Conference Program
Day 1 : Monday, December 16, 2019 |
||
Plenary Session |
||
Auditorium |
0915 |
Guests to be seated |
0930 – 0935 |
Tilawat |
|
0935 – 0945 |
Conference Introduction |
|
0945 – 1030 |
Keynote Address, “The Exciting World of Discovery” by Atta-ur-Rahman, FRS, UNESCO Science Laureate, President NASIC, Professor Emeritus, University of Karachi, Pakistan. |
|
1030 – 1045 |
Address by Chief Guest |
|
1045 |
Refreshments |
|
FIT 2019-Technical Sessions |
||
Parallel Sessions 1, 2, 3 and 4 |
||
Session 1: Software Engineering |
||
Jinnah Hall
|
1130 – 1215 |
Invited Talk: Are you paying for the free internet content with your privacy? by Zartash Afzal Uzmi, Lahore University of Management Sciences, Pakistan |
1215 – 1235 |
The Impact of Features on Feature Location by Abdul Qayum and Abdul Razzaq. |
|
1235 – 1255 |
An Empirical Investigation on Requirements Change Management Practices in Pakistani Agile based Industries by Kanwal Batool and Irum Inayat. |
|
1255 – 1315 |
Quality Factors Enhancement of Requirement Engineering: A Systematic Literature Review by Syed Manzar Abbas, Umer Iqbal, Sahar Ajmal and Khubaib Amjad Alam. |
|
1315 – 1415 |
Lunch & Prayers |
|
Session 2: Modeling & Simulation for Emergent Technologies |
||
Iqbal Hall
|
1130 – 1215 |
Invited Talk: Security and Reliability for Machine Learning: Do You Trust the Intelligence Features of Your Smart Cyber Physical Systems and Internet-of-Things by Muhammad Shafique, Vienna University of Technology (TU Wien), Austria |
1215 – 1235 |
A Collaborative Computation Offloading Scheme for 5G Heterogeneous Networks by Muhammad Bilal Khan, Sohaib Manzoor, Hira Manzoor and Md Samiul Islam. |
|
1235 – 1255 |
NMPC based Trajectory Tracking Control for Nonholonomic Wheeled Mobile Robots by Muhammad Zeeshan Babar, Syed Ibrar Ali Shah and Yasir Awais Butt. |
|
1255 – 1315 |
Design of a Feedback Loop Circuit for Quadrature Error Correction in 90-nm CMOS by Muhammad Haseeb, Muhammad Usman and Shabbir Majeed Chaudhry. |
|
1315 – 1415 |
Lunch & Prayers |
|
Session 3: Adaptive Systems, Networks, IoT & Cloud Computing |
||
Sir Syed Hall
|
1130 – 1215 |
Invited Talk: Data Science Landscape in 2019 by Sohail Asghar, COMSATS University Islamabad, Pakistan |
1215 – 1235 |
A Novel Routing Protocol Based on Congruent Gravity Value for Underwater Wireless Sensor Networks by Syed Umair Aslam Shah, M. Kashif Manzoor, Rana M. Amir Latif, Muhammad Farhan and M. Imran Ashiq |
|
1235 – 1255 |
Real-Time Simulation of IoT Based Smart Home Live Mirror using WSN by Rana M. Amir Latif, Laiqa Binte Imran, Muhammad Farhan, Mohamed Jaward Bah, Ghazanfar Ali and Yawar Abbas Abid |
|
1255 – 1315 |
A Low-Cost IoT based System for Environmental Monitoring by Nauman Khan, Khurram Shehzad Khattak, Shaukat Ullah and Zawar H. Khan |
|
1315 – 1445 |
Lunch & Prayers |
|
Session 4: Water Informatics |
||
Liaqat Hall |
1130 – 1230 |
Invited Talk: Water Informatics and Management System by Abubakr Muhammad, Lahore University of Management Sciences LUMS, Pakistan |
1230 – 1315 |
SCADA for Water Management System by Munir Ahmad, WAPDA - Power Station, Tarbala, Pakistan |
|
1315 – 1415 |
Lunch & Prayers |
|
Parallel Sessions 5, 6, 7 and 8 |
||
