kidd metrics. CK metrics is one of the oldest and most reliable metrics among all metrics available to software industry to evaluate OO design. This paper presents an evaluation of CK metrics to propose an improved CK design metrics values to reduce the defects during software design phase in software. This paper will also describe that whether a significant effect of any CK design metrics exists on total number of defects per module or not. This is achieved by conducting survey in two software development companies.
△ Less
Submitted 22 April, 2012;
originally announced April 2012.
-
Using Fuzzy Logic to Evaluate Normalization Completeness for An Improved Database Design
Authors:
M. Rizwan Jameel Qureshi,
Mehboob Sharif,
Nayyar Iqbal
Abstract:
A new approach, to measure normalization completeness for conceptual model, is introduced using quantitative fuzzy functionality in this paper. We measure the normalization completeness of the conceptual model in two steps. In the first step, different normalization techniques are analyzed up to Boyce Codd Normal Form (BCNF) to find the current normal form of the relation. In the second step, fuzz…
▽ More
A new approach, to measure normalization completeness for conceptual model, is introduced using quantitative fuzzy functionality in this paper. We measure the normalization completeness of the conceptual model in two steps. In the first step, different normalization techniques are analyzed up to Boyce Codd Normal Form (BCNF) to find the current normal form of the relation. In the second step, fuzzy membership values are used to scale the normal form between 0 and 1. Case studies to explain schema transformation rules and measurements. Normalization completeness is measured by considering completeness attributes, preventing attributes of the functional dependencies and total number of attributes such as if the functional dependency is non-preventing then the attributes of that functional dependency are completeness attributes. The attributes of functional dependency which prevent to go to the next normal form are called preventing attributes.
△ Less
Submitted 1 April, 2012;
originally announced April 2012.
-
Novel Component-Based Development Model for SIP-Based Mobile Application (1202)
Authors:
Ahmed Barnawi,
Abdulrahman H. Altalhi,
M. Rizwan Jameel Qureshi,
Asif Irshad Khan
Abstract:
Universities and Institutions these days' deals with issues related to with assessment of large number of students. Various evaluation methods have been adopted by examiners in different institutions to examining the ability of an individual, starting from manual means of using paper and pencil to electronic, from oral to written, practical to theoretical and many others. There is a need to expedi…
▽ More
Universities and Institutions these days' deals with issues related to with assessment of large number of students. Various evaluation methods have been adopted by examiners in different institutions to examining the ability of an individual, starting from manual means of using paper and pencil to electronic, from oral to written, practical to theoretical and many others. There is a need to expedite the process of examination in order to meet the increasing enrolment of students at the universities and institutes. Sip Based Mass Mobile Examination System (SiBMMES) expedites the examination process by automating various activities in an examination such as exam paper setting, Scheduling and allocating examination time and evaluation (auto-grading for objective questions) etc. SiBMMES uses the IP Multimedia Subsystem (IMS) that is an IP communications framework providing an environment for the rapid development of innovative and reusable services Session Initial Protocol (SIP) is a signalling (request-response) protocol for this architecture and it is used for establishing sessions in an IP network, making it an ideal candidate for supporting terminal mobility in the IMS to deliver the services, with the extended services available in IMS like open APIs, common network services, Quality of Services (QoS) like multiple sessions per call, Push to Talk etc often requiring multiple types of media (including voice, video, pictures, and text). SiBMMES is an effective solution for mass education evaluation using mobile and web technology. In this paper, a novel hybrid component based development (CBD) model is proposed for SiBMMES. A Component based Hybrid Model is selected to the fact that IMS takes the concept of layered architecture one step further by defining a horizontal architecture where service enablers and common functions can be reused for multiple applications.
△ Less
Submitted 15 February, 2012;
originally announced February 2012.
