This page has only limited features, please log in for full access.

Dr. Fazal-e- Amin
King Saud University

Basic Info


Research Keywords & Expertise

0 Software Modeling
0 Software Reuse
0 Global Software Development
0 Empirical Software Engineering
0 Software engineering

Fingerprints

Global Software Development
Software Reuse
Software engineering

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

Fazal-e- Amin received his B.Sc. in computer science from Hamdard University. He received a Master’s degree in information technology from Quid-i-Azam University and a Master’s degree in software engineering from International Islamic University. He received his Ph.D. degree from the Department of Computer and Information Sciences, Universiti Teknologi PETRONAS, Malaysia. He has secured several research grants and completed research projects successfully. He has published several research papers in reputable journals and conferences and has served as a reviewer for many conferences and journals. Currently, he is serving as Associate Professor at the Department of Software Engineering at the College of Computer and Information Sciences, King Saud University, Saudi Arabia. His research interest includes software project management, open-source software, software usability, IoT, blockchain, and global software development.

Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 01 March 2021 in Sustainability
Reads 0
Downloads 0

Software risks are a common phenomenon in the software development lifecycle, and risks emerge into larger problems if they are not dealt with on time. Software risk management is a strategy that focuses on the identification, management, and mitigation of the risk factors in the software development lifecycle. The management itself depends on the nature, size, and skill of the project under consideration. This paper proposes a model that deals with identifying and dealing with the risk factors by introducing different observatory and participatory project factors. It is assumed that most of the risk factors can be dealt with by doing effective business processing that in response deals with the orientation of risks and elimination or reduction of those risk factors that emerge over time. The model proposes different combinations of resource allocation that can help us conclude a software project with an extended amount of acceptability. This paper presents a Risk Reduction Model, which effectively handles the application development risks. The model can synchronize its working with medium to large-scale software projects. The reduction in software failures positively affects the software development environment, and the software failures shall reduce consequently.

ACS Style

Basit Shahzad; Fazal- E- Amin; Ahsanullah Abro; Muhammad Imran; Muhammad Shoaib. Resource Optimization-Based Software Risk Reduction Model for Large-Scale Application Development. Sustainability 2021, 13, 2602 .

AMA Style

Basit Shahzad, Fazal- E- Amin, Ahsanullah Abro, Muhammad Imran, Muhammad Shoaib. Resource Optimization-Based Software Risk Reduction Model for Large-Scale Application Development. Sustainability. 2021; 13 (5):2602.

Chicago/Turabian Style

Basit Shahzad; Fazal- E- Amin; Ahsanullah Abro; Muhammad Imran; Muhammad Shoaib. 2021. "Resource Optimization-Based Software Risk Reduction Model for Large-Scale Application Development." Sustainability 13, no. 5: 2602.

Research article
Published: 09 April 2020 in PLOS ONE
Reads 0
Downloads 0

Software development outsourcing is becoming more and more famous because of the advantages like cost abatement, process enhancement, and coping with the scarcity of needed resources. Studies confirm that unfortunately a large proportion of the software development outsourcing projects fails to realize anticipated benefits. Investigations into the failures of such projects divulge that in several cases software development outsourcing projects are failed because of the issues that are associated with requirements engineering process. The objective of this study is the identification and the ranking of the commonly occurring issues of the requirements engineering process in the case of software development outsourcing. For this purpose, contemporary literature has been assessed rigorously, issues faced by practitioners have been identified and three questionnaire surveys have been organized by involving experienced software development outsourcing practitioners. The Delphi technique, cut-off value method and 50% rule have also been employed. The study explores 150 issues (129 issues from literature and 21 from industry) of requirements engineering process for software development outsourcing, groups the 150 issues into 7 identified categories and then extricates 43 customarily or commonly arising issues from the 150 issues. Founded on ‘frequency of occurrence’ the 43 customarily arising issues have been ranked with respect to respective categories (category-wise ranking) and with respect to all the categories (overall ranking). Categories of the customarily arising issues have also been ranked. The issues’ identification and ranking contribute to design proactive software project management plan for dealing with software development outsourcing failures and attaining conjectured benefits of the software development outsourcing.

ACS Style

Javed Iqbal; Rodina B. Ahmad; Muzafar Khan; Fazal-E- Amin; Sultan Alyahya; Mohd Hairul Nizam Nasir; Adnan Akhunzada; Muhammad Shoaib. Requirements engineering issues causing software development outsourcing failure. PLOS ONE 2020, 15, e0229785 .

