User:Qasim Sidd 1987: Difference between revisions
Appearance
Content deleted Content added
←Replaced content with '[http://www.fui.edu.pk/fuiems.htm] Foundation Univesity - FUIEMS' |
|||
(48 intermediate revisions by 5 users not shown) | |||
Line 1: | Line 1: | ||
{{Infobox person |
|||
| name = Qasim Siddique |
|||
| image = Qasim Name.JPG|thumb|200px|Qasim Siddique |
|||
| alt = |
|||
| caption = Qasim |
|||
| birth_date = 1987|02|26 |
|||
| birth_place = Lahore |
|||
| death_date = |
|||
| death_place = |
|||
| nationality = Pakistan |
|||
| other_names = Qasum |
|||
| known_for = Programming and Algorithm Design |
|||
| occupation = Application Developer |
|||
| Email = qasim_1987@hotmail.com |
|||
}} |
|||
=Qasim Siddique= |
|||
[[File:Copy_of_qasim_logo.jpg|left|thumb|200px|Qasim Siddique]] |
|||
Qasim Siddique received his undergraduate degree from Foundation University, Pakistan in 2010. He worked on the implementation of the Early Warning and Alerting System for Forest Fires (EWAFF) as part of his undergraduate Final Year Project. He has interests in multi-agent systems, Wireless Sensor Networks and in general Artificial Intelligence. |
|||
==Education== |
|||
Foundation University Islamabad, Pakistan. |
|||
<br />Bachelor of Science in Computer Science |
|||
<br />Concentration in Programming and Simulation Systems. |
|||
<br />FEB 2010 |
|||
==Research== |
|||
My research interests lie broadly in computer networks, distributed systems, operating systems and real-time computing. Currently, my research is mainly focusing on Wireless Sensor Networks (WSNs), a new information paradigm based on the collaboration of a large number of self-organized sensing nodes. These networks form the basis for many promising applications such as immersive gaming, intelligent battlefields, hazard response systems, smart hospitals and learning environments. I also devote my research effort to several major topics in WSNs such as localization, energy efficiency, real-time, networking, programming abstraction and wireless modeling. |
|||
==Research Interest== |
|||
*Wireless Sensor Network |
|||
*Multi-Agents System |
|||
*Linear Algebra |
|||
*Machine Learning |
|||
*Virtual Sensor Networks '' Efficient Approach for Concurrent Applications'' |
|||
==Projects== |
|||
[[File:Agent1 Qasim.JPG|left|thumb|250px|Multi Agent Meeting Scheduling System]] |
|||
[[File:EWAFF Systemarch.JPG|right|thumb|250px|Early Warning and Alerting System For Forest Fires '''EWAFF''']] |
|||
* Agent Based Simulation of Forest Fires developed using Netlogo Language. |
|||
* Banking Information System developed using SQL Server 2005 and C++. |
|||
* Chat Application developed using Java, JDBC, Microsoft Access. |
|||
* Departmental Store Management and Billing System developed using C. |
|||
* Early Warning and Alerting For Forest Fire using C#,Asp.Net and web services. |
|||
* Eight bit Arithmetic Logic Unit developed using 8051 microcontroller and Keil Language. |
|||
* Eight Bit Shift register using Verilog language. |
|||
* Fire Weather Index Calculation System in C#. |
|||
* Forest Fire Simulation System with wireless sensor network developed in Netlogo. |
|||
* Location Based Services using virtual sticky Notes for office Environment using VB.net. |
|||
* Multi Agent Meeting scheduling System for office Environment using Netlogo. |
|||
* Online Book Store developed using ASP, ADO, Ms Access. |
|||
* Research Project Survey of Forest Fire Simulation. |
|||
* RFID based library Management System using C# and SQL Server 2005. |
|||
* Student Information System developed using C#. |
|||
* University Course Adviser using CLIPS expert System. |
|||
* Implementation of a mouse based Tic-Tac-Toe in C++. |
|||
==My Simulation== |
|||
===Wireless Sensor Network Implementation of the Flooding Techniques=== |
|||
[[File:Flooding in Wireless Sensor Network Qasim.JPG|right|thumb|300px|Flooding Technique in Wireless Sensor Network by ''Qasim Siddique'']] |
|||
This application is a simulation of data dissemination flooding technique in wireless sensor network. Such a network is used to detect and report certain events across an expanse of a remote area - e.g., a battlefield sensor network that detects and reports troop movements. The idea behind this network is that it can be deployed simply by scattering sensor units across the area, e.g. by dropping them out of an airplane; the sensors should automatically activate, self-configure as a wireless network with a mesh topology, and determine how to send communications packets toward a data collector (e.g., a satellite uplink.) Thus, one important feature of such a network is that collected data packets are always traveling toward the data collector, and the network can therefore be modeled as a directed graph (and every two connected nodes can be identified as "upstream" and "downstream.")A primary challenge of such a network is that all of the sensors operate on a finite energy supply, in the form of a battery. (These batteries can be rechargeable, e.g. by embedded solar panels, but the sensors still have a finite maximum power store.) Any node that loses power drops out of the communications network, and may end up partitioning the network (severing the communications link from upstream sensors toward the data collector.) Thus, the maximum useful lifetime of the network, at worst case, is the mnimum lifetime of any sensor. |
