MS: Recent submissions

  • SADAF, TAHIRA (College of Electrical & Mechanical Engineering (CEME), NUST, 2012)
    In past few years, rate adaptation for wireless multimedia applications has been a subject of wide research. Rate adaptation can be achieved at MAC/PHY layer by making the accurate decision to choose available data rates. ...
  • DIN, MARIA ALAWAD (College of Electrical & Mechanical Engineering (CEME), NUST, 2012)
    Service Oriented applications are becoming very popular due to ease of Web services Usage. The area of Web Service Discovery (WSD) is a primary area of research today. It has fundamental importance in web services ...
  • SHARIF, BUSHRA (College of Electrical & Mechanical Engineering (CEME), NUST, 2012)
    It is well acknowledged fact that software development is a dynamic process so during the development of a software project many requirement changes are proposed. These proposed changes have the potential to affect the ...
  • AIN, QURAT UL (College of Electrical & Mechanical Engineering (CEME), NUST, 2012)
    The cost of software errors or problems as a result of quality lapse is a major difficulty to the software industry at large, to the developers of the Software as well its clients. The task of improving quality is therefore ...
  • Unknown author (College of Electrical & Mechanical Engineering (CEME), NUST, 2012)
    Open source projects for example eclipse and fire fox have open source bug repositories. User reports bugs to these repositories. Users of these repositories are usually non-technical and cannot assign correct class to ...
  • ZAREEN, SAIMA (College of Electrical & Mechanical Engineering (CEME), NUST, 2011)
    The wireless multimedia sensor networks is becoming popular and is used in many important applications like surveillance systems, health monitoring system, maintaining law and order systems monitoring and control of ...
  • RUBAB, SADDAF (College of Electrical & Mechanical Engineering (CEME), NUST, 2012)
    Steganography is a means to hide the existence of information exchange. Using this technique the sender embeds the secret information in some other media. This is done by replacing useless data in ordinary computer files ...
  • NAWAZ, ASIM (College of Electrical & Mechanical Engineering (CEME), NUST, 2011)
    Many organizations use data warehouse for strategic decision making. Today's real‐ time business stresses the potential to process increasingly volumes of data at very high speed in order to stay competitive in market. ...
  • CHOHAN, AZHAR (College of Electrical & Mechanical Engineering (CEME), NUST, 2011)
    OLAP and OLTP Data Integration for Operational Level Decision Making Data warehousing is being used by many organizations to make decisions at top level. These analysis‐based decisions are more helpful for top management ...
  • Basir, Kashif (College of Electrical & Mechanical Engineering (CEME), NUST, 2014)
    Traditional software development process is gradually being replaced by Commercial Off-theshelf (COTS) based software development (CBSD). The reason for this replacement is the availability of ready-made software packages. ...
  • MALIK, HUFSA (College of Electrical & Mechanical Engineering (CEME), NUST, 2014)
    Global Software Engineering (GSE), despite its practical importance, is still an immature field, with palpable shortage of systematic guidelines and best practices in various contexts. This thesis presents an approach ...
  • AHMAD, SHABIR (College of Electrical & Mechanical Engineering (CEME), NUST, 2013)
    The continuously increasing Internet coverage and its availability gave rise to an issue that once has been considered not important to take into consideration. Today a number of applications use the Internet to deliver ...
  • FATIMA, MAMUNA (College of Electrical & Mechanical Engineering (CEME), NUST, 2013)
    There is a huge amount of ‘knowledge-enriched data’ in hospitals, which needs to be processed in order to extract useful information from it. The knowledge-enriched data is very useful in making valuable medical decisions. ...
  • KAKLI, MUHAMMAD BILAL (College of Electrical & Mechanical Engineering (CEME), NUST, 2013)
    The educational planners need comprehensive, reliable, up-to-date, and timely data for decision making purposes, related to planning, monitoring, evaluation, and review of education system. Such education related data ...
  • SHAHNAZ, ANDLEEB (College of Electrical & Mechanical Engineering (CEME), NUST, 2013)
    Considering today’s surge of information, the need for well organized knowledge bases is increasing rapidly for providing simplified access to knowledge and its further processing. In biomedical domain, heaps of information ...
  • NISA, ROZINA (College of Electrical & Mechanical Engineering (CEME), NUST, 2013)
    Web services have been evolved as a versatile and cost effective solution for exchanging dissimilar data between distributed applications. They have become a fundamental part of service oriented architecture (SOA). The ...
  • ASHRAF, SADAF (College of Electrical & Mechanical Engineering (CEME), NUST, 2013)
    Accurate and reliable automatic personal identification is critical in wide range of application domains such as National ID card, Electronic Commerce, ATMs etc. Biometrics which refer to automatic identification of a ...
  • KAMRAN, MUHAMMAD (College of Electrical & Mechanical Engineering (CEME), NUST, 2013)
    The constant modification of software systems, the increasing size of the software and the expensive development process are the factors that are responsible for the increase in the amount of the effort that is being ...
  • NAFEES, TAYYABA (College of Electrical & Mechanical Engineering (CEME), NUST, 2013)
    Android operating system is designed for use in mobile computing by The Open Handset Alliance. It runs the powerful applications and gives its users a choice to select their applications and their carriers. At this time ...
  • WARIS, MADIHA (College of Electrical & Mechanical Engineering (CEME), NUST, 2013)
    Due to the wide use of cloud services the amount of unstructured data being transferred to the clouds is increasing exponentially. The security threats to the cloud data and probability of data vulnerabilities is also ...

Search DSpace


Advanced Search

Browse

My Account