Home
My
Recent CV
My
Projects
Current Activities
Photo Gallery
My Favorite Links
|
|
Descriptions for My Development Projects
Downloadable Copies:
Word Format
Pdf Format
A-0 |
Enterprise wide implementation of Oracle’s EBusiness Suite in
King Fahd University, Saudi Arabia
|
2006, 2007 |
1:
Housing & Office Services Module |
|
My Role |
Assistant Developer |
|
Reference(s) |
1.
Mr. Riyazuddin,Mohammed, ITC (0501961645, mriyaz@kfupm.edu.sa)
2.
Mr. Said Ghurmallah Al-Ghamdi, Director, Faculty Housing |
|
Main Contributions: |
|
1. |
Successfully debated for the adoption of
Oracle Application Framework (OAF) as the right development
platform for the Housing & Office Services module (customized
extension to Oracle Apps ERP) |
|
2. |
Support the suggestion for OAF adoption
with the following:
·
A self-prepared list of Frequently Asked Questions
(FAQ) (with proper references to authentic technical sources)
shedding light on the significance of OAF for Oracle Apps
customized extensions (a copy is attached).
·
A proof of concept prototype built using OAF
platform. |
|
3. |
Proposed the main screen layouts . |
|
4. |
Implement a simulation environment (on a
local machine using Oracle backend) to test workflow management
scenarios needed in Housing & Office Service Business processes |
|
5. |
Troubleshoot and resolved a number JAVA
related technical issues faced during development |
|
6. |
A significant contribution in back-end
infrastructure design (database objects) |
|
7. |
Helped in routine tasks like script
writing/ troubleshooting, formatting page styles etc. |
1.2:
SQL Script Troubleshooting/ Tuning |
|
My Role |
Code Troubleshooter |
|
Reference(s) |
Mr. Sanchay Pal, TCS (0563948013, sanchay@kfupm.edu.sa) |
|
Main Contributions: |
|
1. |
Troubleshoot problems in scripts affecting
PL/SQL trigger invocation (firing) in Oracle back-end |
|
2. |
Troubleshoot problems in scripts affecting
PL/SQL function invocation |
1.3:
Report Development |
|
My Role |
Report Developer |
|
Reference(s) |
Mr. Dennish, Mohammad, TCS |
|
Main Contributions: |
|
1. |
Formulated SQL Queries needed for Security
& Safety Department Reports |
|
2. |
Troubleshoot various issues involved in
data retrieval for reporting |
|
|
|
A-1 |
Online-course development (Web-based interactive multimedia
content) Projects |
2005, 2004 |
Brief Description |
§
KFUPM is interested to explore the potential of using web in
teaching. Deanship of Academic Development (DAD), KFUPM
therefore awards grants for the development of some KFUPM
courses into an online format.
§
Every academic year DAD announces its annual Online Courses
Grant. These grants are given for the development of
comprehensive online courses, which could be delivered
completely through the web.
§
DAD is interested in receiving proposals from teams of KFUPM
faculty members who are seriously interested in this field of
education and have members with necessary skills required to
successfully accomplish such a task. The announcement is made
through e-mail, which is sent to all KFUPM faculties. |
|
|
Program User(s) |
Undergraduate and Graduate
Students of MIS Department |
|
|
Client(s) |
Deanship of Academic
Development, KFUPM. |
|
|
Functionality Details |
§
A distance-education, multimedia-rich course that utilizes the
features and tools of Internet/Intranet environment, and is
conducted and delivered completely through the medium.
§
The Online Course uses the necessary tools and comprehensive
enough so that it is considered a viable replacement of the
traditional face-to-face method of teaching.
§
The course encourages engaging the learner actively and
effectively with the instructor, monitoring, providing prompt
feedback, evaluating and facilitating enjoyable, self-directed
and active leaning.
In summary, the online course have the following characteristics.