|||
===Multi-Agent Meeting Scheduling=== |
|||
Updated Multi-Agent Meeting Scheduling through learning Version 2 In this domain each person has an agent that knows his/her time table and obligation (possibly other meeting or travel).upon the request to schedule a meeting that required the presence of multi person their agent duties are to find time and place to hold the meeting. The Multi-Agent Meeting Scheduling problem (MAMS) presents a number of significant challenges, including the online modeling of user preferences and the satisfaction of these preferences through efficient scheduling. |
|||
===ForestFire3=== |
|||
[[File:Basic netlogo model.JPG|left|thumb|300px|Forest Fire 3 Simulation by ''Qasim Siddique'']] |
|||
A simulation of tree regrowth after a forest fire. |
|||
===Fire Simulation=== |
|||
Fire Simulation for the system of EWAFF Early warning and altering system for forest fires |
|||
===Automated Weather Warning System for Airports (AWWSA)=== |
|||
To identify the requirement of where and when an aircraft can/cannot fly safely; from the weather point of view. |
|||
===Other Systems=== |
|||
* Line Game |
|||
<br />* Plane Warrior |
|||
<br />* Routing Protocol for Wireless Sensor Network |
|||
==Protocol== |
|||
[[File:Protocol_p3_Multi_Qasim.JPG|right|thumb|300px|Meeting Scheduling using '''Gnutella''' Protocol]] |
|||
Implementation of the Meeting Scheduling using Gnutella Protocol |
|||
<br />To initiate a meeting an agent sends a message to each attendant with some time possible |
|||
<br />When an attendee agent receives an ordinary message about a meeting it marks some times as possible and sends to the initiator |
|||
<br />To request that a meeting is fixed for a certain time the initiator marks that time a pending and sends to the attendees |
|||
When an attendee agent receives a message with a pending time slot, it accepts by marking the time as pending in the reply and rejects by marking the time in any other way |
|||
<br />To confirm a meeting the initiator first check that all the attendees have marked the time as pending the initiator the marks this time as confirmed and sends to the attendees .The initiator then marks this time as confirmed and sends to the attendees. The initiator add the meeting to the calendar |
|||
<br />When the message is received with a confirmed time slot the attendee agent check it is previously marked the slot as pending If so the attendee agent updates the status ti confirmed and add the meeting to the calendar |
|||
<br />To recall a request for a time to be marked as pending the initiator marks the time as impossible and attendees |
|||
<br />To cancel the meeting the initiator marks the previously confirmed time slots as impossible and sends to the attendees. <br />The meeting is removed form the user calendar and assigned for rescheduling |
|||
<br />When an attendee agent received a message where the previously confirmed time is marked as impossible it removes the meeting from the calendar |
|||
<br />To request a meeting be canceled an attendee agent marks the confirmed time as impossible and sends to the meeting initiator |
|||
==Survey of Forest Fire Simulation== |
|||
* Qasim Siddique “Survey of Forest Fire Simulation”, Global Journal of Computer Science and Technology, Volume 1.2 ,pp 137–140, September 2009. Online ISSN: 0975-4172. |
|||
''System Abstract'' |
|||
<br />Fire modeling is used to understand and to predict possible fire behavior without getting burned. Fire models are used in different aspect of fire management. The increase in the number of forest fires in the last few years has forced governments to take precautions. Beside prevention, early intervention is also very important in fire fighting. If the fire fighters know where the fire will be in sometimes it would be easier for them to stop the fire. Therefore a big need for simulating the fire behavior exists. In this paper we present the survey of various forest fire simulations. The main goal is to determine how forest fires develop in different manners under specific conditions. |
|||
==Intelligent Car System== |
|||
* Qasim Siddique “Intelligent Car System”, Annals. Computer Science Séries. Volume VII Fasc. 2-2009, pp 113-124 November 2009 ISSN: 2065-7471. |
|||
''System Abstract'' |
|||
<br />In modern life the road safety has becomes the core issue. One single move of a driver can cause horrifying accident. The main goal of intelligent car system is to make communication with other cars on the road. The system is able to control to speed, direction and the distance between the cars the intelligent car system is able to recognize traffic light and is able to take decision according to it. This paper presents a framework of the intelligent car system. I validate several aspect of our system using simulation. |
