MS: Recent submissions

  • Ahmad, Mahmood (SEECS, National University of Science and Technology, Islamabad., 2010)
    In rst quarter of year 2009 a new kind of self generating bot- nets got phenomenal prominence amongst top prevailing web threats; e.g. Gumblar. Originally the malware was served up via malicious site. Once the infection ...
  • Tahir, Nazish (SEECS, National University of Science and Technology, Islamabad., 2016)
    Wireless sensor networks (WSNs) are a vital projection of wireless networks that are capable of opening a world of possibilities in wireless domain. Many of wireless sensor applications are being utilized for military, ...
  • Rashid, Owais (SEECS, National University of Science and Technology, Islamabad., 2015)
    There are two types of call centers, Inbound and Outbound Call centers. In inbound call centers, focus is always on multiple factors like customer satisfaction, customer retention etc. In outbound call centers, only focus ...
  • AKHTAR, ADEEL (SEECS, National University of Science and Technology, Islamabad., 2014)
    Wavelength Division Multiplexing (WDM) is a very attractive option to satisfy the rapidly growing bandwidth needs. Multiplexing devices made it possible to exploit the real bandwidth of optical fibre. An optical switch ...
  • Khan, Aamir (SEECS, National University of Science and Technology, Islamabad., 2016)
    Data visualization has gained signi cant importance since the demand for software applications providing abstract view and pattern identi cation has increased. To meet the demand, a number of data visualization techniques and ...
  • Gul, Faiza (SEECS, National University of Science and Technology, Islamabad., 2014)
    The importance of self-adaptability has emerged as an exciting research area among the software engineering community in recent years. The future software systems are envisioned as self-adaptive. They will respond in a ...
  • Khalid, Maria (SEECS, National University of Science and Technology, Islamabad., 2016)
    A large amount of research has been done in ad-hoc networks. Most of the research uses simulation as a means of protocol evaluation., The credibility of the published simulation results is very important for productive ...
  • Kulsoom, Umay (SEECS, National University of Science and Technology, Islamabad., 2012)
    Reliability is the most important feature of event-driven wireless sensor net- works. Due to the resource constrained nature of sensor networks, achieving reliability is challenging with e cient utilization of communication ...
  • Awan, Sadia Waheed (SEECS, National University of Science and Technology, Islamabad., 2016)
    Wireless Sensor Networks are composed of tiny electronic device sensor nodes and are capable of sensing the information of external environment. Sensor nodes are also capable of computing and transmitting the information ...
  • Javed, Hira (SEECS, National University of Science and Technology, Islamabad., 2015)
    HL7 community is profoundly involved in the development of standards in order to exchange, share and retrieve health related information. FHIR is an emerging standard of HL7 that encourages use of JSON as a data serialization ...
  • Abbas, Faheem (SEECS, National University of Science and Technology, Islamabad., 2014)
    The aviation industry is probably one of the largest industries worldwide. The Air Transport Action Group reports that three billion passengers were transported globally in 2012. Booking trends analyzed by ITB Berlin ...
  • Usman, Amjad (SEECS, National University of Science and Technology, Islamabad., 2012)
    Semantic-based information retrieval in the digital repositories is becoming an important mechanism to facilitate end users with an ease of exploring intensive volume of information. The traditional keyword-based ...
  • MUHAMMAD (SEECS, National University of Science and Technology, Islamabad., 2016)
    Energy-Harvesting is a technique which is playing a vital role to improve the lifetime of wireless sensor networks. Di erent prediction models have pro- posed so far to predict the solar or wind energy with maximum ...
  • Ali, Sardar (SEECS, National University of Science and Technology, Islamabad., 2009)
    Real-time Anomaly Detection Systems (ADSs) use packet sam- pling to realize tra±c analysis at wire speeds. While recent studies have shown that a considerable loss of anomaly detection accuracy is incurred due to sampling, ...
  • Maqbool, Saba (SEECS, National University of Science and Technology, Islamabad., 2016)
    In this thesis we proposed an algorithm for e cient resource allocation in torus network. The torus is one of the topology used in High Performance Computing (HPC) to connect systems and high speed networks. The ...
  • Noureen, Fauzia (SEECS, National University of Science and Technology, Islamabad., 2011)
    Multi-core systems and multi-core servers are present in almost all data cen- ters now-a-days. All major processor vendors are producing multi-core chips. These multi-core systems are commonly used to deploy high end ...
  • Jan, Alam (SEECS, National University of Science and Technology, Islamabad., 2012)
    Optical burst switching (OBS) is an intermediate solution between optical packet switching and optical circuit switching. In OBS, resources are reserved on the y and released when the burst is passed. Contention occurs ...
  • Haq, Mazhar Ul (SEECS, National University of Science and Technology, Islamabad., 2013)
  • Kamran, Muhammad (SEECS, National University of Science and Technology, Islamabad., 2016)
    To endure through the throat cutting contention, business industry and researchers are compelled to take intelligent and proficient decisions. This gives rise to the requirement of an automated solution powered by cutting ...
  • Inayat, Sidrah (SEECS, National University of Science and Technology, Islamabad., 2010)
    Software testing is any activity used for evaluating an attribute or capability of a program or system and determining that it meets its required results. The difficulty in software testing stems from the complexity of ...

Search DSpace


Advanced Search

Browse

My Account