Conference Program
Day 1: Monday, December 12, 2022 |
||||||
Plenary Session |
||||||
Auditorium |
0900Hrs |
Guests to be seated |
||||
0915Hrs |
National Anthem |
|||||
0920Hrs |
Recitation of Holy Quran |
|||||
0925Hrs |
Overview of the Conference |
|||||
0935Hrs |
Welcome Address |
|||||
0945Hrs |
Keynote Address: Bridging the Academia - Industry Divide by S. Sohail H. Naqvi, KnowlEDGE Streams (Private) Ltd., Pakistan |
|||||
1030Hrs |
Address by Chief Guest |
|||||
1045Hrs |
Closing of Inaugural Ceremony |
|||||
1050Hrs |
Refreshments |
|||||
FIT 2022-Technical Sessions |
||||||
Parallel Sessions 1, 2, 3, and 4 |
||||||
Session 1: Software Engineering |
||||||
Sir Syed Hall |
1130 – 1215 |
Invited Talk: Motivators and Inhibitors of Software Piracy: A User’s Perspective by Irfan Butt, Toronto Metropolitan University, Canada |
||||
1215 – 1235 |
Successful Change Management in Cloud-Based Offshore Software Development Outsourcing by Muhammad Azeem Akbar, Saima Rafi, Rafiq Ahmad Khan and Muhammad Tanveer Riaz |
|||||
1235 – 1255 |
Investigation of Latest CASE Tools for Database Engineering: A Systematic Literature Review by Nazish Yousaf, Madeha Arif, Misbah Mehboob and Wasi Haider |
|||||
1255 – 1315 |
Determining The Level of Detail of Software Requirements by Syed Absar Ul Hasan and Zeeshan Ali Rana |
|||||
1315 – 1415 |
Lunch & Prayers |
|||||
Session 2: Pattern Recognition, Image & Natural Language Processing |
||||||
Jinnah Hall |
1130 – 1215 |
Invited Talk: Recent Developments in AI and Multispectral Imaging for Skin Cancer Detection by Ricardo Vardasca, ISLA Santarém, Portugal |
||||
1215 – 1235 |
Inspecting Mega Solar Plants through Computer Vision and Drone Technologies by Syed Umaid Ahmed, Muhammad Affan, Muhammad Raza and Muhammad Harris Hashmi |
|||||
1235 – 1255 |
Tri-model Ensemble with Grid Search Optimization for Bipolar Disorder Diagnosis by Syed Muhammad Zain and Wajid Mumtaz |
|||||
1255 – 1315 |
Summarization of Cricket Videos Using Deep Learning Technique by Tabinda Nasir, Muhammad Javed Iqbal and Mehmoon Anwar |
|||||
1315 – 1415 |
Lunch & Prayers |
|||||
Session 3: Tutorial |
||||||
Iqbal Hall |
1130 – 1315 |
Introduction to Blockchain : Concepts and Applications by Jawad Shamsi, National University of Computer and Emerging Sciences (FAST-NUCES), Pakistan |
||||
1315 – 1415 |
Lunch & Prayers |
|||||
Session 4: Invited Talks |
||||||
Liaqat Hall |
1130 – 1205 |
How 6G Joint Communication & Sensing Use Case will Help for Future Healthcare by Qammer Abbasi, University of Glasgow, UK |
||||
1205 – 1240 |
Bridging The Digital Divide in Healthcare by Syed Ahmad Chan Bukhari, St. John's University, USA |
|||||
1240 – 1315 |
Visualizing Healthcare in the Developing World: A Real-World Analysis Using Geospatial Information System by Faisal Ahmad Khan, Balochistan University of IT, Engineering and Management Sciences (BUITEMS), Pakistan |
|||||
1315 – 1415 |
Lunch & Prayers |
|||||
Parallel Sessions 5, 6, 7,8, and 9 |
||||||
Session 5: Remote Health Monitoring and Prediction Systems |
||||||
Jinnah Hall |
1415 – 1500 |
Invited Talk: Artificial Intelligence based Technologies in Digital Healthcare by Naeem Ramzan, University of West of Scotland, UK |
||||
1500 – 1520 |
An Improved Deep Learning Approach for Heart Attack Detection from Digital Images by Zaheer Ahmed, Aun Irtaza, Awais Mehmood and Muhammad Faheem Saleem |
|||||
1520 – 1540 |
