Papers by Muhammad Ibrahim Channa

Student opinion mining regarding educational system using facebook group
2017 First International Conference on Latest trends in Electrical Engineering and Computing Technologies (INTELLECT)
Social computing has been emerged in the era of computing where the technology is being used to s... more Social computing has been emerged in the era of computing where the technology is being used to share information, ask suggestions, create academic groups for discussions and to name a few. Due to vast number of users and massive usage, many data mining techniques are applied social web data for numerous purposes. This paper introduces a solution to extract and analyze comments of masters students from the Facebook academic group. The proposed technique is implemented using Facebook graph API to extract the comments and then those are classified into three groups (i.e. positive, negative and neutral) using Bayesian Network probabilistic model. The said system may help administration to improve the learning environment by providing different proformas and analyzing different opinions from the students.

Zenodo (CERN European Organization for Nuclear Research), Oct 5, 2022
This paper presents the importance of Artificial intelligence (AI) in the computing education, wh... more This paper presents the importance of Artificial intelligence (AI) in the computing education, which has become an important and powerful aspect of human lives. It is still a field in its beginnings, but as time progresses, we will observe how AI evolves and explores its untapped potential. The rapid development regarding scrutiny of learning outcomes for higher education, establishment and implementation of international standards shows the need of the technology. Many higher education institutes of the world are adopting information and communication technology (ICT) to enhance the Course Learning Outcomes (CLO) of the students based on the revised Bloom Taxonomy that assists the institutions to analyze the outcomes of students in planning the course and techniques to improve and enhance the performance of students. This research paper analysis the importance of blooms in integration of computing technologies and smart learning environment and provides the encouraging results when analyzed by using supervised machine learning methods during the COVID-19 pandemic situation. In this research, we have designed an ICT based framework to achieve the learning outcomes of the students in computing subjects. It is worth mentioning that the proposed educational model reports the promising results of a bout of 83% accuracy. The accuracy of the model is also verified from self-assessment reports of the students.

April 2021, 2021
Sindhi is one of the historical languages which is widely used in all over the world, but especia... more Sindhi is one of the historical languages which is widely used in all over the world, but especially in the province of Sindh Pakistan. Sindhi language has its own script and written by the right-handed. Nowadays the use of different Sindhi platforms is increasing especially for communication. The majority of the people of Sindh province read, write and speak very well, but they face the problem in text communication while using different communication platforms. However, the users of computer and mobile phone feel trouble/difficulty during the use of the Sindhi script in typing of text messages, tweets and comments while using different platforms in computer and mobile phone. Natural Language Processing (NLP) is one of the better options for the solution of these problems of text communication on different platforms. For the proper solution of text communication issues, Romanized Sindhi text is used instead of Sindhi text. Romanized text writing is easier than the Sindhi text writi...

An evaluation of smart learning approach using bloom taxonomy based neuro-fuzzy system
Journal of Intelligent & Fuzzy Systems, 2022
The World Health Organization has stated Covid-19 as a pandemic that has posture a current hazard... more The World Health Organization has stated Covid-19 as a pandemic that has posture a current hazard to humanity. Covid-19 pandemic has magnificently forced global shutdown of several events, including educational activities. This has caused in tremendous crisis-response immigration of educational institutes with online smart learning helping as the educational platform. Smart learning targets at providing universal learning to students consuming modern technology to completely prepare them for a fast-changing world everywhere. In this research paper an evaluation system has been developed that is based on bloom taxonomy. A Neuro-fuzzy system for the training and testing of the data for smart and traditional learning outcomes has been applied on collected data. For this research work, we have selected students of the computing discipline and focus on core-computing subjects. The findings of this research work shows the importance of smart learning and its positive impact on student lea...
A Computer Network which automatically configures itself and adopts the services which fulfil use... more A Computer Network which automatically configures itself and adopts the services which fulfil user requirements according to their needs is called autonomic network. Autonomic network self manages the services for heterogeneous devices and modify polices for users to satisfy them from network services. In ENhanced Autonomic network Management Architecture (ENAMA), we propose two blocks of processing which control the operations of management as well as for learning from environment and take decisions for network related issues. QoE will be used for collecting data for learning from external environment and store in Long Term Memory (LTM) block for future analysis and decisions. The proposed ENAMA is the fast learning autonomic network management architecture; it will take most accurate decisions to handle the critical situations.
Parts of Speech Tagging of Romanized Sindhi Text by applying Rule Based Model

