Papers by DR Nadeem Mahmood

Sukkur IBA Journal of Computing and Mathematical Sciences, 2017
It is always difficult to manipulate the production of huge amount of data which comes from multi... more It is always difficult to manipulate the production of huge amount of data which comes from multiple sources and to extract meaningful information to make appropriate decisions. When data comes from various input resources, to get required streams of events form this complex input network, the one of the strong functionality of Business Intelligence (BI) the Complex Event Processing (CEP) is the appropriate solution for the above mention problems. Real time processing, pattern matching, stream processing, big data management, sensor data processing and many more are the application areas of CEP. Health domain itself is a multi-dimension domain such as hospital supply chain, OPD management, disease diagnostic, In-patient, out-patient management, and emergency care etc. In this paper, the main focus is to discuss the application areas of Complex Event Processing (CEP) in health domain by using sensor device, such that how CEP manipulate health data set events coming from sensor device...

Un-weighted Network Study of Pakistani Airports
2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)
Complex network is a rich field which covers different social, biological and scientific networks... more Complex network is a rich field which covers different social, biological and scientific networks. Transportation network is an important indicator to measure the economic growth in any country. In this study different dynamics of Airport Network in Pakistan are analyzed by the complex network methodology. The air traffic data of summer 2016 has been gathered by Civil Aviation Authority (CAA) of Pakistan and formatted to fulfill the complex network requirement. The network is formed to observe its different properties and compare these with their topological counterparts. Airports of Pakistan are considered as nodes and flights between them within a week as edges. By analyzing the topology of the network, it has been observed that few focal hubs are present there. Degree distribution showed the behaviour as preferential attachment of nodes, like few nodes have high degree thus controlling overall network which emphasizes that Airport Network in Pakistan (ANP) follows power law. Un-weighted clustering coefficient showed that ANP is moderately clustered network. Clustering coefficient with short average path length underscores that ANP is small-world network. By analyzing the average nearest neighbour degree node, Knn(k), which illustrate that ANP showed disassortative mixing in nature which state that high degree nodes (airports) tend to connect to low degree nodes (airports).

Geospatial assessment of water quality using principal components analysis (PCA) and water quality index (WQI) in Basho Valley, Gilgit Baltistan (Northern Areas of Pakistan)
Environmental Monitoring and Assessment, 2022
Public health quality in Gilgit Baltistan (GB) is at threat due to multiple water-borne diseases.... more Public health quality in Gilgit Baltistan (GB) is at threat due to multiple water-borne diseases. Anthropogenic activities are accelerating the burden of pollution load on the glacio-fluvial streams and surface water resources of Basho Valley in Skardu district of GB. The present research has investigated the drinking water quality of the Basho Valley that is being used for domestic purposes. The study also comprehends public health status by addressing the basis drinking water quality parameters. A total of 23 water samples were collected and then analyzed to elucidate the current status of physico-chemical, metals, and microbial parameters. Principal component analysis (PCA) was applied and three principal components were obtained accounting 53.04% of the total variance, altogether. PCA identified that metallic and microbial parameters are the major factor to influence the water quality of the valley. Meanwhile, water quality index (WQI) was also computed and it was observed that WQI of the valley is characterized as excellent in terms of physico-chemical characteristics; however, metals and microbial WQI shows most of the samples are unfit for drinking purpose. Spatial distribution is also interpolated using the Inverse distance weight (IDW) to anticipate the results of mean values of parameters and WQI scores. The study concludes that water quality is satisfactory in terms of physico-chemical characteristics; however, analysis of metals shows that the concentrations of copper (Cu) (0.40 ± 0.16 mg/L), lead (Pb) (0.24 ± 0.10 mg/L), zinc (Zn) (6.77 ± 27.1 mg/L), manganese (Mn) (0.19 ± 0.05), and molybdenum (Mo) (0.07 ± 0.02 mg/L) are exceeding the maximum permissible limit as set in the WHO guidelines for drinking water. Similarly, the results of the microbial analysis indicate that the water samples are heavily contaminated with fecal pollution (TCC, TFC, and TFS > 3 MPN/100 mL). On the basis of PCA, WQI, and IDW, the main sources of pollution are most likely to be concluded as the anthropogenic activities including incoming pollution load from upstream channels. A few underlying sources by natural process of weathering and erosion may also cause release of metals in surface and groundwater. This study recommends ensuring public health with regular monitoring and assessment of water resources in the valley.

