scispace - formally typeset
Search or ask a question
Institution

National University of Computer and Emerging Sciences

EducationIslamabad, Pakistan
About: National University of Computer and Emerging Sciences is a education organization based out in Islamabad, Pakistan. It is known for research contribution in the topics: Computer science & The Internet. The organization has 1506 authors who have published 2438 publications receiving 26786 citations.


Papers
More filters
Proceedings ArticleDOI
01 Sep 2019
TL;DR: This paper presents the n-gram and constraint-based level generator, which generates levels based on the player logs and handles the aesthetics and playability by using precise constraints.
Abstract: General Video Game Level Generation provides a platform to develop level generators that work for general games within a certain domain. In this paper, we present our n-gram and constraint-based level generator. The generator generates levels based on the player logs. The aesthetics are handled by n-gram and playability is ensured by using precise constraints. The generated levels are also evaluated using relative performance profile and user study. The experimental results show that the generated levels are of adequate quality comparative to the levels generated by sample level generators.

14 citations

Book ChapterDOI
05 Sep 2018
TL;DR: A novel ensemble method is presented, where texture and deep learning features are integrated to improve the prediction of the abnormalities in the GI tract e.g. Peptic ulcer disease.
Abstract: An endoscopy is a strategy in which a specialist utilizes specific instruments to see and work on the inward vessels and organs of the body. This paper expects to predict the abnormalities and diseases in the Gastro-Intestinal Tract, utilizing multimedia data acquired from endoscopy. Deep Analysis of GI tract pictures can foresee diseases and abnormalities, in its early stages and accordingly spare human lives. In this paper, a novel ensemble method is presented, where texture and deep learning features are integrated to improve the prediction of the abnormalities in the GI tract e.g. Peptic ulcer disease. Multimedia content analysis (to extricate data from the visual information) and machine learning (for classification) have been explored. Deep learning has additionally been joined by means of Transfer learning. Medieval Benchmarking Initiative for Multimedia Evaluation provided the dataset, which includes 8000 pictures. The data is gathered from conventional colonoscopy process. Using logistic regression and ensemble of different extracted features, 83% accuracy and a F1 score of 0.821 is achieved on testing sample. The proposed approach is compared with several state-of-the-art methods and results have indicated significant performance gains when compared with other approaches.

14 citations

Journal ArticleDOI
TL;DR: In this article, the authors investigated the mechanical behavior of a lime and quicklime-treated cohesive soil under the effects of repeated cycles of wetting and drying, and found that the durability behavior of treated soil is multipart due to parallel processes of positive aging (hydration process associated with binding agents) and negative aging (induced weathering).
Abstract: An earthwork design requires to consider the influence of severe climatic conditions on enduring performance of soils treated with chemical additives. This study was focused on investigating the mechanical behavior of a lime and cement-treated cohesive soil under the effects of repeated cycles of wetting and drying. The soil samples were prepared by adding different concentrations of cement (2, 6, 10, 12, 16, 20%) and quicklime (2, 4, 6, 8, 10%). Due to low-plastic nature of the host soil, the effectiveness of cement to reduce the plasticity of soil was relatively higher compared to lime-treatment. Likewise, an increase in optimum moisture and decrease in maximum dry unit weight was observed for both the additives and these effects were significant for lime treated soil compared to cement. Moreover, an increase in strength from 0.57 MPa to 12.9 MPa at 20% cement and from 0.57 MPa to 2.03 MPa at 2% lime was observed in unconfined compressive strengths (UCS) tests on soil samples. To investigate the durability characteristics of the treated soil, the samples were subjected to 12 cycles of wetting and drying with each cycle consisting of 5 hours of immersion in potable water and subsequent drying in oven for 43 hours. The compressive strength, volume change and weight loss of soil samples were determined at the 1st, 3rd, 6th, 9th and 12th cycle. It is observed that the durability behaviour of treated soil is multipart due to parallel processes of positive aging (hydration process associated with binding agents) and negative aging (induced weathering). For a sustainable mechanical performance of the treated soil, an optimum dose of 6% lime or 16% cement is recommended and some correlations are proposed to quantify the effects of repeated wetting and drying.

14 citations

Proceedings ArticleDOI
01 Dec 2011
TL;DR: This paper proposes a novel technique for embedding watermarks in digital images that takes inspiration from the Bee Algorithm, a fairly new evolutionary algorithm that exploits the food foraging behavior of honey bees which enables them to search for best quality flower patches over large distances.
Abstract: In today's era of digital information, protection of intellectual property rights is of great concern Watermarking is one technique which is used to protect against illicit copy and distribution of digital information In this paper we propose a novel technique for embedding watermarks in digital images that takes inspiration from the Bee Algorithm The Bee Algorithm is a fairly new evolutionary algorithm that exploits the food foraging behavior of honey bees which enables them to search for best quality flower patches over large distances Our Algorithm mimics this behavior of bees to embed watermark in the wavelet domain such that the resultant image is highly imperceptible as well as robust Simulation results show that our proposed technique consumes far less time in comparison to other classical evolutionary algorithms

14 citations

Journal ArticleDOI
01 Dec 2011
TL;DR: A hybrid AIS model - combining the relevant features of classical self/non-self paradigm with the emerging danger theory paradigm is presented that has the capability to meet the above-mentioned challenges of the MANET environment.
Abstract: Securing ad hoc routing protocols for MANETs is a significant challenge due to number of reasons: (1) mobility results in continuously changing network topology - the premise of stable self or non-self is void, (2) the proposed security solution must be lightweight so that it can be deployed on resource constrained mobile nodes, and (3) the solution should provide high detection accuracy and low false positive rate. The major contribution of this paper is a hybrid AIS model - combining the relevant features of classical self/non-self paradigm with the emerging danger theory paradigm - that has the capability to meet the above-mentioned challenges of the MANET environment. As a case study, we use our hybrid model to develop a power aware security framework for BeeAdHoc- a well-known bio-inspired routing protocol. We have realized our framework in ns-2 simulator. We have also developed an attacker framework in ns-2 that has the capability to launch a number of Byzantine attacks on BeeAdHoc. The results of our experiments show that our proposed framework meets all its requirements: (1) the adaptive learning because of changing self/non-self, (2) high detection accuracy and low false positive rate, (3) lightweight in terms of processing and communication overheads, and (4) better or comparable performance compared with non-secure versions of existing state-of-the-art MANET routing protocols -DSR and AODV. We have also compared our hybrid AIS model with self/non-self, danger theory and a conventional anomaly detection system to show its merits over these schemes. Finally, we propose an extension of the framework for securing DSR.

14 citations


Authors

Showing all 1515 results

NameH-indexPapersCitations
Muhammad Shoaib97133347617
Muhammad Usman61120324848
Muhammad Saleem60101718396
Abdul Hameed5250714985
Muhammad Javaid483448765
Muhammad Umar452285851
Muhammad Adnan383815326
JingTao Yao371294374
Amine Bermak374415162
Nadeem A. Khan341664745
Majid Khan332303818
Tariq Shah321953131
Muhammad Shahzad312284323
Maurizio Repetto302523163
Tariq Mahmood30933772
Network Information
Related Institutions (5)
COMSATS Institute of Information Technology
21.2K papers, 340.9K citations

91% related

Information Technology University
13K papers, 236.4K citations

85% related

Quaid-i-Azam University
16.8K papers, 381.6K citations

82% related

Sharif University of Technology
31.3K papers, 526.8K citations

82% related

Iran University of Science and Technology
24.9K papers, 372K citations

81% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20235
202221
2021389
2020338
2019266
2018178