-
Novel Component Based Development Model For Sip-Based Mobile Application
Authors:
Ahmed Barnawi,
Abdurrahman H. Al-Talhi,
M. Rizwan Jameel Qureshi,
Asif Irshad Khan
Abstract:
Universities and Institutions these days' deals with issues related to with assessment of large number of students. Various evaluation methods have been adopted by examiners in different institutions to examining the ability of an individual, starting from manual means of using paper and pencil to electronic, from oral to written, practical to theoretical and many others. There is a need to expedi…
▽ More
Universities and Institutions these days' deals with issues related to with assessment of large number of students. Various evaluation methods have been adopted by examiners in different institutions to examining the ability of an individual, starting from manual means of using paper and pencil to electronic, from oral to written, practical to theoretical and many others. There is a need to expedite the process of examination in order to meet the increasing enrolment of students at the universities and institutes. Sip Based Mass Mobile Examination System (SiBMMES) expedites the examination process by automating various activities in an examination such as exam paper setting, Scheduling and allocating examination time and evaluation (auto-grading for objective questions) etc. SiBMMES uses the IP Multimedia Subsystem (IMS) that is an IP communications framework providing an environment for the rapid development of innovative and reusable services Session Initial Protocol (SIP) is a signalling (request-response) protocol for this architecture and it is used for establishing sessions in an IP network, making it an ideal candidate for supporting terminal mobility in the IMS to deliver the services, with the extended services available in IMS like open APIs, common network services, Quality of Services (QoS) like multiple sessions per call, Push to Talk etc often requiring multiple types of media (including voice, video, pictures, and text). SiBMMES is an effective solution for mass education evaluation using mobile and web technology. In this paper, a novel hybrid component based development (CBD) model is proposed for SiBMMES.
△ Less
Submitted 12 February, 2012;
originally announced February 2012.
-
A Framework for Next Generation Mobile and Wireless Networks Application Development using Hybrid Component Based Development Model
Authors:
Ahmed Barnawi,
M. Rizwan Jameel Qureshi,
Asif Irshad Khan
Abstract:
The IP Multimedia Subsystems (IMS) that features in Next Generation Networks (NGN) offers the application developer (third party) abilities to map out applications over mobile telecommunication infrastructure. The IMS comes about with APIs useful for mobile application developers to create applications to meet end-users' demands and comply with the provider's infrastructure set up at the same time…
▽ More
The IP Multimedia Subsystems (IMS) that features in Next Generation Networks (NGN) offers the application developer (third party) abilities to map out applications over mobile telecommunication infrastructure. The IMS comes about with APIs useful for mobile application developers to create applications to meet end-users' demands and comply with the provider's infrastructure set up at the same time. Session Initiation Protocol (SIP) is a signaling protocol for this architecture. It is used for establishing sessions in IP network, making it an ideal candidate for supporting terminal mobility in to deliver the services with improved Quality of Services (QOS). The realization of IMS's virtues as far as software design is concerned is faced by lack of standardizations and methodologies throughout application development process. In this paper, we report on progress on ongoing research by our group toward putting together a platform as a testbed used for NGN application development. We examine a novel component based development model used for SIP based mobile applications. The developed model is to be used as framework for general purpose application development over the testbed. We apply this model on MObile Mass EXamination (MOMEX) system that is an application attracting the interest of educational authorities around the world due to its potential convenience.
△ Less
Submitted 12 February, 2012;
originally announced February 2012.
-
A Comprehensive Study of Commonly Practiced Heavy & Light Weight Software Methodologies
Authors:
Asif Irshad Khan,
M. Rizwan Jameel Qureshi,
Usman Ali Khan
Abstract:
Software has been playing a key role in the development of modern society. Software industry has an option to choose suitable methodology/process model for its current needs to provide solutions to give problems. Though some companies have their own customized methodology for develo** their software but majority agrees that software methodologies fall under two categories that are heavyweight an…
▽ More
Software has been playing a key role in the development of modern society. Software industry has an option to choose suitable methodology/process model for its current needs to provide solutions to give problems. Though some companies have their own customized methodology for develo** their software but majority agrees that software methodologies fall under two categories that are heavyweight and lightweight. Heavyweight methodologies (Waterfall Model, Spiral Model) are also known as the traditional methodologies, and their focuses are detailed documentation, inclusive planning, and extroverted design. Lightweight methodologies (XP, SCRUM) are, referred as agile methodologies. Light weight methodologies focused mainly on short iterative cycles, and rely on the knowledge within a team. The aim of this paper is to describe the characteristics of popular heavyweight and lightweight methodologies that are widely practiced in software industries. We have discussed the strengths and weakness of the selected models. Further we have discussed the strengths and weakness between the two opponent methodologies and some criteria is also illustrated that help project managers for the selection of suitable model for their projects.
