Ahmad Waqas
Sukkur Institute of Business Administration
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ahmad Waqas.
Information & Software Technology | 2016
Abdul Rehman Gilal; Jafreezal Jaafar; Mazni Omar; Shuib Basri; Ahmad Waqas
Abstract Context Recent studies have established the fact that the supply of handy and successful software has decreased to 6%. The past studies have also attributed this supply failure to software development team composition factor. To overcome this problem, it is also suggested in the past studies that the soft skills of team member must be considered along with the hard skills. Objective Keeping in view this problem, this study aimed to look for in-depth understanding of team-lead role with personality types of member. This study also included gender to see its diverting impact on personality types and job role, since past studies have also raised many issues pertinent to these two variables. Method This study used the experimented data to develop the rule-based model for software development team composition by keeping gender as major effecting variable with personality. There were three independent predictor variables: Team leader role, Personality types, and Gender; and one outcome dependent variable: team performance. Additionally, personality types of team members were measured by using Myers–Briggs Type Indicator(MBTI) instrument. This study divided the experiments into two stages. The first stage was descriptive examination of factual figures of data for model development. Whereas, the second stage was predictive experiments of data for developing the model. Results The findings revealed that each gender emerged compatible with different types of personality for the same role. For instance, descriptive analysis part of this research highlighted that feeling(F) personality males were appropriate for team leader role, on another hand, thinking(T) personality females were suitable for the team lead role. Conclusion The conclusion can be drawn with the claim that the personality types of software development team roles fluctuate by gender type. Besides, this study revealed and ensured that gender should be kept in the consideration when composing teams based on personality types.
international conference on information and communication technology | 2013
Ahmad Waqas; Zulkefli Muhammed Yusof; Asadullah Shah
The aim of cloud computing is to deliver on-demand services to its users with guarantee of scalability, availability and reliability. These services have a variety that may include simple and complex software, infrastructure and architecture. It may vary according to the Cloud Service Provider (CSP) and the service license agreement (SLA) with Cloud Client. The research contribution in this paper has two facets. First, an investigative review on cloud computing services, models, security and privacy concerns, and auditing strategies is conducted. Secondly, we suggest the fault tolerant approach in conjunction with the tiered strategy for cloud auditing.
international conference on advanced computer science applications and technologies | 2013
Ahmad Waqas; Zulkefli Muhammed Yusof; Asadullah Shah
This research paper aims to explore the underlying cloud computing architectures with respect to security and auditing services. As most of the standards have not been defined yet for cloud computing, academic and industrial researchers are participating with their ideas and proofs. We have surveyed and classified the available cloud computing architectures into three categories which are 1) Architecture of Cloud Computing Security and Auditing, 2) Data Storage Security, Privacy and Auditing of Data Leakage, and 3) Security and Auditing of Malicious Acts. This taxonomy and analysis of existing cloud architectures will be helpful to address the primary issues focusing the security and auditing perspectives in future research.
international conference on advanced computer science applications and technologies | 2013
Zeeshan Bhati; Asadullah Shah; Ahmad Waqas; Hafiz Abid Mahmood Malik
Character rigging is a process of endowing a character with a set of custom manipulators and controls making it easy to animate by the animators. These controls consist of simple joints, handles, or even separate character selection windows. This research paper present an automated rigging system for quadruped characters with custom controls and manipulators for animation. The full character rigging mechanism is procedurally driven based on various principles and requirements used by the riggers and animators. The automation is achieved initially by creating widgets according to the character type. These widgets then can be customized by the rigger according to the character shape, height and proportion. Then joint locations for each body parts are calculated and widgets are replaced programmatically. Finally a complete and fully operational procedurally generated character control rig is created and attached with the underlying skeletal joints. The functionality and feasibility of the rig was analyzed from various source of actual character motion and a requirements criterion was met. The final rigged character provides an efficient and easy to manipulate control rig with no lagging and at high frame rate.
International Journal of Computational Geometry and Applications | 2015
Zeeshan Bhati; Asadullah Shah; Ahmad Waqas; Nadeem Mahmood
Character rigging is a process of endowing a character with a set of custom manipulators and controls making it easy to animate by an animators. These controls consists of simple joints, handles, or even separate character selection window. This research paper presents an automated rigging system for quadruped characters with custom controls and manipulators for animation. The full character rigging mechanism is procedurally driven based on various principles and requirements used by the riggers and animators. The automation is achieved initially by creating widgets according to the character type. These widgets then can be customized by the rigger according to the character shape, height and proportion. Then joint locations for each body parts are calculated and widgets are replaced programmatically. Finally a complete and fully operational procedurally generated character control rig is created and attached with the underlying skeletal joints. The functionality and feasibility of the rig was analyzed from various sources of actual character motion and a requirements criterion was met. The final rigged character provides an efficient and easy to manipulate control rig with no lagging and at high frame rate.