Session 5: Data Science & Advanced Analytics |
||
Jinnah Hall
|
1415 – 1500 |
Invited Talk: Neuroscience Patient Identification Using Big Data and Fuzzy Logic - An Alzheimer’s Disease Case Study by Kamran Munir, University of the West of England (UWE), UK |
1500 – 1520 |
A Machine Learning-Based Comparative Study for the Classification of Septic Shock Using Microarray Gene Expression Data by Arslan Ali, Ayesha Hanif, Arsalan Tahir, Hafiz Umar Iftikhar, Huma Shehwana and Mehak Rafiq. |
|
1520 – 1540 |
DCNN and LDA-RF-RFE based Short-Term Electricity Load and Price Forecasting by Hammad Ur-Rehman, Sana Mujeeb and Nadeem Javaid. |
|
1540 – 1600 |
ERBFNN based Electricity Load and Price Forecasting by Asra Rafi, Sana Mujeeb and Nadeem Javaid. |
|
1600 – 1620 |
Controlling Smart-City Traffic using Machine Learning by Tania Iram, Jawwad Shamsi, Usama Alvi, Saif Ur Rahman Saleem and Maaz Ansari. |
|
1620 – 1640 |
Web-AM: An Efficient Boilerplate Removal Algorithm for Web Articles by Naser Aslam, Bilal Tahir, Hafiz Muhammad Shafiq and Amir Mehmood. |
|
Session 6: Pattern Recognition, Image & Natural Language Processing |
||
Iqbal Hall
|
1415 – 1500 |
Invited Talk: Intelligent Digital Twins: Artificial Intelligence and HPC meet Virtual Reality to offer Real Time 3D Analytics by Ashiq Anjum University of Derby, UK |
1500 – 1520 |
Minutia Texture Cylinder Codes by Wajihullah Baig, Umar Munir, Adeel Ejaz and Kashif Sardar. |
|
1520 – 1540 |
A Robust Segmentation of Blood Vessels in Retinal Images by Farhana Siddique, Talha Iqbal, Sheryar Mehmood Awan, Zahid Mahmood and Gul Zameen Khan. |
|
1540 – 1600 |
Region and Decision Tree-based segmentations for Multi-objects detection and classification in Outdoor Scenes by Abrar Ahmed, Ahmad Jalal and Adnan Ahmad Rafique. |
|
1600 – 1620 |
Real-time Rehabilitation and Fitness System using Depth Sensor by Syyam Noor, Muhammad Hasham, Allah Bux Sargano and Zulfiqar Habib. |
|
1620 – 1640 |
Weather Classification on Roads for Drivers Assistance using Deep Transferred Features by Abdul Ghaffar Malkana, Saira Jabeen, Ali Farooq and Muhammad Usman Ghani Khan. |
|
Session 7: Signal Processing and Next Generation Communication Systems |
||
Sir Syed Hall
|
1415 – 1500 |
Invited Talk: From Concept to Completion by Shoab Ahmed Khan, Center for Advanced Studies in Engineering, Pakistan |
1500 – 1520 |
A Flexible Antenna on Cost-Effective PEN Substrate for Sub-6 GHz 5G Wireless Transceivers by Fareah Tariq, Qudsia Amjad, Areeba Kamran, Rashid Karim and Arshad Hassan. |
|
1520 – 1540 |
Detection of Myocardial Infarction using Pulse Plethysmograph Signals by Muhammad Umar Khan, Sumair Aziz, Asra Malik and Muhammad Atif Imtiaz. |
|
1540 – 1600 |
Electromyography (EMG) Data-driven Load Classification using Empirical Mode Decomposition and Feature Analysis by Sumair Aziz, Muhammad Umar Khan, Foha Aamir and Muhammad Arshad Javid. |
|
1600 – 1620 |
Design and Implementation of Receiver Autonomous Integrity Monitoring Algorithm on DSP for Small UAV Applications by Hira Imtiaz, Mohammad Haroon Yousaf, Hassan Sajjad Malik and Muhammad Ali Akhtar. |
|
1620 – 1640 |
Design of Configurable Digital Spike Filtering Circuits in 130 nm CMOS Process by Imran Ali, Huo Yingge, Muhammad Riaz Ur Rehman, Muhammad Asif and Kang-Yoon Lee. |
