scispace - formally typeset
Search or ask a question
Institution

National University of Computer and Emerging Sciences

EducationIslamabad, Pakistan
About: National University of Computer and Emerging Sciences is a education organization based out in Islamabad, Pakistan. It is known for research contribution in the topics: Computer science & The Internet. The organization has 1506 authors who have published 2438 publications receiving 26786 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, a theoretical study of the dynamics of an electroosmotic flow (EOF) in cylindrical domain is presented. And the results obtained reveal that the magnitude of velocity increases with increase of the Debye-Huckel and electrokinetic parameters.
Abstract: The present paper reports a theoretical study of the dynamics of an electroosmotic flow (EOF) in cylindrical domain. The Cauchy momentum equation is first simplified by incorporating the electrostatic body force in the electric double layer and the generalized Burgers fluid constitutive model. The electric potential distribution is given by the linearized Poisson–Boltzmann equation. After solving the linearized Poisson–Boltzmann equation, the Cauchy momentum equation with electrostatic body force is solved analytically by using the temporal Fourier and finite Hankel transforms. The effects of important involved parameters are examined and presented graphically. The results obtained reveal that the magnitude of velocity increases with increase of the Debye–Huckel and electrokinetic parameters. Further, it is shown that the results presented for generalized Burgers fluid are quite general so that results for the Burgers, Oldroyd-B, Maxwell and Newtonian fluids can be obtained as limiting cases.

15 citations

Journal ArticleDOI
TL;DR: In this article, the combined effect of Reynolds number (30 ≤ Re ≤ 150) and gap spacing (1 ≤ g ≤ 7) is studied for two dimensional cross flow across multiple staggered rows of square cylinders.
Abstract: In this numerical exploration, the combined effect of Reynolds number (30 ≤ Re ≤ 150) and gap spacing (1 ≤ g ≤ 7) is studied for two dimensional cross flow across multiple staggered rows of square cylinders. Flow is simulated by using lattice Boltzmann method. Outcomes show that for the outset of vortex shedding phenomenon, the critical Re increases as the normalized g increases. At large Re and at g = 7, 6 and 5, the primary vortex shedding frequency controls the flow whereas the secondary frequency almost vanishes. The jets in the gap region have strong influence upon the wake interaction. The nature of the wakes is changed by changing the g and Re which is visualized by the change of wake size behind the cylinders. These g depending on the Re are used to split the flow regimes into chaotic, quasiperiodic-I and quasiperiodic-II flow regimes. Some physical parameters of practical importance are also analysed.

15 citations

Journal ArticleDOI
TL;DR: In this article, a three-way clustering based algorithm called reduction and elevation based threeway (RE3OWC) for open world classification is proposed. But, it does not consider a specific interpretation where novel instances are instances from unknown classes which are not seen during the training phase.

15 citations

Journal ArticleDOI
TL;DR: A new CVI is proposed to perform the color image segmentation that combines compactness, separation and overlap to assess the clustering quality effectively and performs better compared to other state-of-the-art methods.
Abstract: Clustering validity index (CVI) plays an important role in data partitioning and image segmentation. In this paper, a new CVI is proposed to perform the color image segmentation. The proposed CVI combines compactness, separation and overlap to assess the clustering quality effectively. The aggregation operators (t-norms and t-conorms) are used to build a new reliable and robust overlap measure. Moreover, a genetic algorithm is employed to dynamically optimize the clusters centroids and get the best possible data partition. The clustering of super-pixels is performed to reduce the computational cost and convergence time. The genetic algorithm with new clustering validity index is able to find the best data partitioning. The performance of the proposed algorithm is evaluated on the Berkeley image segmentation database. The extensive experimentation shows that the proposed algorithm performs better compared to other state-of-the-art methods.

15 citations

Journal ArticleDOI
TL;DR: This paper presents QuPiD (query profile distance) attack: a machine learning-based attack that evaluates the effectiveness of UUP in privacy protection, and determines the distance between the user’s profile (web search history) and upcoming query using a proposed novel feature vector.
Abstract: With the advancement in ICT, web search engines have become a preferred source to find health-related information published over the Internet. Google alone receives more than one billion health-related queries on a daily basis. However, in order to provide the results most relevant to the user, WSEs maintain the users’ profiles. These profiles may contain private and sensitive information such as the user’s health condition, disease status, and others. Health-related queries contain privacy-sensitive information that may infringe user’s privacy, as the identity of a user is exposed and may be misused by the WSE and third parties. This raises serious concerns since the identity of a user is exposed and may be misused by third parties. One well-known solution to preserve privacy involves issuing the queries via peer-to-peer private information retrieval protocol, such as useless user profile (UUP), thereby hiding the user’s identity from the WSE. This paper investigates the level of protection offered by UUP. For this purpose, we present QuPiD (query profile distance) attack: a machine learning-based attack that evaluates the effectiveness of UUP in privacy protection. QuPiD attack determines the distance between the user’s profile (web search history) and upcoming query using our proposed novel feature vector. The experiments were conducted using ten classification algorithms belonging to the tree-based, rule-based, lazy learner, metaheuristic, and Bayesian families for the sake of comparison. Furthermore, two subsets of an America Online dataset (noisy and clean datasets) were used for experimentation. The results show that the proposed QuPiD attack associates more than 70% queries to the correct user with a precision of over 72% for the clean dataset, while for the noisy dataset, the proposed QuPiD attack associates more than 40% queries to the correct user with 70% precision.

15 citations


Authors

Showing all 1515 results

NameH-indexPapersCitations
Muhammad Shoaib97133347617
Muhammad Usman61120324848
Muhammad Saleem60101718396
Abdul Hameed5250714985
Muhammad Javaid483448765
Muhammad Umar452285851
Muhammad Adnan383815326
JingTao Yao371294374
Amine Bermak374415162
Nadeem A. Khan341664745
Majid Khan332303818
Tariq Shah321953131
Muhammad Shahzad312284323
Maurizio Repetto302523163
Tariq Mahmood30933772
Network Information
Related Institutions (5)
COMSATS Institute of Information Technology
21.2K papers, 340.9K citations

91% related

Information Technology University
13K papers, 236.4K citations

85% related

Quaid-i-Azam University
16.8K papers, 381.6K citations

82% related

Sharif University of Technology
31.3K papers, 526.8K citations

82% related

Iran University of Science and Technology
24.9K papers, 372K citations

81% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20235
202221
2021389
2020338
2019266
2018178