△ Less
Submitted 12 February, 2012;
originally announced February 2012.
-
Empirical Evaluation of the Proposed eXScrum Model: Results of a Case Study
Authors:
M. Rizwan Jameel Qureshi
Abstract:
Agile models promote fast development. XP and Scrum are the most widely used agile models. This paper investigates the phases of XP and Scrum models in order to identify their potentials and drawbacks. XP model has certain drawbacks, such as not suitable for maintenance projects and poor performance for medium and large-scale development projects. Scrum model has certain limitations, such as lacke…
▽ More
Agile models promote fast development. XP and Scrum are the most widely used agile models. This paper investigates the phases of XP and Scrum models in order to identify their potentials and drawbacks. XP model has certain drawbacks, such as not suitable for maintenance projects and poor performance for medium and large-scale development projects. Scrum model has certain limitations, such as lacked in engineering practices. Since, both XP and Scrum models contain good features and strengths but still there are improvement possibilities in these models. Majority of the software development companies are reluctant to switch from traditional methodologies to agile methodologies for development of industrial projects. A fine integration, of software management of the Scrum model and engineering practices of XP model, is very much required to accumulate the strengths and remove the limitations of both models. This is achieved by proposing an eXScrum model. The proposed model is validated by conducting a controlled case study. The results of case study show that the proposed integrated eXScrum model enriches the potentials of both XP and Scrum models and eliminates their drawbacks.
△ Less
Submitted 12 February, 2012;
originally announced February 2012.
-
A Step Forward To Component-based Software Cost Estimation in Object-oriented Environment
Authors:
Nadeem Ahmed,
M. Rafiq Asim,
M. Rizwan Jameel Qureshi
Abstract:
Software cost estimation (SCE) of a project is pivotal to the acceptance or rejection of the development of software project. Various SCE techniques have been in practice with their own strengths and limitations. The latest of these is object-oriented one. Currently object-oriented approach for SCE is based on Line of Code (LOC), function points, functions and classes etc. Relatively less attentio…
▽ More
Software cost estimation (SCE) of a project is pivotal to the acceptance or rejection of the development of software project. Various SCE techniques have been in practice with their own strengths and limitations. The latest of these is object-oriented one. Currently object-oriented approach for SCE is based on Line of Code (LOC), function points, functions and classes etc. Relatively less attention has been paid to the SCE in component-based software engineering (CBSE). So there is a pressing need to search parameters/variables that have a vital role for the SCE using CBSE which is taken up in this paper. This paper further looks at level of significance of all the parameters/variables thus searched. The time is being used as an independent variable because time is a parameter which is almost, all previous in one. Therefore this approach may be in a way an alternate of all previous approaches. Infact the underlying research ultimately may lead towards SCE of complex systems, using CBSE, in a scientific, systematic and comprehensive way.
△ Less
Submitted 12 February, 2012;
originally announced February 2012.
-
A New Teaching Model For The Subject Of Software Project Management
Authors:
M. Rizwan Jameel Qureshi,
Muhammad Rafiq Asim,
Muhammad Nadeem,
Asif Mehmood
Abstract:
Software (SW) development is a very tough task which requires a skilled project leader for its success. If the project leader is not skilled enough then project may fail. In the real world of SW engineering 65% of the SW projects fail to meet their objectives as in [1]. The main reason is lack of training of the project mangers. This extreme ratio of failure can be reduced by teaching SW project m…
▽ More
Software (SW) development is a very tough task which requires a skilled project leader for its success. If the project leader is not skilled enough then project may fail. In the real world of SW engineering 65% of the SW projects fail to meet their objectives as in [1]. The main reason is lack of training of the project mangers. This extreme ratio of failure can be reduced by teaching SW project management (SPM) to the future project managers in the practical manner, so that they may be skillful enough to handle the project in a better way. This paper intends to propose a model to be used to teach SPM to the student of SW engineering to reduce the failure rate of projects.