|
Session 8: Water Informatics |
||
Liaqat Hall |
1415 – 1500 |
The Sustainable Groundwater Management Using Smart Waste Grid by Khan Zaib Jadoon, International Islamic University, Pakistan |
1500 – 1520 |
Comparison of Water Flows between Various Channels under Different Circumstances by Talat Nazir. |
|
1520 – 1540 |
Numerical Modeling of One Dimensional Unsteady Flow in Parabolic Channel by Talat Nazir, Sohail Ahmad Awan and Bahadar Nawab Khattak. |
|
1540 – 1625 |
Practice of Modern Techniques of Water Accounting in Pakistan by Zahoor, Khyber Pakhtunkhwa Agriculture Department, Pakistan |
Day 2 : Tuesday, December 17, 2019 |
||
Parallel Sessions 9, 10,11 and 12 |
||
Session 9: Software Engineering |
||
Jinnah Hall
|
0900 – 0945 |
Invited Talk: Teaching Calculus is like Designing a Game or Designing a Game means doing Calculus by Ashraf Iqbal, 188 Eden Avenue Extension, Pakistan |
0945 – 1005 |
Towards A Catalog on Variants of Design Patterns by Ghulam Rasool and Hassan Akhtar. |
|
1005 – 1025 |
Risk Management in Agile Software Development: A Survey by Muhammad Hammad, Irum Inayat and Maryum Zahid. |
|
1025 – 1045 |
Software Design Patterns Recommendation: A Systematic Literature Review by Zeeshan Asghar, Shahzeb Javed and Khubaib Amjad. |
|
1045 – 1105 |
Refreshments |
|
Session 10: Adaptive Systems, Networks, IoT & Cloud Computing |
||
Iqbal Hall
|
0900 – 1000 |
Invited Talk: 3GPP-IMS Compliant End-to-End Mobile IPTV Solution for 4G/LTE Networks by Amir Qayyum, Capital University of Science and Technology, Pakistan |
1000 – 1020 |
Erlang Based Server Selection Scheme Using Software Defined Networking in Datacenter for Energy Conservation by Arif Husen, Syed Asad Hussain and Imran Raza |
|
1020 – 1040 |
Joint Sybil Attack Prevention and Energy Conservation in Wireless Sensor Networks by Waqas Ali, Ghulam Abbas and Ziaul Haq Abbas |
|
1045 – 1105 |
Refreshments |
|
Session 11: Data Science & Advanced Analytics |
||
Sir Syed Hall
|
0900 – 0945 |
Invited Talk: GDPR-compliant Cloud Containers: Blockchains for Cloud Event Tracking by Omer F. Rana, Cardiff University, UK |
0945 – 1005 |
Heterogeneous 2-Phase Detection of Strongly Connected Components, and Classification of Graphs by Sara Rehmat, Usman Shah and Sohail Yousaf. |
|
1005 – 1025 |
Duckworth-Lewis-Stern Method Comparison with Machine Learning Approach by Kumail Abbas and Sajjad Haider. |
|
1025 – 1045 |
K-Anonymity without the Prior Value of the Threshold k: Revisited by Khan Farhan Rafat. |
|
1045 – 1105 |
Refreshments |
|
Session 12: Smart Grid, Energy and Electronics |
||
Liaqat Hall |
0900 – 0945 |
Invited Talk: What is the Role of Blockchain in Smart Grid? by Nadeem Javaid, COMSATS University Islamabad, Pakistan |
0945 – 1005 |
A Soft Robotic Glove for Assistance and Rehabilitation of Stroke Affected Patients by Mir Muneeb Ullah, Uzair Hafeez, Muhammad Naeem Shehzad, Muhammad Naeem Awais and Haroon Elahi. |
|
1005 – 1025 |
Deep Learning Based Techniques to Enhance the Performance of Microgrids: A Review by Sheraz Aslam, Herodotos Herodotou, Nasir Ayub and Syed Muhammad Mohsin. |
|
1025 – 1045 |
Short-term Electricity Load and Price Forecasting using Enhanced KNN by Tehreem Ashfaq and Nadeem Javaid. |
