Recently, data science has emerged as the most attractive profession. This is mainly because data... more Recently, data science has emerged as the most attractive profession. This is mainly because data scientists are currently in high demand in the business and healthcare industry, and are also a high-paying profession and several career options. Inspired by this, the transmuter (i.e. a person who wants to change his/her profession as per job trends) having different educational backgrounds focuses on acquiring the required level of knowledge and skills regarding the data scientist. However, to the best of our knowledge, the current state-of-the-art lacks in providing any information/roadmap useful for the transmuters to gain the required set of data scientist’s knowledge and skills. Based on this, the main objective of this work is to identify the skills and knowledge required for data scientists keeping in view of their educational background. To achieve this, we have conducted an exploratory study and received responses from 134 data scientists of different educational backgrounds ...
Software Fault Prediction (SFP) assists in the identification of faulty classes, and software met... more Software Fault Prediction (SFP) assists in the identification of faulty classes, and software metrics provide us with a mechanism for this purpose. Besides others, metrics addressing inheritance in Object-Oriented (OO) are important as these measure depth, hierarchy, width, and overriding complexity of the software. In this paper, we evaluated the exclusive use, and viability of inheritance metrics in SFP through experiments. We perform a survey of inheritance metrics whose data sets are publicly available, and collected about 40 data sets having inheritance metrics. We cleaned, and filtered them, and captured nine inheritance metrics. After preprocessing, we divided selected data sets into all possible combinations of inheritance metrics, and then we merged similar metrics. We then formed 67 data sets containing only inheritance metrics that have nominal binary class labels. We performed a model building, and validation for Support Vector Machine(SVM). Results of Cross-Entropy, Acc...
A dynamic inventory model is formulated in which the demand distributions may change from period ... more A dynamic inventory model is formulated in which the demand distributions may change from period to period. The optimal policy at each stage is characterized by a single critical number which also could vary in successive periods. The dependence of the critical numbers as a function of stochastic ordering amongst distributions is developed under various conditions. Most of the studies are conducted under the assumption of linear purchasing cost. In section 3 the possibility of convex purchasing cost is allowed. In this paper we shall consider an extended version of the classical ArrowHarris-Marschak dynamic inventory model, with emphasis on the varying nature of the demand distributions. For a detailed discussion of this model see Chapters 8, 9, and 10 of [2]. A historical account of the general inventory problem may be found in Chapters 1 and 2 of [2]. Throughout this paper we restrict our attention to the case of a single commodity. A sequence of ordering decisions is to be made a...
Long-distance transportation systems play an important role in economic growth. Yet, these system... more Long-distance transportation systems play an important role in economic growth. Yet, these systems are incurred with multifaceted delays and cost problems. The major incites affecting transportation systems are congestion, breakdowns, emergencies, and inclement weather. Scarcity of information about the environment also exacerbates travel problems. It is essential to employ monitoring and guidance that aid in making timely decisions through premediated information. This work aims to provide a flexible model for the long-distance transport system. The model is based on problems faced in long-distance transportation. Moreover, we examine the possible use of emerging Information and Communication Technologies (ICTs) for better transportation. The system dynamics study the problem at hand through cognitive agent-based modelling (ABM) concepts. The integrated model lays the rules to abate traffic delays. In this model, the distance travelled by vehicles is divided into sections using che...
Excessive proliferation of COVID-19 -posed negative impacts on many sectors, especially the educa... more Excessive proliferation of COVID-19 -posed negative impacts on many sectors, especially the education sector. As a result, educational institutions around the world are closed; thus, online learning seems to be an optimal way to bridge the communication gap between students and teachers. Online-learning tools provide an effective way to continue the learning process in a COVID-19 context. However, finding the best tool that meets most of the online-learning requirements remains a challenging task. Additionally, it is essential to identify and respond to the underlying concerns of students and teachers in an online-learning environment. Motivated by this, current work provides a comparative analysis of existing learning tools grounded on the set of features mentioned in the literature. Moreover, we conduct a pilot study on students and teachers of various universities (taking online classes) of south-east Asia region. The conducted study reveals that some new features need to be accommodated to improve online teaching. Finally, we propose a set of recommendations to further enhance the online-learning environment.