△ Less
Submitted 12 February, 2012;
originally announced February 2012.
-
A Validation of the Proposed Component-Based Development Process
Authors:
M. Rizwan Jameel Qureshi,
M. E. Sandhu
Abstract:
Component-based development (CBD) is a name, with which software development professionals are quite familiar. There are several models which have been proposed for CBD in last few years. They contain good features but there are some improvement possibilities in them. The objective of this paper is to propose a process for CBD and to evaluate the effects of quality parameters on reusability. The v…
▽ More
Component-based development (CBD) is a name, with which software development professionals are quite familiar. There are several models which have been proposed for CBD in last few years. They contain good features but there are some improvement possibilities in them. The objective of this paper is to propose a process for CBD and to evaluate the effects of quality parameters on reusability. The validations of the proposed CBD model provide positive indication for software (SW) industry that it can be successfully implemented for CBD projects.
△ Less
Submitted 12 February, 2012;
originally announced February 2012.
-
Improvement of Key Problems of Software Testing in Quality Assurance
Authors:
Nayyar Iqbal,
M. Rizwan Jameel Qureshi
Abstract:
Quality assurance makes sure the project will be completed based on the previously approved specifications, standards and functionality. It is required without defects and possible problems. It monitors and tries to progress the development process from the start of the project. Software Quality Assurance (SQA) is the combination of the entire software development process, which includes software…
▽ More
Quality assurance makes sure the project will be completed based on the previously approved specifications, standards and functionality. It is required without defects and possible problems. It monitors and tries to progress the development process from the start of the project. Software Quality Assurance (SQA) is the combination of the entire software development process, which includes software design, coding, source code control, code review, change management, configuration management and release management. In this paper we describe the solution for the key problems of software testing in quality assurance. The existing software practices have some problems such as testing practices, attitude of users and culture of organizations. All these tree problems have some combined problems such as shortcuts in testing, reduction in testing time, poor documentation etc. In this paper we are recommending strategies to provide solution of the said problems mentioned above.
△ Less
Submitted 12 February, 2012;
originally announced February 2012.
-
Seamless Long Term Learning in Agile Teams for Sustainable Leadership
Authors:
M. R. J. Qureshi,
Muhammad Kashif
Abstract:
Seamless and continuous support for long term organizational learning needs is essential for long lasting progress of the organization. Agile process model provides an excellent opportunity to cater that specific problem and also helps in motivation, satisfaction, coordination, presentation and technical skills enhancement of agile teams. This long term learning process makes organization to susta…
▽ More
Seamless and continuous support for long term organizational learning needs is essential for long lasting progress of the organization. Agile process model provides an excellent opportunity to cater that specific problem and also helps in motivation, satisfaction, coordination, presentation and technical skills enhancement of agile teams. This long term learning process makes organization to sustain their current successes and lead both organization and team members to successful and dynamic market leaders.
△ Less
Submitted 12 February, 2012;
originally announced February 2012.
-
An Improved XP Software Development Model
Authors:
M. Rizwan Jameel Qureshi,
S. A. Hussain
Abstract:
The concept of agile process models has attained great popularity in software (SW) development community in last few years. Agile models promote fast development. Fast development has certain drawbacks, such as weak documentation and performance for medium and large development projects. Fast development also promotes use of agile process models in small-scale projects. This paper modifies and eva…
▽ More
The concept of agile process models has attained great popularity in software (SW) development community in last few years. Agile models promote fast development. Fast development has certain drawbacks, such as weak documentation and performance for medium and large development projects. Fast development also promotes use of agile process models in small-scale projects. This paper modifies and evaluates Extreme Programming (XP) process model and proposes a novel process model based on these modifications.