|
1045 – 1105 |
Refreshments
|
|
Parallel Sessions 13, 14, 15 and 16 |
||
Session 13: Network, Cyber & Information Security |
||
Jinnah Hall
|
1105 – 1145 |
Invited Talk: Ordinal-Optimized Scheduling for Large-Scale Cloud Data Processing by Fan Zhang, MIT - Massachusetts Institute of Technology, USA |
1145 – 1205 |
A secure service discovery scheme for mobile ad hoc network using artificial deep neural network by Noman Islam. |
|
12:05 – 1225 |
BoDMitM: Botnet Detection and Mitigation System for Home Router Based on Manufacture Usage Description (MUD) by Hassan Jalil Hadi, Syed Muhammad Sajjad and Khaleeq Un Nisa. |
|
1225 – 1245 |
Forensics analysis of Wish-Shopping Made Fun application on Android by Suneela Pasha and Shahzad Saleem. |
|
1245 – 1305 |
An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection by Mukhtar Hussain, Ernest Foo and Suriadi Suriadi. |
|
1305 – 1400 |
Lunch & Prayers |
|
Session 14: Invited Talks |
||
Iqbal Hall
|
1105 – 1145 |
Introduction of Research on Pneumatic Components - Active Control of Air Spring for Rail Train, A New Soft Actuator Driven by Gas-Liquid Phase-Change of Fluorocarbon, Rotation Control of Air Turbine Spindle for Milling by Tomonori Kato, Fukuoka Institute of Technology, Japan |
1145 – 1225 |
Challenges in Healthcare Risk Modeling- Case of Contrast-Induced Acute Kidney Injury by Khalid Latif, Biome Analytics, Pakistan |
|
1225 – 1305 |
Stochastic Geometry for Modeling nodes in M2M Communications by Aamir Hasan, Habib University, Pakistan |
|
1305 – 1400 |
Lunch & Prayers |
|
Session 15: Tutorial |
||
Sir Syed Hall
|
1105 – 1305 |
Hardware and Software Optimizations for the Machine Learning Systems by Muhammad Shafique, Vienna University of Technology (TU Wien), Austria |
1305 – 1400 |
Lunch & Prayers |
|
Session 16: Workshop on Advances in AI |
||
Liaqat Hall |
1105 – 1145 |
AI for Everyone by Yasar Ayaz, National University of Sciences and Technology, Pakistan |
1145 – 1225 |
Recent Architectural Advancements in Deep Convolutional Neural Networks by Asifullah, Pakistan Institute of Engineering and Applied Sciences (PIEAS), Pakistan |
|
1225 – 1305 |
Urdu OCR: A journey from hand-crafting to deep learning by Faisal Shafait, National Center of Artificial Intelligence (NCAI) of Pakistan, Pakistan |
|
1305 – 1400 |
Lunch & Prayers |
|
Parallel Sessions 17, 18, 19 and 20 |
||
Session 17: Network, Cyber & Information Security |
||
Jinnah Hall |
1400 – 1455 |
Invited Talk: Transient Key-based Obfuscation for HLS in an Untrusted Cloud Environment by Guy Gogniat, University of South Brittany (UBS), Lorient, France. |
1455 – 1520 |
Web Server Integrity Protection Using Blockchain by Muhammad Zaid, Muhammad Waheed Akram, Naveed Admed and Shahzad Saleem. |
|
1520 – 1545 |
Security against Compromised Servers: Verifiable DB Queries by Muhammad Waheed Akram, Muhammad Zaid, Naveed Ahmed and Shahzad Saleem. |
|
1545 – 1610 |
Interest Flooding Attack Mitigation in Named Data Networking based VANETs by Muhammad Umar Sattar and Rana Asif Rehman. |
|
1610 – 1640 |
Randomness Analyses of the Secure Hash Algorithms, SHA-1, SHA-2 and Modified SHA by Zeyad Al-Odat, Samee Khan and Assad Abbas. |
|
