W
Waqar Mehmood
Researcher at COMSATS Institute of Information Technology
Publications - 25
Citations - 223
Waqar Mehmood is an academic researcher from COMSATS Institute of Information Technology. The author has contributed to research in topics: Software development process & Software configuration management. The author has an hindex of 6, co-authored 23 publications receiving 131 citations.
Papers
More filters
Journal ArticleDOI
Why do firms adopt enterprise risk management (ERM)? Empirical evidence from France
TL;DR: In this paper, the authors employ a particular technique of survival data analysis, the Cox proportional hazards model, to investigate the factors that lead towards the decision of initiating an ERM programme.
Journal ArticleDOI
Breast Cancer Detection and Classification using Traditional Computer Vision Techniques: A Comprehensive Review
TL;DR: It is concluded that for the survival of women's life it is essential to improve the methods or techniques to diagnose breast cancer at an initial stage by improving the results of the Computer-Aided Diagnosis systems.
Journal ArticleDOI
Predicting The Cricket Match Outcome Using Crowd Opinions On Social Networks: A Comparative Study Of Machine Learning Methods
TL;DR: Attempts are made to investigate the feasibility of using collective knowledge obtained from microposts posted on Twitter to predict the winner of a Cricket match to classify winning team prediction in a Cricket game before the start of game.
Journal ArticleDOI
A survey of P2P content sharing in MANETs
TL;DR: A comprehensive survey of researches related to P2P overlay networks for sharing the content at the application layer in MANETs is presented and the features, vitality, and vulnerability of these approaches are compared.
Journal ArticleDOI
Enforcing Optimal ACL Policies Using K-Partite Graph in Hybrid SDN
TL;DR: A systematic design approach to implement network policies optimally by using decision tree and K-partite graph is proposed and results indicate that the proposed technique outperforms existing approaches in terms of computation time, traffic optimization and successful packet delivery, etc.