Multiclass Classification of Breast Cancer using Mammographic Images With Masses by Nazeef Ul Haq, Muhammad Danish, Madeeha Kanwal and Muhammad Arslan Rauf |
|||||
1540 – 1600 |
Hybrid Deep Learning model for ECG-based Arrhythmia Detection by Amina Ashfaq, Nadeem Anjum, Salman Ahmed and Nayyer Masood |
|||||
1600 – 1620 |
EHG Signal Analysis for Prediction of Term and Preterm using Variational Mode Decomposition and Artificial Neural Networks by Muhammad Umar Khan, Sumair Aziz, Khushbakht Iqtidar and Raul Fernandez-Rojas |
|||||
Session 6: Pattern Recognition, Image & Natural Language Processing |
||||||
Iqbal Hall |
1415 – 1500 |
Invited Talk: Microwave Imaging for Low-Cost and Safe Medical Diagnostic Applications by Muhammad Zubair, Information Technology University, Pakistan |
||||
1500 – 1520 |
A Methodology of Customized Dataset for Cotton Disease Detection Using Deep Learning Algorithms by Maryam Saba Tahir, Ayesha Yaqoob, Haiqa Hamid and Rana M. Amir Latif |
|||||
1520 – 1540 |
Detection of COVID-19 in High Resolution Computed Tomography Using Vision Transformer by Aroosa Yaqoob, Abdul Basit, Abdul Rehman, Abdul Hannan and Kaleem Ullah |
|||||
1540 – 1600 |
Impact of Demographics on Automated Criminal Tendency Detection from Facial Images by Negarish Mushtaq, Khizer Ali, Momina Moetesum and Imran Siddiqi |
|||||
1600 – 1620 |
Locomotion Classification of Bipedal Humanoid Robot using Fast Fourier Transform by Saad Imran, Farrukh Zeeshan and Subhan Fazal |
|||||
1620 – 1640 |
A Lecture Centric Automated Distractor Generation for Post-Graduate Software Engineering Courses by Rudeema Chughtai, Farooque Azam, Muhammad Waseem Anwar, Wasi Haider But and Muhammad Umar Farooq |
|||||
Session 7: Data Science & Advanced Analytics |
||||||
Sir Syed Hall |
1415 – 1500 |
Invited Talk: Leveraging Data Center Heterogeneity for Improving The Performance of AI Workloads by M. Mustafa Rafique, Rochester Institute of Technology, USA |
||||
1500 – 1520 |
Bankruptcy Prediction using Diverse Machine Learning Algorithms by Ahmad Hassan and Nazish Yousaf |
|||||
1520 – 1540 |
Rumour Source Detection on Interconnected Social Networks by Amanullah Khan, Mohammad Farooq Shaikh, Fahad Sherwani, Syed Hamza Hassan and Aymen Kalifa Soluman Ahteewash |
|||||
1540 – 1600 |
Analyzing Bangkok City Taxi Ride: Reforming Fares for Profit Sustainability using Big Data Driven Model-Revisited by Khan Farhan Rafat |
|||||
1600 – 1620 |
An Image Captioning Algorithm based on the Hybrid Deep Learning Technique (CNN+GRU) by Rana Adnan Ahmad, Muhammad Azhar and Hina Sattar |
|||||
1620 – 1640 |
Churn Prediction of Customers in a Retail Business using Exploratory Data Analysis by Waseem Abbas, Muhammad Usman and Usman Qamar |
|||||
Session 8: Network, Cyber & Information Security |
||||||
Liaqat Hall |
1415 – 1500 |
Invited Talk: Sensor Fault Diagnostics using Machine Learning by Sana Ullah Jan, Edinburgh Napier University Merchiston Campus, UK |
||||
1500 – 1520 |
A Systematic Review on the Block-chain Attacks by Muhammad Azeem, Jabar Mahmood, Tayyaba Aslam and Kiran Shahzadi |
|||||
1520 – 1540 |
Let’s Prevent Spectre Attacks in the Docker Containers Too by Humdah Shakir Khan, Farooque Hassan Kumbhar and Jawwad Ahmed Shamsi |
|||||
1540 – 1600 |
Network Forensic Analysis of Twitter Application on Android OS by Alia Umrani, Yousra Javed and Muhammad Iftikhar |
|||||
1600 – 1620 |
