1. home
  2. faculty detail



image description

Precision Agriculture Lab
Incharge: Dr. Saqib Ali

Associate Professor, Department of Computer Science, University of Agriculture, Faisalabad.

The focus of the Climate change lab is to strengthen the applied research and innovation capacities of agriculture universities in Pakistan by structuring and implementing social innovation labs to mitigate and adapt to climate change.

Selected Publications:
(1). A Blockchain-Based Decentralized Data Storage and Access Framework for PingER S Ali, G Wang, B White, RL Cottrell 2018 17th IEEE International Conference On Trust, Security And Privacy In
(2). Secure Data Provenance in Cloud-Centric Internet of Things via Blockchain Smart Contracts S Ali, G Wang, MZA Bhuiyan, H Jiang 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced
(3). A taxonomy of cross layer routing metrics for wireless mesh networks MAB Ngadi, S Ali, AH Abdullah, RH Khokhar EURASIP Journal on Wireless Communications and Networking 2012 (1), 177
(4). Aspect Based Sentiment Analysis of Ridesharing Platform Reviews for Kansei Engineering S Ali, G Wang, S Riaz IEEE Access 8, 173186-173196
(5). Blockchain and IoT Based Textile Manufacturing Traceability System in Industry 4.0 MS Faridi, S Ali, G Duan, G Wang International Conference on Security, Privacy and Anonymity in Computation
(6). Sentiment Analysis of Code-Mixed Roman Urdu-English Social Media Text using Deep Learning Approaches A Younas, R Nasim, S Ali, G Wang, F Qi 2020 IEEE 23rd International Conference on Computational Science and
(7). Energy based efficiency evaluation of cluster-based routing protocols for wireless sensor networks (WSNs) M Faheem, AB Ngadi, S Ali, MA Shahid, L Sakar International Journal of Software Engineering and Its Applications 7 (6
(8). Libra Critique Towards Global Decentralized Financial System S Ali, G Wang, B White, K Fatima International Conference on Smart City and Informatization, 661-672
(9). Ensuring Security and Energy Efficiency of Wireless Sensor Network by Using Blockchain A Rehman, S Abdullah, M Fatima, MW Iqbal, KA Almarhabi, MU Ashraf, ... Applied Sciences 12 (21), 10794
(10). Risk Reduction Activities Identification in Software Component Integration for Component Based Software Development (CBSD) F Fatima, S Ali, MU Ashraf International Journal of Modern Education and Computer Science 9 (4), 19
(11). A comparative analysis using different machine learning: An efficient approach for measuring accuracy of face recognition MS Faridi, MA Zia, Z Javed, I Mumtaz, S Ali International Journal of Machine Learning and Computing 11 (2)
(12). AGILE-WATERFALL HYBRID MODEL FOR SOFTWARE DEVELOPMENT PROCESSES S Ajmal, S Ali The Science International
(13). Multi-criteria receiver self-election scheme for optimal packet forwarding in vehicular ad hoc networks RH Khokhar, MA Ngadi, MS Latiff, KZ Ghafoor, S Ali International Journal of Computers Communications & Control 7 (5), 865-878
(14). Semantic Knowledge Based Graph Model in Smart Cities S Ali, G Wang, K Fatima, P Liu International Conference on Smart City and Informatization, 268-278
(15). Detecting Anomalies from End-to-end Internet Performance Measurements ( PingER ) using Cluster Based Local Outlier Factor S Ali, G Wang, RL Cottrell, T Anwar 15th IEEE International Symposium on Parallel and Distributed Processing
(16). Interference nomenclature in wireless mesh networks S Ali, A Naveed, MAB Ngadi, JA Chaudhry Wireless personal communications 75 (4), 1983-2003
(17). Internet Performance Analysis of South Asian Countries using End-to-end Internet Performance Measurements S Ali, G Wang, RL Cottrell, S Masood 16th IEEE International Conference on Ubiquitous Computing and
(18). Optimized interference aware joint channel assignment model for wireless mesh network S Ali, MA Ngadi Telecommunication Systems 62 (1), 215-230
(19). Ensemble of Clustering Algorithms for Anomaly Intrusion Detection System S Benqdara, MDA NGADI, JM SHARIF, S ALI, SVT Sangeetha, S Ravi, ... Journal of Theoretical and Applied Information Technology 70 (3), 425-431
(20). Remote Sensing-Based Prediction of Temporal Changes in Land Surface Temperature and Land Use-Land Cover (LULC) in Urban Environments M Ramzan, ZA Saqib, E Hussain, JA Khan, A Nazir, MYS Dasti, S Ali, ... Land 11 (9), 1610