Assistive Technology: UK Land-Escape Study
People with disabilities accomplish daily living task with the help of assistive technology produ... more People with disabilities accomplish daily living task with the help of assistive technology products. For example, medical equipments or Tele-care can support older people living and enable them for caring themselves. Assistive technology enables quality life for peoples with disorder or impairment, and people with physical and mental weaknesses. Latest technology can help in developing assistive living products or improving caring methods. Improvement in technology enables various techniques for caring older people or people with disabilities. Research and products in result of this research are significantly increased for utilizing improved technology. For this purpose, this research investigates the current and past research/projects for assistive living technologies. This research studies various universities, research centers and companies/organizations involve in assistive living research/projects/ product development. This research can provide the insight for any business cas...
Security is the one of the basic need of human’s life and biggest challenge of history that canno... more Security is the one of the basic need of human’s life and biggest challenge of history that cannot be diminished at least in metropolitan cities like Karachi. It can only be controlled by efficient resources allocation and effective strategies with forthcoming insight of criminal moves. Big data analytics with the support of machine learning algorithms makes it possible to deals with huge amount of data, extract hidden inter-connection, pattern and meaningful information. This paper, proposed the model for the predictive policing system and built test model using k-means and naive Bayes methodologies for street crime in Karachi region. The model is then run under R and WEKA environment which produced accuracy around 70%.

WSEAS Transactions on Information Science and Applications archive, 2018
The rapid advancements in the fast and rapidly growing field of information and communication tec... more The rapid advancements in the fast and rapidly growing field of information and communication technologies (ICT’s) has lead us to new thinking paradigm and it is being implemented in all walks of life including business, finance, health, management, engineering, basic sciences, sports, social sciences and many other domains. There are many advantages of speedy growth of internet and mobile phones in the society and people are taking full advantage of them. However this technology is widely used by the criminals for the execution of criminal or terrorist activities. The state of Pakistan is going through a period where they are crushing criminal and terrorist networks throughout the country. There are number of terrorist and criminal activities in the last few years. This study focuses on the use of related equipment like mobile phone, SIM’s etc. in criminal or terrorist activities. We have analyzed call detail records (CDR) collected from tower data of five mobile companies by using...

Effectiveness of Online Teaching during COVID-19
2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), 2021
While considering the challenges of online teaching in the current scenario of Covid-19 pandemic,... more While considering the challenges of online teaching in the current scenario of Covid-19 pandemic, the current study aimed to analyze the effect of student participation, teachers' skills and strategies, teacher training, teaching domain and teaching perception on effectiveness of online teaching. Primary data was used to test the proposed model of the study, data was collected through emails using convenience sampling from university teachers of Pakistan. Structural equation modelling technique was used through SmartPLS (v.3.3.3) to analyze the model of this research. Findings of the current study indicate that student participation, teachers' skills and strategies, teacher's training, teaching domain and teaching perception have a significant positive effect on effectiveness of online teaching. Hence, this study recommends that universities must have to focus on the individual teachers' need to make online teaching more effective.

Sukkur IBA Journal of Computing and Mathematical Sciences, 2017
In today’s world the rapid advancements in Micro-Electromechanical Systems (MEMS) and Nano techno... more In today’s world the rapid advancements in Micro-Electromechanical Systems (MEMS) and Nano technology have improved almost all the aspects of daily life routine with the help of different smart devices such as smart phones, compact electronic devices etc. The prime example of these emerging developments is the development of wireless sensors for healthcare procedures. One kind of these sensors is wearable bio-sensors. In this paper, the technologies of two types of bio-sensors (ECG, EMG) are investigated and also compared with traditional ECG, EMG equipment. We have taken SHIMMERTM wireless sensor platform as an example of wearable biosensors technology. We have investigated the systems developed for analysis techniques with SHIMMERTM ECG and EMG wearable bio-sensors and these biosensors are used in continuous remote monitoring. For example, applications in continuous health monitoring of elderly people, critical chronic patients and Fitness & Fatigue observations. Nevertheless, ear...