Defeating Modern Day Anti-Viruses for Defense Evaluation by Abdul Basit Ajmal, Shawal Khan and Farhana Jabeen |
|||||
Session 9: Invited Talks |
||||||
Nishtar Hall |
1415 – 1500 |
Use of IoTs, AI and Edge Computing for Remote Patient Monitoring by Amir Qayyum, Capital University of Science and Technology (CUST), Pakistan |
||||
1500 – 1545 |
Security Against Microarchitectural Side-Channel Vulnerabilities in Memory Subsystem -the Case of Indirect Eviction Cache! by Khurram Bhatti, Information Technology University, Pakistan |
|||||
1545 – 1630 |
Changing Landscape of Operational Technology (OT) Cyber Threats in the Process Industry by Khalil Sultan, Pakistan Petroleum Limited (PPL), Pakistan |
|||||
Day 2: Tuesday, December 13, 2022 |
|||
Parallel Sessions 10, 11, 12, 13, and 14 |
|||
Session 10: Pattern Recognition, Image & Natural Language Processing |
|||
Jinnah Hall |
0900 – 0945 |
Invited Talk: Is Seeing Still Believing? Deepfakes, A Tool for Disinformation: State-of-the-Art Open Challenges, Countermeasures, and a Way Forward by Ali Javed, University of Engineering and Technology (UET), Pakistan |
|
0945 – 1005 |
Contextual Word Embedding based Clustering for Extractive Summarization by Shah Faisal, Atif Khan, Suhail Yousaf and Muhammad Umair |
||
1005 – 1025 |
Sequence-Driven Neural Network Models for NER Tagging in Roman Urdu by Maaz Ali Nadeem, Khadija Irfan, Khaula Atiq, Mirza Omer Beg and Muhammad Umair Arshad |
||
1025 – 1045 |
Stroke Sequence Identification in Handwritten Urdu Alphabets Using Convolutional Neural Networks by Awais Qarni, Muhammad Shoaib, Muhammad Abdullah, Saba Khalid, Ayesha Aslam, Noreen Kausar, Ayesha Khan, Mohammad Naveed Tariq, Fizza Jameel and Tayyab Gull Khan |
||
1045 – 1105 |
Refreshments |
||
Session 11: Pattern Recognition, Image & Natural Language Processing |
|||
Iqbal Hall |
0900 – 0945 |
Invited Talk: Deep Ensemble Learning and its Application by Muhammad Atif Tahir, National University of Computer and Emerging Sciences (FAST-NUCES), Pakistan |
|
0945 – 1005 |
Brain Tumor Augmentation using the U-NET Architecture by Mohsin Jabbar, Maria Saddiqui and Sultan Daud |
||
1005 – 1025 |
Deep Neural Networks for Human Activity Recognition by Muhammad Ashar Burney, Ayesha Waheed, Shuaib Khan, Ali Raza Shahid, Mehmood Nawaz, Muhammad Bilal Shaikh and Rizwan Qureshi |
||
1025 – 1045 |
Automatic Detection of Leukemia through Convolutional Neural Network by Rida Arif, Shahzad Akbar, Ahmad Bilal Farooq, Syed Ale Hassan and Sahar Gull |
||
1045 – 1105 |
Refreshments |
||
Session 12: Signal Processing and Next Generation Communication Systems |
|||
Sir Syed Hall |
0900 – 0945 |
Invited Talk: The 6G Wireless Networks: What to Expect and How to Incept? by Syed Ali Hassan, National University of Sciences and Technology (NUST), Pakistan |
|
0945 – 1005 |
On Evaluation of Dereverberation Algorithms for Expectation-Maximization based Binaural Source Separation in Varying Echoic Conditions by Muhammad Sheryar Fulaly, Sania Gul, Muhammad Salman Khan, Ata Ur Rehman and Syed Waqar Shah |
||
1005 – 1025 |
A Simulation Study on the Downlink Performance of Non-Uniform Dense Cellular Networks by Muhammad Masood, Muhammad Hanaan and Khurram Shehzad |
||
1025 – 1045 |
Cyber Attacks and Vulnerabilities Assessment for Unmanned Aerial Vehicles Communication Systems by Hassan Jalil Hadi and Yue Cao |
||
1045 – 1105 |
Refreshments |
||
Session 13: Data Science & Advanced Analytics |
