BS: Recent submissions

  • Usman Ahmad Mian (SEECS, National University of Sciences and Technology, Islamabad., 2005)
    Performance of a network is dependent upon various parameters. Network management people are mainly interested in knowing the performance of the network at particular instance of time. Monitoring information from various ...
  • Mushtaq Ali, Ata Ur Rehman (SEECS, National University of Sciences and Technology, Islamabad., 2013)
    Today every organization requires an efficient and effective application that can manage financial transaction. Among the various sub-systems of a financial application is General Ledger which is also known as GL that acts ...
  • Asma Shamshad Zaki (SEECS, National University of Sciences and Technology, Islamabad., 2006)
    Many tools have been developed to monitor the network, so that network performance may be determined and the issues related to the decline in performance isolated and resolved. The characteristics of the network performance ...
  • Muhammad Khurshid Alam (SEECS, National University of Sciences and Technology, Islamabad., 2007)
    Project management has become one of the most challenging and demanding aspect of managerial sciences all around the world. Success and failure of any underlying project mainly depends upon the maximum resource utilization, ...
  • Syed Mohammad Ali Hasnain (SEECS, National University of Sciences and Technology, Islamabad., 2005)
    The system is designed for the pharmaceutical distributors. The objective of the system was to automate the various mature pharmaceutical processes used in the Marketing and Distribution departments. The system provides ...
  • Adeel Ahmed Hashmi (SEECS, National University of Sciences and Technology, Islamabad., 2004)
    This project “Design / Development of Lab Exercises for Enterprise Network Technologies” provides the platform for students, instructors and administration to not only understand and learn about the concepts of enterprise ...
  • Bilal Mustafa (SEECS, National University of Sciences and Technology, Islamabad., 2004)
    Multi-Agent systems are one of the important emerging technologies that provide collaborative environment for a community of social agents for the provision of continuous and dynamic services. Foundation for Intelligent ...
  • Muhammad Sohaib Ayub, Muhammad Adnan, Muhammad Yasir Shafi (SEECS, National University of Sciences and Technology, Islamabad., 2012)
    Parallel I/O refers to the ability of scientific programs to concurrently read/write from/to a single file from multiple processes executing on distributed memory platforms like compute clusters. In the HPC world, I/O ...
  • Adeel Ahmed Hashmi (SEECS, National University of Sciences and Technology, Islamabad., 2004)
    This project “Design / Development of Lab Exercises for Enterprise Network Technologies” provides the platform for students, instructors and administration to not only understand and learn about the concepts of enterprise ...
  • Fawad Nazir (SEECS, National University of Sciences and Technology, Islamabad., 2004)
    Information and communication are two of the most important strategic issues for the success of every enterprise. While today nearly every organization uses a substantial number of computers and communication tools ...
  • Hamid Mukhtar (SEECS, National University of Sciences and Technology, Islamabad., 2006)
    Active Network Topology discovery is a mechanism to keep track of the status of network resources and their interconnections. The knowledge of the real-time topology of a network is crucial for management tasks such as ...
  • Muhammad Qaisar Ch (SEECS, National University of Sciences and Technology, Islamabad., 2006)
    Radio Resource Management (RRM) becomes a challenging job for network providers when it comes to provide flexible, higher bandwidth services, and maintaining the best system capacity, which are the distinguishing features ...
  • Ahmad Ali, Hussnain Azam, Arslan Sohail (SEECS, National University of Sciences and Technology, Islamabad., 2013)
    In recent years, smart phones and other mobile technologies have become ubiquitous. With their rapidly expanding uses, the number of people who own mobile device has increased many folds. Students ruin a lot of books by ...
  • Ali Akram, Muhammad Umar Farooq (SEECS, National University of Sciences and Technology, Islamabad., 2012)
    Ontology is widely used as framework to model the domain knowledge. Knowledge modeling for a specific domain is done by multiple agents. At a time only one agent works on the model and passes it to the next agent when his ...
  • Yousef Khan, Muhammad Usman Mansha, Dil Muhammad (SEECS, National University of Sciences and Technology, Islamabad., 2013)
    Clampx – ARM (Clampx Active Restaurant Manager) is a solution to the major problems in management of restaurant industry. Restaurant industry is one of the most profitable businesses in Pakistan. Restaurants are often very ...
  • Atif John, Muhammad Ilyas (SEECS, National University of Sciences and Technology, Islamabad., 2012)
    A PERSON’S aim in life determines his success. The clearer and more focused a person’s aim is the higher the success he/she will reach. An aim is the very basis of a man’s success. Carlyle said:“know your work and do ...
  • Muddassar Mahmood (SEECS, National University of Sciences and Technology, Islamabad., 2004)
    This documentation reports the design of bilingual dictionary in Expert Based Machine Translation System from English to Urdu. This dictionary is a basically a collection of parallel words of English and Urdu. In this ...
  • Zohaib Najeeb (SEECS, National University of Sciences and Technology, Islamabad., 2006)
    Grid computing is a promising next generation computing platform as it enables the sharing of resources that are distributed across the world. The management of such large computing systems becomes increasingly complex as ...
  • Kashif Iqbal (SEECS, National University of Sciences and Technology, Islamabad., 2004)
    In both e-business and e-science, we often need to integrate services across distributed, heterogeneous, dynamic “virtual organizations” formed from the disparate resources within a single enterprise and/or from external ...
  • Humaira Yousuf (SEECS, National University of Sciences and Technology, Islamabad., 2006)
    Existing security measures rely on knowledge-based approaches like passwords or token-based approaches such as ID cards and credit cards to control access to security systems. Though ubiquitous, such methods are not very ...

Search DSpace


Advanced Search

Browse

My Account