A secure and QoS aware routing protocol for Wireless Sensor Network
2016 11th International Conference for Internet Technology and Secured Transactions (ICITST), 2016
Wireless Sensor Network (WSN) has emerged as useful alternative to provide prompt communication s... more Wireless Sensor Network (WSN) has emerged as useful alternative to provide prompt communication services in mission critical applications such as post disaster relief operations where reliably data delivery in timely manner is utmost important. However, unsupervised nature of such environments makes security of node vulnerable and exposes them various threats such as damage, physical capture and node's misbehavior attacks. Moreover, the data delivery with higher end-to-end delays undermines the benefits of such networks. Recently, trust aware protocols have proved their efficacy in countering node misbehavior attacks. The existing trust aware routing protocols either use single metric (trust) or composite metric (trust and hop count, trust and energy or trust and geographical information) thereby overlooking QoS requirements. Recent research has proved that there can be significant variations in wireless links such as delay, capacity and loss ratio thereby leading to high route instability. Therefore, this paper presents the Secure and QoS aware Routing Protocol (SQRP) that takes into consideration the trust and QoS parameters pertaining to link's quality (transmission rate, link capacity and loss ratio) to select an optimized end-to-end route. This multi-facet strategy helps to maintain the trusted network environment while routing the data using the links that satisfy QoS requirements. Simulation results demonstrate that SQRP achieves improved performance in terms of throughput, delay and link stability.

Energy-aware and secure routing with trust for disaster response wireless sensor network
Peer-to-Peer Networking and Applications, 2015
Wireless Sensor Network (WSN) is considered as a useful alternative to provide prompt communicati... more Wireless Sensor Network (WSN) is considered as a useful alternative to provide prompt communication services in post disaster relief operations where field information is exchanged with first responders and nearby emergency centers. However, such application environments expose the nodes to physical capture, damage and misbehaviour attacks. In addition, the compromised nodes potentially increase network congestion by advertizing false information. The loss of critical information due to significant congestion and node misbehavior attacks adversely affect emergency operations. The traditional cryptographic and authentication based secure schemes can’t be adopted due to their associated cost and incapability to counter nodes misbehaviour attacks. Furthermore, existing trust based routing protocols incur high control overheads in trust estimation and dissemination; lead to high number of dead nodes due to adopted route discovery mechanism and suffer from high route instability. In this paper, we present an Energy-aware Secure Routing with Trust (ESRT) scheme that maintains a trusted environment and isolate misbehaving nodes. ESRT incorporates trust, energy, and hop counts for making routing decisions. This multi-facet routing strategy helps to balance out energy consumption among trusted nodes while routing data using shorter paths. Simulation results demonstrate improved performance of the ESRT scheme when compared to existing work.

International Journal of Computer Applications, 2013
Operation and maintenance of installed wireless networks face various difficulties due to rapidly... more Operation and maintenance of installed wireless networks face various difficulties due to rapidly shifting trends in technology. The planning of existing wireless networks make it difficult to combine different elements, made by different technological companies and different network operators. In this paper, we survey different integrated wireless networking structure, system architectures and its applications. Integrated wireless networks use combination of different types of following networks e.g. MANET with mobile cellular network, MANET with satellite network, and GSM with software-defined radio (DSR) that have been proposed for low cost of network deployments and provides the voice communication, short message service and low rate data service for remote areas where infrastructure networks are difficult to exist. They also improve their routing reliability and maintain security issues.
Transactions on Machine Learning and Artificial Intelligence, 2015
Robot is machine like human beings working in hazardous situations, replace domain experts and pr... more Robot is machine like human beings working in hazardous situations, replace domain experts and provide accurate results. We proposed automated medication system that work like human physician experts in remote locations, where flood and thunderstorm occurs. It measure patient's temperature and blood pressure using sensors and get input from user via keyboard and voice system. After finding diseases, it retrieves symptoms for diseases from stored databases. The proposed automated medication system provides facility to people which are unable to reach big cities where medical facilities are available.

