scispace - formally typeset
W

Waqar Mehmood

Researcher at COMSATS Institute of Information Technology

Publications -  25
Citations -  223

Waqar Mehmood is an academic researcher from COMSATS Institute of Information Technology. The author has contributed to research in topics: Software development process & Software configuration management. The author has an hindex of 6, co-authored 23 publications receiving 131 citations.

Papers
More filters
Journal ArticleDOI

Why do firms adopt enterprise risk management (ERM)? Empirical evidence from France

TL;DR: In this paper, the authors employ a particular technique of survival data analysis, the Cox proportional hazards model, to investigate the factors that lead towards the decision of initiating an ERM programme.
Journal ArticleDOI

Breast Cancer Detection and Classification using Traditional Computer Vision Techniques: A Comprehensive Review

TL;DR: It is concluded that for the survival of women's life it is essential to improve the methods or techniques to diagnose breast cancer at an initial stage by improving the results of the Computer-Aided Diagnosis systems.
Journal ArticleDOI

Predicting The Cricket Match Outcome Using Crowd Opinions On Social Networks: A Comparative Study Of Machine Learning Methods

TL;DR: Attempts are made to investigate the feasibility of using collective knowledge obtained from microposts posted on Twitter to predict the winner of a Cricket match to classify winning team prediction in a Cricket game before the start of game.
Journal ArticleDOI

A survey of P2P content sharing in MANETs

TL;DR: A comprehensive survey of researches related to P2P overlay networks for sharing the content at the application layer in MANETs is presented and the features, vitality, and vulnerability of these approaches are compared.
Journal ArticleDOI

Enforcing Optimal ACL Policies Using K-Partite Graph in Hybrid SDN

TL;DR: A systematic design approach to implement network policies optimally by using decision tree and K-partite graph is proposed and results indicate that the proposed technique outperforms existing approaches in terms of computation time, traffic optimization and successful packet delivery, etc.