Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Muhammad Ilyas is active.

Publication


Featured researches published by Muhammad Ilyas.


international multi-conference on computing in global information technology | 2009

A Similarity Measurement Framework for Requirements Engineering

Muhammad Ilyas; Josef Küng

Researches show that a reasonable number of projects failed to achieve their desired goals. There could be many different reasons like managing requirements, excessive documentation of code, difficulty to deliver the software with all required functions on time etc. Through proper management of requirements and concept of reusability, an effort could be made to overcome such percentage of failure. This paper argues about requirement similarity measurements and a possible application to support design and code reusability. An outline of SimReq framework is a step towards this direction.


frontiers of information technology | 2009

A comparative analysis of similarity measurement techniques through SimReq framework

Muhammad Ilyas; Josef Küng

The study of semantic similarity has long been an essential part of natural language processing. In informational retrieval, usage of similarity measurement is getting popularity day by day, but usage of similarity measurements in requirements engineering is not very common. Previously, we have presented SimReq, a Similarity Measurement Framework for requirements engineering. In this paper, we have used different similarity measurement techniques with SimReq framework, and perform a comparative analysis among those similarity measurement techniques. Results have shown that efficiency of Cosine similarity measurement is always better than rest of other similarity measurement techniques.


Cluster Computing | 2018

Zombies Arena: fusion of reinforcement learning with augmented reality on NPC

Saad Razzaq; Fahad Maqbool; Maham Khalid; Iram Tariq; Aqsa Zahoor; Muhammad Ilyas

Augmented reality (AR) is a discipline having less cognizance but it is the door to new advance technologies. Accustomed games doesn’t facilitate user to physically interact with the surroundings which resulted into reduced learning capabilities. Our objective is to develop AR based first person shooter game empowering reinforcement learning. This act as a building block to capacitate users to interact with the physical environment. Non-player characters will be able to learn and adopt strategy more wisely after each move to capacitate players. Game is played by hundred users at different stages. Reported results are summarized in experiment section.


international symposium on networks computers and communications | 2017

A trust management system model for cloud

Ahmad Ali; Mansoor Ahmed; Abid Khan; Muhammad Ilyas; Muhammad Saad Razzaq

Distributed computing environments merged into cloud computing architecture which is being used extensively for resource sharing. It has provided efficient and flexible ways for the provision of services meeting resource sharing needs and challenges of the time. Cloud computing has become a cost effective solution as compared to traditional systems. In cloud computing, Software, Infrastructure, and Platforms are being provided as services however this introduced new dimensions of research in security and privacy breaches. Trust establishment and its maintenance play a vital role in Cloud Computing. Availability, Security and Privacy are key parameters of trust and sharing of privacy preserved statistics of these parameters with stakeholders enhances but Security and Privacy lapses shatter users trust. This paper proposes a model of Trust Management System which provides a comprehensive component based architecture to facilitate cloud service providers in maintaining Users Trust and ultimately help them in flourishing their business.


International Journal of Education and Management Engineering | 2017

A Comparative Study of Global Software Development Tools Supporting Project Management Activities

Hafiz Anas Bilal; Sunnia Amjad; Muhammad Ilyas

For the last few years,Global Software Development (GSD) has been gaining attention of experts and researchers. Because of distance, communication and cultural issues GSD is creating hurdles for performing effective project management. In this regard, GSD provides a large number of tools and technologies to facilitate and simplify the work for project managers. To accomplish this task we have used a framework.The results of the study of 21 existing tools reveals that although GSD tools show dominating strengths in achieving some Project Management (PM )goals, yet much work needs to be done. Comprehensively, there is an ultimate need of a single GSD that could facilitate every aspect of PM.


International Conference on Future Data and Security Engineering | 2017

Effectiveness of Object Oriented Inheritance Metrics in Software Reusability

Muhammad Ilyas; Josef Küng; Van Quoc Phuong Huynh

Inheritance is a key feature of object oriented paradigm. It is actually the sharing of attributes and operations among classes based on a hierarchical relationship. Software reusability is the basic concept of software engineering that is affected by the sophistication of inheritance hierarchy so in order to determine complexity of inheritance which in turn has impact on software reusability; we have proposed class inheritance metrics and explained them in an elaborative manner. In the work presented here we proposed different class inheritance metrics, compared them with existing ones and attempted to present an alternate solution with some extended features to find out intricacy of class inheritance which significantly concerns with reusability.


International Conference on Future Data and Security Engineering | 2017

MITIS - An Insider Threats Mitigation Framework for Information Systems

Ahmad Ali; Mansoor Ahmed; Muhammad Ilyas; Josef Küng

Cloud computing is now among the most extensively used mean for resource sharing as SaaS, PaaS, and IaaS. Computing Scenarios have been emerged into cloud computing instead of distributed computing. It has provided an efficient and flexible way for dynamic services meeting needs and challenges of the time in cost effective manners. Virtual environments provided the opportunity to migrate traditional systems to the cloud. Cloud service providers and Administrators generally have full access on Virtual Machines (VMs) whereas tenants have limited access on respective VMs. Cloud Admins as well as remote administrators also have full access rights on respective resources and may pose severe insiders threats on which tenants haven shown their concerns. Securing these resources are the key issues. In this paper, available practices for cloud security are investigated and a self-managed framework is introduced to mitigate malicious insider threats posed to these virtual environments.


Proceedings of the 2nd Africa and Middle East Conference on Software Engineering | 2016

An Automated System for Measuring Similarity between Software Requirements

Fatma A. Mihany; Hanan Moussa; Amr Kamel; Ehab Ezzat; Muhammad Ilyas

Recently, usage of text similarity has increased rapidly to be involved in different areas such as document clustering, information retrieval, short answer grading, text summarization, machine learning and natural language processing. Lexical-based similarity and semantic-based similarity are the two main categories of text similarity. Reusability of software components increases productivity and quality. In this paper, we propose that there is some linkage between text similarity and software reusability. In an organization, whenever a new incoming project is received, similarity test can be done to identify some similar projects and therefore some components to be reused such as design, code and test cases instead of starting building software from scratch. In this paper, we present an interactive system to measure the lexical similarity between a new incoming project and a set of completed projects exist in the repository and therefore identify some components to be reused.


international conference on software engineering advances | 2010

Ontology-Based Similarity Measurement in Software Projects through SimReq Framework

Muhammad Ilyas; Josef Küng

The study of similarity measurement has long been a fundamental part of natural language processing. Similarity measurement usage is increasing day by day in Information Extraction. Moreover, determining similarity measurement between two or more sets of information is facing problem in web mining. Traditional information retrieval approaches may not always find out the right match of exact concepts. Previously, we have presented SimReq, a Similarity Measurement Framework for requirements engineering. In this paper, we have presented a new idea by using SimReq framework with the help of ontology to find out similarity measurements in different software projects based on different software attributes like Functional Size, Data Quality Rating, and Work Effort etc.


International journal of advanced science and technology | 2013

A Comparative Study on Code Smell Detection Tools

Almas Hamid; Muhammad Ilyas; Muhammad Hummayun; Asad Nawaz

Collaboration


Dive into the Muhammad Ilyas's collaboration.

Top Co-Authors

Avatar

Josef Küng

Johannes Kepler University of Linz

View shared research outputs
Top Co-Authors

Avatar

Ahmad Ali

COMSATS Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Mansoor Ahmed

COMSATS Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Abid Khan

COMSATS Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Aqsa Zahoor

University of Sargodha

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Iram Tariq

University of Sargodha

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Saad Razzaq

University of Sargodha

View shared research outputs
Researchain Logo
Decentralizing Knowledge