Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Institute of Business Administration

Conference

Discipline
Keyword
Publication Year
Publication

Articles 1 - 30 of 34

Full-Text Articles in Engineering

Does Green Energy Really Matter For Environment And Economic Sustainability? Validating The Long-Standing Existing Empirics On Pakistan Economy, Syed Kafait Hussain Naqvi Nov 2023

Does Green Energy Really Matter For Environment And Economic Sustainability? Validating The Long-Standing Existing Empirics On Pakistan Economy, Syed Kafait Hussain Naqvi

CBER Conference

The empirical outcomes of the study validate the widespread concern of the literature on the existence of the “growth hypothesis” which supports, that there is a systematic positive causation running from green energy to economic sustainability. The study findings suggest that regulations in the energy sector can encourage the applications of green energy resources, particularly in the real sector of the economy, leading to reduced emissions.


Food-Water-Energy Nexus In The Perspective Of Green Revolution, Green Energy, Legal And Institutional Framework: A Killian Based Adjusted Bootstrap Approach, Zia Ur Rahman Nov 2023

Food-Water-Energy Nexus In The Perspective Of Green Revolution, Green Energy, Legal And Institutional Framework: A Killian Based Adjusted Bootstrap Approach, Zia Ur Rahman

CBER Conference

Food and water energy is crucial for human well-being, sustainable development, and poverty reduction. The growing global demand driven by population growth, economic development, urbanization, changing diets, technological advancements, and climate change projections indicates a significant increase in the need for these resources. Understanding the intricate interdependencies between food, water, and energy is essential for effectively addressing these challenges and fostering a prosperous and sustainable future. Therefore, this study incorporated statistical data collected from the Pakistan Economic Survey and the World Governance Indicator from 1990 to 2022 to elucidate the complex connection between food, water, and energy.


Analysis Of Sectoral Energy Demand In Pakistan, Raza Ali Khan, Mirza Faizan Ahmed, Jaweriya Naz Nov 2023

Analysis Of Sectoral Energy Demand In Pakistan, Raza Ali Khan, Mirza Faizan Ahmed, Jaweriya Naz

CBER Conference

The purpose of this research is to estimate the energy demand for different sectors including commercial, industrial, residential, transportation and agriculture. For this purpose, different factors affecting the demand for energy in each sector have been analyzed. The adopted methodology is Box Jenkins, which is a systematic approach of identification, estimation, diagnostic checks and forecasting of the model.


Demand Analysis Of Energy Mix In District Kotli Azad Jammu And Kashmir, Pakistan, Syed Kafait Hussain Naqvi Nov 2023

Demand Analysis Of Energy Mix In District Kotli Azad Jammu And Kashmir, Pakistan, Syed Kafait Hussain Naqvi

CBER Conference

This study is an effort to empirically analyze the household’s demand for energy mix (electricity, liquefied petroleum gas (LPG), kerosene, and firewood) in the District Kotli, AJK. The study estimates the demand elasticities (price and expenditure) by employing the Linear Approximate Almost Ideal Demand System (LA-AIDS) to 384 households sampled across District Kotli, AJK in 2017. The empirical estimations are carried out by using the Seemingly Unrelated Regression (SUR), keeping intact the adding-up, homogeneity and symmetry restrictions.


Crowd-Based Requirement Engineering, Ume Sauda Ghanyani Apr 2021

Crowd-Based Requirement Engineering, Ume Sauda Ghanyani

CBER Conference

Requirement elicitation through crowdsourcing is trending nowadays and due to its major benefits, some of the organizations are implementing this idea. Our research paper discusses the traditional requirement engineering concepts and then compares them with crowd-based requirement engineering to show the benefits of crowdsourcing. Features of Crowd-Based Requirements Engineering are highlighted to give an idea of the basis on which the survey was conducted. Furthermore, we have discussed the online survey and gamification methods to motivate the crowd.