§
Encourages Contacts between students and faculty
§
Encourages Cooperation among students
§
Encourages Active Learning
§
Gives prompt Feedback
§
Emphasizes Time on Task
§
Communicates High Expectations
§
Respects Diverse Talents and Ways of Learning |
|
|
Platform Details |
§
Macromedia Flash MX (for animations)
§
Screen capturing tool (for demonstrating software use)
§
Voice generation tool (like Microsoft Narrator) for reading
screens. |
|
|
A-2 |
An outpatient ‘Hospital Management System’ for King Fahd
University Clinic |
2005 |
Brief
Description |
The system is developed with a focus towards information
management. The system aims at providing medical center’s
management personnel at King Fahd University, with those tools
at their fingertips that would help them to streamline the
various organizational activities right from Patient
Registration, Medical Services, Appointment scheduling to
Billing and Accounting and Resource Management. |
|
|
Program User(s) |
Staff Personnel at King Fahd
Medical Center including Doctors & Therapists, Lab Technicians,
Receptionists and Non-medical staff, like Accountants, Store
keepers, etc. |
|
|
Client(s) |
King Fahd University, Saudi Arabia. |
|
|
Functionality Details |
The system provides support for the routine activities for its
audience, a summary of the functionalities is as follows:
Audience |
Usage |
Doctors & Therapists |
§
Retrieve the patient’s medical
history,
§
Record the patient current visit
details including prescription, lab test needed and other
details. |
Lab Personnel |
§
Retrieve the test requirements entered
by the doctor.
§
Enter the recent lab results for
doctor’s reference |
Receptionists |
Do visit administration jobs like patient registration,
appointment searching etc. |
Non-medical staff, like Accountants, Store keepers |
Responsible for recording drug stock, financial transactions
with the drug suppliers etc. |
|
|
|
Platform Details |
The system uses a two-tier
(client/ server) based distributed architecture. The back-end is
an object-relational database engine of Oracle 9i Database which
interacts with front-end program modules developed in Visual
Basic 6.0 code. |
|
|
A-3 |
A Data Backup Utility for College of Industrial Management (CIM) |
2002 |
Brief Description |
Unexpected data loss is a real and significant problem in today's
computing environments and can occur for a variety of different
reasons. Hardware failure, virus attacks, theft, accidental
deletes, overwrites and even natural disasters can cause
organizations or individuals to lose considerable amounts of
their most valuable asset, the data. The loss in employee
productivity during the time it takes to restore or recreate the
lost information, considerably affect.
CIM data backup is a handy, small, easy backup program that lets
its users easily back up their documents and folders. Safely
protects you from accidental deletes, overwrites, and viruses.
Backups are stored in Zip files and can be created both manually
and automatically (on schedule).
The program delivers Comprehensive Data Protection that
guarantees the most current file backup possible by tracking
changes as they occur. With automatic, unobtrusive hard drive
backup, end-users can work as they always have - without IT
training on procedures. Self-serve file recovery brings users
back to productivity quickly, without burdening IT.
The program’s ease of use and fast, reliable data recovery tools
combine to help organizations minimize downtime, increase IT and
end-user efficiency, simplify data management, and save money.
CIM Backup utility enables the user to perform their regular
backups with the minimum amount of effort needed. |
|
|
Program User(s) |
§
CIM Faculty Members
§
CIM Secretarial/ administrative Staff |
|
|
Client |
College of Industrial Management (CIM) Administration, King
Fahd University, Saudi Arabia. |
|
|
Functionality Details |
Main features of the program
are as follows:
1. The program frees the users from burden of arranging backup
media on their own. A centrally installed data backup server
machine with a fixed amount of disk space quota for every
faculty member/ secretarial staff is dedicated for this purpose.
2. The program automates the
back up task by enabling the users to configure a personalized
backup schedule, on a timely or on demand basis.
3. Data is replicated as a
single compressed file (in the zip format) at the central
networked server. The feature will allow for the adoption of
large amount of data in an affordable disk space.
4. The program allows the
users to encrypt the replicated data copy (stored at the central
server) with a personal password. This will maximize the data
integrity by making the restoration inaccessible even for the
Network Administrator.
5. The backup stuff, created
at the central server by CIM faculty and staff, will be
replicated on regular basis on removable media (backup tapes) by
the college’s network staff.
6. After running the backup
task once, the subsequent invocation will only replicate the
changed contents of the files/ folders configured for backup
earlier, instead of repeating the backup of full contents at
every attempt.
|
|
|
Platform Details |
The program development and complete testing is done mainly
in-house by using Visual Basic Script Code modules. These
modules work much similar to a batch file and run by Window
Script Host interpreter (WSH, available with all Windows
Platforms).