(21). Preserving the privacy of dependent tuples using enhanced differential privacy S Ali, G Wang, S Riaz, T Rafique Human-centric Comput Informat Sci 12, 1-5
(22). Pinger malaysia-internet performance measuring project: A case study S Ali, RL Cottrell, A Nveed SLAC National Accelerator Lab., Menlo Park, CA (United States)
(23). A Levenberg-Marquardt Based Neural Network for Short-Term Load Forecasting S Ali, S Riaz, Safoora, X Liu, G Wang CMC-COMPUTERS MATERIALS & CONTINUA 75 (1), 1783-1800
(24). Fagan Inspection: A Defects Finding Mechanism in Software Requirements Specification (SRS) Document MS Yousaf, S Ali, Q Nawaz, S Afsar, I Mumtaz, N Rashid
(25). Intelligent Surveillance in Smart City Using 3D Road Monitoring A Tariq, S Ali, X Xing, G Wang 2020 IEEE 8th International Conference on Smart City and Informatization
(26). Differentially private block coordinate descent S Riaz, S Ali, G Wang, A Anees Journal of King Saud University-Computer and Information Sciences 35 (1
(27). Enhancement of Non Functional Requirements in Agile Software Development K Iftikhar, S Ali, MA Ngadi International Journal of Computer Science and Information Security 14 (12), 820
(28). Autonomic service composition through context orientation approach JA Chaudhry, S Ali, MA Binngadi, AH Abdullah Journal of Theoretical and Applied Information Technology 34 (1), 50-56
(29). Automated Segmentation to Make Hidden Trigger Backdoor Attacks Robust against Deep Neural Networks S Ali, S Ashraf, MS Yousaf, S Riaz, G Wang Applied Sciences 13 (7), 4599
(30). Impacts of Nitrogen Fertilizer Application and Mulching on the Morpho-Physiological and Yield-Related Traits in Cotton K Hussain, A Ilyas, S Ali, I Bibi, Q Shakil, MU Farid, ZA Saqib, A Habib, ... Agriculture 13 (1), 12
(31). Android Malware Detection Using Category-Based Permission Vectors X Li, G Wang, S Ali, QL He International Conference on Algorithms and Architectures for Parallel
(32). An Automatic Tool to Model and Remove Integration Dependencies in user stories using UML T Afzal, S Ali IJCSIS 15 (1)
(33). Applying big data warehousing and visualization techniques on pingER data A Hameed, S Ali, RL Cottrell, B White Proceedings of the 3rd IEEE/ACM International Conference on Big Data
(34). A synopsis of self-healing functions in wireless networks KA Kamal, JA Chaudhry, S Ali, M Ahmad, MAB Ngadi, AH Abdullah 2011 IEEE 14th International Multitopic Conference, 176-181
(35). Membership inference attack on differentially private block coordinate descent S Riaz, S Ali, G Wang, MA Latif, MZ Iqbal PeerJ Computer Science 9, e1616
(36). ChainApparel: A Trustworthy Blockchain and IoT-Based Traceability Framework for Apparel Industry 4.0 MS Faridi, S Ali, G Wang, SA Awan, MZ Iqbal
(37). Exploiting Requirement Validation Techniques for Assessing the Software’s Quality in Pakistan S Ali, MS Yousaf, S Mehmood, S Riaz, A Rehan
(38). Key Benefits of Cloud-Based Internet of Vehicle (IoV)-Enabled Fleet Weight Management System MS Faridi, S Ali, S Afsar, Z Javed International Journal of Advanced Trends in Computer Science and Engineering
(39). Frequency of Different Pattern of Hair Loss in Pakistani Men Using BASP Classification S Nasreen, T Malik, H Memon, I Shafquat, M Shah, S Ali Pakistan Journal of Medical and Health Sciences 15 (5), 1187-1189
(40). The Future Prospects of Adversarial Nets MS Yousaf, S Riaz, S Ali, S Chen, G Wang International Conference on Security, Privacy and Anonymity in Computation
(41). Internet Performance Prediction Framework Based on PingER Dataset W Zhang, X Xing, S Ali, G Wang International Conference on Algorithms and Architectures for Parallel
(42). Substituting Missing Values in End-to-End Internet Performance Measurements Using k-Nearest Neighbors S Ali, G Wang, X Xing, RL Cottrell 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th
(43). Data Security Issues in Cloud Computing S Umer, Amna Ali International Journal of Computer Science and Information Security 14 (10), 1-8
(44). Usability of information systems software in Pakistan in users perspective S Shafeeq, Ayesha Ali Journal of Software Engineering & Intelligent Systems 1 (2), 122-132
(45). Interference Aware Cluster-based Joint Channel Assignment Scheme in Multi-channel Multi-radio Wireless Mesh Networks S Ali Universiti Teknologi Malaysia

Contact :