Dr. Muhammad Aasim Qureshi
Category: Faculty November 23, 2020
PERSONAL INFORMATION
Name Dr. Muhammad Aasim Qureshi
Email aasim.qureshi@bahria.edu.pk maasimq@hotmail.com
Phone 042 99233408 Ext. 232
Research Area 1- Algorithms 2- Graph Theory 3- AI and Fuzzy Logic 4- Robot Navigation 5- Teaching and Learning
Number of Publications Journal: 9 Conference: 18
 
AFFILIATIONS
Designation Associate Professor / PGP Coordinator
Department Department of Computer Science
University Bahria University Lahore Campus
 
QUALIFICATION
DEGREE PASSING YEAR MAJORS UNIVERSITY
PhD 2015 IT UTP
MS 2006 CS LUMS
MSc 1998 CS PU Lahore
MA 1995 Eng PU Lahore
PGD 1996 CS GCU Lahore
BA 1990 Math (A & B) PU Lahore
TEACHING EXPERIENCE
DESIGNATION FROM TO ORGANIZATION
Assistant Professor-I Sep 2015, 2011 To, Date BULC
Associate Professor Nov, 2011 Nov, 2013 UCP
Tutor Feb,2009 Nov, 2013 UTP
Tutor Jan, 2014 May, 2015 UTP
Assistant Professor Sep, 2007 Feb , 2009 PMAS-AAUR. Pak.
Senior Lecturer/subject Sep,2004 Jan, 2008 Bahria University Islamabad, Pakistan
Lecturer Mar, 2001 Sep, 2001 PUCIT Lahore
Lecturer/C. Coordinator Dec, 1999 Feb, 2001 GSD College, Lahore
Lecturer/C. Coordinator Oct, 1998 Dec, 1999 Al-Khair Univ, Pak
PUBLICATIONS
 

PUBLICATIONS – PEER-REVIEWED JOURNAL PROCEEDINGS

 

  1. “NewBee: Context-Free Grammar of a New Programming Language for Novice Programmers”, Intelligent Automation & Soft Computing (Accepted; Paper Id: 36102) [IF. 3.401] [X]
  2. “Roman Urdu Sentiment Analysis of Reviews on PSL Anthems”, Lahore Garrison University Research Journal of Computer Science and Information Technology, vol. 6, no 2, 01-08-22, https://doi.org /10.54692/lgurjcsit.2022.06003351 [Y]
  3. “Aspect Level Songs Rating Based upon Reviews in English,” Computers, Materials & Continua, vol. 74, no.2, pp. 2589–2605, 2023. https://doi.org/10.32604/cmc.2023.032173 [IF. 3.860] [W]
  4. “CTMF: Context-Aware Trust Management Framework for Internet of Vehicles”, IEEE Access, vol. 10, 2022, p.73685-73701, published on July 7, 2022 doi: 1109/ACCESS.2022.3189349; https://ieeexplore.ieee.org/document/9819910 [IF. 3.367] [W]
  5. “A Robust Graph Theoretic Solution of Network Routing”, Wireless Communications and Mobile Computing, vol 2022, pp 1-7, 20-Jun-2022, https://dl.acm.org/doi/abs/10.1155/2022/9661411 [IF. 2.336] [W]
  6. “Machine Learning Empowered Efficient Intrusion Detection Framework”, VFAST Transactions on Software Engineering, Vol 10, No 2, 13 May 2021. [Y]
  7. “Intelligence of Autonomous Vehicles A Concise Revisit”, Journal of Sensors, vol 2022, 23-Apr-2022, https://doi.org/10.1155/2022/2690164 , [IF. 2.137][W]
  8. “Design of Two-Mode Spectroscopic Sensor for Biomedical Applications: Analysis and Measurement of Relative Intensity Noise through Control Mechanism”, Applied Sciences, vol. 12, no. 4, 11-Feb, 2022 [IF 2.679][W]
  9. “Sentiment Analysis of Reviews in Natural Language: Roman Urdu as a Case Study”, IEEE Access, vol. 10, p. 24945-24954, 15 Feb, 2022 [IF. 3.7][W]
  10. “Prediction of covid-19 daily infected cases (worldwide & united states) using regression models and Neural Network”, VFAST Transactions on Software Engineering, Vol 9, No 4, 31 Dec 2021. [Y]
  11. “Context-Free Grammar of a New Programming Language for Teaching and Learning”, VFAST Transactions on Software Engineering, Vol 9, No 4, 31 Dec 2021. [Y]
  12. “A Novel Auto-Annotation Technique for Aspect Level Sentiment Analysis”, Computers, Materials & Continua, vol.70 , no.3 , pp4987-5004, 01 Jan, 2022. [IF:3.772] [W]
  13. “Dijkstra’s Algorithm-A Case Study to Understand How Algorithms are improved”, VFAST Transactions on Software Engineering, Vol 9, No 3, 30 Sep, 2021 [Y]
  14. “Intelligent and integrated Framework for Exudate Detection in Retinal Fundus Images”, Intelligent Automation and Soft Computing, 30(2), 663–672, 11 Aug, 2021, [IF: 1.27][X]
  15. “Context and Machine Learning Based Trust Management Framework for Internet of Vehicles,” Computers, Materials & Continua, vol. 68, no.3, pp. 4125–4142, 06 May, 2021. [IF:4.89] [W]
  16. “Impact Of Online Social Networking On Study, Academic Performance And Learning Of Undergraduate Students” Sci. Int., 31(1),35-43, 2019 [ISI]
  17. “Using Morpho-Syntactic Tagging In English-To-Urdu Statistical Machine Translation”, Sci. Int., 27(5),4433-4436, 2015 [IF. 0.75][Y]
  18. “Shortest Path Tree with Embedded Backups–an Exhaustive Link Failure Recovery Algorithm,” Journal of Artificial Intelligence, 4(2), pp. 143-155, 2011
  19. “Directions and Advancements in Global Software Development: A summarized Review of GSD and Agile Methods”, Research Journal of Information Technology, 3(2), 69-80, 2011
  20. “A Framework to Recover Single Link Failure on Shortest Path Tree,” Journal of Applied Sciences, 11(16), 2916-2923, 2011
  21. “Structured Role Based Interaction Model for Agile Based Outsourced IT Projects: Client’s Composite Structure”, Information Technology Journal, 10(5), 1009-1016, 2011
  22. “Effective Methods for Secure Authentication in Vulnerable Workflows using n x n Passwords”, Journal of Information Technology, 10(6), 1161-1169, 2011. [Y]
  23. “Biologically Inspired Execution Framework for Vulnerable Workflow Systems”, International Journal of Computer Science and Information Security, Vol.6 No.1, IJCSIS 2009.
  24. “A O(| E |) Time Shortest Path Algorithm For Non- Negative Weighted Undirected Graphs,” Int. Journal of Computer Science and Information Security, Vol.6 No.1, IJCSIS 2009. pp. 40-46.
  25. “Complexity of Teaching: Computability and Complexity”, INTI Journal Special Issue on Teaching and Learning 2007