Journal of Fundamental and Applied Sciences | 2018
Mostafa Karbasi; A. Zabidi; I. M. Yassin; Ahmad Waqas; Zeeshan Bhatti
Hearing impaired individuals have issues to communicate with normal people. They have their own language called Sign Language (SL) to express their feeling or to communicate with others. As communication is an essential part of normal everyday life, it is particularly important for deaf people to communicate as normally as possible with others. Recent advancements in computing technologies have the potential to be applied in the field of SL recognition. These computer-based approaches are able to translate the SL into verbal language and vice-versa. This paper describes the development of a dataset for an automated SL recognition system based on the Malaysian Sign Language (MSL). Implementation results are described.
the internet of things | 2017
Naeem A. Nawaz; Ahmad Waqas; Zulkefli Muhammed Yusof; Asadullah Shah
Crowdsource management imposes many challenges including varying degree of demands for food and daily routine consumables. The explicit problem for estimating increase or decrease in demand arises when crowd moves dynamically to different locations with respect to time. This may result in wastage or shortage of many resources and loss for various stakeholders. To overcome the issue of demand estimation more precisely food demand and efficient supply, this paper proposes a conceptual framework to sense the data of crowd such as number of humans and update the suppliers timely. IoT and WSN techniques are used to count the number of humans in crowd at some particular area with respect to time for food demand estimation.
International Journal of Advanced Computer Science and Applications | 2017
Mohammad Asif Khan; Ahmad Waqas; Qamar Uddin Khand; Sajid Khan
The past decade has been very productive for cellular operators of Pakistan, as their subscribers have grown exponentially with increase in revenue. After this wave of rising, the operators have now reached to saturation level, with the highest teledensity of all time. These Cellular Networks consist of Cell sites, which need electrical power to run. Because of electrical power shortage in Pakistan, the power needs of cell site are fulfilled by the use of electrical power generators which are installed on each site. These generators run on fossil fuel, a large amount of which is being theft from sites. This has very negative impact on Network availability and Operator’s operational expenditure. To cope with this major issue of fuel theft, an embedded system is being designed and tested. This paper highlights this issue of the telecom sector and discusses the design and results of the proposed system. This system would reduce the cell site operational cost and will increase its availability in the service area.
International Journal of Advanced Computer Science and Applications | 2017
Ahmad Waqas; M. Abdul Rehman; Abdul Rehman Gilal; Mohammad Asif Khan; Javed Ahmed; Zulkefli Muhammed Yusof
Cloud computing has emerged during the last decade and turned out to be an essential component for today’s business. Therefore, many solutions are being proposed to optimize and secure the cloud computing environment. To test and validate the proposed solutions before deploying in real cloud infrastructure, a cloud computing simulator is the key requirement. There are several cloud computing simulators that have been used by research community for this purpose. In this paper, we have discussed modern cloud simulators and presented comprehensive comparison based on their features.
international conference on information and communication technology | 2013
Ahmad Waqas; Nahdia Majeed; Zulkefli Muhammed Yusof; Abdul Waheed Mahesar
Object replication is an unavoidable phenomenon in distributed systems to address the issues of size, administrative and resources scalability. It also guarantees the availability of system as more users can be accommodated and failures can be tolerated. If the location of object replica is not proper, the problem may arise when it is requested by many entities at once. The response time may also increase due to the network latency although network is considered to be steadfast in the distributed systems but the latency can never be avoided. Efficient replica placement, both client initiated and server initiated, can be ensured using the dynamic replica placement mechanism in conjunction with the underlying routing protocols that provides the reliability of contents distribution and minimizes the network latency. In this paper, it is discussed that reliability can be assured if we use replica placement algorithm along with the EIGRP (Enhanced Interior Gateway Routing Protocol). The issues of choosing the best path for placing the replica that provides the minimum latency and reliability of contents transmission can be overcome by combining the EIGRP features that includes internetwork delay, bandwidth consumption, reliability of packet transmission and traffic load, with dynamic replica placement algorithm.