|||
Liaqat Hall |
0900 – 0945 |
Invited Talk: Cyber Security for OT Environments by Omer F. Rana, Cardiff University, UK |
|
0945 – 1005 |
An Improved Social Ties Inference Framework using Location Ranking by Aqeel Ahmed, Xianghong Lin, Ali Arshad, Khalil Ur Rahman and Nauman Ali Khan |
||
1005 – 1025 |
Covid Severity Prediction: Who Cares About the Data Quality? by Teodora Nae, Johannes Krabbe, Faiza Allah Bukhsh, Jeewanie Jayasinghe Arachchige and Faizan Ahmed |
||
1025 – 1045 |
Traffic Classification based on Incremental Learning Algorithms for the Software-Defined Networks by Arwa M.Eldhai, Mosab Hamdan, Suleman Khan, Muzaffar Hamzah and MN Marsono |
||
1045 – 1105 |
Refreshments |
||
Session 14: Water Informatics and Communication Technology |
|||
Nishtar Hall |
0900 – 0925 |
Invited Talk: Deep Sea Underwater Acoustic Release: Design Consideration and its Mariana Trench Application by Songzuo LIU, College of Underwater Acoustic Engineering, Harbin Engineering University, China |
|
0925 – 0950 |
Invited Talk: SST Variability in the Tropical Indian Ocean during ENSO and IOD Events by Sartaj Khan, Centres of Excellence in Science and Applied Technologies (CESAT), Pakistan |
||
0950 – 1010 |
Experimental Study and Results on Real-Time Communication via Gigabit Ethernet in Underwater Sensor Array Systems by Kashif Waqas, Umar Hamid and Shahid Ali |
||
1010 – 1030 |
Measurement-based Analysis of Characteristics of Fast Moving Underwater Acoustic Communication Channel by Yang Wang, Honglu Yan, Chenyu Pan and Songzuo Liu |
||
1030 – 1050 |
TARIQ: Towards Area Adjustment and Rounding of Intermediate Nodes for Quadrilateration in Blockchain Enabled Underwater Beacon Node Localization by Sheikh Umar, Tariq Ali and Sana Yasin |
||
1050 – 1105 |
Refreshments |
||
Parallel Sessions 15, 16, 17, 18, and 19 |
|||
Session 15: Invited Talks |
|||
Jinnah Hall |
1105 – 1145 |
Supporting Low-Latency Mobile Edge Applications via Control Plane Interventions by Zartash Afzal Uzmi, Lahore University of Management Sciences (LUMS), Pakistan |
|
1145 – 1230 |
Artificial Intelligence for Mobile Healthcare using Wearable Gadgets by Syed Fawad Hussain, University of Birmingham, Dubai |
||
1230 – 1305 |
Digital Transformation a Journey to Never Normal and eGovernance of Open Distance Learning in Managed Learning Eco-System (MLE) by Tanveer Ahmed, Technology Consultant at Government of Pakistan |
||
1305 – 1400 |
Lunch & Prayers |
||
Session 16: Adaptive Systems, Networks, IoT & Cloud Computing |
|||
Sir Syed Hall |
1105 – 1140 |
Invited Talk: Challenges and Opportunities in Cyber-Physical Systems Security: Attacks and Defenses by Mujeeb Ahmed, The University of Strathclyde, UK |
|
1140 – 1155 |
Development of Embedded Device for Stroke Prediction via Artificial Intelligence-based Algorithms by Muhammad Usama, Mudassar Ahmad, Rehan Ashraf and Muhammad Asif Habib |
||
1155 – 1210 |
A Machine Learning based Approach for Improving TCP Congestion Detection Mechanism in IoTs by Madeha Arif, Usman Qamar and Amreen Riaz |
||
1210 – 1225 |
A Pothole Warning System using Vehicular Ad-hoc Networks (VANETs) by Pedro Nepomuceno, Kifayat Ullah, Kelly Braghetto and Daniel Macedo Batista |
||
1225 – 1240 |
Verification and Validation of a VANET-based Formal Model for Online Taxi Service using VDM-SL Toolbox by Sidra Iqbal, Nazir Ahmad Zafar, Tariq Ali and Tahira Batool |
||
