{"title":"Twitter and Urdu","authors":"Saqib Muhammad Ghulam, Tariq Rahim Soomro","doi":"10.1109/ICOMET.2018.8346370","DOIUrl":"https://doi.org/10.1109/ICOMET.2018.8346370","url":null,"abstract":"The modern social media is generating terabytes of data in AVT (audio, video and text) format, which mainly comprises of opinions, relations or expressions. Language has always been a way of communication and interaction primarily used in the form of words or signs. Humans have used verbal and physical expression to convey their feelings to facilitate communication. ‘Urdu’ is the national language of Pakistan and has evolved from several languages; such as Persian, Arabic, Hindi, Sanskrit and Prakrit dating back to the 6th to 13th Century. This study will use the Twitter handle for social media applications sample data to analyze and derive the Urdu language and see the status of Urdu language communication using Twitter. The biggest challenge of this study is that Urdu communication occurs in the form of traditional Urdu and roman Urdu, which makes identification of tweet corpse difficult.","PeriodicalId":381362,"journal":{"name":"2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128166776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solution to web services security and threats","authors":"Iqra Ilyas, M. Tayyab, Aliza Basharat","doi":"10.1109/ICOMET.2018.8346321","DOIUrl":"https://doi.org/10.1109/ICOMET.2018.8346321","url":null,"abstract":"The demand and use of internet and web applications is increasing day by day and millions of web applications are providing various services in different fields. While moving towards development, there are still many ways where security is compromising due to which our business, trade and marketing face heavy loss. Different emerging technologies are making it possible to mitigate this loss and finding threats and risks as soon as possible. This paper covers the security issues in most popular areas of Health Care Units, e-commerce transactions by comparison of popular algorithms of page rank and trust rank and more security through XML in web services through WS-Security framework by exploring XML signature and its verification and occurrence of major security attacks.","PeriodicalId":381362,"journal":{"name":"2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125827246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samuel Omaji, N. Javaid, Sheeraz Aslam, M. H. Rahim
{"title":"JAYA optimization based energy management controller for smart grid: JAYA optimization based energy management controller","authors":"Samuel Omaji, N. Javaid, Sheeraz Aslam, M. H. Rahim","doi":"10.1109/ICOMET.2018.8346337","DOIUrl":"https://doi.org/10.1109/ICOMET.2018.8346337","url":null,"abstract":"In this paper, we presented JAYA algorithm which is a recently developed scheme that do not need any specific parameter to be adjusted except the known control parameters. To achieve the set of objectives like: electricity bill minimization, peak to average ratio (PAR) reduction, minimum user dissatisfaction, a proposed JAYA energy management controller (JAYA-EMC) for optimization is implemented. In increasing sustainability of smart grid, the simulation results of our proposed scheme is proven to be cost effective solution. In addition, the feasible region (FR) of appliances are calculated which show relationship between energy load, cost and delay.","PeriodicalId":381362,"journal":{"name":"2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125866053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Rehman, Sheeraz Ahmed, Sarmad Ullah Khan, S. Begum, A. Ishtiaq
{"title":"ARV2V: Attack resistant vehicle to vehicle algorithm, performance in term of end-to-end delay and trust computation error in VANETs","authors":"M. Rehman, Sheeraz Ahmed, Sarmad Ullah Khan, S. Begum, A. Ishtiaq","doi":"10.1109/ICOMET.2018.8346338","DOIUrl":"https://doi.org/10.1109/ICOMET.2018.8346338","url":null,"abstract":"Making cities smarter and well equipped in communication prospective VANETs plays significant role. These days VANETs are quickly maturing and emerging technique in the field of communication technology build upon on the IEEE 802.11p standard proposed for DSRC among vehicles and following IEEE 802.11a/b/g standard for RSUs and vehicle communication. VANETs make the existence of ITS possible in WAVE through dissemination of vital FSAMs among vehicles to avoid any misfortune. The FSAMs basically consist of information about traffic situation, malicious nodes penetration, loss of information etc. However, due to high mobility environment vehicles distance among nodes varies which can also affect the link and delay or loss of information may also take place. So, absolute protocols in VANETs for desire output and data delivery on perfect time is still a challenging job. In our research work we tried to design a routing scheme, which provides better performance than the existing schemes like Trust and Logistic Trust. We compare our design scheme ARV2V in term of performance metrics, which are EED and TCE with Trust and LT techniques. In VANETs system it is important to receive data on time with