Journal of Basic & Applied Sciences, 2017
Dysgraphia, a learning disability associated with writing skills, hinders students to put their t... more Dysgraphia, a learning disability associated with writing skills, hinders students to put their thought on paper and write correctly. Writing problems hit students most frequently that one third students become failed to acquire writing skill. Different IT based assistance solutions available for dysgraphia students but most of them are accommodations based or provides writing alternatives rather than developing writing skills of a dysgraphia student. Handwriting is an essential skill for academic life and developed handwriting skill helps student to protect their self-esteem and build student’s confidence to participate in other activities during class. Most of available writing assistance solutions do not provide interesting ways to acquire writing skills. To handle this problem, augmented reality (AR) based dysgraphia assistance solution has presented in this work. This study utilized AR to develop dysgraphia student’s interest in writing and used it to assist in writing activity...

WSEAS Transactions on Computers
The task of identifying the main key nodes in the dark (covert) networks is very important for th... more The task of identifying the main key nodes in the dark (covert) networks is very important for the researchers in the field of dark networks analysis. This analysis leads to locate the major nodes in the network as the functionality can be minimized by disrupting major key nodes in the network. In this paper, we have primarily focused on two basic network analysis metrics, degree and betweenness centrality. Traditionally, both these centrality measures have been applied on the bases of number of links connected with the nodes but without considering link weights. Like many other networks, dark networks also follow scale-free behavior and thus follow the power-law distribution where few nodes have maximum links. This, inhomogeneous structure of network causes the creation of key nodes. In this research, we analyze the behavior of nodes in dark networks based on degree and betweenness centrality measures by using 9/11 terrorist network dataset. We analyzed both these measures with wei...

International Journal of Database Management Systems, 2015
Distributed database management systems (DDBMs) have limited capacity to manage overhead of distr... more Distributed database management systems (DDBMs) have limited capacity to manage overhead of distributed transactions due to certain failures. These types of failures don't guarantee the enforcement of transactional properties and which reduces the scalability and availability of these systems. Research in this area proved that scaling out while providing consistency of transactions and guaranteeing availability in the presence of different failures in distributed computing environment is not feasible. As a result, the database community have used vertical scaling rather than horizontal scaling. Moreover changes in data access patterns resulting from a new generation of web applications with high scalability and availability guarantees weaker consistency. In this paper we have analyse that how different systems such as ElasTraS, Mstore, Sinfonia, ecStore and Gstore provide scalable transactional data access in cloud computing environment. We have also discussed transaction management (TM) in Gstore in detail and compared with other techniques and protocols used in current cloud based systems.
Temporal and Fuzzy Relational Databases: Application of Patient Data in Health-care Information Systems
The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), 2014
The integration of information and communication technology (ICT) in the healthcare sector has be... more The integration of information and communication technology (ICT) in the healthcare sector has been one of the important areas of research since last two decades. The application of RFID (Radio Frequency Identification) technology is widely used in healthcare sector to provide better, reliable and secure services. RFID systems are integrated into hospital information systems and provide full automation and streamline the important modules of patient identification, staff allocation, doctors, medicines and treatments. In this paper, we propose RFID based
Healthcare Informatics Research, 2019
Various kinds of real world complex systems including physical, biological, and social systems ca... more Various kinds of real world complex systems including physical, biological, and social systems can be represented in terms of complex networks. Some important examples are the World Wide Web, electric power grids, scientific collaboration networks, airport networks, the Hajj network, and social networks of friendship [1-4]. In the fields of medicine and biology, the complex networks of diseases such as HIV/ AIDS, smallpox, and dengue virus have also been investigated to analyze the spreading phenomenon [5,6]. The dengue virus network includes the mosquito 'Aedes aegypti'. Dengue is an arbovirus that spreads infections through mosquitoes

International Journal of Advanced Computer Science and Applications, 2019
Field of complex network covers different social, technological, biological, scientific collabora... more Field of complex network covers different social, technological, biological, scientific collaborative work, communication networks and many others. Among these networks, transportation network is an important indicator to measure the economic growth in any country. In this study different dynamics of Airport Network in Pakistan are analyzed by the complex network methodology. Dataset of air transportation has been collected from Civil Aviation Authority of Pakistan (CAA) and formatted to accomplish the complex network requirements. The network is formed to observe its different properties and compare these with their topological counterparts. In this, network nodes are represented by Airports of Pakistan while flights between them within a week are considered as edges. The behavior of degree distribution is observed as preferential attachment of nodes, which represented that few nodes are controlling overall network which emphasizes that Airport Network in Pakistan (ANP) follows power law. Clustering coefficient displayed the network as a clustered network. Result of short average path length highlights that Airport Network in Pakistan is small-world network. Study also signified the average nearest neighbour degree node, which explained that ANP exhibited disassortative mixing in nature which states that high degree nodes (airports) tend to connect to low degree nodes (airports). Interestingly, is has been observed that it is not necessary that the most connected node is also the most central node in degree centralities.