1240 – 1255 |
Efficient Distance based Response Time Pruning Cache Policy for NDN by Ahmad Arsalan, Muhammad Burhan and Rana Asif Rehman |
||
1255 – 1310 |
Cyber Automated Network Resilience Defensive Response Against Malware Images by Kainat Rizwan, Mudassar Ahmad and Muhammad Asif Habib |
||
1310 – 1400 |
Lunch & Prayers |
||
Session 17: Smart Grid, Energy & Electronics |
|||
Iqbal Hall |
1105 – 1145 |
Invited Talk: Chaining the Blockchain by Shoab A. Khan, Center for Advanced Studies in Engineering (CASE), Pakistan |
|
1145 – 1205 |
IEWH: Modeling and Optimization of Integrated Energy Water Nexus for Hydrogen Generation by Muhammad Babar Rasheed and Maria D. R-Moreno |
||
1205 – 1225 |
Towards Automatic Retinal Blood Vessels Segmentation in Retinal Images by Noshaba Khurshid, Muhammad Ibrahim Syed, Khurram Khan and Zahid Mahmood |
||
1225 – 1245 |
Unsupervised Vessel Segmentation Method in Retinal Images by Zanib Qaiser, Waqar Ahmad, Mir Yasir Umair and Zahid Mahmood |
||
1245 – 1305 |
A Reliable Graph-Based Routing Algorithm in Residential Multi-Microgrid Systems by Khuram Shahzad and Sohail Iqbal |
||
1305 – 1400 |
Lunch & Prayers |
||
Session 18: Pattern Recognition, Image & Natural Language Processing |
|||
Liaqat Hall |
1105 – 1140 |
Invited Talk: Distributed Machine Learning Models for Self-adapting Network of Digital Twins by Ashiq Anjum, University of Leicester, UK |
|
1140 – 1157 |
Emotional States Detection Model from Handwriting by using Machine Learning by Khadija Nadeem, Mudassar Ahmad and Muhammad Asif Habib |
||
1157 – 1214 |
CoviFake: A Framework to Detect and Analyze Fake COVID19 Tweets by Tooba Asif, Bilal Tahir, Yasir Saleem and Amir Mehmood |
||
1214 – 1231 |
Development of a Machine Learning Model for Prediction of Colour Trends in Fashion Industry by Khadija Nadeem, Mudassar Ahmad, Zafar Javed and Muhammad Asif Habib |
||
1231 – 1248 |
Application of NLP on Student's Discord Messages for Automatic Belbin Role Identification by Konstantine Dichev, Faiza Bukhsh and Yeray Barrios Fleitas |
||
1248 – 1305 |
Multi-Encoder Convolution Block Attention Model for Binary Segmentation by Keita Mamadou, Mohib Ullah, Øyvind Nordbø and Faouzi Alaya Cheikh |
||
1305 – 1400 |
Lunch & Prayers |
||
Session 19: Software Engineering |
|||
Nishtar Hall |
1105 – 1145 |
Invited Talk: Cyber Insecurity: Challenges and Way Forward by Haider Abbas, Military College of Signals, National University of Sciences & Technology (MCS- NUST), Pakistan |
|
1145 – 1205 |
Impact of Serious Game Design Factors and Problem based Pedagogy on Learning Outcome by Fatima Gillani, Irum Inayat and Carlos Carvalho |
||
1205 – 1225 |
A Project Manager’s Personality is a Treasure Trove of Information by Neelum Qasimi and Ali Afzal Malik |
||
1225 – 1245 |
Impact of Code Smells on Software Fault Prediction at Class Level and Method Level by Um E Safia and Tamim Ahmed Khan |
||
1245 – 1305 |
Template-based Automatic code generation for Web application and APIs Using Class Diagram by Irfan Ullah and Irum Inayat |
||
1305 – 1400 |
Lunch & Prayers |
||
Conference Panel Discussion |
|||
Auditorium |
1400 – 1600 |
Topic: Make in Pakistan: Need Assessment for a Strong Policy to Strengthen Indigenization |
|
Closing Ceremony |
|||
Auditorium |
1600 – 1615 |
Conference Report |
|
1615 – 1625 |
Presentation of Shields |
||
1625 – 1635 |
Address by the Chief Guest |
||
1640 |
Refreshments |
||