AMA Style

Javed Iqbal, Rodina B. Ahmad, Muzafar Khan, Fazal-E- Amin, Sultan Alyahya, Mohd Hairul Nizam Nasir, Adnan Akhunzada, Muhammad Shoaib. Requirements engineering issues causing software development outsourcing failure. PLOS ONE. 2020; 15 (4):e0229785.

Chicago/Turabian Style

Javed Iqbal; Rodina B. Ahmad; Muzafar Khan; Fazal-E- Amin; Sultan Alyahya; Mohd Hairul Nizam Nasir; Adnan Akhunzada; Muhammad Shoaib. 2020. "Requirements engineering issues causing software development outsourcing failure." PLOS ONE 15, no. 4: e0229785.

Journal article
Published: 23 May 2019 in IEEE Access
Reads 0
Downloads 0

Currently, being deployed by organizations to develop high-quality software at a low cost, global software development (GSD) faces many challenges that make development activities more complex. These GSD challenges are mainly concerned with requirements change management (RCM). RCM plays a key role in the successful execution of software projects. The objective of this study is to identify the best practices of RCM process by adopting systematic literature review (SLR) and validate them using questionnaire survey with industry experts. A total of 46 best practices were identified through SLR and validated with industry experts. We have further classified the identified practices in the domain of client and vendor GSD organizations with aim to provide clear understanding of the RCM best practices in the context of both types of GSD organizations (client, vendor). Moreover, we have conducted a comparison analysis between SLR and questionnaire survey data, and found a moderate positive correlation in the ranks of both data sets (rs= 0.522, p=0.003). In addition, the criticality of the identified best practices was assessed using the criteria of a practice having frequency ≥50%. The findings of this study provide a framework that could help the GSD organizations to address the problems related to RCM in GSD environment.

ACS Style

Muhammad Azeem Akbar; Jun Sang; Nasrullah; Arif Ali Khan; Muhammad Shafiq; Fazal-E- Amin. Towards the Guidelines for Requirements Change Management in Global Software Development: Client-Vendor Perspective. IEEE Access 2019, 7, 76985 -77007.

AMA Style

Muhammad Azeem Akbar, Jun Sang, Nasrullah, Arif Ali Khan, Muhammad Shafiq, Fazal-E- Amin. Towards the Guidelines for Requirements Change Management in Global Software Development: Client-Vendor Perspective. IEEE Access. 2019; 7 (99):76985-77007.

Chicago/Turabian Style

Muhammad Azeem Akbar; Jun Sang; Nasrullah; Arif Ali Khan; Muhammad Shafiq; Fazal-E- Amin. 2019. "Towards the Guidelines for Requirements Change Management in Global Software Development: Client-Vendor Perspective." IEEE Access 7, no. 99: 76985-77007.

Journal article
Published: 16 May 2018 in IEEE Access
Reads 0
Downloads 0

Cooperative routing mitigates the adverse channel effects in the harsh underwater environment and ensures reliable delivery of packets from the bottom to the surface of water. Cooperative routing is analogous to sparse recovery in that faded copies of data packets are processed by the destination node to extract the desired informationCooperative routing mitigates the adverse channel effects in the harsh underwater environment and ensures reliable delivery of packets from the bottom to the surface of water. Cooperative routing is analogous to sparse recovery in that faded copies of data packets are processed by the destination node to extract the desired information. However, it usually requires information about the two or three position coordinates of the nodes. It also requires the synchronization of the source, relay and destination nodes. These features make the cooperative routing a challenging task as sensor nodes move with water currents. Moreover, the data packets are simply discarded if the acceptable threshold is not met at the destination. This threatens the reliable delivery of data to the final destination. To cope with these challenges, this paper proposes a cooperative energy efficient optimal relay selection (Co-EEORS) protocol for UWSNs. Unlike the existing routing protocols involving cooperation, the proposed scheme combines location and depth of the sensor nodes to select the destination nodes. Combination of these two parameters does not involve knowing the position coordinates of the nodes and results in selection of the destination nodes closest to the water surface. As a result, data packets are less affected by the channel properties. In addition, a source node chooses a relay node and a destination node. Data packets are sent to the destination node by the relay node as soon as the relay node receives them. This eliminates the need for synchronization among the source, relay and destination nodes. Moreover, the destination node acknowledges the source node about the successful reception or retransmission of the data packets. This overcomes packets drop. Based on simulation results, the proposed scheme is superior in delivering packets to the final destination than some existing techniques.