Networks - Ii: Em-Wave Consideration Through Polarization And Magnetization Effects In Fiber Optics, Hassan Ali, Zain -Ul- Abiden, M. Rizwan Anjum Jul 2011

Networks - Ii: Em-Wave Consideration Through Polarization And Magnetization Effects In Fiber Optics, Hassan Ali, Zain -Ul- Abiden, M. Rizwan Anjum

International Conference on Information and Communication Technologies

Optical fiber communication is the field of the applied science and a promising technique that permits the communication of data in the form of audio and video signal over transparent medium with high data rate over longer distances. Due to the property of fiber optics that it carries high frequency and allows high bandwidth, as the information travels through fiber optic cable in the form of light which belongs to the spectrum of EM wave. The intensity of the electromagnetic radiation decreases in the non conducting medium due to the scattering and absorption of photons. The research on the behavior …


Networks - Ii: Closed-Form Expressions For Correlation Function And Power Density Spectrum In Mimo Mobile-To-Mobile Channels Using Two-Erose-Ring Model, Muahammad Riaz, Noor M. Khan Jul 2011

Networks - Ii: Closed-Form Expressions For Correlation Function And Power Density Spectrum In Mimo Mobile-To-Mobile Channels Using Two-Erose-Ring Model, Muahammad Riaz, Noor M. Khan

International Conference on Information and Communication Technologies

This paper presents an extensive study of MIMO channels in mobile-to-mobile environment. Recently proposed two-erose-ring model is reviewed for more details, and closed-form mathematical expressions for space-time correlations and power spectral density for MIMO mobile-to-mobile communication channels are derived. Using the correlation function, we analyze and compare capacity and diversity gains for two-ring model and two-erose-ring model. Furthermore, we compared the results with the existing models.


Networks - Ii: A High Bandwidth Covert Channel In Network Protocol, Mehdi Hussain Jul 2011

Networks - Ii: A High Bandwidth Covert Channel In Network Protocol, Mehdi Hussain

International Conference on Information and Communication Technologies

Covert channel is secret communication path, which existence is not expected in original system of design. It allows different users access to the same information, at the same time, but from different points-of-view. It is being more and more studying due to the grooming of internet. Always high-bandwidth network covert channel pose the significant risk of detection over network. Although the existing technique utilized the reserved bits of header, timestamp, initial sequence number, packet length etc for network covert channel, to some extend these have good temper resistance. But when increase their covert data capacity they becomes to fail to …


Network Security: A Review Of Salient Security Aspects Of The Universal Mobile Telecommunication System (Umts), F. Imran, M. Hussain Jul 2011

Network Security: A Review Of Salient Security Aspects Of The Universal Mobile Telecommunication System (Umts), F. Imran, M. Hussain

International Conference on Information and Communication Technologies

Wireless communication is known as key to global development. Wireless and mobile communication is gaining more importance in our life. Protecting information is one the aspects which we need to focus on the wireless networks. Universal mobile telecommunication system (UMTS) is evolution of the third generation mobile communication system. It was built on the success of global system for mobile communication (GSM). Universal mobile telecommunication system's security is also built on global system for mobile communication (GSM). The paper reviews the literature of the security aspects of the Universal mobile telecommunication system. A critical evaluation of the proposed solutions is …


Networks - Ii: Modified On Demand Transmission Power Control For Wireless Sensor Networks, Mirza M Yasir Masood, Ghufran Ahmed, Noor M. Khan Jul 2011

Networks - Ii: Modified On Demand Transmission Power Control For Wireless Sensor Networks, Mirza M Yasir Masood, Ghufran Ahmed, Noor M. Khan

International Conference on Information and Communication Technologies

On Demand Transmission Power Control (ODTPC) is a well known transmission power control strategy that is used to reduce high power consumption in wireless sensor networks (WSNs). In this paper, we propose an extension to ODTPC and thus, a modified version of ODTPC is proposed named MODTPC. Simulation results show that performance of MODTPC is better than ODTPC in terms of efficiency and energy saving.


Image Processing – I: Spatial Domain Lossless Image Data Compression Method, Syed Ali Hassan, Mehdi Hussain Jul 2011

Image Processing – I: Spatial Domain Lossless Image Data Compression Method, Syed Ali Hassan, Mehdi Hussain

International Conference on Information and Communication Technologies

Images has very significant role in digital media. However, generally digital imaging generates large amounts of data it need to be compressed, without loss of relevant information or simply lossless compression. This paper presents a novel lossless image compression technique in spatial domain. The proposed algorithm divide the image into no. of blocks uses variable bits to store each block pixels. Calculation of variable bits is dependent on pixel values of each block. The advantage of proposed scheme, it is dependent upon pixels correlation with in a block. Experimental results show that our proposed algorithm gives better compression efficiency as …


Network Security: A Secure Architecture For Open Source Voip Solutions, Fahad Sattar, M. Hussain, Kashif Nisar Jul 2011

Network Security: A Secure Architecture For Open Source Voip Solutions, Fahad Sattar, M. Hussain, Kashif Nisar