International Journal of Computer …, 2010
The popularity of wireless communications systems can be seen almost everywhere in the form of ce... more The popularity of wireless communications systems can be seen almost everywhere in the form of cellular networks, WLANs and WPANS. In addition, small portable devices have been fully equipped with various communication interfaces building a heterogeneous environment in terms of access technologies. the future heterogeneous environments are expected to integrate wireless technologies such as WLANs, WMANs and WWANs, based on the individual network architectures. It is envisioned that the next generation wireless systems would provide convergence of various wireless network technologies so as to have architectures with global connectivity [27, 28]. We present a view of the various routing protocols present in the Mobile AdHoc Networks (MANETs) and compare them as to see the best performance oriented. The Integration of different access technologies is a very complex task and involves issues at all layers of the protocol stack.

Journal of Communications, 2011
The natural or man-made disaster demands an efficient communication and coordination among first ... more The natural or man-made disaster demands an efficient communication and coordination among first responders for successful emergency management operations. During emergency situations such as an earthquake or a flood, the traditional telecommunication infrastructure may be damaged and may not provide adequate communication services to emergency management teams. Mobile ad hoc networks are used in such type of situations for exchanging emergency related information. During emergency situation, the deployed ad hoc communication network may itself be prone to failures and vulnerable to malicious threats. The first responders use real-time applications for exchanging emergency related information, which may create network congestion. The significant loss of emergency related information may cause mismanagement of emergency response efforts. We propose a reliable routing scheme for postdisaster ad hoc communication networks, which finds the shortest possible routes with all reliable nodes. The proposed scheme also detects packet forwarding misbehavior caused by network fault or congestion in an active route and reroutes packets through other reliable route. The performance of the proposed scheme is evaluated in terms of packet delivery ratio, end-to-end delay and routing overhead through extensive simulations.

Proceedings of the IEEE Symposium on Emerging Technologies, 2005., 2005
Mobile ad hoc networks have become, quite common nowadays. The usage of voice and video applicati... more Mobile ad hoc networks have become, quite common nowadays. The usage of voice and video applications over these networks has created various challenges for research community. Real-time applications require certain guarantees in terms of throughput, delay, jitter and packet loss ratio from the underlying network. Legacy MAC layers do not provide service/traffic differentiation and treat both real-time and best-effort traffic equally. We propose an architecture for heterogeneous ad hoc networks that provides service differentiation. It gives better treatment to high priority traffic. More transmission time is allocated to high priority traffic, which improves its throughput and reduces end-to-end delay. Real-time traffic is allowed to transmit a burst of packets without contending for channel access, known as transmit opportunity (TXOP). A novel route, repair scheme, called AODV real repair (AODV-RR) is also proposed that tries its best to locally repair a broken route and minimize t...
A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network
Mobile Networks and Applications, 2016

The natural or man-made disaster demands an efficient communication and coordination among first ... more The natural or man-made disaster demands an efficient communication and coordination among first responders to save life and other community resources. Normally, the traditional communication infrastructures such as land line or cellular networks are damaged and don't provide adequate communication services to first responders for exchanging emergency related information. Wireless ad hoc networks such as mobile ad hoc networks, wireless sensor networks and wireless mesh networks are the promising alternatives in such type of situations. The security requirements for emergency response communications include privacy, data integrity, authentication, key management, access control and availability. Various ad hoc communication frameworks have been proposed for emergency response situations. The majority of the proposed frameworks don't provide adequate security services for reliable and secure information exchange. This paper presents a survey of the proposed emergency response communication frameworks and the potential security services required by them to provide reliable and secure information exchange during emergency situations.
Sentiment analysis of Romanized Sindhi text
Journal of Intelligent & Fuzzy Systems
An Energy and Priority Aware Routing Scheme for Mobile Ad Hoc Networks in Emergency Management
Indian Journal of Science and Technology
Measuring Effect of Packet Reordering on Quality of Experience (QoE) in Video Streaming
3D Research
Trust and Thermal Aware Routing Protocol (TTRP) for Wireless Body Area Networks
Wireless Personal Communications
Akhtar Hussain, Abdul Rehman Abbasi, Muhammad Ibrahim Channa, Sadia Murawwat, Ghullam Mustafa Bhutto “Blob Analysis of Hand-Touch-Head/Face Movements for Affective Computing ", Sindh University Research Journal(2012) (SURJ). (Vol. 44 No. 2-AB, pp. 125-130, 2012)
Uploads
Papers by Muhammad Ibrahim Channa