Under Review  

  1. Machine Learning Based Acral Lentiginous Melanoma Detection Using Dermoscopic Images

 

PUBLICATIONS – PEER-REVIEWED CONFERENCE PROCEEDINGS

2007

  1. “Complexity of Teaching: Computability and Complexity” ‘International Conference on Teaching and Learning 2007’ organized by INTI International University College at Putrajaya, Malaysia.

2009

  1. “Vision based Navigation for a Mobile Robot with Different Field of Views” PAK-US International Symposium on ‘High Capacity Optical Networks and Enabling Technologies’ Islamabad, Pakistan 2009
  2.  “An Edge-wise Linear Shortest Path Algorithm for Non Negative Weighted Undirected Graphs,” Frontiers of Information Technology 2009 (FIT ’09), Abbotabad, Pakistan, 2009, pp. 16-19. (ACM)

2010

  1. “Shortest Path Algorithm With Pre-calculated Single Link Failure Recovery for Non-Negative Weighted Undirected Graphs”, International Conference on Information and Emerging Technologies, ICIET 2010, Karachi, Pakistan. (IEEE)
  2. “Framework for Alternate Execution of workflows under threat”, 2nd International Conference on Communication Software and Networks, ICCSN 2010, Feb 2010, Singapore. (IEEE)
  3. “Client’s Perspective: Realization as a New Generation Process for Software Project Development and Management”, 2nd International Conference on Communication Software and Networks, ICCSN 2010, Feb 2010, Singapore.pp.191-195. (IEEE)
  4. “Two Phase Shortest Path Algorithm for Non-negative Weighted Undirected Graphs,” 2nd International Conference on Communication Software and Networks, ICCSN 2010, Feb 2010, Singapore, pp. 223-227. (IEEE)
  5. “Authentication Model Based on Reformation Mapping Method”, International Conference on Information and Emerging Technologies, ICIET 2010, Karachi, Pakistan. (IEEE)
  6. “Improvements over Two Phase Shortest Path Algorithm”, International Symposium on Information Technology 2010, ITSIM 2010, June 2010, Malaysia. (IEEE)
  7. “Formal specification languages for real-time systems.” Information Technology (ITSim), 2010 International Symposium in. Vol. 3. 2010,(IEEE)

2011

  1. “A Near Linear Shortest Path Algorithm for Weighted Undirected Graphs”, 2011 IEEE Symposium on Computers and Informatics, ISCI 2011, Malaysia. (IEEE)
  2. “Data Hibernation Framework in Workflows Under Intrusion Threat”, 2011 IEEE Symposium on Computers and Informatics, ISCI 2011, Malaysia. (IEEE)
  3. “An Insight into Real Software Industry Paradigms and Software Engineering Research”, 2011 IEEE Symposium on Computers and Informatics, ISCI 2011, Malaysia. (IEEE)
  4. “The client as a real option in successful software project management (The CPPM model).” National Postgraduate Conference (NPC), 2011. (IEEE)
  5. Embedded Backups for Link Failure Recovery in Shortest Path Trees. In Software Engineering and Computer Systems (pp. 663-671). Springer Berlin Heidelberg (Book Chapter)

2012

  1. “Formalizing an abstract architecture for the alternative data source utilized during system availability under intrusion threat.” IET International Conference on Wireless Communications and Applications (ICWCA 2012), (IEEE)

2013

  1. “Software development project states and project behavior”, International Conference on Open Source Systems and Technologies (ICOSST ‘13), 2013, (IEEE)

2014

  1. “Rationale of students’ failure in comprehending theoretical computer science courses.” International Conference on Computer and Information Sciences (ICCOINS), 2014, (IEEE)

2015

  1.  “Abstract Framework to Continue System Availability during Cyber Threat Scenario” in GREHACK 2015
  2. Effect of Social Networking Websites on Learning Behavior of Students” in 9th IEEE ICOSST-2015

2017

  1.  “Mechanism to Continue System Availability during Cyber Threat Scenario”, in IMCOM 2017

2019

  1. “A Dataset for the Sentiment Analysis of Indo-Pak Music Industry” in 2019 International Conference on Innovative Computing (ICIC) (pp. 1-6). (IEEE)