Aims and method To evaluate differences between male patients in secure psychiatric settings in t... more Aims and method To evaluate differences between male patients in secure psychiatric settings in the UK based on whether they are detained under civil or forensic sections of the Mental Health Act 1983. A cohort of patients discharged from a secure psychiatric hospital were evaluated for length of stay and frequency of risk-related incidents. Results Overall, 84 patients were included in the study: 52 in the forensic group and 32 in the civil group. Civil patients had more frequent incidents of aggression, sex offending, fire-setting and vulnerability, whereas forensic patients had more frequent episodes of self-harm. Clinical implications Secure hospitals should ensure treatment programmes are tailored to each patient's needs. Civil patients require greater emphasis on treatment of their mental illness, whereas forensic patients have additional offence-related treatment needs. Regular liaison between forensic and general adult services is essential to help ensure patients can re...
2016 International Conference on Frontiers of Information Technology (FIT), 2016
Software testing is an important aspect for the quality of software. Different levels of experien... more Software testing is an important aspect for the quality of software. Different levels of experience, types of application and needs enforce differences in performing testing activity for same features of applications. Testing as an activity within a development house usually includes testing of recurrent situation e.g., testing of security features etc. Development of a homogeneous test ground requires considering information regarding the structure of real world scenarios. We propose a test pattern based technique which supports identification of test cases on the basis of specification and domain analysis. The proposed technique provides support for Test Driven Development (TDD) and Test Last Development (TLD). We provide test patterns for testing cloud applications where we study what features an application would bear and we propose what test cases must exist in the test suite for that application. For the purpose of evaluation, we consider threats to cloud applications and discuss test patterns.
2016 Sixth International Conference on Innovative Computing Technology (INTECH), 2016
Optical character recognition or OCR becomes necessary first step for all applications that consi... more Optical character recognition or OCR becomes necessary first step for all applications that consider typewritten or handwritten manuscripts as input. We need to train our classifier in case we are considering to use data mining techniques for such purposes. There are several established generic classification techniques that can be used together with feature extraction mechanisms but it is important to know which of them do better under which circumstances. We evaluate three approaches for OCR from handwritten manuscripts and we study their results. We consider a case study where we need to identify cases with probability of dyslexia.
Transportation Research Record: Journal of the Transportation Research Board, 2016
Using reclaimed and recycled materials in asphalt mixtures is one of the most commonly used susta... more Using reclaimed and recycled materials in asphalt mixtures is one of the most commonly used sustainable strategies, which results in cost savings and environmental benefits because they replace virgin materials. Commonly used recycled, reclaimed asphalt pavement (RAP) and recycled asphalt shingles (RAS) can pose challenges because their inclusion in the asphalt mixture may adversely affect pavement performance. This paper presents the recently developed fracture testing method, the Illinois semicircular bending (IL-SCB) fracture geometry at 25°C with a displacement rate of 50 mm/min. The flexibility index (FI), derived from the IL-SCB test results, was introduced to rank the potential cracking resistance of mixes. The developed testing protocol provides a practical and reliable approach to screen the capacity of mixes to resist cracking. An application of the IL-SCB test method and FI is presented using laboratory-prepared and compacted mixes with varying proportions of RAP and RAS....
2015 13th International Conference on Frontiers of Information Technology (FIT), 2015
Fault Seeding is a testing technique where faults are artificially injected into an application t... more Fault Seeding is a testing technique where faults are artificially injected into an application to assess the effectiveness, i.e. if a given test suite is capable of uncovering the injected faults, of a test suite. This is helpful in establishing confidence in the test suite and is an alternative to structural testing methods. One of the issues with fault seeding is the identification of potential areas in the application, where the faults are to be seeded. We argue that if the intended usage of the application under test could be inferred from the potential users' interactions with the application, such information could be incorporated into the fault-seeding process. This could lead to more effective fault-seeding in a test application. In this work, we study fault seeding mechanisms based on user interactions with the application, and thus give a guided fault seeding mechanism for the purpose. We show the usefulness of the guided fault seeding with the help of a case study using the blackboard application.
2015 2nd International Conference on Information and Communication Technologies for Disaster Management (ICT-DM), 2015
Natural and man-made disasters are constantly occurring leading to human casualties, infrastructu... more Natural and man-made disasters are constantly occurring leading to human casualties, infrastructure destruction and financial losses. Volunteers and volunteer organizations play a significant role in each and every phase of disaster management. Therefore, selecting and retaining skilled, motivated and able volunteers becomes important. Existing ICT based solutions focus on resource allocation, team work and other disaster management activities, however none of these systems has addressed the issue of volunteers and their reputation. Reputation of a volunteer based on his personal traits and experience can be used for his selection for an emergency operation. It can also be used as a performance measurement tool during a particular operation. The current work proposes a reputation management system consisting of a Reputation Meta-model and a reputation system architecture for reputation management and measurement.
