Kiran Amjad, Prof Dr. Aftab Ahmad Malik, Dr. Sumet Mehta
{"title":"A Technique and Architectural Design for Criminal Detection based on Lombroso Theory Using Deep Learning","authors":"Kiran Amjad, Prof Dr. Aftab Ahmad Malik, Dr. Sumet Mehta","doi":"10.54692/lgurjcsit.2020.040398","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.040398","url":null,"abstract":"Crimes and criminal activities are increasing day by day and there are no proper criteria to search, detect, identify, and predict these criminals. Despite various surveillance cameras in different areas still, crimes are at a peak. The police investigation department cannot efficiently detect the criminals in time. However, in many countries for the sake of public and private security, the initiation of security technologies has been employed for criminal identification or recognition with the help of footprint identification, fingerprint identification, facial recognition, or based on other suspicious activity detections through surveillance cameras. However, there are limited automated systems that can identify the criminals precisely and get the accurate or precise similarity between the recorded footage images with the criminals that already are available in the police criminal records. To make the police investigation department more effective, this research work presents the design of an automated criminal detection system for the prediction of criminals. The proposed system can predict criminals or possibilities of being criminal based on Lombrosso's Theory of Criminology about born criminals or the persons who look like criminals. A deep learning-based facial recognition approach was used that can detect or predict any person whether he is criminal, or not and that can also give the possibility of being criminal. For training, the ResNet50 model was used, which is based on CNN and SVM Classifiers for feature extracting from the dataset. Two different labeled based datasets were used, having different criminals and noncriminals images in the database. The proposed system could efficiently help the investigating officers in narrowing down the suspects' pool.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"13 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126155141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shahan Yamin Siddiqui, , Ghanwa Batool, Muhammad Sohail Irshad, Hafiz Muhammad Usama, Muhammad Tariq Siddique, Bilal Shoaib, Sajid Farooq, , Arfa Hassan
{"title":"Time Complexity of Color Camera Depth Map Hand Edge Closing Recognition Algorithm","authors":"Shahan Yamin Siddiqui, , Ghanwa Batool, Muhammad Sohail Irshad, Hafiz Muhammad Usama, Muhammad Tariq Siddique, Bilal Shoaib, Sajid Farooq, , Arfa Hassan","doi":"10.54692/lgurjcsit.2020.040395","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.040395","url":null,"abstract":"The objective of this paper is to calculate the time complexity of the colored camera depth map hand edge closing algorithm of the hand gesture recognition technique. It has been identified as hand gesture recognition through human-computer interaction using color camera and depth map technique, which is used to find the time complexity of the algorithms using 2D minima methods, brute force, and plane sweep. Human-computer interaction is a very much essential component of most people's daily life. The goal of gesture recognition research is to establish a system that can classify specific human gestures and can make its use to convey information for the device control. These methods have different input types and different classifiers and techniques to identify hand gestures. This paper includes the algorithm of one of the hand gesture recognition “Color camera depth map hand edge recognition” algorithm and its time complexity and simulation on MATLAB.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131203122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preservation of Privacy of Big Data Using Efficient Anonymization Technique","authors":"Dr. Muhammad Rizwan","doi":"10.54692/lgurjcsit.2020.040399","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.040399","url":null,"abstract":"Big data needs to be retained private because of the increase in the amount of data. Data is generated from social networks, organizations and various other ways, which is known as big data. Big data requires large storage as well as high computational power. At every stage, the data needs to be protected. Privacy preservation plays an important role in keeping sensitive information protected and private from any attack. Data anonymization is one of the techniques to anonymize data to keep it private and protected, which includes suppression, generalization, and bucketization. It keeps personal and private data anonymous from being known by others. But when it is implemented on big data, these techniques cause a great loss of information and also fail in defense of the privacy of big data. Moreover, for the scenario of big data, the anonymization should not only focus on hiding but also on other aspects. This paper aims to provide a technique that uses slicing, suppression, and functional encryption together to achieve better privacy of big data with data anonymization.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121926061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Asma Kanwal, Wajahat Mahmood Qazi, Muhammad Atif Altaf, Atifa Athar, Mahmood Hussain, Syed Tanweer Shah Bukhari, Abeo Timothy Apasiba
{"title":"A Step Towards the Development of Socio-cognitive Agent","authors":"Asma Kanwal, Wajahat Mahmood Qazi, Muhammad Atif Altaf, Atifa Athar, Mahmood Hussain, Syed Tanweer Shah Bukhari, Abeo Timothy Apasiba","doi":"10.54692/lgurjcsit.2020.040396","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.040396","url":null,"abstract":"The embodiment of consciousness in socio-cognitive agents play a significant role in their acceptance as co-partners. Man-machine social interaction’s success is based on the agent’s generated believable behaviors. In this regard, such an agent needs to generate realistic beliefs, intentions, goals, self-regulation, verbal, and non-verbal communication (including gestures) according to the context of ongoing interaction is very important. This study hypothesizes that the implementation of the Theory of mind (TOM) may allow the agent to change its intentions, beliefs, and desires by predicting the existing perspective and mental states of the other agents involved in the given social interaction. To study the complexity of dynamics in a social context we have taken the case study of the ‘paper-scissor-rock’ game and developed a cognitive agent capable of using gestures for non-verbal communication following the Theory of mind. This work is in progress and is being developed on the iCub robot simulation. We have used tapped delay line neural networks as the basis for reinforcement learning and strategic planning. This paper will report the cognitive model, neural network initial results obtained.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126055919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Tuberculosis using Hybrid Features from Chest Radiographs","authors":"Maham Mehr Awan, Ayesha Fatima, Kinza Mehr Awan","doi":"10.54692/lgurjcsit.2020.040397","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.040397","url":null,"abstract":"Tuberculosis is a contagious disease, but it’s diagnosis is still a difficult and challenging task as it is considered a big threat everywhere on the planet. Literature shows that underdeveloped countries widely use chest radiographs (X ray images) for the diagnosis of tuberculosis. Low accuracy of results and high cost are the two main reasons due to which most of the available methods are not useful for radiologists. In our research, we proposed a detection technique in which features extraction is performed on the basis of their texture, intensity and shape. For evaluating the performance of our proposed methodology, Montgomery Country (MC) dataset is used. It is a publically available data set which consists of 138 CXRs; among them, 80 CXRs are normal and 58 CXRs are malignant. The results of the proposed technique have outperformed state of the art methodologies on the MC dataset as it has shown 81.16% accuracy.