|||
==Wireless Local Area Network Security System== |
|||
* Qasim Siddique “Wireless Local Area Network Security System”, Global Journal of Computer Science and Technology, Volume 1.2 ,pp 113–120, September 2009. Online ISSN: 0975-4172. |
|||
''System Abstract'' |
|||
<br />Wireless technologies have become increasingly popular in our everyday business and personal lives. Today, wireless communication technology has become very important part of our daily life. The use of wireless communication technology is increasing day by day but there is a danger of black hole associated with these types of networks communications (wireless). This research paper will provide an overview of security risks, threats and vulnerabilities (weaknesses in the design and implementation) with wireless network systems, referencing IEEE 802.11. This research paper will not cover the topic of Bluetooth wireless security. To combat these risks, some protocols and mechanisms will be needed to secure this wireless communication and increase the use of wireless based systems. |
|||
==Kerberos Authentication in Wireless Sensor Networks== |
|||
* Qasim Siddique “Kerberos Authentication in Wireless Sensor Networks”, Annals. Computer Science Séries. Volume VIII Fasc. 1-2010, pp 67-80 May 2010 ISSN: 1583-7165. |
|||
''System Abstract'' |
|||
<br />We proposed an authentication mechanism in the wireless sensor network. Sensor network uses the Kerberos authentication scheme for the authentication of bases station in the network. Kerberos provides a centralized authentication server whose function is to authenticate user by providing him the ticket to grant request to the base station. In this paper we have provided architecture for the authentication of base station in the wireless sensor network based on the Kerberos server authentication scheme. |
|||
==Unified Modeling Language to Object Oriented Software Development== |
|||
* Qasim Siddique "Unified Modeling Language to Object Oriented Software Development", International Journal of Innovation, Management and Technology, Vol. 1, No. 3, August 2010 ISSN: 2010-0248. |
|||
''System Abstract'' |
|||
<br />Application development is set of activity those results in software product. There are several approaches to design software applications. The approach presented in this paper is a Unified Modeling Language. UML is the standardized general purpose modeling language. Unified |
|||
modeling language can be used with all processes throughout the software development life cycle. This paper presents an approach to transform the UML design in to a software application. |
|||
==Verification & Validation Of An Agent-Based Forest Fire Simulation Model== |
|||
* Muaz Niazi, Qasim Siddique, Amir Hussain and Mario Kolberg, Verification & Validation Of An Agent-Based Forest Fire Simulation Model, Proceedings of the Agent Directed Simulation Symposium 2010, as part of the ACM SCS Spring Simulation Multiconference, pp142-149, Orlando, FL, April 11-15, 2010 |
|||
==Technical Skills== |
|||
{| class="wikitable" |
|||
|- |
|||
! My Skills |
|||
|- |
|||
| '''Applications''' |
|||
|- |
|||
| Visual Studio.NET, Visual Studio 6.0, Microsoft Visio, Macromedia Dream weaver, Macromedia Director, Microsoft Office, Latex, Model-sim, Clips Expert System, Adobe Photoshop,3D Studio Max, Maya 3D |
|||
|- |
|||
| '''Databases''' |
|||
|- |
|||
| SQL Server 2005, Oracle, MS Access |
|||
|- |
|||
| '''Operating Systems''' |
|||
|- |
|||
| Windows Vista/XP/2000/98. |
|||
|- |
|||
| '''Programming Languages''' |
|||
|- |
|||
| C#.Net, C, C++, VB.net, Java, Web Services |
|||
|} |
|||
==Reviewers Memberships== |
|||
Qasim Siddique Reviewer Member of International Journal of Computer Science Issues |
|||
[http://www.ijcsi.org/reviewers-list.php IJOCS Reviewer List] |
|||
=Professional Life= |
|||
Many Companies interviewed Qasim Siddique for different position some of them are following |
|||
{| class="wikitable" |
|||
|- |
|||
! Company Name !! Attempt !! Offer |
|||
|- |
|||
|Eixler Technologies|| 2|| No |
|||
|- |
|||
|E-strats|| 1|| No |
|||
|- |
|||
|JS Software House|| 1|| Yes |
|||
|- |
|||
|Keystone Construction|| 2|| Yes |
|||
|- |
|||
|Railway Hospital|| 1|| Yes |
|||
|- |
|||
|Sofnix|| 1|| No |
|||
|- |
|||
|Teradata|| 3|| No |
|||
|- |
|||
|Your Engineering Solutions (Pvt) Ltd|| 1|| No |
|||
|- |
|||
|Salt Valley|| 1|| No |
|||
|- |
|||
|Kalsoft|| 2|| Yes |
|||
|- |
|||
|Netsolace|| 1|| No |
|||
|- |
|||
|Telenor|| 1|| No |
|||
|- |
|||
|Launchpad Interactive|| 1|| No |
|||
|- |
|||
|Total Interview|| 19 |
|||
|} |
|||
=My Saying= |
|||
"All things are '''simple'''. You just have to '''sort''' them out" |
|||
=Contract Me= |
|||
E-Mail: qasim_1987@hotmail.com |
|||
=links= |
|||
[http://ccl.northwestern.edu/papers/netlogo-outside.html] NetLogo Community Publications<br /> |
|||
[http://www.fui.edu.pk/fuiems.htm] Foundation Univesity - FUIEMS |
[http://www.fui.edu.pk/fuiems.htm] Foundation Univesity - FUIEMS |
Latest revision as of 10:11, 10 July 2012
[1] Foundation Univesity - FUIEMS