Session 18: Modeling & Simulation for Emergent Technologies |
||
Iqbal Hall
|
1400 – 1455 |
Invited Talk: Actor Critic Algorithms for Efficient Communications in IoT Systems by Ahmed E Kamal, Iowa State University, USA |
1455 – 1520 |
Blockchain based Vehicular Trust Management and Less Dense Area Optimization by Shahid Abbas and Nadeem Javaid. |
|
1520 – 1545 |
Agent-based modeling and simulation in the analysis of e-commerce market by Muhammad Umar Farooq and Fahim Gohar Awan. |
|
1545 – 1610 |
Blockchain and IoT Based Formal Model of Smart Waste Management System Using TLA+ by Saba Latif, Aniqa Rehman and Nazir Zafar. |
|
1610 – 1640 |
Comparative Analysis of Different Light Intensities for Implementation Idea of Li-Fi for CPEC by Umar Draz, Tariq Ali and Sana Yasin. |
|
Session 19: Invited Talks |
||
Sir Syed Hall
|
1400 – 1450 |
Digital Disruption by Muhammad Kheam Khan, Keystone Consulting (Pvt) Ltd. Islamabad, Pakistan |
1450 – 1540 |
Time to Formalize the Systematic Technology Risk Management Process for Complex Resource Mapping Projects by Tanveer Ahmed, Higher Education Commission, Pakistan |
|
1540 – 1630 |
Bridging the gender gap: Pakistani Women in Tech Space by Sidra Jalil, Punjab Education Foundation, Pakistan |
|
Session 20: Adaptive Systems, Networks, IoT & Cloud Computing |
||
Liaqat Hall
|
1400 – 1450 |
Invited Talk: Malware Detection using Fuzzy Hashes by Muhammad Yousuf, Riphah International University, Pakistan |
1450 – 1540 |
Invited Talk: State of Cyber Security in Pakistan by Rafi Us Shan, Khyber Pakhtunkhwa Information Technology Board, Pakistan |
|
1540 – 1600 |
Cyber Physical System for Solar Energy Monitoring by Sayed Shahid Hussain, Khurram S. Khattak, Ali Khan and Zawar H. Khan |
Day 3: Wednesday, December 18, 2019 |
||
Parallel Sessions 21, 22, 23 and 24 |
||
Session 21: Smart Grid and Image Processing |
||
Jinnah Hall
|
0900 – 0945 |
Invited Talk: New Developments in Electrical Propulsion Systems for EVs/HEVs by Mahmood Nagrial, Western Sydney University, Australia |
0945 – 1005 |
Design of Permanent Magnet Assisted Synchronous Reluctance Machines with Rare-Earth Magnets by Mahmood Nagrial, Thushanth Mohanarajah, Jamal Rizk and Ali Hellany. |
|
1005 – 1025 |
Optimum sizing of PV-WT-FC-DG hybrid energy system using teaching learning-based optimization by Asif Khan and Nadeem Javaid. |
|
1025 – 1045 |
Identification and Classification of Cybercrimes using Text Mining Technique by Shiza Andleeb, Rashid Ahmed, Zaheer Ahmed and Maira Kanwal. |
|
1045 – 1105 |
Refreshments |
|
Session 22: Invited Talks |
||
Iqbal Hall
|
0900 – 0950 |
An AI Enabled System for the Appraisal of Risk Assessments by Andrew Ware, University of South Wales, UK |
0950 – 1040 |
Process Mining: A Data Science Perspective of Business Process Management by Faiza A. Bukhsh, University of Twente, Netherland |
|
1045 – 1105 |
Refreshments |
|
Session 23: Software Engineering |
||
Sir Syed Hall
|
0900 – 0950 |
Invited Talk: Machine Learning and API Security: What We Have and What We Need by Rasheed Hussain, Innopolis University, Innopolis, Russia |
0950 – 1015 |
Spreadsheet Smells: A Systematic Mapping Study by Awais Azam, Areeba Umair and Khubaib Amjad Alam. |
|
1015 – 1040 |