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127594257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Usability Analysis of University Websites in Pakistan","authors":"Jawad Hassan","doi":"10.54692/lgurjcsit.2020.0402131","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.0402131","url":null,"abstract":"Usability analysis of a website determines how easy it is for the user to navigate between the pages, find information of interest, and his overall experience of the usage. Good website design is focused on the user experience. Usability is one of the major factors deciding the product's value. It can decide what value the product holds for its user hence the importance of website usability cannot be ignored. In this research, we have used different, manual, and automated heuristic evaluation methods to determine the usability of different Pakistani University websites. Our main goal is to provide some insight on the usability of these University websites as no such work has been done in the past on this. We evaluate a system based on heuristic evaluation and usability standards to measure its score. We also conducted an online survey on University students to get their feedback on their University website. We concluded that the user experience of most of the University websites in Pakistan fails from the usability perspective and students usually have to face a hard time finding the relevantinformation.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129764219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applications of Internet of Vehicle(IoV): A Survey","authors":"Irshad Ahmed Sumra","doi":"10.54692/lgurjcsit.2020.0402134","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.0402134","url":null,"abstract":"Due to the fast advancement in the field of communication and computation technology, the Internet of Vehicle (IoV) attracts most of the researchers to contribute in this area of research. In the recent research on the Internet of Vehicle (IoV) technology, IoV becomes one of the major active and famous research areas in the technology of networks, especially in transportation. It provides an Intelligent Transportation System (ITS)and it resolves traffic and driving problems by using advanced communication and information technology. Inthe implementation of IoV, the different actuators, sensors, personal gadgets are required so that the vehicles communicate with each other. In this paper, it will provide the comprehensive survey on applications of IoV and also discuss in detail IoVnetwork model, the required technologies for the creation of IoV, the various applications which are based on existing technologies and the features of research in IoV area and Vehicular Sensor Network (VSN's) based effective and security-oriented applications. The key objective of these applications is to reduce fuel consumption and furthermore to provide a supportin saving the life of drivers andpedestrians.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133188778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cognitive Modelling for User Interface Design in HCI: A Comparative Analysis on Cognitive Models","authors":"Sundas Munir","doi":"10.54692/lgurjcsit.2020.0402138","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.0402138","url":null,"abstract":"This research aims to elaborate the cognition in the field of human-computer interaction, also acknowledges the cognitive modeling and human behavior processes. Cognitive modeling is a field of Human-Computer Interaction (HCI) which is used to design more efficient human interactive systems. It is used to model the interactive system in such a way that analysts can determine methods that users will interact with the system and also be used to understand the different processes of cognitive human behaviors. Hierarchal task analysis is a task to goal-based model, in which analyst selects the actions and tasks to perform. GOMS is a cognitive knowledge of the human information processing model in HCI that describes the user's cognitive architecture based on four components. The linguistic and grammatical model is a syntactical model in which languages and syntax are designed for the user for system communication in an interactive system. Cognitive human behavior processes are also described to understand the mutual coordination of cognition processes and cognitivemodels in designing an interactive system. Problem-solving is a cognitive process of the human mind to search for a problem and explore the possible solutions for that problem. Decision making is also a cognitive process of human behaviour in which human chooses an action from other alternatives based on certain criteria.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125856104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Internet of Things for Smart City and Environmental Solutions","authors":"Afrozah Nadeem","doi":"10.54692/lgurjcsit.2020.0402137","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.0402137","url":null,"abstract":"Internet of Things (IoT) is the latest concept and considered the essential infrastructure for smart cities. However, IoT is allowing smart cities to take the initiative of starting different projects and its deployment all over the world. For Information & Communication Technologies (ICT) solutions, IoT is a compatible way to combine the numerous sensors. Communication of the Internet of Things is the soul of the smart cities. The scopeof IoT in smart cities is connected and deployed with over 50 billion objects this year and more in the future too. This paper deals with concern regarding IoT globally and a detailed review of the idea of IoT with the smart city encouragement and its applications. Furthermore, the paper presents the main gap, instability, and challenges of implementing the IoT with smart cities on technological standards.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131713327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Operating Systems for the Internet of Things:A Survey","authors":"Anum Ali","doi":"10.54692/lgurjcsit.2020.0402135","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.0402135","url":null,"abstract":"Machine-to-Machine (M2M) is an ecosystem that is used to describe any technology deploying and creating a network of devices to perform actions and exchange information. This new class of communicating devices have very diverse traffic characteristics and pose unique challenges. This paper surveys the state-of-the-art operating system technologies, architectures and available networking stack protocols on it, and explore their potential to support the growth of related applications. Moreover, the diversity of applications and the Internet of Things (IoT) devices also necessitate the investigation of middleware framework and specifications to cater to the currently existing challenges. Therefore, we also discuss different challenges and issues in developing rich applications by using available operating systems. The paper concludes after providing recommendations for future enhancement in existing operating systems.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121016964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}