Information Technology: Recent submissions

  • Fahad Pervez (SEECS, National University of Sciences and Technology, Islamabad, 2008)
  • Zeeshan Pervez (SEECS, National University of Sciences and Technology, Islamabad, 2004)
    Machine translation (MT) of English text to its Urdu equivalent is a difficult challenge, and one that has not been tackled with much success to date. In this dissertation, a direct approach is being presented using an ...
  • Abeer Khan (SEECS, National University of Sciences and Technology, Islamabad, 2008)
    In today’s world, the use of computers is increasing. Where on one hand the use of technology has created many miracles, on the other hand it has given rise to cybercrime (computer-related crime) such as hacking, phishing, ...
  • Asma Mumtaz (SEECS, National University of Sciences and Technology, Islamabad, 2008)
    Distributed denial-of-service (DDoS) attacks have recently emerged as one of the most potent and prominent threats against information and service availability. Current research on DDoS attacks lacks realistic tools that ...
  • Hayyan Khan (SEECS, National University of Sciences and Technology, Islamabad, 2004)
  • Hira Jaffar (SEECS, National University of Sciences and Technology, Islamabad, 2009)
    This document defines and specifies the user requirements for the project “Automated Access Control and Attendance System (AACAS)” to aid in the analysis, development and test stage of the system development process. The ...
  • Junaid Arshad (SEECS, National University of Sciences and Technology, Islamabad., 2005)
    With the passage of time and increase in the need for mobility, wireless or mobile networks emerged to replace the wired networks. This new generation of networks is different from the earlier one in many aspects like ...
  • Samreen Afzal (SEECS, National University of Sciences and Technology, Islamabad., 2008)
    Most of the network attacks are carried out through compromised hosts. Intruders get hold of different vulnerable hosts and launch attacks, which can lead to disastrous loss to organizations and networks. Moreover, emergences ...
  • Zainab Majeed (SEECS, National University of Sciences and Technology, Islamabad., 2008)
    In today’s world of computing, the use of hand held devices is increasing. A personal digital assistant (PDA) allows you to efficiently access, organize, collect, store, and process various kinds of information, and work ...
  • Pehlaj Rai, Shoaib Manzoor, Adil Gulzar (SEECS, National University of Sciences and Technology, Islamabad., 2012)
    Traffic law enforcement is important for every civilized society. In the developed world, in addition to the police, separate departments are raised to ensure that people follow traffic rules especially those related to ...
  • Amir Bashir, Chaman Lal (SEECS, National University of Sciences and Technology, Islamabad., 2012)
    Many people believe that the positive change in Pakistan can be brought through educating the citizens. With 56% of adult population being literate and the country ranked as 160 out of 177 countries in literacy by United ...
  • Huda Abdul Aziz (SEECS, National University of Sciences and Technology, Islamabad., 2006)
    Due to the disjointed nature of device interfaces, communication modes and operating platforms, as well as the need to exchange real-time and semi-real-time data from remote sensor systems and instrumentation, the systems ...
  • Sarah Qureshi (SEECS, National University of Sciences and Technology, Islamabad., 2004)
    There are about 150,000 registered vehicles and about 15,000 vehicles are registered every year, in the Islamabad district alone. Currently there is no IT infrastructure; the existing registration application and issuance ...
  • Waqas Abdul-Basi (SEECS, National University of Sciences and Technology, Islamabad., 2008)
    Distance learning through the internet has now become practical due to the continuous spread of the internet all across the globe. This phenomenon can now be fully exploited in the developed world in general and the USA ...
  • M. Saeed Anwar, Muhammad Nasir, Nakash Butt (SEECS, National University of Sciences and Technology, Islamabad., 2012)
    Inventory control systems are very useful in any organization to manage and control their inventories. Inventory can be finished goods that we sell to our customers, services, spare parts, raw material or goods that we buy ...
  • Muhammad Idris, M Shoaib Khan (SEECS, National University of Sciences and Technology, Islamabad., 2012)
    Fixed assets are any permanent object that an organization uses internally like computers, tools, office equipment, software etc. They produce considerable financial value to the organization. The lifecycle of fixed assets ...
  • Naveed Khan Leghari (SEECS, National University of Sciences and Technology, Islamabad., 2004)
    Network Traffic Generator (NTG) operates to emulate the working of TCP/IP protocol suite for generating network traffic on different layers of the suite. The TCP/IP suite includes a number of protocols on each layer. NTG ...
  • Noman Latif (SEECS, National University of Sciences and Technology, Islamabad., 2008)
    Anomaly detection is a non-trivial task, which is becoming more and more mature as we are stepping in the high-speed networks links. Existing network monitoring tools and algorithms may not match the needs of high-performance ...
  • Sadia Javaid Malik (SEECS, National University of Sciences and Technology, Islamabad., 2005)
    Multimedia Information Relay and Garbled Embedding, MIRGAE, describes watermarking for images and audio files. Watermarking, the art of secretly embedding data, has become exceedingly popular during the past few years. This ...
  • Fahad Ramzan (SEECS, National University of Sciences and Technology, Islamabad., 2005)
    The honeypot has emerged as an effective tool to provide insights into new attacks and current exploitation trends. Though effective, a single honeypot or multiple independently operated honeypots only provide a limited ...

Search DSpace


Advanced Search

Browse

My Account