Mushtaq Raza

ORCID: 0000-0003-2890-8072
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Techniques and Practices
  • Software System Performance and Reliability
  • Software Engineering Research
  • Outsourcing and Supply Chain Management
  • Gene expression and cancer classification
  • Genetic and phenotypic traits in livestock
  • Quality and Supply Management
  • Library Science and Information Literacy
  • Advanced Malware Detection Techniques
  • Ergonomics and Musculoskeletal Disorders
  • ERP Systems Implementation and Impact
  • Data Quality and Management
  • Gaze Tracking and Assistive Technology
  • Public Procurement and Policy
  • Advanced Software Engineering Methodologies
  • Service-Oriented Architecture and Web Services
  • Software Reliability and Analysis Research
  • Software Testing and Debugging Techniques
  • Open Source Software Innovations
  • Mobile Health and mHealth Applications
  • Genomics and Phylogenetic Studies
  • Advanced Multi-Objective Optimization Algorithms
  • Marine and Offshore Engineering Studies
  • Medical Image Segmentation Techniques
  • Network Security and Intrusion Detection

Abdul Wali Khan University Mardan
2012-2024

ORCID
2021

The University of Agriculture, Peshawar
2021

Universidade do Porto
2010-2020

INESC TEC
2014-2020

Komar University of Science and Technology
2018

University of Sulaimani
2018

Distributed network attacks are referred to, usually, as Denial of Service (DDoS) attacks. These take advantage specific limitations that apply to any arrangement asset, such the framework authorized organization's site. In existing research study, author worked on an old KDD dataset. It is necessary work with latest dataset identify current state DDoS This paper, used a machine learning approach for attack types classification and prediction. For this purpose, Random Forest XGBoost...

10.1109/access.2022.3152577 article EN cc-by IEEE Access 2022-01-01

Wireless Sensor Networks (WSNs) have revolutionized the era of conventional computing into a digitized world, commonly known as "The Internet Things". WSN consists tiny low-cost sensing devices, having computation, communication and capabilities. These networks are always debatable for their limited resources most arguable critical issue in WSNs is energy efficiency. Sensors utilize broadcasting, routing, clustering, on-board calculations, localization, maintenance, etc. However, primary...

10.1109/access.2020.3026939 article EN cc-by IEEE Access 2020-01-01

Enhancers are short DNA regulatory elements which play a vital role in gene expression. Due to their important roles genomics, several computational models have been proposed the literature for identification of enhancers and strengths using traditional machine learning algorithms, however, unable identify strength with reasonable accuracy because high non-linearity sequences. This article proposes two-level intelligent model based on Deep Neural Network (DNN) along multiple feature...

10.1109/access.2021.3062291 article EN cc-by IEEE Access 2021-01-01

Application maintenance consumes a considerable amount of an organization's time and resources each year. Almost 60% IT budget is spent alone on application maintenance. The reason offshore outsourcing not only the reduction cost but to free up keep focus core products. Offshore common business strategy that used by companies achieve savings about 20-50%. However, decision making process complex phenomenon. It based set influencing factors, clients' requirements nature project. Hence,...

10.1109/access.2020.3029501 article EN cc-by IEEE Access 2020-01-01

Global Software Development (GSD) has been an emerging trend in the development of software globally, for last two decades. Information Technology (IT) outsourcing includes application development, maintenance, infrastructure management and business process outsourcing. maintenance aims to keep IT system operational fulfill client requirements. The is considered longest phase life cycle that consumes about 60-70% total budget. Maintenance not only time consuming but also requires a...

10.1109/access.2021.3073315 article EN cc-by IEEE Access 2021-01-01

The phenomenon of Global Software Development (GSD) has attracted the interest businesses all over world. It brings together partners from various national and corporate cultures to develop applications with numerous advantages, including access a vast labor pool, cost savings, round clock growth. GSD, on other hand, is technologically organizationally diverse poses number obstacles for development team, such as geographical distance, cultural differences, communication language barriers....

10.3390/app11188550 article EN cc-by Applied Sciences 2021-09-14

Selective image segmentation is one of the most significant subjects in medical imaging and real-world applications. We present a robust selective model based on local spatial distance utilizing dual-level set variational formulation this study. Our concept tries to partition all objects using global level function selected item different (local). combines marker function, edge detection, distance, active contour without edges into one. The new noise gives better performance for images...

10.1109/access.2022.3152785 article EN cc-by IEEE Access 2022-01-01

Healthcare has evolved significantly over time, from traditional healthcare systems to cutting-edge medical technologies. As these technologies advance, researchers have become interested in their usability. The usefulness of websites helps provide more precise information. A comprehensive review the literature is required identify usability features, techniques, and issues a specified time period. In this study, articles years 2017-2021 are reviewed well-known digital libraries i.e, IEEE,...