ACS Style

Anwar Khan; Ihsan Ali; Atiq Ur Rahman; Muhammad Imran; Fazal-E- Amin; Hasan Mahmood. Co-EEORS: Cooperative Energy Efficient Optimal Relay Selection Protocol for Underwater Wireless Sensor Networks. IEEE Access 2018, 6, 28777 -28789.

AMA Style

Anwar Khan, Ihsan Ali, Atiq Ur Rahman, Muhammad Imran, Fazal-E- Amin, Hasan Mahmood. Co-EEORS: Cooperative Energy Efficient Optimal Relay Selection Protocol for Underwater Wireless Sensor Networks. IEEE Access. 2018; 6 (99):28777-28789.

Chicago/Turabian Style

Anwar Khan; Ihsan Ali; Atiq Ur Rahman; Muhammad Imran; Fazal-E- Amin; Hasan Mahmood. 2018. "Co-EEORS: Cooperative Energy Efficient Optimal Relay Selection Protocol for Underwater Wireless Sensor Networks." IEEE Access 6, no. 99: 28777-28789.

Journal article
Published: 11 May 2018 in IEEE Access
Reads 0
Downloads 0

Presently, global software development (GSD) is growing very rapidly. However, it is not an easy and straightforward process. Requirements engineering (RE) and requirements change management (RCM) both are considered as very challenging activities due to demanding rich communications. Because it is necessary to address geographical and cultural differences in GSD, this requirement makes RE and RCM challenging. This study investigates the importance of project management in RE and RCM processes. First, the frameworks with the phenomena of specialized project management are proposed for RE and RCM. Then, a survey and blind interviews of the experts are conducted to validate the proposed frameworks. Finally, statistical tools are applied to analyze the collected data. By utilizing the analyzed data, our results show the significant impacts of both frameworks (i.e., RE and RCM) in the GSD environment.

ACS Style

Muhammad Shafiq; Qinghua Zhang; Muhammad Azeem Akbar; Arif Ali Khan; Shahid Hussain; Fazal-E- Amin; Asfandyar Khan; Aized Amin Soofi. Effect of Project Management in Requirements Engineering and Requirements Change Management Processes for Global Software Development. IEEE Access 2018, 6, 25747 -25763.

AMA Style

Muhammad Shafiq, Qinghua Zhang, Muhammad Azeem Akbar, Arif Ali Khan, Shahid Hussain, Fazal-E- Amin, Asfandyar Khan, Aized Amin Soofi. Effect of Project Management in Requirements Engineering and Requirements Change Management Processes for Global Software Development. IEEE Access. 2018; 6 (99):25747-25763.

Chicago/Turabian Style

Muhammad Shafiq; Qinghua Zhang; Muhammad Azeem Akbar; Arif Ali Khan; Shahid Hussain; Fazal-E- Amin; Asfandyar Khan; Aized Amin Soofi. 2018. "Effect of Project Management in Requirements Engineering and Requirements Change Management Processes for Global Software Development." IEEE Access 6, no. 99: 25747-25763.

Journal article
Published: 13 February 2018 in IEEE Access
Reads 0
Downloads 0

Traditionally, software development organizations relied on heavyweight development methodologies, such as waterfall, V-model, and others. Later, agile development methodologies known as lightweight methodologies were introduced. Many considered these to be more flexible and more effective than heavyweight methodologies. Both methodologies are equally important for a software development life cycle. The purpose of adopting software development methodologies is to optimize the process model to achieve milestones while concurrently and effectively managing time, budget, and quality. The literature review reveals that there is a lack of statistical evidence for determining the effect of both methodologies on the six-pointed star model (schedule, scope, budget, risk, resource, and quality). In this paper, statistical comparisons were performed for the effects of both methodologies on each factor of the six-pointed star model and the interdependency among factors. Numerical analyses were conducted based on survey responses collected from the experienced users of both methodologies. After examining the results of all the factors of both methodologies, it was determined that lightweight methodologies are suitable for small-scale projects and that heavyweight methodologies perform better for mediumand large-scale projects.