Time is one of the most difficult aspects to handle in real world applications, especially in dat... more Time is one of the most difficult aspects to handle in real world applications, especially in database systems. Relational database management systems proposed by Codd offer very little built-in support for managing time varying data and theory of temporal semantics. Many temporal extensions of the relational model have been proposed and some of them are also implemented. The proposed system is based on an ontology of health Care terminology including patients vital data, activities and as well as the treatment data. We will propose a conceptual temporal model for handling time varying attributes in the relational database model with minimal temporal attributes. The proposed model is easy to define, manage and incorporates the important and relevant features in the target temporal relational model. Furthermore we have illustrated implementation of the model on patient database and also present the requirement analysis: work flow for managing patients in hospital environment. In response to rising health care costs, reliability, privacy, security and changing expectations concerning the quality of health care, data management is very important in improving health care services.
The focus on patient safety, care and security in hospitals has yielded a number of new technolog... more The focus on patient safety, care and security in hospitals has yielded a number of new technologies aimed at improving quality of patient care. Health information systems are now combining physical process of healthcare delivery with medication information and applications that provide clinical decision support. One such technology is Radio Frequency Identification (RFID). Application of RFID technology in hospitals has risen dramatically during the last decade. This study focuses the use of RFID technology for managing patients and ensures better control and safety procedures. The paper presents a system that integrates RFID with patient data management system addressing all these drawbacks together with the classical entities in a health information system or patient data management.
Management of fuzzy and vague information has been a research problem for computer scientists, pa... more Management of fuzzy and vague information has been a research problem for computer scientists, particularly in artificial intelligence, relational and temporal databases. Fuzzy set theory has been widely used to cater this problem. Rough set theory is a newer approach to deal with uncertainty. After many years of rivalry between the two theories, many researchers have started working towards a hybrid theory. In this paper we have discussed the fundamental concepts of fuzzy and rough set theories as well as their application in temporal database model. We have also presented a conceptual model of fuzzy rough temporal data processing along with a case study.

Distributed database management systems (DDBMs) have limited capacity to manage overhead of distr... more Distributed database management systems (DDBMs) have limited capacity to manage overhead of distributed transactions due to certain failures. These types of failures don’t guarantee the enforcement of transactional properties and which reduces the scalability and availability of these systems. Research in this area proved that scaling out while providing consistency of transactions and guaranteeing availability in the presence of different failures in distributed computing environment is not feasible. As a result, the database community have used vertical scaling rather than horizontal scaling. Moreover changes in data access patterns resulting from a new generation of web applications with high scalability and availability guarantees weaker consistency. In this paper we have analyse that how different systems such as ElasTraS, Mstore, Sinfonia, ecStore and Gstore provide scalable transactional data access in cloud computing environment. We have also discussed transaction management (TM) in Gstore in detail and compared with
other techniques and protocols used in current cloud based systems.

A generic temporal and fuzzy ontological framework (GTFOF) is presented, specific to the task of ... more A generic temporal and fuzzy ontological framework (GTFOF) is presented, specific to the task of designing temporal and fuzzy database system. The framework includes both time and fuzzy dimension in deigning patient information system in a hospital environment. The proposed framework is essential for developing knowledge management systems (KMS) in healthcare environments. The importance of ontological models in the development of patient information system is well established and it provides the logical and formal mechanism for building KMS. Healthcare information systems may include complex data such as time stamped data and fuzzy data about patients. This paper highlights the importance of identifying the key concepts for building an ontological framework to manage both temporal and fuzzy information content. The proposed generic framework is capable of integrating and mapping the proposed ontological model into an effective database design for implementation.
Uploads
Papers by DR Nadeem Mahmood
other techniques and protocols used in current cloud based systems.