Recently, data science has emerged as the most attractive profession. This is mainly because data... more Recently, data science has emerged as the most attractive profession. This is mainly because data scientists are currently in high demand in the business and healthcare industry, and are also a high-paying profession and several career options. Inspired by this, the transmuter (i.e. a person who wants to change his/her profession as per job trends) having different educational backgrounds focuses on acquiring the required level of knowledge and skills regarding the data scientist. However, to the best of our knowledge, the current state-of-the-art lacks in providing any information/roadmap useful for the transmuters to gain the required set of data scientist’s knowledge and skills. Based on this, the main objective of this work is to identify the skills and knowledge required for data scientists keeping in view of their educational background. To achieve this, we have conducted an exploratory study and received responses from 134 data scientists of different educational backgrounds ...
Software Fault Prediction (SFP) assists in the identification of faulty classes, and software met... more Software Fault Prediction (SFP) assists in the identification of faulty classes, and software metrics provide us with a mechanism for this purpose. Besides others, metrics addressing inheritance in Object-Oriented (OO) are important as these measure depth, hierarchy, width, and overriding complexity of the software. In this paper, we evaluated the exclusive use, and viability of inheritance metrics in SFP through experiments. We perform a survey of inheritance metrics whose data sets are publicly available, and collected about 40 data sets having inheritance metrics. We cleaned, and filtered them, and captured nine inheritance metrics. After preprocessing, we divided selected data sets into all possible combinations of inheritance metrics, and then we merged similar metrics. We then formed 67 data sets containing only inheritance metrics that have nominal binary class labels. We performed a model building, and validation for Support Vector Machine(SVM). Results of Cross-Entropy, Acc...
A dynamic inventory model is formulated in which the demand distributions may change from period ... more A dynamic inventory model is formulated in which the demand distributions may change from period to period. The optimal policy at each stage is characterized by a single critical number which also could vary in successive periods. The dependence of the critical numbers as a function of stochastic ordering amongst distributions is developed under various conditions. Most of the studies are conducted under the assumption of linear purchasing cost. In section 3 the possibility of convex purchasing cost is allowed. In this paper we shall consider an extended version of the classical ArrowHarris-Marschak dynamic inventory model, with emphasis on the varying nature of the demand distributions. For a detailed discussion of this model see Chapters 8, 9, and 10 of [2]. A historical account of the general inventory problem may be found in Chapters 1 and 2 of [2]. Throughout this paper we restrict our attention to the case of a single commodity. A sequence of ordering decisions is to be made a...
Long-distance transportation systems play an important role in economic growth. Yet, these system... more Long-distance transportation systems play an important role in economic growth. Yet, these systems are incurred with multifaceted delays and cost problems. The major incites affecting transportation systems are congestion, breakdowns, emergencies, and inclement weather. Scarcity of information about the environment also exacerbates travel problems. It is essential to employ monitoring and guidance that aid in making timely decisions through premediated information. This work aims to provide a flexible model for the long-distance transport system. The model is based on problems faced in long-distance transportation. Moreover, we examine the possible use of emerging Information and Communication Technologies (ICTs) for better transportation. The system dynamics study the problem at hand through cognitive agent-based modelling (ABM) concepts. The integrated model lays the rules to abate traffic delays. In this model, the distance travelled by vehicles is divided into sections using che...
Excessive proliferation of COVID-19 -posed negative impacts on many sectors, especially the educa... more Excessive proliferation of COVID-19 -posed negative impacts on many sectors, especially the education sector. As a result, educational institutions around the world are closed; thus, online learning seems to be an optimal way to bridge the communication gap between students and teachers. Online-learning tools provide an effective way to continue the learning process in a COVID-19 context. However, finding the best tool that meets most of the online-learning requirements remains a challenging task. Additionally, it is essential to identify and respond to the underlying concerns of students and teachers in an online-learning environment. Motivated by this, current work provides a comparative analysis of existing learning tools grounded on the set of features mentioned in the literature. Moreover, we conduct a pilot study on students and teachers of various universities (taking online classes) of south-east Asia region. The conducted study reveals that some new features need to be accommodated to improve online teaching. Finally, we propose a set of recommendations to further enhance the online-learning environment.