ACS Style

Muhammad Azeem Akbar; Jun Sang; Arif Ali Khan; Fazal-E- Amin; Nasrullah; Shahid Hussain; Mohammad Khalid Sohail; Hong Xiang; Bin Cai. Statistical Analysis of the Effects of Heavyweight and Lightweight Methodologies on the Six-Pointed Star Model. IEEE Access 2018, 6, 8066 -8079.

AMA Style

Muhammad Azeem Akbar, Jun Sang, Arif Ali Khan, Fazal-E- Amin, Nasrullah, Shahid Hussain, Mohammad Khalid Sohail, Hong Xiang, Bin Cai. Statistical Analysis of the Effects of Heavyweight and Lightweight Methodologies on the Six-Pointed Star Model. IEEE Access. 2018; 6 ():8066-8079.

Chicago/Turabian Style

Muhammad Azeem Akbar; Jun Sang; Arif Ali Khan; Fazal-E- Amin; Nasrullah; Shahid Hussain; Mohammad Khalid Sohail; Hong Xiang; Bin Cai. 2018. "Statistical Analysis of the Effects of Heavyweight and Lightweight Methodologies on the Six-Pointed Star Model." IEEE Access 6, no. : 8066-8079.

Journal article
Published: 29 December 2017 in IEEE Access
Reads 0
Downloads 0

Quality is the most important factor for software development as it mainly defines customer satisfaction that is directly related to the success of a software project. The software process model is used to ensure software quality, represent a variety of task settings, manage project duration, improve the process and range to execute the process understanding, and to appropriate implicit conjecture for all task settings. Several software processes models exist in software albeit with limited scope. Given this viewpoint, this paper presents a new software development life cycle model, “AZ-Model”, for software development by introducing new activities during software development life cycle. It overcomes the limitations of traditional models and significantly impacts the production of a quality product in a time-box. This paper also presents a comprehensive comparative study and statistical analyses to examine the significance of AZ-Model for software development.

ACS Style

Muhammad Azeem Akbar; Jun Sang; Arif Ali Khan; Fazal-E- Amin; Nasrullah; Muhammad Shafiq; Shahid Hussain; Haibo Hu; Manzoor Elahi; Hong Xiang. Improving the Quality of Software Development Process by Introducing a New Methodology–AZ-Model. IEEE Access 2017, 6, 4811 -4823.

AMA Style

Muhammad Azeem Akbar, Jun Sang, Arif Ali Khan, Fazal-E- Amin, Nasrullah, Muhammad Shafiq, Shahid Hussain, Haibo Hu, Manzoor Elahi, Hong Xiang. Improving the Quality of Software Development Process by Introducing a New Methodology–AZ-Model. IEEE Access. 2017; 6 ():4811-4823.

Chicago/Turabian Style

Muhammad Azeem Akbar; Jun Sang; Arif Ali Khan; Fazal-E- Amin; Nasrullah; Muhammad Shafiq; Shahid Hussain; Haibo Hu; Manzoor Elahi; Hong Xiang. 2017. "Improving the Quality of Software Development Process by Introducing a New Methodology–AZ-Model." IEEE Access 6, no. : 4811-4823.

Journal article
Published: 01 October 2017 in Journal of Medical Imaging and Health Informatics
Reads 0
Downloads 0
ACS Style

Saba Noor; Mansoor Ahmed; Malik Najmus Saqib; M. Abdullah-Al-Wadud; Saiful Islam; Fazal-E- Amin. Ontology for Attack Detection: Semantic-Based Approach for Genomic Data Security. Journal of Medical Imaging and Health Informatics 2017, 7, 1309 -1323.

AMA Style

Saba Noor, Mansoor Ahmed, Malik Najmus Saqib, M. Abdullah-Al-Wadud, Saiful Islam, Fazal-E- Amin. Ontology for Attack Detection: Semantic-Based Approach for Genomic Data Security. Journal of Medical Imaging and Health Informatics. 2017; 7 (6):1309-1323.

Chicago/Turabian Style

Saba Noor; Mansoor Ahmed; Malik Najmus Saqib; M. Abdullah-Al-Wadud; Saiful Islam; Fazal-E- Amin. 2017. "Ontology for Attack Detection: Semantic-Based Approach for Genomic Data Security." Journal of Medical Imaging and Health Informatics 7, no. 6: 1309-1323.