10.1109/access.2022.3193378 article EN cc-by IEEE Access 2022-01-01

In this paper, a novel feature selection method called Robust Proportional Overlapping Score (RPOS), for microarray gene expression datasets has been proposed, by utilizing the robust measure of dispersion, i.e., Median Absolute Deviation (MAD). This robustly identifies most discriminative genes considering overlapping scores values binary class problems. Genes with high degree overlap between classes are discarded and ones that discriminate selected. The results proposed compared five...

10.7717/peerj-cs.562 article EN cc-by PeerJ Computer Science 2021-06-01

Outsourcing has been getting a significant growth for the last few years. Organizations tend to outsource Information Technology (IT), primarily take advantage of availability qualified, trained and skilled workforce in low cost countries across globe. IT software maintenance seem very promising, but number factors, risks, challenges associated with outsourcing process that make sourcing decision complicated. The present study aimed at gaining in-depth understanding three aspects...

10.1109/access.2021.3051023 article EN cc-by IEEE Access 2021-01-01

High-maturity software development processes can generate significant amounts of data that be periodically analyzed to identify performance problems, determine their root causes and devise improvement actions. However, conducting analysis manually is challenging because the potentially large amount analyze effort expertise required. In this paper, we present ProcessPAIR, a novel tool designed help developers with less effort, by automatically identifying ranking problems potential causes, so...

10.1145/2970276.2970284 article EN 2016-08-25

High-maturity software development processes, making intensive use of metrics and quantitative methods, such as the Personal Software Process (PSP) Team (TSP), can generate a significant amount data that be periodically analyzed to identify performance problems, determine their root causes devise improvement actions. Currently, there are several tools automate collection produce charts for manual analysis in context PSP/TSP, but practically no tool support exists automating recommendation...

10.1109/quatic.2012.46 article EN 2012-09-01

Abstract High‐maturity software development processes, such as the Team Software Process and accompanying Personal (PSP), can generate significant amounts of data that be periodically analyzed to identify performance problems, determine their root causes, devise improvement actions. However, there is a lack tool support for automating type analysis, hence diminish manual effort expert knowledge required. So, we propose in this paper comprehensive model, addressing time estimation accuracy,...

10.1002/smr.1759 article EN Journal of Software Evolution and Process 2015-11-19

High-maturity software development processes, making intensive use of metrics and quantitative methods, such as the Team Software Process (TSP) accompanying Personal (PSP), can generate a significant amount data that be periodically analyzed to identify performance problems, determine their root causes devise improvement actions. However, there is lack tool support for automating analysis recommendation actions, hence diminish manual effort expert knowledge required. So, we propose in this...

10.1145/2600821.2600828 article EN 2014-05-26

Process PAIR is a novel tool for automating the performance analysis of software developers. Based on model calibrated from data many developers, it automatically identifies and ranks potential problems root causes individual We present results controlled experiment involving 61 engineering master students, half whom used ProcessPAIR in assignment. The show significant benefits terms students' satisfaction (average score 4.78 out 5 users, against 3.81 other users), quality outcomes grades...

10.1109/icse-c.2017.61 article EN 2017-05-01

Understanding the factors that affect productivity of software developers and may cause variations among individuals projects is important for anyone interested in improving engineering performance estimates, particular users high-maturity processes, such as Personal Software Process (PSP) Team (TSP).

10.2316/p.2014.810-014 article EN 2014-01-01

The usage of web shows the importance usability and readability applications or sources provide by web.Web application fails to encounter user's requirements in effective manner, because designers are unaware from some important factors effecting readability, reading screen.In this regard, study is continuation previous work that has been done for improvement handle issues on basis Eye Blink male participants only.To achieve general recommendations suitable length text line all type users,...

10.5120/4628-6653 article EN International Journal of Computer Applications 2012-01-28

Software development processes can generate significant amounts of data that be periodically analyzed to identify performance problems, determine their root causes and devise improvement actions.However, conducting analysis manually is challenging because the potentially large amount analyze effort expertise required.ProcessPAIR a novel tool designed help developers with less effort, by automatically identifying ranking problems potential causes.The based on models derived from community...

10.18293/seke2016-205 article EN Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering 2016-07-01

Nowadays Information Technology (IT) has been engaged in all spheres of life. It plays an important role developing and processing works types organizations, especially the teaching process institutions universities. The purpose this paper is to present impact information technology learning progress improvement University Sulaimani from both lecturers students perspective view, also determine common key factors which relies upon framework. In paper, researchers created online questionnaire...

10.14569/ijacsa.2018.091172 article EN International Journal of Advanced Computer Science and Applications 2018-01-01

Cybersecurity is an ongoing and critical concern because of the constant persistent threats from malicious actors such as hackers crackers. The widespread use software systems has revolutionized modern society in various aspects, but it also brought forth new challenges safeguarding sensitive confidential information with evolution communication technology (ICT). Quantifying security measures can provide evidence to support decision-making security, especially when comes evaluating...

10.22541/au.168594497.70356768/v1 preprint EN Authorea (Authorea) 2023-06-05
Coming Soon ...