Papers by Adeel Akbar Memon

American Journal of Systems and Software, Jan 23, 2014
The online research web and project library is an approach that will provide an online platform f... more The online research web and project library is an approach that will provide an online platform for the researchers with the library of projects, thesis of various disciplines. The study of emphasis share the experience gained from establishing a process and a supporting architecture for the role of an improved online research and web library in supporting online platform for the researchers. The architecture of the project that supports the web development team for the smooth implementation of web process is an area of focus. This online research web library System will allow the researchers to register themselves in order to submit their projects/thesis that can be searched by other researchers for the purpose of study. Furthermore, this architecture will also provide a productive mechanism of communication among the researchers that are in academies and industries so that the researchers of different fields can collaborate there work of mutual interest.
In this paper, we propose new approach for UML based modeling of relational databases. Furthermor... more In this paper, we propose new approach for UML based modeling of relational databases. Furthermore, we use UML Class Diagram and Sequence Diagram to model book data archive and SQL based operations on that data. However this approach is quite in general and can be used for other relational databases.
In this paper, we propose new approach for UML based modeling of relational databases. Furthermor... more In this paper, we propose new approach for UML based modeling of relational databases. Furthermore, we use UML Class Diagram and Sequence Diagram to model book data archive and SQL based operations on that data. However this approach is quite in general and can be used for other relational databases.
In this paper we are proposing a generic visual model for automatic exam system. We use UML as mo... more In this paper we are proposing a generic visual model for automatic exam system. We use UML as modeling language to model this system. This model is totally generic and extendable according to the requirements of any type of institution which conducts automatic exams. Furthermore, this model also helps in improving automatic exam system by showing performance analysis of students and evaluation using WEKA data mining methods.
Proceedings of 2014 International Conference on Cloud Computing and Internet of Things, 2014
Risk Assessment is one of the most critical parts of software engineering process, and risks are ... more Risk Assessment is one of the most critical parts of software engineering process, and risks are the factors that could be results in software failure if they are not correctly handled. In this Paper, we propose a solution to reduce risks using UML visualization of software processes in detail, and V-Model (Software Development Lifecycle Model) techniques are performed to produce verified results in each phase of development lifecycle. Using all above aspects and research findings, we propose "Risk Assessment V-Model". Furthermore, we use "Do Sale Process" to discuss different properties of our model. This model is quite in general and can be applicable and expendable for many kinds of software systems.
With the passage of time, service quality is the most evolving topic of cloud infrastructure wher... more With the passage of time, service quality is the most evolving topic of cloud infrastructure where resources are scattered over different places. Nowadays in cloud environment, it has become more essential that response time should be fast as well as consumption of bandwidth should be less and all the resources should be work properly. Thus, quality of service has achieved high priority. The purpose of this study is to review different cloud service techniques and their impact on cloud technology. This paper discusses the main factors that affect service quality and various existing methods to achieve high quality services in cloud technology.
with the passage of time as technology is evolving,
there is an increase in number of massive sec... more with the passage of time as technology is evolving,
there is an increase in number of massive security attacks
estimated. In this fast growing communication network, data
security has become a major issue. Cryptography is usually
employed to solve this problem. However combination of
cryptography with steganography is very valuable. In this paper,
we introduce a technique of hiding message by first encrypting it
with pseudorandom key stream of bits and then embed this
encrypted data inside image using Bit shifting method. The
primary purpose of this paper is to enhance security of useful
data possibly by combining steganography with cryptography.

The main responsibility and duty of government employees is to serve the nation. We have proposed... more The main responsibility and duty of government employees is to serve the nation. We have proposed a combination of cloud computing solution and data mining to the third world countries to better serve the nations. We have focused data/statistics gathered from Pakistan as exemplary data. There are four provincial governments of Pakistan headed by the Chief Ministers and ministries/departments are headed by the ministers/department heads. Having the up to date and accurate information on finger tips is headache for the stakeholders as the existing system is manual (Paper) work. The main objective of the proposed solution is to provide the up to date and accurate information (knowledge) to the stakeholders on their finger tips providing them a dashboard displaying the information with the drill down/up facility to get information of the own will. The proposed solution is intended to be used by the governments of third world countries to better serve the nations. However; the proposed solution is quite in general and can be easily adopted by the private organizations currently using individual information systems at different locations.

In this paper, we are proposing a new cloud computing solution for government hospitals of 3 rd w... more In this paper, we are proposing a new cloud computing solution for government hospitals of 3 rd world countries to better access patient's medical information. Existing system is based on manual paper work and independent standalone applications in some districts'/ small towns' hospitals which results in waste of resources, high construction and maintenance costs and difficult to manage and maintain. The main objective of proposing cloud based solution is to reduce the cost (construction and maintenance), to reduce data loss risk, to gather all the government hospitals on one platform to better access patients' medical information for easy management and maintenance. The proposed cloud computing solution is intended to be used by government hospitals of 3 rd world countries; however the solution is generic and can be used by government hospitals of any country and the community based hospitals.
In this paper, we are proposing new web based Student Annual Review Information System (SARIS) an... more In this paper, we are proposing new web based Student Annual Review Information System (SARIS) and prediction method for the success of scholar students to China Scholarship Council(CSC). The main objective of developing this system is to save the cost of paper, to reduce the risk of data loss, to decrease the processing time, to reduce the delay in finding for the successful students. The proposed system and prediction method is intended to be used by China Scholarship Council; however SARIS and prediction method are quite generic and can be used by other scholarship agencies.
Uploads
Papers by Adeel Akbar Memon
there is an increase in number of massive security attacks
estimated. In this fast growing communication network, data
security has become a major issue. Cryptography is usually
employed to solve this problem. However combination of
cryptography with steganography is very valuable. In this paper,
we introduce a technique of hiding message by first encrypting it
with pseudorandom key stream of bits and then embed this
encrypted data inside image using Bit shifting method. The
primary purpose of this paper is to enhance security of useful
data possibly by combining steganography with cryptography.