Journal article
Published: 01 October 2017 in Journal of Medical Imaging and Health Informatics
Reads 0
Downloads 0
ACS Style

Iftikhar Ahmad; Irshad Ahmad; Fazal-E- Amin; Muhammad Imran; Kashif Sattar; Mohammad Shoaib; Muhammad Nasir. Towards Intrusion Detection to Secure VANET-Assisted Healthcare Monitoring System. Journal of Medical Imaging and Health Informatics 2017, 7, 1391 -1398.

AMA Style

Iftikhar Ahmad, Irshad Ahmad, Fazal-E- Amin, Muhammad Imran, Kashif Sattar, Mohammad Shoaib, Muhammad Nasir. Towards Intrusion Detection to Secure VANET-Assisted Healthcare Monitoring System. Journal of Medical Imaging and Health Informatics. 2017; 7 (6):1391-1398.

Chicago/Turabian Style

Iftikhar Ahmad; Irshad Ahmad; Fazal-E- Amin; Muhammad Imran; Kashif Sattar; Mohammad Shoaib; Muhammad Nasir. 2017. "Towards Intrusion Detection to Secure VANET-Assisted Healthcare Monitoring System." Journal of Medical Imaging and Health Informatics 7, no. 6: 1391-1398.

Journal article
Published: 01 October 2017 in Journal of Medical Imaging and Health Informatics
Reads 0
Downloads 0
ACS Style

Nada Almohaimeed; Fazal-E- Amin; Areej Al-Wabil. Virtual Reality-Based Surgical Simulation Training Usability Heuristics. Journal of Medical Imaging and Health Informatics 2017, 7, 1338 -1345.

AMA Style

Nada Almohaimeed, Fazal-E- Amin, Areej Al-Wabil. Virtual Reality-Based Surgical Simulation Training Usability Heuristics. Journal of Medical Imaging and Health Informatics. 2017; 7 (6):1338-1345.

Chicago/Turabian Style

Nada Almohaimeed; Fazal-E- Amin; Areej Al-Wabil. 2017. "Virtual Reality-Based Surgical Simulation Training Usability Heuristics." Journal of Medical Imaging and Health Informatics 7, no. 6: 1338-1345.

Journal article
Published: 01 October 2017 in Journal of Medical Imaging and Health Informatics
Reads 0
Downloads 0
ACS Style

Buthina Al-Dhafian; Iftikhar Ahmad; Muhammad Hussain; Fazal-E- Amin; Muhammad Imran. Improving the Security in Healthcare Information System Through Elman Neural Network Based Classifier. Journal of Medical Imaging and Health Informatics 2017, 7, 1429 -1435.

AMA Style

Buthina Al-Dhafian, Iftikhar Ahmad, Muhammad Hussain, Fazal-E- Amin, Muhammad Imran. Improving the Security in Healthcare Information System Through Elman Neural Network Based Classifier. Journal of Medical Imaging and Health Informatics. 2017; 7 (6):1429-1435.

Chicago/Turabian Style

Buthina Al-Dhafian; Iftikhar Ahmad; Muhammad Hussain; Fazal-E- Amin; Muhammad Imran. 2017. "Improving the Security in Healthcare Information System Through Elman Neural Network Based Classifier." Journal of Medical Imaging and Health Informatics 7, no. 6: 1429-1435.

Journal article
Published: 01 June 2017 in Journal of Medical Imaging and Health Informatics
Reads 0
Downloads 0

Testbeds are common in engineering education. Testbeds provides a platform for learning and simulation of complex engineering tasks. C4I (Command, Control, Communication, Computer and Intelligence) systems are critical systems of systems. These systems are used in different domains like battlefield management, emergency response, and in disaster/recovery management etc. Due to the sensitive nature of these domains and applications of these systems, testing them in real environment is difficult. Usually, testbeds are used to test and simulate such systems. Testbeds also help to better learn and understand the systems. C4I systems can be expanded or upgraded to enhance their functionality by adding more computing resources. Cloud computing provides a solution for the convenient access and scaling of resources. Recently, researchers envisioned to deploy command and control systems using cloud. However, there are many issues in such deployment, security is one of them. In this research paper security requirements and concerns of cloud based C4I systems are highlighted. Cloud computing and C4I systems are discussed from the security point of view. Furthermore, an enhanced encryption algorithm to improve data confidentiality is presented in this paper and its security is analyzed. This research will be helpful for both academia and industry to further strengthen the basis of cloud based C4I systems by improving data confidentiality.