International Conference on Information and Communication Technologies

Voice over IP “VoIP” is a form of voice speech that uses data networks, for transmission of voice traffic over IP-based networks to transmit voice signals. The signal is correctly encoded at one end of the communication channel, sent as packets through the data network, then decoded at the receiving end and transformed back into a voice signal. It has a potential and offering a choice to the traditional telephony systems due to its high resource utilization and cost efficiency. Meanwhile, Wireless Local Area Networks (WLANs) have become an ever present networking technology that has been deployed around the world. …


Networks - I: Interference Mitigation In 4g System Using Smart Antenna, Asad Ali Siddiqui, Muhammad Mazhar Manzoor, Aamir Ijaz, Adnan Umar Khan, Imran Ahmed Awan, Sangita Lal Chand Jul 2011

Networks - I: Interference Mitigation In 4g System Using Smart Antenna, Asad Ali Siddiqui, Muhammad Mazhar Manzoor, Aamir Ijaz, Adnan Umar Khan, Imran Ahmed Awan, Sangita Lal Chand

International Conference on Information and Communication Technologies

Emerging trends of mobile communication and ever growing demand of mobile users with high speed data requirements and migrating towards 4G, Co-Channel interference and multipath in urban/dense urban environment will limit the capacity of the network. Smart antenna is now recognized by its higher user capacity in 4G wireless networks by efficiently reducing multipath and co-channel interference. Smart Antenna use adaptive beam forming algorithms in a dynamic environment continuously adjusting the weight of antenna arrays for creating a beam to track desired users automatically, and minimize interference from other users by placing nulls in their directions. This research work provides …


Networks - I: An Optimal Mutual Authentication Scheme In Gsm Networks, Abdul Haleem, Muhammad Usman Jul 2011

Networks - I: An Optimal Mutual Authentication Scheme In Gsm Networks, Abdul Haleem, Muhammad Usman

International Conference on Information and Communication Technologies

GSM is one of the most dominating networks for wireless mobile communication. With the passage of time, financial institutions have started using this network for providing their services. Beginning from basic services like balance enquiry, the trend is increasing to provide financial transactions on mobile. This trend establishes the need of strengthening user authentication and requirement of network authentication as well. In this paper, we have proposed a mutual authentication approach using asymmetric cryptography. In the proposed technique, user and network are authenticated with minimal computation and signaling overhead.


Artificial Intelligence – I: A Preliminary Framework For Human-Agent Communication In Electronic Negotiations, Moez Ur Rehman, Nosheen Riaz Jul 2011

Artificial Intelligence – I: A Preliminary Framework For Human-Agent Communication In Electronic Negotiations, Moez Ur Rehman, Nosheen Riaz

International Conference on Information and Communication Technologies

Electronic negotiations are business negotiations conducted via electronic means using information and communications technologies (ICT). Two dominant types of electronic negotiation systems are automated negotiation systems for software agents and negotiation support systems (NSSs) for humans. However, the integration of two types for human-agent negotiations is an important task. In this paper, an extended communication model for human-agent business negotiations is presented. For this purpose, the underlying communication models of automated negotiations and NSSs are analyzed. The extended communication model is based on a common negotiation ontology which captures the negotiation agenda and paves the way for such hybrid communication, …


Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar Aug 2009

Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar

International Conference on Information and Communication Technologies

Putting constraints on performance of a system in the temporal domain, some times turns right into wrong and update into outdate. These are the scenarios where apposite value of time inveterate in the reality. But such timing precision not only requires tightly scheduled performance constraints but also requires optimal design and operation of all system components. Any malfunctioning at any relevant aspect may causes a serious disaster and even loss of human lives. Managing and interacting with such real-time system becomes much intricate when the resources are limited as in wireless sensor nodes. A wireless sensor node is typically comprises …


Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali Aug 2009

Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali

International Conference on Information and Communication Technologies

Frequency is amongst the most exclusive and most costly resources in wireless communication networks, especially, while considering the demands of broadband wireless access (BWA). In BWA, the management of frequency distribution and its effective utilization is of utmost importance. This research explores possible ways to ensure the most effective allocation of bandwidth resources and their best possible utilization on need basis. The model for static frequency allocation has been optimized and the dynamic frequency management has been calculated while dividing the users in different user classes on the basis of their needs and requirements. The effect of ping-pong handovers has …


Networks - Ii: Formal Modeling Of Trust In Semantic Grid Registry, Saba Mahmood, Saman Iftikhar, Hafiz Farooq Ahmad, Farah Mahmood Aug 2009

Networks - Ii: Formal Modeling Of Trust In Semantic Grid Registry, Saba Mahmood, Saman Iftikhar, Hafiz Farooq Ahmad, Farah Mahmood

International Conference on Information and Communication Technologies

In this paper we have analyzed and developed a formal specification of a trust model in semantic grid registry. This paper formalizes the basic requirements of a trust model in case of semantic grid registry. We have described the flow of operations of our system through links and processes in the system architecture. The system is formally modeled in pi-calculus. Finally we transformed the specification to pi- ADL and generated code using Archware tool. We have already developed a semantic grid registry.


