User:Qasim Sidd 1987
Qasim Siddique | |
---|---|
File:Qasim Name.JPG | |
Born | 1987 Lahore |
Nationality | Pakistan |
Other names | Qasum |
Occupation | Application Developer |
Known for | Programming and Algorithm Design |
Qasim Siddique
Qasim Siddique received his undergraduate degree from Foundation University, Pakistan in 2010. He worked on the implementation of the Early Warning and Alerting System for Forest Fires (EWAFF) as part of his undergraduate Final Year Project. He has interests in multi-agent systems, Wireless Sensor Networks and in general Artificial Intelligence.
Education
Foundation University Islamabad, Pakistan.
Bachelor of Science in Computer Science
Concentration in Programming and Simulation Systems.
FEB 2010
Research
My research interests lie broadly in computer networks, distributed systems, operating systems and real-time computing. Currently, my research is mainly focusing on Wireless Sensor Networks (WSNs), a new information paradigm based on the collaboration of a large number of self-organized sensing nodes. These networks form the basis for many promising applications such as immersive gaming, intelligent battlefields, hazard response systems, smart hospitals and learning environments. I also devote my research effort to several major topics in WSNs such as localization, energy efficiency, real-time, networking, programming abstraction and wireless modeling.
Research Interest
- Wireless Sensor Network
- Multi-agents System
- Linear Algebra
- Machine Learning
- Virtual Sensor Networks Efficient Approach for Concurrent Applications
Projects
- Agent Based Simulation of Forest Fires developed using Netlogo Language.
- Banking Information System developed using SQL Server 2005 and C++.
- Chat Application developed using Java, JDBC, Microsoft Access.
- Departmental Store Management and Billing System developed using C.
- Early Warning and Alerting For Forest Fire using C#,Asp.Net and web services.
- Eight bit Arithmetic Logic Unit developed using 8051 microcontroller and Keil Language.
- Eight Bit Shift register using Verilog language.
- Fire Weather Index Calculation System in C#.
- Forest Fire Simulation System with wireless sensor network developed in Netlogo.
- Location Based Services using virtual sticky Notes for office Environment using VB.net.
- Multi Agent Meeting scheduling System for office Environment using Netlogo.
- Online Book Store developed using ASP, ADO, Ms Access.
- Research Project Survey of Forest Fire Simulation.
- RFID based library Management System using C# and SQL Server 2005.
- Student Information System developed using C#.
- University Course Adviser using CLIPS expert System.
- Implementation of a mouse based Tic-Tac-Toe in C++.
My Simulation
Wireless Sensor Network Implementation of the Flooding Techniques
This application is a simulation of data dissemination flooding technique in wireless sensor network. Such a network is used to detect and report certain events across an expanse of a remote area - e.g., a battlefield sensor network that detects and reports troop movements. The idea behind this network is that it can be deployed simply by scattering sensor units across the area, e.g. by dropping them out of an airplane; the sensors should automatically activate, self-configure as a wireless network with a mesh topology, and determine how to send communications packets toward a data collector (e.g., a satellite uplink.) Thus, one important feature of such a network is that collected data packets are always traveling toward the data collector, and the network can therefore be modeled as a directed graph (and every two connected nodes can be identified as "upstream" and "downstream.")A primary challenge of such a network is that all of the sensors operate on a finite energy supply, in the form of a battery. (These batteries can be rechargeable, e.g. by embedded solar panels, but the sensors still have a finite maximum power store.) Any node that loses power drops out of the communications network, and may end up partitioning the network (severing the communications link from upstream sensors toward the data collector.) Thus, the maximum useful lifetime of the network, at worst case, is the mnimum lifetime of any sensor.
Multi-Agent Meeting Scheduling
Updated Multi-Agent Meeting Scheduling through learning Version 2 In this domain each person has an agent that knows his/her time table and obligation (possibly other meeting or travel).upon the request to schedule a meeting that required the presence of multi person their agent duties are to find time and place to hold the meeting. The Multi-Agent Meeting Scheduling problem (MAMS) presents a number of significant challenges, including the online modeling of user preferences and the satisfaction of these preferences through efficient scheduling.
ForestFire3
A simulation of tree regrowth after a forest fire.
Fire Simulation
Fire Simulation for the system of EWAFF Early warning and altering system for forest fires
Automated Weather Warning System for Airports (AWWSA)
To identify the requirement of where and when an aircraft can/cannot fly safely; from the weather point of view.
Other Systems
Line Game
Plane Warrior
Routing Protocol for Wireless Sensor Network
Protocol
Implementation of the Meeting Scheduling using Gnutella Protocol
To initiate a meeting an agent sends a message to each attendant with some time possible
When an attendee agent receives an ordinary message about a meeting it marks some times as possible and sends to the initiator
To request that a meeting is fixed for a certain time the initiator marks that time a pending and sends to the attendees
When an attendee agent receives a message with a pending time slot, it accepts by marking the time as pending in the reply and rejects by marking the time in any other way
To confirm a meeting the initiator first check that all the attendees have marked the time as pending the initiator the marks this time as confirmed and sends to the attendees .The initiator then marks this time as confirmed and sends to the attendees. The initiator add the meeting to the calendar
When the message is received with a confirmed time slot the attendee agent check it is previously marked the slot as pending If so the attendee agent updates the status ti confirmed and add the meeting to the calendar
To recall a request for a time to be marked as pending the initiator marks the time as impossible and attendees
To cancel the meeting the initiator marks the previously confirmed time slots as impossible and sends to the attendees.