ACS Style

Fazal-E- Amin; Iftikhar Ahmad; AbdullahS. Alghamdi. Improving Security of Cloud Based C4I Systems: A Data Confidentiality Approach for C4I Test-Bed. Journal of Medical Imaging and Health Informatics 2017, 7, 720 -728.

AMA Style

Fazal-E- Amin, Iftikhar Ahmad, AbdullahS. Alghamdi. Improving Security of Cloud Based C4I Systems: A Data Confidentiality Approach for C4I Test-Bed. Journal of Medical Imaging and Health Informatics. 2017; 7 (3):720-728.

Chicago/Turabian Style

Fazal-E- Amin; Iftikhar Ahmad; AbdullahS. Alghamdi. 2017. "Improving Security of Cloud Based C4I Systems: A Data Confidentiality Approach for C4I Test-Bed." Journal of Medical Imaging and Health Informatics 7, no. 3: 720-728.

Journal article
Published: 01 January 2017 in IEEE Access
Reads 0
Downloads 0

Software development organizations are globalizing their activities by adopting the phenomenon of global software development (GSD), mainly due to the significant return on investment it offers. Various challenges are associated with software process improvement (SPI). The aim of this work is to develop a software process improvement implementation and management model (SPIIMM) that can assist GSD organizations in assessing and improving their SPI activities. A thorough systematic literature review (SLR) study was performed to identify the critical success factors (CSFs), critical barriers (CBs), and the relevant practices of SPI. An empirical study of the industry was conducted with 111 SPI experts using a survey questionnaire to verify the outcomes of the SLR. The final CSFs and CBs were categorized into five maturity levels based on the implementation maturity model (IMM), the software outsourcing vendor readiness model (SOVRM), and capability maturity model integration (CMMI). Each maturity level consisted of different CSFs and CBs to assess and improve the SPI-related maturity level of an organization. Three case studies were conducted to evaluate the effectiveness of the proposed model. The results revealed that SPIIMM can provide a robust framework to assess and improve SPI activities in GSD organizations.

ACS Style

Arif Ali Khan; Jacky Keung; Fazal-E- Amin; M. Abdullah-Al-Wadud. SPIIMM: Toward a Model for Software Process Improvement Implementation and Management in Global Software Development. IEEE Access 2017, 5, 13720 -13741.

AMA Style

Arif Ali Khan, Jacky Keung, Fazal-E- Amin, M. Abdullah-Al-Wadud. SPIIMM: Toward a Model for Software Process Improvement Implementation and Management in Global Software Development. IEEE Access. 2017; 5 (99):13720-13741.

Chicago/Turabian Style

Arif Ali Khan; Jacky Keung; Fazal-E- Amin; M. Abdullah-Al-Wadud. 2017. "SPIIMM: Toward a Model for Software Process Improvement Implementation and Management in Global Software Development." IEEE Access 5, no. 99: 13720-13741.

Journal article
Published: 01 October 2015 in Computers in Human Behavior
Reads 0
Downloads 0
ACS Style

Fazal-E- Amin. Characterization of web browser usage on smartphones. Computers in Human Behavior 2015, 51, 896 -902.

AMA Style

Fazal-E- Amin. Characterization of web browser usage on smartphones. Computers in Human Behavior. 2015; 51 ():896-902.

Chicago/Turabian Style

Fazal-E- Amin. 2015. "Characterization of web browser usage on smartphones." Computers in Human Behavior 51, no. : 896-902.

Conference paper
Published: 01 May 2015 in Fifth International Conference on the Innovative Computing Technology (INTECH 2015)
Reads 0
Downloads 0

C4I (Command, Control, Communication, Computer and Intelligence) systems became the core of the command and control operations in military, emergency response, disaster management etc. The data sets used by these systems are large and complex to analyze and analysis process take long time. In today's scenario the quantity of information or data that is traveling over the internet is not only huge in size but intricate as well. Big Data are now speedily growing in all domains of science and engineering due to fast expansion of data storage, networking and data collection capacity. Since Big Data is an emerging technology in the market which can bring huge benefits to the companies and organizations, it becomes a need of time to understand this technology. C4I systems can also be benefitted from Big Data. In this paper some important goals, applications, challenges and tools of Big Data are highlighted in context of C4I systems that will be helpful for both academia and industry to further strengthen the basis of Big Data usage in C4I systems.