Some pre-built program components from third party vendors are
being used for the full functionality. A summary of program
component details is as follows:
No. |
Program Component |
Details |
1. |
Power Archiver
(command line version) |
Compression Utility from
http://www.powerarchiver.com |
2. |
Path copying utility |
For the availability of
"Copy Selected Path" option in the right clicked context
menu inside Windows by Fox Magic Software |
3. |
VB Script Code Modules |
Written by Mr. Irfan
Ilyas (Acting CAIR Administrator). These modules integrate
the functionality of all program components transparent to
the users. |
|
A-4 |
A Course Administration System (web-integrated database) for
College of Industrial Management (CIM) |
2001 |
Brief Description |
Course administrative management is an essential element in
course teaching. The system includes many administrative
features that allow course instructors to keep track of students
individually, and monitor entire classes quickly and easily.
The course activities include students registration, class
attendance entry (online during class lectures), class
performance reporting (to be used for different university
requirements from course instructors) etc.
Through the web-interface, students will be allowed to make them
aware of their course performance statistics through out the
semester. |
|
|
Program User(s) |
§
Course Instructors – administrative privileges
§
Course Students – user privileges |
|
|
Client(s) |
College of Industrial Management (CIM) Administration, King
Fahd University, Saudi Arabia. |
|
|
Functionality Details |
Main features of the system include:
§
Enter and edit students and class information
§
Online support for regular course activity tracking like daily
attendance logging,
§
Utilize extensive reporting both for instructors and students
|
|
|
Platform Details |
The system utilizes two-tier
system architecture with the back-end database engine (Microsoft
Access 2002) and front end web-based interface objects (Data
Access Page of Microsoft Access). Form objects with Visual Basic
for Application coding required for automating activities. The
system deploys a privilege based security model with password
protected user accounts for desired system access. |
|
|
A-5 |
A database driven web-site for serving CIM users IT-support
activities |
2001 |
Brief Description |
Success in customer support depends upon how quickly and
effectively the service administrator responds to customer
inquiries so the full potential of your customer relationships
can be unlocked.
Some benefits of an efficient web-based customer support
interface include:
§
More satisfied clients;
§
New and existing customers relations are under better control;
§
Improve customer support;
§
Optimize agent productivity and availability;
§
Customer support staff is more productive;
§
Keeping track of customer correspondence;
§
Creating Knowledge Base for typical customer support questions;
§
Creating a single integrated source for all customer support
inquiries;
§
Ability to analyze information more effectively. |
|
|
Program User(s) |
Information Technology Users
in College of Industrial Management, King Fahd University |
|
|
Client(s) |
College of Industrial Management, King Fahd University |
|
|
Platform Details |
§
Front Page 2002 (Authoring Tool)
§
Active Server Pages |
|
|
A-6 |
Design & Implementation of a Java Based Load Balancing Software
(JLBS) Framework (for parallel/distributed applications on a
Local Area Network), |
2000 |
Brief Description |
§
JLBS is a software package that permits a heterogeneous
collection of Unix and/or Windows computers hooked together by a
network to be used as a single large parallel computer. Thus
large computational problems can be solved more cost effectively
by using the aggregate power and memory of many computers.
Cryptography, pattern matching, graphic intensive & computation
intensive applications are some of the example applications of
such a system.
§
JLBS enables users to exploit their existing computer hardware to
solve much larger problems at minimal additional cost. These
include important scientific, industrial, and medical problems.
It can also be used in educational setups to teach the concepts
of parallel programming.
§
JLBS requires the developers to code the parallel application
using JLBS class framework. After the application is coded, the
execution can be started by initiating the master object in the
application which will send the slave objects (distributed
tasks) all around the network in a load balanced manner.
§
As compared with other parallel computing systems like Parallel
Virtual Machine (PVM), Message Passing Interface (MPI) etc.,
JLBS added the feature of load balancing in the parallel
computing setup. This feature dynamically controls the computing
load on the participant machines by relocating the parallelized
computing tasks during runtime.
§
As JLBS is completely built in Java, it is much flexible in terms
of environment heterogeneity as JLBS deployment doesn’t require
any recompilation for a newly introduced hardware/ software
platform. The only requirement is to have a proper JVM (Java
Virtual Machine) environment available for every distinct
platform available in the setup.
|
|
|
Program User(s) |
§
Researchers, Programmers (parallel computing community)
§
Educators in Computer Science |
|
|
Client(s) |
College
of Graduate Studies, King Fahd University |
Functionality Details |
§
JLBS provides the developer with a bunch of extendable/ interface
class definitions. The developer can extend/ provide missing
methods, thus create concrete classes which comprised the
parallel application (e.g. a matrix multiplication application –
a classical parallelizable problem in mathematical domain).