less delay and minimal error to handle disastrous circumstances wisely. In our research paper we analyzed EED and TCE in Trust, LT and in our scheme ARV2V. We observed from simulation results that our scheme is much efficient than Trust and LT. From the comparison analysis our scheme ARV2V in term of performance metric TCE is 11.6% and 7.3% more efficient than LT and Trust schemes respectively, while Trust scheme is 4.3% efficient than LT. From EED comparison we observed that ARV2V 57.6% more efficient than Trust and 5.2% than LT, also Trust schemes faced 52.4% more delay than LT.","PeriodicalId":381362,"journal":{"name":"2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134010051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mian Muhammad Naeem Abid, N. Javaid, M. H. Rahim, S. Aslam
{"title":"Demand side management for residential areas using hybrid bacterial foraging and bat optimization algorithm: Demand side management using hybrid bacterial foraging and bat optimization algorithm","authors":"Mian Muhammad Naeem Abid, N. Javaid, M. H. Rahim, S. Aslam","doi":"10.1109/ICOMET.2018.8346369","DOIUrl":"https://doi.org/10.1109/ICOMET.2018.8346369","url":null,"abstract":"In this work, two meta-heuristic bio-inspired algorithms and our proposed hybrid technique (Bacterial foraging optimization algorithm (BFA) and BAT algorithm (BA) (HBB)) are proposed for optimizing and scheduling the appliances of residential consumers. BFA, BA and our proposed technique HBB are used for scheduling the appliances in order to find the optimal solution. Appliances have different power ratings and power consumption patterns. Three different operational time intervals of 5, 30 and 60 minutes are taken in this work and their comparison is carried out. Eighteen appliances are considered and they are classified into three categories: interruptible, non-interruptible and base load appliances. Single home scenario is considered in this work. Results show that proposed technique has significantly reduced electricity cost and peak-to-average ratio. Consumers have not only supposed to pay less electricity bill, however, utilities also have to bear less stress especially in on-peak hours.","PeriodicalId":381362,"journal":{"name":"2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133590568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual team management challenges mitigation model (VTMCMM)","authors":"Mudasir Khan, A. W. Khan","doi":"10.1109/ICOMET.2018.8346328","DOIUrl":"https://doi.org/10.1109/ICOMET.2018.8346328","url":null,"abstract":"Teams that are managed by an organization and its members are located at remote places, connected by modern communication technologies are gaining popularity day by day. The main purpose of this research work is to develop a model of Virtual Team Management Challenges mitigation (VTMCMM), to assist virtual team members for their team management. This model will be useful for outsourcing vendor industries in addressing the problems in virtual team management for offshore software development. The method which we have used in development of Virtual team management challenges mitigation model (VTMCMM) is Systematic literature review and empirical methods. We will use SLR for identifying the challenges faced by outsourcing vendors in virtual team management and practices to handle the identified challenges. We will conduct questionnaire survey in software industry for validation of the SLR findings and tried to identify some new ones apart from the identified ones. We will also conduct case study in outsourcing software industry for evaluation of our developed model through some industry experts. The expected outcome of this project is a model for virtual team management challenges that will assist virtual team members in proper management of outsourcing software development activities.","PeriodicalId":381362,"journal":{"name":"2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"36 24","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113971148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AAG: An automatic assertion generation framework for RTL designs","authors":"Shahid Ali Murtza, O. Hasan, K. Saghar","doi":"10.1109/ICOMET.2018.8346391","DOIUrl":"https://doi.org/10.1109/ICOMET.2018.8346391","url":null,"abstract":"Assertion Based Verification (ABV) has been shown to be a very effective functional verification approach for digital designs. ABV is usually employed by the verification engineers by embedding assertions in the hardware description language (HDL) code manually by studying the design and user provided specifications. However, with the growing complexity of digital systems, understanding different designs and specifications in general and then writing assertions manually in particular has become quite tedious. In this paper, we propose to alleviate these issues by proposing AAG, i.e., an Automatic Assertion Generation framework that accepts the Register Transfer Level (RTL) code in Verilog, generates the corresponding randomized testbench automatically and then generates the corresponding value change dump (VCD) file from the simulation of RTL code using the generated testbench. In the proposed verification framework, we use GoldMine as an assertion generation engine. The paper also explains, with help of case studies, how can verification engineers benefit from AAG.","PeriodicalId":381362,"journal":{"name":"2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132937729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Sadiq Khan, G. Mujtaba, M. Al-garadi, Nweke Henry Friday, A. Waqas, Fahad Raheem Qasmi