The meeting is removed form the user calendar and assigned for rescheduling
When an attendee agent received a message where the previously confirmed time is marked as impossible it removes the meeting from the calendar
To request a meeting be canceled an attendee agent marks the confirmed time as impossible and sends to the meeting initiator
Survey of Forest Fire Simulation
- Qasim Siddique “Survey of Forest Fire Simulation”, Global Journal of Computer Science and Technology, Volume 1.2 ,pp 137–140, September 2009. Online ISSN: 0975-4172.
System Abstract
Fire modeling is used to understand and to predict possible fire behavior without getting burned. Fire models are used in different aspect of fire management. The increase in the number of forest fires in the last few years has forced governments to take precautions. Beside prevention, early intervention is also very important in fire fighting. If the fire fighters know where the fire will be in sometimes it would be easier for them to stop the fire. Therefore a big need for simulating the fire behavior exists. In this paper we present the survey of various forest fire simulations. The main goal is to determine how forest fires develop in different manners under specific conditions.
Intelligent Car System
- Qasim Siddique “Intelligent Car System”, Annals. Computer Science Séries. Volume VII Fasc. 2-2009, pp 113-124 November 2009 ISSN: 2065-7471.
System Abstract
In modern life the road safety has becomes the core issue. One single move of a driver can cause horrifying accident. The main goal of intelligent car system is to make communication with other cars on the road. The system is able to control to speed, direction and the distance between the cars the intelligent car system is able to recognize traffic light and is able to take decision according to it. This paper presents a framework of the intelligent car system. I validate several aspect of our system using simulation.
Wireless Local Area Network Security System
- Qasim Siddique “Wireless Local Area Network Security System”, Global Journal of Computer Science and Technology, Volume 1.2 ,pp 113–120, September 2009. Online ISSN: 0975-4172.
System Abstract
Wireless technologies have become increasingly popular in our everyday business and personal lives. Today, wireless communication technology has become very important part of our daily life. The use of wireless communication technology is increasing day by day but there is a danger of black hole associated with these types of networks communications (wireless). This research paper will provide an overview of security risks, threats and vulnerabilities (weaknesses in the design and implementation) with wireless network systems, referencing IEEE 802.11. This research paper will not cover the topic of Bluetooth wireless security. To combat these risks, some protocols and mechanisms will be needed to secure this wireless communication and increase the use of wireless based systems.
Kerberos Authentication in Wireless Sensor Networks
- Qasim Siddique “Kerberos Authentication in Wireless Sensor Networks”, Annals. Computer Science Séries. Volume VIII Fasc. 1-2010, pp 67-80 May 2010 ISSN: 1583-7165.
System Abstract
We proposed an authentication mechanism in the wireless sensor network. Sensor network uses the Kerberos authentication scheme for the authentication of bases station in the network. Kerberos provides a centralized authentication server whose function is to authenticate user by providing him the ticket to grant request to the base station. In this paper we have provided architecture for the authentication of base station in the wireless sensor network based on the Kerberos server authentication scheme.
Verification & Validation Of An Agent-Based Forest Fire Simulation Model
- Muaz Niazi, Qasim Siddique, Amir Hussain and Mario Kolberg, Verification & Validation Of An Agent-Based Forest Fire Simulation Model, Proceedings of the Agent Directed Simulation Symposium 2010, as part of the ACM SCS Spring Simulation Multiconference, pp142-149, Orlando, FL, April 11-15, 2010
Technical Skills
Applications
•Visual Studio.NET, Visual Studio 6.0, Microsoft Visio, Macromedia Dream weaver, Macromedia Director, Microsoft Office, Latex, Model-sim, Clips Expert System, Adobe Photoshop,3D Studio Max, Maya 3D
Databases
•SQL Server 2005, Oracle, MS Access
Operating Systems
•Windows Vista/XP/2000/98.
Programming
•C#.Net, C, C++, VB.net, Java.
Reviewers Memberships
Qasim Siddique Reviewer Member of International Journal of Computer Science Issues IJOCS Reviewer List
Professional Life
Many Companies interviewed Qasim Siddique for different position some of them are following
- Diyatech
- Eixler Technologies
- E-strats
- JS Software House
- Keystone Construction
- Railway Hospital
- Sofnix
- Teradata
- Your Engineering Solutions (Pvt) Ltd
- Salt Valley
- Kalsoft
Contract Me
E-Mail: qasim_1987@hotmail.com
links
[1] NetLogo Community Publications