PhD (CS)

 

Recent Submissions

  • iltaf, Naima (2025-02-20)
    Pervasive compudng is characteri zedbylarge numbers of roaming entities and sence of the ab_ a globally available fixed infrastructure. In such an environment entities need to collaborate with little known or even unknown ...
  • Zaman, Nasir (MCS, 2025-02-20)
    Alzheimer’s disease is a chronic disease which is characterized by the gradual loss of cognitive functions and the impairment of the ability to perform activities of daily living. This paper presents a new approach for ...
  • Bibi, Nazia (MCS, 2024-07-26)
    In software development, the availability of useful and adaptable programming components or source codes is crucial. Traditional information retrieval techniques fall short in code search, as these require bridging the ...
  • Anwar, Zeeshan (MCS, 2024-07-09)
    Software has expanded beyond computers to become an integral component of our daily lives. In spite of being a pivotal discipline, Software engineering, a relatively new discipline when compared to other engineering ...
  • Zainab, Naureen (MCS, 2024-03-19)
    Citrus canker is a devastating bacterial disease affecting citrus trees and has significant economic implications for agriculture. The timely identification and precise diagnosis of citrus canker are critical components ...
  • Farooq, Maemoona (MCS, 2023-10-27)
    The protection of personal information is of utmost significance in today’s digitally connected society. In this digital era, encryption is seen as a rapidly developing trend. Despite the development of sophisticated ...
  • Javaid, Sabeen (Military College of Signals, (MCS),NUST, 2019)
    Trust has a significant impact on our personal and business relations. It is noteworthy that in the era of things based services, people trust in various companies/organizations for personal and business purposes. They ...
  • Naseer, Ayesha (MCS, 2023)
    The organizations protect information resources and maintain competitive advantage by using risk driven and controlled centered security management systems. These systems are very useful in the prevention of threats that ...
  • Usman Zia (MCS, 2022-12)
    Internet technologies are generating enormous amount of data that merges textual and visual content: tagged images, descriptions in newspaper, videos with captions, and social media feeds. Such interaction with technology ...
  • Kanwal, Maria; Supervised by Dr. Abdul Ghafoor (MCS, 2022-10)
    Saliency is the perceptual quality by which an observable thing or object stands out relative to its environment. It is that property by which some object stands out. Accurate detection of salient object is a challenging ...
  • Ashraf, Javed; Supervised by Dr. Hasnat Khurshid (MCS, 2021-12)
    The Internet of Things (IoT) is poised to impact several aspects of our lives with its fast proliferation in many areas such as wearable devices, smart sensors, smart cities, autonomous vehicles, and home appliances. IoT ...
  • Baig, Nasir; Supervised by Dr. Adil Masood Siddiqui. (MCS, 2021-09)
    Image enhancement is very important element in forensic security and surveil- lance applications. Image enhancement is a technique which removes artifacts in image and improves the quality of information in image using ...
  • Iqbal Ch, M Munawwar; Supervised by Dr. Naima Iltaf. (MCS, 2020-07)
    The image fusion process aims to combine the crucial information from multiple images obtained from different resources. Numerous image fusion techniques are proposed to achieve better fusion accuracy however they generally ...
  • Sukhia, Komal Nain; Supervised by Abdul Ghafoor (MCS, 2020-06)
    The exponential increase and wide accessibility of visual content on internet have led to research in the field of image retrieval and search. Image retrieval has been broadly categorized into content based image retrieval ...
  • Amin, Benish; Supervised by Dr Abdul Ghafoor. (MCS, 2020-03)
    Accurate extraction of foreground objects from various kinds of images/ video sequences is significant yet challenging task in digital image processing. It is an active research area and has diverse applications that ...
  • Javid, Rakhshanda; Supervised by Dr. Naveed Iqbal Rao. (MCS, 2019-08)
    Automation of behavior analysis of crowds is a challenging task due to the density variations, occlusions, context, and scene variability. This dissertation aims to address different challenges in image as well as videos ...
  • Sultana, Sidra; Supervised by Dr. Fahim Arif (MCS, 2018-01)
    Formal methods help in quantifying the functional and nonfunctional requirements that are later used in the verification process for safety assurance in real-time systems. System formalism is a crucial step in terms of ...
  • Hussain, Muhammad Rashid; Supervised by Dr. Asif Masood. (MCS, 2017-01)
    Writing is a codified system of standard symbols: the repetition of agreed-upon simple shapes to represent ideas. Language using symbols is assumed to be universal which is easier to interpret and efficient to use. Handwriting ...
  • Babar, Muhammad; Supervised by Dr. Fahim Arif (MCS, 2018-11)
    The recent expansion in the field of Internet of Things (IoT) and Big Data is providing a large production potential in the course of the new era of smart urban. The IoT infrastructure for the design of smart urban consists ...
  • Basit Ur Rahim, Muhammad Abdul; Supervised by Dr. Fahim Arif (MCS, 2017-09)
    The graphical modeling languages (UML and SysML) play an important role in designing the system engineeringapplications. In the field of software and system engineering, these languages are considered as the benchmark for ...

View more