ACS Style

Fazal-E- Amin; Abdullah S. Alghamdi; Iftikhar Ahmad; Tazar Hussain; AlGhamdi A.S.; Ahmad I.; Hussain T.. Big data for C4i systems: goals, applications, challenges and tools. Fifth International Conference on the Innovative Computing Technology (INTECH 2015) 2015, 89 -93.

AMA Style

Fazal-E- Amin, Abdullah S. Alghamdi, Iftikhar Ahmad, Tazar Hussain, AlGhamdi A.S., Ahmad I., Hussain T.. Big data for C4i systems: goals, applications, challenges and tools. Fifth International Conference on the Innovative Computing Technology (INTECH 2015). 2015; ():89-93.

Chicago/Turabian Style

Fazal-E- Amin; Abdullah S. Alghamdi; Iftikhar Ahmad; Tazar Hussain; AlGhamdi A.S.; Ahmad I.; Hussain T.. 2015. "Big data for C4i systems: goals, applications, challenges and tools." Fifth International Conference on the Innovative Computing Technology (INTECH 2015) , no. : 89-93.

Journal article
Published: 16 March 2015 in IEEE Transactions on Wireless Communications
Reads 0
Downloads 0

In Cognitive Radio Ad Hoc Networks (CRAHNs), cooperative spectrum sensing schemes exploit spatial diversity of the Secondary Users (SUs), to reliably detect an unoccupied licensed spectrum. Soft energy combining schemes provide optimal detection performance by combining the actual sensed information from SUs. For reliable data fusion, these techniques mandate weight estimation for individual SUs in each sensing interval, resulting in high cooperation overhead in terms of time, processing and bandwidth. Alternately, a hard energy combining scheme offers lower cooperation overhead in which only local SU decisions are reported to the fusion center. However, it provides sub-optimal detection performance due to the information loss. In this paper, a Log-Likelihood Ratio (LLR) based cooperative spectrum sensing scheme is proposed in which each SU performs a local LLR based sensing test employing two threshold levels. The local decision and sequentially estimated SNR parameter values (for weight computation) are not reported to the fusion center if the local test result is in-between the two threshold levels. Thereby, cooperation overhead is reduced in proportion to the hard combining techniques; nevertheless simulation results show that the detection performance of the proposed scheme is close to the optimal soft combining techniques.

ACS Style

Sheeraz A. Alvi; Muhammad S. Younis; Muhammad Imran; Fazal-E- Amin; Mohsen Guizani. A Near-Optimal LLR Based Cooperative Spectrum Sensing Scheme for CRAHNs. IEEE Transactions on Wireless Communications 2015, 14, 1 -1.

AMA Style

Sheeraz A. Alvi, Muhammad S. Younis, Muhammad Imran, Fazal-E- Amin, Mohsen Guizani. A Near-Optimal LLR Based Cooperative Spectrum Sensing Scheme for CRAHNs. IEEE Transactions on Wireless Communications. 2015; 14 (7):1-1.

Chicago/Turabian Style

Sheeraz A. Alvi; Muhammad S. Younis; Muhammad Imran; Fazal-E- Amin; Mohsen Guizani. 2015. "A Near-Optimal LLR Based Cooperative Spectrum Sensing Scheme for CRAHNs." IEEE Transactions on Wireless Communications 14, no. 7: 1-1.

Conference paper
Published: 01 October 2014 in 2014 IEEE Conference on Open Systems (ICOS)
Reads 0
Downloads 0

Browsing Web through smartphone browsers is gaining popularity due to the convenience and availability of infrastructure at almost all places. On the other hand the capabilities of smartphone browsers are also improved to a great extent and many browsers are available to users. One can perform almost all of his information seeking and Web related tasks through smartphone browser. Many Web sites are customized for the smartphone browsers. This research work is deemed to identify the frequently used smartphone browser features. Mixed methods of research are employed in this study. Qualitative method i.e. interview is used to collect the data from the smartphone users to lay down the basis for quantitative phase i.e. survey. Features are categorized into different categories and two groups i.e. basic, and advanced features. Results show that features related to tabs, view and download are the frequently used by users. The results are equally help for practitioners and researchers to work on the improvement of browser's usability.