{"title":"Multi-soft sets-based decision making using rank and fix valued attributes","authors":"Muhammad Sadiq Khan, G. Mujtaba, M. Al-garadi, Nweke Henry Friday, A. Waqas, Fahad Raheem Qasmi","doi":"10.1109/ICOMET.2018.8346380","DOIUrl":"https://doi.org/10.1109/ICOMET.2018.8346380","url":null,"abstract":"Soft set theory is used as an effective mathematical tool for handling different operations with vague data including decision making. Decision making in soft sets is almost fully dependent on accuracy of input values. Obtaining incorrect values as input from various sources through different methods can badly effect the decision making and resulting in huge financial loss to organizations and individuals due to wrong decisions. Multi-soft set is one of those sources for providing input data for decision, but there is no existing proper technique for converting multi-soft set categorical values to numerical values. In this paper we present a technique for obtaining precise numerical data from multi-soft set. We categorize multi-soft set attributes to two types and present the method for representation of both types in a combined information system. We also present the concept of forward and reverse order in attribute values and discuss its effect on decision making.","PeriodicalId":381362,"journal":{"name":"2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116146849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent traffic monitoring and guidance system for smart city","authors":"Saba Latif, Hamra Afzaal, N. Zafar","doi":"10.1109/ICOMET.2018.8346327","DOIUrl":"https://doi.org/10.1109/ICOMET.2018.8346327","url":null,"abstract":"IoT stands for Internet of things which is defined as an intercommunication of heterogeneous smart devices acting as a single network. In IoT, every device is connected via internet with different devices having different capabilities within a network. IoT is implemented almost in every field of life which is an extension of Wireless Sensor Networks (WSNs). Smart city is implemented through smart nodes in real scenarios to make digital environment in all field of life including smart parking, banking, sewerage system, waste management, environmental monitoring, smart transport and healthcare centers. However, there is a very little practical use of IoT and smart cities infrastructure in real life. In this paper, we have focused on intelligent traffic monitoring system using graph theory and formal methods. Our proposed model has various nodes that are assumed within a city including roads, objects and traffic signals to make a collective intelligent traffic guidance and monitoring system. Many operations including finding shortest path in terms of time and distance, finding specific area within city and finding safest and low rush ways towards the destination. The graph based model is transformed into a formal model using Vienna Development Method-Specification Language (VDM-SL). The proof of correctness is provided by various facilities available in the VDM-SL toolbox.","PeriodicalId":381362,"journal":{"name":"2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127020639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating StockTwits with sentiment analysis for better prediction of stock price movement","authors":"Rakhi Batra, Sher Muhammad Daudpota","doi":"10.1109/ICOMET.2018.8346382","DOIUrl":"https://doi.org/10.1109/ICOMET.2018.8346382","url":null,"abstract":"Sentiment Analysis is new way of machine learning to extract opinion orientation (positive, negative, neutral) from a text segment written for any product, organization, person or any other entity. Sentiment Analysis can be used to predict the mood of people that have impact on stock prices, therefore it can help in prediction of actual stock movement. In order to exploit the benefits of sentiment analysis in stock market industry we have performed sentiment analysis on tweets related to Apple products, which are extracted from StockTwits (a social networking site) from 2010 to 2017. Along with tweets, we have also used market index data which is extracted from Yahoo Finance for the same period. The sentiment score of a tweet is calculated by sentiment analysis of tweets through SVM. As a result each tweet is categorized as bullish or bearish. Then sentiment score and market data is used to build a SVM model to predict next day's stock movement. Results show that there is positive relation between people opinion and market data and proposed work has an accuracy of 76.65% in stock prediction.","PeriodicalId":381362,"journal":{"name":"2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115060096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}