Information Technology: Recent submissions

  • Ahmad Ali, Hussnain Azam, Arslan Sohail (SEECS, National University of Sciences and Technology, Islamabad., 2013)
    In recent years, smart phones and other mobile technologies have become ubiquitous. With their rapidly expanding uses, the number of people who own mobile device has increased many folds. Students ruin a lot of books by ...
  • Fatima, Madiha (SEECS, National University of Science and Technology, Islamabad., 2014)
    In medical body area network small sized medical sensors are attached to a patient's body for continuous and real-time monitoring of biomedical vital signs. These nodes collect data from patient's body and send it to ...
  • Riaz-ud-din, Muhammad (SEECS, National University of Science and Technology, Islamabad., 2011)
    In this thesis, we mathematically model the lifetime of a wireless sensor network (WSN) that uses the prominent MELETE protocol for data dissemination. We first model the lifetime of an individual sensor node which is ...
  • Hassan, Zara (SEECS, National University of Science and Technology, Islamabad., 2014)
    The emerging domain of Self-Adaptive Systems (SAS) has gained significant importance in software engineering community over the recent years. Self-adaptive application by definition should modify itself at run-time as a ...
  • Shah, Sayed Qaiser Ali (SEECS, National University of Science and Technology, Islamabad., 2014)
    Network Convergence is of vital importance due to limited network resources. On one hand it decreases network cost but on the other hand it reduces Quality of Service (QoS). Due to increase in real-time network applications, ...
  • Razzaq, Muhammad Asif (SEECS, National University of Science and Technology, Islamabad., 2014)
    The signi cance of social media has already been proven in provoking transformation of public opinion for developed countries in improving democratic process of elections. On the contrary, developing countries lacking ...
  • Ali Akram, Muhammad Umar Farooq (SEECS, National University of Sciences and Technology, Islamabad., 2012)
    Ontology is widely used as framework to model the domain knowledge. Knowledge modeling for a specific domain is done by multiple agents. At a time only one agent works on the model and passes it to the next agent when his ...
  • Sultana, Sara (SEECS, National University of Science and Technology, Islamabad., 2017)
    Higher education is a privilege in developing countries like Pakistan where citizens are fighting even for getting basic education. In the past two decades, more and more students have started to enroll in IT and engineering ...
  • Khan, Majid (SEECS, National University of Science and Technology, Islamabad., 2014)
    Data mining is the process of discovering new patterns from large data set using di erent data analysis techniques. During the last few years, the appli- cation of data mining techniques on educational data has gained ...
  • Imran, Muhammad (SEECS, National University of Science and Technology, Islamabad., 2011)
    Demand of multimedia traffic is increasing day by day due to broadband internet access and new end-user business applications as well as the continuing paradigm shift from voice to data services. Multimedia applications ...
  • Shah, Sadiq (SEECS, National University of Science and Technology, Islamabad., 2011)
    Multi-radio Multi-channel (MRMC) Wireless Mesh Networks (WMNs) have made rapid progress in recent years to become a preferred option for end users due to its reliability, scalability and extending the network connectiv- ity ...
  • Ujager, Farhan Sabir (SEECS, National University of Science and Technology, Islamabad., 2011)
    Optical Burst Switching (OBS) is one of the promising switching technique to meet the demands of the future networks. OBS combines the feature of optical circuit switching (OCS) and optical packet switching (OPS) which ...
  • Mahmood, Asiah (SEECS, National University of Science and Technology, Islamabad., 2015)
    Medical devices are pivotal in the modern healthcare services. The quality of service increases when the data from the devices are acquired seamlessly by Electronic Medical Record (EMR) systems. Ensuring Interoperabili ...
  • Ahmad, Mahmood (SEECS, National University of Science and Technology, Islamabad., 2010)
    In rst quarter of year 2009 a new kind of self generating bot- nets got phenomenal prominence amongst top prevailing web threats; e.g. Gumblar. Originally the malware was served up via malicious site. Once the infection ...
  • Tahir, Nazish (SEECS, National University of Science and Technology, Islamabad., 2016)
    Wireless sensor networks (WSNs) are a vital projection of wireless networks that are capable of opening a world of possibilities in wireless domain. Many of wireless sensor applications are being utilized for military, ...
  • Rashid, Owais (SEECS, National University of Science and Technology, Islamabad., 2015)
    There are two types of call centers, Inbound and Outbound Call centers. In inbound call centers, focus is always on multiple factors like customer satisfaction, customer retention etc. In outbound call centers, only focus ...
  • AKHTAR, ADEEL (SEECS, National University of Science and Technology, Islamabad., 2014)
    Wavelength Division Multiplexing (WDM) is a very attractive option to satisfy the rapidly growing bandwidth needs. Multiplexing devices made it possible to exploit the real bandwidth of optical fibre. An optical switch ...
  • Khan, Aamir (SEECS, National University of Science and Technology, Islamabad., 2016)
    Data visualization has gained signi cant importance since the demand for software applications providing abstract view and pattern identi cation has increased. To meet the demand, a number of data visualization techniques and ...
  • Gul, Faiza (SEECS, National University of Science and Technology, Islamabad., 2014)
    The importance of self-adaptability has emerged as an exciting research area among the software engineering community in recent years. The future software systems are envisioned as self-adaptive. They will respond in a ...
  • Khalid, Maria (SEECS, National University of Science and Technology, Islamabad., 2016)
    A large amount of research has been done in ad-hoc networks. Most of the research uses simulation as a means of protocol evaluation., The credibility of the published simulation results is very important for productive ...

Search DSpace


Advanced Search

Browse

My Account