ACS Style

Fazal-E- Amin; Abdullah S. Alghamdi; Iftikhar Ahmad. Identification of frequently used features of smartphone web browsers. 2014 IEEE Conference on Open Systems (ICOS) 2014, 133 -138.

AMA Style

Fazal-E- Amin, Abdullah S. Alghamdi, Iftikhar Ahmad. Identification of frequently used features of smartphone web browsers. 2014 IEEE Conference on Open Systems (ICOS). 2014; ():133-138.

Chicago/Turabian Style

Fazal-E- Amin; Abdullah S. Alghamdi; Iftikhar Ahmad. 2014. "Identification of frequently used features of smartphone web browsers." 2014 IEEE Conference on Open Systems (ICOS) , no. : 133-138.

Conference paper
Published: 01 March 2014 in 2014 International Conference on Computational Science and Computational Intelligence
Reads 0
Downloads 0

C4I (Command, Control, Communication, Computer and Intelligence) systems are critical systems of systems. These systems are used in military, emergency response, and in disaster management etc. Due to the sensitive nature of domains and applications of these systems, quality could never be compromised. C4I systems are resource demanding system, their expansion or up gradation for the sake of improvement require additional computational resources. Cloud computing provides a solution for the convenient access and scaling of resources. Recently, it is envisioned by the researchers to deploy C4I systems using cloud computing resources. However, there are many issues in such deployment and security being at the top, is focus of many researchers. In this research, security requirements and concerns of cloud based C4I systems are highlighted. Different aspects of cloud computing and C4I systems are discussed from the security point of view. This research will be helpful for both academia and industry to further strengthen the basis of cloud based C4I systems.

ACS Style

Fazal-E- Amin; Abdullah S. Alghamdi; Iftikhar Ahmad. Cloud Based C4I Systems: Security Requirements and Concerns. 2014 International Conference on Computational Science and Computational Intelligence 2014, 2, 75 -80.

AMA Style

Fazal-E- Amin, Abdullah S. Alghamdi, Iftikhar Ahmad. Cloud Based C4I Systems: Security Requirements and Concerns. 2014 International Conference on Computational Science and Computational Intelligence. 2014; 2 ():75-80.

Chicago/Turabian Style

Fazal-E- Amin; Abdullah S. Alghamdi; Iftikhar Ahmad. 2014. "Cloud Based C4I Systems: Security Requirements and Concerns." 2014 International Conference on Computational Science and Computational Intelligence 2, no. : 75-80.

Journal article
Published: 20 February 2014 in Research Journal of Applied Sciences, Engineering and Technology
Reads 0
Downloads 0
ACS Style

Arif Ali Khan; Shuib Basri; Fazal-E- Amin. A Survey Based Study on Factors Effecting Communication in GSD. Research Journal of Applied Sciences, Engineering and Technology 2014, 7, 1309 -1317.

AMA Style

Arif Ali Khan, Shuib Basri, Fazal-E- Amin. A Survey Based Study on Factors Effecting Communication in GSD. Research Journal of Applied Sciences, Engineering and Technology. 2014; 7 (7):1309-1317.

Chicago/Turabian Style

Arif Ali Khan; Shuib Basri; Fazal-E- Amin. 2014. "A Survey Based Study on Factors Effecting Communication in GSD." Research Journal of Applied Sciences, Engineering and Technology 7, no. 7: 1309-1317.

Journal article
Published: 01 January 2014 in Procedia Computer Science
Reads 0
Downloads 0
ACS Style

Sheeraz Akhtar Alvi; Muhammad Shahzad Younis; Muhammad Imran; Fazal-E- Amin. A Log-likelihood based Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks. Procedia Computer Science 2014, 37, 196 -202.

AMA Style

Sheeraz Akhtar Alvi, Muhammad Shahzad Younis, Muhammad Imran, Fazal-E- Amin. A Log-likelihood based Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks. Procedia Computer Science. 2014; 37 ():196-202.

Chicago/Turabian Style

Sheeraz Akhtar Alvi; Muhammad Shahzad Younis; Muhammad Imran; Fazal-E- Amin. 2014. "A Log-likelihood based Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks." Procedia Computer Science 37, no. : 196-202.