Aims and method To evaluate differences between male patients in secure psychiatric settings in t... more Aims and method To evaluate differences between male patients in secure psychiatric settings in the UK based on whether they are detained under civil or forensic sections of the Mental Health Act 1983. A cohort of patients discharged from a secure psychiatric hospital were evaluated for length of stay and frequency of risk-related incidents. Results Overall, 84 patients were included in the study: 52 in the forensic group and 32 in the civil group. Civil patients had more frequent incidents of aggression, sex offending, fire-setting and vulnerability, whereas forensic patients had more frequent episodes of self-harm. Clinical implications Secure hospitals should ensure treatment programmes are tailored to each patient's needs. Civil patients require greater emphasis on treatment of their mental illness, whereas forensic patients have additional offence-related treatment needs. Regular liaison between forensic and general adult services is essential to help ensure patients can re...
2016 International Conference on Frontiers of Information Technology (FIT), 2016
Software testing is an important aspect for the quality of software. Different levels of experien... more Software testing is an important aspect for the quality of software. Different levels of experience, types of application and needs enforce differences in performing testing activity for same features of applications. Testing as an activity within a development house usually includes testing of recurrent situation e.g., testing of security features etc. Development of a homogeneous test ground requires considering information regarding the structure of real world scenarios. We propose a test pattern based technique which supports identification of test cases on the basis of specification and domain analysis. The proposed technique provides support for Test Driven Development (TDD) and Test Last Development (TLD). We provide test patterns for testing cloud applications where we study what features an application would bear and we propose what test cases must exist in the test suite for that application. For the purpose of evaluation, we consider threats to cloud applications and discuss test patterns.
2016 Sixth International Conference on Innovative Computing Technology (INTECH), 2016
Optical character recognition or OCR becomes necessary first step for all applications that consi... more Optical character recognition or OCR becomes necessary first step for all applications that consider typewritten or handwritten manuscripts as input. We need to train our classifier in case we are considering to use data mining techniques for such purposes. There are several established generic classification techniques that can be used together with feature extraction mechanisms but it is important to know which of them do better under which circumstances. We evaluate three approaches for OCR from handwritten manuscripts and we study their results. We consider a case study where we need to identify cases with probability of dyslexia.
Transportation Research Record: Journal of the Transportation Research Board, 2016
Using reclaimed and recycled materials in asphalt mixtures is one of the most commonly used susta... more Using reclaimed and recycled materials in asphalt mixtures is one of the most commonly used sustainable strategies, which results in cost savings and environmental benefits because they replace virgin materials. Commonly used recycled, reclaimed asphalt pavement (RAP) and recycled asphalt shingles (RAS) can pose challenges because their inclusion in the asphalt mixture may adversely affect pavement performance. This paper presents the recently developed fracture testing method, the Illinois semicircular bending (IL-SCB) fracture geometry at 25°C with a displacement rate of 50 mm/min. The flexibility index (FI), derived from the IL-SCB test results, was introduced to rank the potential cracking resistance of mixes. The developed testing protocol provides a practical and reliable approach to screen the capacity of mixes to resist cracking. An application of the IL-SCB test method and FI is presented using laboratory-prepared and compacted mixes with varying proportions of RAP and RAS....
2015 13th International Conference on Frontiers of Information Technology (FIT), 2015
Fault Seeding is a testing technique where faults are artificially injected into an application t... more Fault Seeding is a testing technique where faults are artificially injected into an application to assess the effectiveness, i.e. if a given test suite is capable of uncovering the injected faults, of a test suite. This is helpful in establishing confidence in the test suite and is an alternative to structural testing methods. One of the issues with fault seeding is the identification of potential areas in the application, where the faults are to be seeded. We argue that if the intended usage of the application under test could be inferred from the potential users' interactions with the application, such information could be incorporated into the fault-seeding process. This could lead to more effective fault-seeding in a test application. In this work, we study fault seeding mechanisms based on user interactions with the application, and thus give a guided fault seeding mechanism for the purpose. We show the usefulness of the guided fault seeding with the help of a case study using the blackboard application.
2015 2nd International Conference on Information and Communication Technologies for Disaster Management (ICT-DM), 2015
Natural and man-made disasters are constantly occurring leading to human casualties, infrastructu... more Natural and man-made disasters are constantly occurring leading to human casualties, infrastructure destruction and financial losses. Volunteers and volunteer organizations play a significant role in each and every phase of disaster management. Therefore, selecting and retaining skilled, motivated and able volunteers becomes important. Existing ICT based solutions focus on resource allocation, team work and other disaster management activities, however none of these systems has addressed the issue of volunteers and their reputation. Reputation of a volunteer based on his personal traits and experience can be used for his selection for an emergency operation. It can also be used as a performance measurement tool during a particular operation. The current work proposes a reputation management system consisting of a Reputation Meta-model and a reputation system architecture for reputation management and measurement.
Uploads
Papers by Tamim Khan