Tracking the Ripple Impact of Code Changes through Version Control Systems by Ali Irfan and Arif Ur Rahman. |
|
1045 – 1105 |
Refreshments
|
|
Session 24: Invited Talks |
||
Liaqat Hall
|
0900 – 0950 |
Content-Centric Vehicular Blockchain Systems – What, How and Opportunities Maaz Rehan, COMSATS University Islamabad, Pakistan |
0950 – 1040 |
Traffic Accident Predictions by Saddaf Rubab, National University of Sciences and Technology, Pakistan |
|
1045 – 1105 |
Refreshments |
|
Parallel Sessions 25, 26, and 27 |
||
Session 25: PhD Symposium |
||
Jinnah Hall |
1105 – 1120 |
Software Requirements Engineering Maturity Model (SREMM) in Offshore Software Development Outsourcing by Muhammad Shafiq, Qinghua Zhang and Muhammad Azeem Akbar. |
|
1120 – 1140 |
Enabling Test Case Prioritization For Component Based Software Development by Sadia Ali and Yaser Hafeez. |
|
1140 – 1200 |
BCALS-An Immutable Audit Log Management System Empowered with Semantics by Ahmad Ali, Mansoor Ahmed and Abid Khan |
|
1200 – 1220 |
Linear Time Compression of Commuters' Trajectory Data for Smart City Administration by Maryam Bashir, Jawad Ashraf and Asad Habib. |
|
1220 – 1240 |
Resource Allocation and Bandwidth Optimization in SDN-Based Cellular Network by Sahrish Khan and Munam Ali Shah. |
|
1240 – 1300 |
An Integrated Decision Making System For Prediction: Multi-Objective Genetic Fuzzy Optimization Approach by Bilal S Raja and Sohail Asghar. |
|
1305 – 1400 |
Lunch & Prayers |
Session 26: Adaptive Systems, Networks, IoT & Cloud Computing |
||
Iqbal Hall |
1105 – 1145 |
Invited Talk: Protection Against Complete Security Meltdown in Contemporary Hardware. –What Options Do We Have? by Khurram Bhatti, Information Technology University, Pakistan |
|
1145 – 1205 |
Evaluating Smartphone Screen Divisions for Designing Blind-Friendly Touch-Based Interfaces by Shah Khusro, Badam Niazi, Akif Khan and Iftikhar Alam |
|
1205 – 1225 |
Usability Barriers in Smart TV User Interfaces: A Review and Recommendations by Iftikhar Alam, Shah Khusro and Mumtaz Khan |
|
1225 – 1245 |
Discovering Semantic Relationships among PDF Book Figures using Contextual and Visual Similarity by Sehrish Rafiq, Shah Khusro and Nosheen Fayyaz |
|
1245 – 1305 |
Server Based Task Allocation to Reduce Inter-Task Memory Interference in Multicore Systems by Syed Aftab Rashid |
|
1305 – 1400 |
Lunch & Prayers |
Session 27: Software Engineering |
||
Sir Syed Hall |
1105 – 1155 |
Invited Talk: AI for E-Commerce by Aurengzeb Khan, Cheez Group, Pakistan |
|
1155 – 1215 |
Scheduling Charging of Electric Vehicles in a Secured Manner using Blockchain Technology by Muhammad Umar Javed and Nadeem Javaid. |
|
1215 – 1235 |
On Fault Localization Using Machine Learning Techniques by Haad Ali and Tamim Khan. |
|
1235 – 1255 |
Test Case prioritization Based on Path Complexity by Tehseen Afzal, Aamer Nadeem, Qamar Uz Zaman and Muddassar Sindhu. |
|
1305 – 1400 |
Lunch & Prayers |
Conference Panel Discussion |
||
Auditorium |
1400 – 1600 |
Topic: National AI Strategy |
Closing Ceremony |
||
Auditorium |
1600 – 1615 |
Conference Report |
1615 – 1625 |
Prize Distribution Ceremony Presentation of Shields |
|
|
1625 – 1635 |
Address by the Chief Guest |
|
1640 |
Refreshments |