Application Of Ict - I: Power Optimization Of Relay Channels, F Ahmed, Z Howard Aug 2009

Application Of Ict - I: Power Optimization Of Relay Channels, F Ahmed, Z Howard

International Conference on Information and Communication Technologies

Relaying in wireless communication can improve power and quality of service. Multiple nodes share channel resources to achieve optimized power. We consider a model with fixed source, destination and relay nodes. Our model finds the optimal values for power transmission for direct and relayed transmitting nodes. In our problem we compare amplify and forward and decode and forward transmission protocols. Unlike other researchers who use constant achievable rates as objective function and power as constraint, we use the strategy of minimizing relay and source power with achievable and target rates as constraints. We simulate various scenarios and our results indicate …


Application Of Ict - I: A Framework For Finding Minimal Test Vectors For Stuck-At-Faults, Azam Beg, S.K. Hasnain Aug 2009

Application Of Ict - I: A Framework For Finding Minimal Test Vectors For Stuck-At-Faults, Azam Beg, S.K. Hasnain

International Conference on Information and Communication Technologies

This paper presents a framework that utilizes Boolean difference theory to find test vectors for stuck-at-fault detection. The framework reads in structural-style Verilog models, and automatically injects single stuck-at-faults (either stuck-at-zero or stuck-at-one) into the models. The simulations are then performed to find minimal sets of test vectors. Using this setup, we conducted experiments on more than 4000 different circuits. The results show that an appreciable savings in test time and effort can be achieved using the method. The same setup can also be used for didactic purposes, specifically for digital design and test courses.


Application Of Ict - I: Using Point-To-Point 1550nm Laser For Outdoor Mobility, Roshan A. Shaikh, Abdul Basit Aug 2009

Application Of Ict - I: Using Point-To-Point 1550nm Laser For Outdoor Mobility, Roshan A. Shaikh, Abdul Basit

International Conference on Information and Communication Technologies

Significant implementation challenges exist in wireless backbone connectivity. Typical optical wireless communication topologies are evaluated. A fresh approach using 1550nm Wavelength laser to design protocol and topology for point-to-point outdoor connectivity is carried out. Matlab simulation results support the 1550nm laser as a good choice for outdoor connectivity for optical wireless communication. New design and topology for an optical wireless communication system is suggested with special consideration of security and recommendation for the optimal use of such a technology is suggested.


Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan Aug 2009

Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan

International Conference on Information and Communication Technologies

The rate of increase of silicon capacity in integrated circuits (IC) will enable system integration of several billion transistors to reside on a single chip in the near future. Future system-on-chip (SoC) systems must therefore integrate up to several hundreds of cores within a single chip, and SoC designs will employ on-chip communication networks (NoCs) as a result. This paper discusses the problems with many current SoC systems, surveys the challenges and trends facing future SoC designs and proposes a mechanism for enhancing NoC strategies of the future by enhancing memory management and utilization techniques within an NoC.


Networks - I: An Instantiation Of Way Point Routing For Mobile Ad Hoc Networks, Waseem M. Arain, Sayeed Ghani Aug 2009

Networks - I: An Instantiation Of Way Point Routing For Mobile Ad Hoc Networks, Waseem M. Arain, Sayeed Ghani

International Conference on Information and Communication Technologies

Mobile ad hoc networks are increasingly finding their existence in the marketplace heading to a new paradigm of pervasive computing. However there are many areas open to research in the field. Due to node mobility resulting in an ever-changing network topology, conventional routing methods cannot be applied in MANETS. Therefore, this is one of the core areas of research. Researchers are challenged to design protocols that can potentially scale to anything from thousand to tens of thousands of nodes and to reduce the route discovery latency. In this paper a different instantiation of way point routing (WPR) model is proposed, …


Networks - I: A Comparative Analysis Of Dccp Variants (Ccid2, Ccid3), Tcp And Udp For Mpeg4 Video Applications, Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood Aug 2009