△ Less
Submitted 12 February, 2012;
originally announced February 2012.
-
Evaluation of the Improved XP Software Development Model
Authors:
M. Rizwan Jameel Qureshi
Abstract:
The concept of agile process models has attained great popularity in software (SW) development community in last few years. Agile models promote fast development. Fast development has certain drawbacks, such as weak documentation and performance for medium and large development projects. Fast development also promotes use of agile process models in small-scale projects. This paper modifies and eva…
▽ More
The concept of agile process models has attained great popularity in software (SW) development community in last few years. Agile models promote fast development. Fast development has certain drawbacks, such as weak documentation and performance for medium and large development projects. Fast development also promotes use of agile process models in small-scale projects. This paper modifies and evaluates Extreme Programming (XP) process model and proposes a novel process model based on these modifications.
△ Less
Submitted 12 February, 2012;
originally announced February 2012.
-
Survey-Based Analysis of the Proposed Component-Based Development Process
Authors:
Rizwan Jameel Qureshi,
M. E. Sandhu
Abstract:
The concept of component-based development (CBD) is widely practiced in software (SW) development. CBD is based on reuse of the existing components with the new ones. The objective of this paper is to propose a novel process model for CBD. Importance of repository has also been discussed. A survey has been conducted to evaluate the proposed model. The results of the survey show that proposed proce…
▽ More
The concept of component-based development (CBD) is widely practiced in software (SW) development. CBD is based on reuse of the existing components with the new ones. The objective of this paper is to propose a novel process model for CBD. Importance of repository has also been discussed. A survey has been conducted to evaluate the proposed model. The results of the survey show that proposed process model can be efficiently implemented for CBD projects.
△ Less
Submitted 12 February, 2012;
originally announced February 2012.
-
The artifacts of component-based development
Authors:
M. Rizwan Jameel Qureshi,
Shaukat Ali Hayat
Abstract:
Component based development idea was floated in a conference name "Mass Produced Software Components" in 1968 [1]. Since then engineering and scientific libraries are developed to reuse the previously developed functions. This concept is now widely used in SW development as component based development (CBD). Component-based software engineering (CBSE) is used to develop/ assemble software from exi…
▽ More
Component based development idea was floated in a conference name "Mass Produced Software Components" in 1968 [1]. Since then engineering and scientific libraries are developed to reuse the previously developed functions. This concept is now widely used in SW development as component based development (CBD). Component-based software engineering (CBSE) is used to develop/ assemble software from existing components [2]. Software developed using components is called component ware [3]. This paper presents different architectures of CBD such as ActiveX, common object request broker architecture (CORBA), remote method invocation (RMI) and simple object access protocol (SOAP). The overall objective of this paper is to support the practice of CBD by comparing its advantages and disadvantages. This paper also evaluates object oriented process model to adapt it for CBD.
△ Less
Submitted 11 February, 2012;
originally announced February 2012.
-
Requirements and the baseline plan
Authors:
M. Rizwan Jameel Qureshi
Abstract:
For each software project a plan is developed, according to a documented procedure, that covers the software activities and commitments. The requirements allocated to software form the basis for the software development plan. Estimates for critical computer resources are documented, reviewed, and agreed to. All affected groups and individuals understand the estimates and plans and commit to suppor…
▽ More
For each software project a plan is developed, according to a documented procedure, that covers the software activities and commitments. The requirements allocated to software form the basis for the software development plan. Estimates for critical computer resources are documented, reviewed, and agreed to. All affected groups and individuals understand the estimates and plans and commit to support them. Senior management reviews the estimates and plans before external commitments are made. Software risks associated with the cost, resources, schedule, and technical aspects of the project are identified and evaluated, and contingencies are documented. Planning and estimation data are collected for use in planning subsequent projects and for input in management oversight review meetings.
△ Less
Submitted 21 January, 2012;
originally announced January 2012.