§
Before any parallel application can be launched, a JLBS parallel
computing setup needs to be configured. This setup comprised of
a collection of networked workstations with a central
workstations acting like a load-balancing controller for all
others. Such a setup is done by making use of JLBS configuration
files and denotes a parallel computing domain.
§
JLBS is capable of controlling a number of such domains in a
collective fashion, thus comprising a large number of networked
hosts in a more scalable manner.
§
In addition, a startup host is need to be identified which is
responsible to run the JLBS startup object and initiate the
required objects on each of the hosts in the parallel computing
environment.
§
Before initiating a JLBS parallel computing environment, it is
required that JLBS system administrator provides the complete
domain configuration, including number of total parallel
computing domains and the names of hosts in each domain.
§
After the entire configuration is done, the JLBS environment can
then be initiated by running a startup script code. The script
causes the system runtime environment to be available on all the
domain hosts. However, inside each domain, the selection of
centralized load balancing controller host is purely automated
and done during the execution of scripts. The selection is based
upon the comparative processing capability of the host with
other domain hosts.
§
After JLBS parallel computing environment is running, a parallel
application can be launched by initiating the master application
object (responsible for initiating the parallelized task objects
as needed and distribute the application data among the
parallelized tasks).
|
Platform Details |
§
Java Development Kit 2.0 – for development purposes.
§
Build on Java RMI (Remote Method Invocation) package of Java 2.0
§
Tested under Java Run time Environments – Solaris/ Linux/ Windows |
A-7 |
A Graphical Research tool for contrasting the working of
different vector graphic algorithms |
1999 |
Brief Description |
§
A graphical tool (vector graphics) to demonstrate basic geometric
shape creation and editing, both in 2D and 3D. Example shapes
used are point, line, rectangle, ellipse, polyline, polygon and
free hand drawings.
§
The tool also demonstrate transforming techniques of vector
objects by applying concepts like Skew, Scale, Distort and
rotation of targeted objects.
§
Concept of object morphing is also demonstrated. |
|
|
Program User(s) |
Computer Science Students/ Instructors |
|
|
Client(s) |
Information & Computer Science Department, King Fahd University. |
|
|
Platform Details |
The tool is built using Borland JBuilder, the leading
cross-platform environment for building industrial-strength
enterprise Java™ applications. |
|
|
A-8 |
A model simulator for validating Simple Mail Transfer Protocol
(SMTP) working |
1998 |
Brief Description |
§
The simulator targets efficient software verification of
distributed systems or protocol. The model is built using an
open-source software tool, called spin (http://spinroot.com/spin/whatispin.html).
§
Spin has been used to trace logical design errors in distributed
systems design, such as operating systems, data communications
protocols, switching systems, concurrent algorithms, railway
signaling protocols, etc.
§
The protocol simulator is programmed in a high level language to
specify systems descriptions, called PROMELA (a PROcess MEta
LAnguage).
§
The model checks the logical consistency of SMTP protocol
specification.
§
It reports on deadlocks, unspecified receptions, flags
incompleteness, race conditions, and unwarranted assumptions
about the relative speeds of processes. |
|
|
Program User(s) |
Students / Instructors |
|
|
Client(s) |
Computer Engineering Department, King Fahd University. |
|
|
Platform Details |
§
Spin is a popular open-source software tool, used by thousands of
people worldwide, that can be used for the formal verification
of distributed software systems.
§
The tool was developed at Bell Labs in the original Unix group of
the Computing Sciences Research Center, starting in 1980.
§
The software has been available freely since 1991, and continues
to evolve to keep pace with new developments in the field.
§
In April 2002 the tool was awarded the prestigious System
Software Award for 2001 by the ACM. |
|
|
A-9 |
Network Clock Synchronization System (NCSS) for Network of
Workstation Environments |
1997 |
Brief Description |
One of the services frequently neglected in computer network
design is a high-quality, time-of-day clock capable of
generating accurate timestamps with small residual errors
compared to intrinsic one-way network delays. Such a service
would be useful for tracing the progress of complex
transactions, synchronizing cached data bases, monitoring
network performance and isolating problems.