Networks - I: A Comparative Analysis Of Dccp Variants (Ccid2, Ccid3), Tcp And Udp For Mpeg4 Video Applications, Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood

International Conference on Information and Communication Technologies

New emerging technologies like Multimedia applications require timely delivery of information as compared to reliability. The most widely used protocols over transport layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both of these have some drawbacks while using in real time applications. TCP increases delay in transfer of data but achieving reliable transfer of data while UDP does not provide any acknowledgment, hence it overcomes the problem of delay but lacking congestion control mechanism. To provide congestion control over transport layer using UDP, Datagram Congestion Control Protocol (DCCP) has been designed to provide timely delivery of data …


Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain Aug 2009

Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain

International Conference on Information and Communication Technologies

An artificial neural network has got greater importance in the field of data mining. Although it may have complex structure, long training time, and uneasily understandable representation of results, neural network has high accuracy and is preferable in data mining. This research paper is aimed to improve efficiency and to provide accurate results on the basis of same behaviour data. To achieve these objectives, an algorithm is proposed that uses two data mining techniques, that is, attribute selection method and cluster analysis. The algorithm works by applying attribute selection method to eliminate irrelevant attributes, so that input dimensionality is reduced …


Artificial Intelligence – I: Subjective Decision Making Using Type-2 Fuzzy Logic Advisor, Owais Malik Aug 2009

Artificial Intelligence – I: Subjective Decision Making Using Type-2 Fuzzy Logic Advisor, Owais Malik

International Conference on Information and Communication Technologies

In this paper, we present and compare two-stage type-2 fuzzy logic advisor (FLA) for subjective decision making in the domain of students' performance evaluation. We test our proposed model for evaluating students' performance in our computer science and engineering department at HBCC/KFUPM in two domains namely cooperating training and capstone/senior project assessment where we find these FLAs very useful and promising. In our proposed model, the assessment criteria for different components of cooperative training and senior project are transformed into linguistic labels and evaluation information is extracted into the form of IF-THEN rules from the experts. These rules are modeled …


Quantified Model Of Cobit For Corporate It Governance, M. Sibghatullah Siddiqui, Dr. Syed Jamal Hussain Aug 2005

Quantified Model Of Cobit For Corporate It Governance, M. Sibghatullah Siddiqui, Dr. Syed Jamal Hussain

International Conference on Information and Communication Technologies

Now organizations are more concerned about the appropriate IT governance. The growing dependency on IT due to the increasing volume of business process automation further challenges the role of Information System Auditor. IT Governance Institute has developed COBIT1 as a model for this purpose [1][2]. The model proposed in this research quantifies the COBIT by developing matrices for all four domains of COBIT; hence it provides a quantitative approach for better implementation of corporate IT governance through effective audit and control.


Irrigation Network Regulation Through Cad System, Dr. Mumtaz Ahmed Sohag, Ali Asghar Mahessar Aug 2005

Irrigation Network Regulation Through Cad System, Dr. Mumtaz Ahmed Sohag, Ali Asghar Mahessar

International Conference on Information and Communication Technologies

The irrigation system of Pakistan is the largest integrated network in the world. There are 3 major storage reservoirs, 19 barrages, 12 inter-river link canals, 45 independent irrigation canal commands and over 1,22,268 watercourses. The network of irrigation of the province of Sindh consists of 3 barrages and 14 canal commands. The irrigation water is being used for agricultural, industrial and domestic purposes. Owing to mismanagement and inequitable distribution of water, it is necessary to have a fool-proof system where water is supplied to the end-users judiciously. Therefore water managers and farmers cannot know, how much quantum of water has …


Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon Aug 2005

Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon

International Conference on Information and Communication Technologies

The fast spread of small wireless computers has enabled the design and deployment of wireless Ad Hoc networks. Typical applications proposed for such networks include both Real Time and Non-Real Time applications. We propose an architecture that provides a complete framework for Real Time applications and Best Effort traffic. The proposed architecture comprises of an Ad Hoc Routing Protocol for route setup and route repair, a Bandwidth Allocation and Reservation Scheme for Real Time traffic, and a MAC layer protocol that provides traffic differentiation. The Admission Control module is used to admit or reject a new Real Time flow request …


Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad Aug 2005

Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad

International Conference on Information and Communication Technologies

Secured flow of information through the network and play important role in the management information systems. In this paper I describe Secured Network Model For Corporate & Business Organization In Based On Network Level IP Security (IPSec) Encryption & Its Physical Layout Using Multilayered Approach. I have four important considerations for adoption of secured network model as secured network model for management information system.