In principle, a clock of sufficient accuracy can be provided at
each workstation using a stable, crystal-controlled clock
which is corrected from time to time by messages from a
central server.
Suitable inexpensive, crystal-controlled clock interfaces are
available for virtually any computer. However, the design of
the synchronization algorithm and protocol used to transmit
the corrections is still a big challenge.
NCSS is an implementation of one such algorithm design. The
protocol is based upon some weighted averaging techniques.
§
In the algorithm, at regular intervals a central server tries to
identify the workstations whose clock-timestamps are drifting
the least among each other. In conclusion, the timestamp on the
majority of workstations will be considered as accurate and the
workstations having huge drifts will be provided with the
accurate timing (at regular intervals).
§
This whole process is transparent to the network users as it uses
operating systems socket API to communicate among the
workstations.
NCSS had been implemented and tested rigorously in a local area
network (LAN) environment. However, it can easily be expanded to
networks of larger capacity. |
|
|
Program User(s) |
College of Computer Science & Engineering
(CCSE) Network Users, King Fahd Unviersity |
|
|
Client(s) |
King Fahd Unviersity |
|
|
Platform Details |
§
NCSS is developed in a LAN environment running Unix based
operating systems (Solaris/ NeXT/ Linux).
§
The network is composed of nearly 20 nodes. |
|
|
A-10 |
An Automated Billing System Module For Time Warner Comm., USA. |
1996 |
Brief Description |
The module served as a small part of a huge subscriber billing
software system for the client. Automated billing to the
relevant subscribers is supported by the use of front end event
procedures (timer based) which further invoked back-end database
trigger code.My participation was as an active member (next to
the Team Lead) of the project team involved. |
|
|
Program User(s) |
Communication Subscribers for Time Warner Communications. |
|
|
Client(s) |
Time Warner Communications |
|
|
Platform Details |
§
The system uses a two-tier (client/ server) based distributed
architecture. The back-end is SYBASE relational database engine
which interacts with front-end program modules developed in
PowerBuilder5.0 |
|
|
A-11 |
Design, implementation and deployment of a Bulletin Board
System (NED-BBS) NED University |
1994 |
Brief Description |
A BBS is a highly social phenomenon and is used for meeting
people and having discussions in message boards as well as for
publishing articles, downloading software, playing games and
many more things using a single application.
The bulletin board system for NED University, named NED-BBS,
allows users to dial into the system over a phone line and,
using a terminal program, perform functions such as downloading
software and data, uploading data, playing games, reading news,
and exchanging messages with other users.
It was built around 1994 before the advent of heavy use of World
Wide Web in Pakistan.
When compared with the Internet’s WWW,
§
a Bulletin board systems were in many ways a precursor to the
modern form of the World Wide Web and other aspects of the
Internet.
§
a BBS is also a local phenomenon, not as widely available as
Internet’s web, as one had to dial into a BBS with a phone line
and would have to pay long distance charges for a BBS out of the
local area. Thus, many users of a BBS lived in the same area and
it was common for them to hold a BBS Meet, where everyone from
the same board would gather and meet face to face.
|
|
|
Program User(s) |
NED University Communities (student/ faculty/ staff) |
|
|
Client(s) |
NED
University, Pakistan |
|
|
Platform Details |
§
Programmed in C++
§
Operated under DOS environment. |
|
|
A-12 |
Design and development of a Gaming software, named ‘Labyrinth
Challenge’ |
1992 |
Brief Description |
‘Labyrinth Challenge’ demonstrates basic techniques in Artificial
Intelligence while allowing the players to search paths in
automatically generated mazes. The searching can be done
automatically by the computer thus challenging the player to
search the path in a smaller time.
The salient features of the game include creating complex mazes
as per the required configuration (bigger or smaller), automated
maze searching, manual path searching etc.
The software can be used for demonstrating Artificial
Intelligence techniques (stacked based path searching) in an
educational setup for computer science students. |
|
|
Program User(s) |
Computer Science Educators/ Students |
|
|
Client(s) |
NED
University, Pakistan. |
|
|
Platform Details |
§
Programmed in Turbo Pascal 7.0
§
Run on DOS platform. |
|
|
|
|