Institute of Business & Technology
Sita Road, Pakistan
Time filter
Source Type

Shaikh A.,International Islamic University Malaysia | Shaikh A.,Institute of Business & Technology | Anjum N.,University of Southern Denmark | Samad F.,Institute of Business & Technology | Shah A.,International Islamic University Malaysia
Communications in Computer and Information Science | Year: 2012

Wireless Sensor and Mobile ad-hoc Networks are characterized by their highly dynamic, multi-hop, and infrastructure-less nature. In this dynamic environment, different nodes offering different services may enter and leave the network at any time. Efficient and timely service discovery is a requirement for good utilization of shared resources in this kind of network. Service discovery is not a new problem. Many academic and industrial researchers have proposed numerous solutions (protocol/middleware) of service discovery for both wired and wireless networks. The wireless sensor networks have several characteristics that set them apart from the traditional wired networks. Hence, classical service discovery protocols in sensor networks are not applicable. This paper presents a service oriented architecture for autonomous wireless sensor networks that provide various services at different levels. © 2012 Springer-Verlag.

Samad F.,RWTH Aachen | Samad F.,Institute of Business & Technology | Abu Ahmed Q.,RWTH Aachen | Shaikh A.,International Islamic University Malaysia | And 2 more authors.
Communications in Computer and Information Science | Year: 2012

In recent years, wireless ad hoc networks (WANETs) have become very popular due to their wide range of applications and their ability to be deployed under normal and harsh conditions while supporting high data rates. Although many intrusion detection and trust-based systems have been developed to protect ad hoc networks against misbehaviors such as rushing attacks, query-flood attacks, and selfishness of nodes, these defense mechanisms are still not able to detect protocol compliant attacks called Jellyfish (JF) attacks. They target closed-loop flows such as TCP that are responsive to network conditions like delay and packet losses and can easily partition the network. In this paper, we introduce a security scheme called JAM (Jellyfish Attacks Mitigator) which can be used to detect and mitigate Jellyfish attacks in ad hoc networks. © 2012 Springer-Verlag.

Ghaffar A.,International Islamic University Malaysia | Ghaffar A.,University of Umm Al - Qura | Wahiddin M.R.,International Islamic University Malaysia | Shaikh A.,Najran University | And 3 more authors.
Proceedings - 2015 4th International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2015 | Year: 2015

Customer service improvement is directly related with organizational standards and productivity. Employees' activities have certain objectives to be followed but sometimes outcomes are different than expected. Human error while performing regular job activities cause sufficient losses and difficult to address. Management faces real challenges while dealing with employee related issues and sometimes becomes unproductive. We propose Brahms Model with multi layered alert filtration and feedback cycle which would address the human error in the system and generate the filtered alerts in the form of sms or by emails. This is especially useful for Human-Computer Interfacing (HCI) Scenarios. Controlling human error and addressing real issues may protect any institution from severe damage and losses. Efficiency of a customer service department can be improved and maximized by multi-layered alert filtration system using Brahms Model. © 2015 IEEE.

Soomro S.,Indus University | Hafeez A.,Hamdard University | Shaikh A.,Najran University | Shaikh A.,Institute of Business & Technology | Musavi S.H.A.,Indus University
Communications in Computer and Information Science | Year: 2014

Requirement interdependency is being extensively studied with greater interest in software engineering research. However, existing tools and techniques have not properly characterized and visualized the requirement interdependency relationships between requirements. This research introduces ontology based representation of requirement interdependencies among requirements, and formal graphical notation for proper visualization of requirement interdependencies. There is evidence to point out that Ontology based approach is better technique for managing the requirement interdependency i.e., diagrammatic representation of requirement interdependency will improve the quality of software and will reduce the failure rates. © Springer International Publishing Switzerland 2014.

Khan A.A.,Institute of Business & Technology | Saeed S.,Institute of Business & Technology | Shaikh H.,Institute of Business & Technology
Life Science Journal | Year: 2013

Photovoltaic cell PVC is semiconductor device generally called PN type semiconductor. PVC plays a vital role in electricity generation. There are various classes of PVC mainly Organic, inorganic and hybrid. Mostly consumers complain that their PVC is not producing electricity efficiently. Another problem which is associated with PVC is its less charging time or less visibility of the sun during winters and rainy season. The aim of this study is to address the aforementioned problems associated with PVC. Our team proposes the two main solutions in this regards one is use of erbium slit over solar cell to get the strong solar beam and second one is plano-convex lens over erbium slit that concentrate the sun light that will enhance the photon emission rate. Our study proves that proposed system is more efficient than the conventional PVC.

Institute of Business & Technology | Entity website

Self-assessment is the basic part of any assessment. An institution evaluating its own activities formulates its objectives and tasks, analyses its activities applying different approaches, reveals its activity problems and foresees the ways of resolving them ...

Institute of Business & Technology | Entity website

Faculty of management and social sciences realizes its mission statement by clearly defining its goals and objectives which are in accordance with its mission statement and also to the vision of institute which are as follows: To prepare middle and top level managers capable of handling business in dynamic global environment. To produce socially responsible and creative entrepreneurs capable of promoting business and industry for the socio-economic development of Pakistan ...

Institute of Business & Technology | Entity website

The Institute of Business & Technology (IBT) was set up in 2001 in the private sector by the Global Education Consultants Society (GEC) to promote higher education vital for Pakistan`s socio-economic progress. Latter it became a degree awarding institute through the Act of Assembly, Government of Sindh in 2004 and by the approval granted by the Higher Education Commission ...

Institute of Business & Technology | Entity website

QEC Resources Self Assessment Manual The objective of the self assessment manual to follow the guidelines during the process of self-assessment of academic programs. The manual is provided by Higher Education Commission (HEC) of Pakistan and as per manual Universities requires to conduct self-assesment of academic Programs periodically in order to maintain quality standards as HEC defined criterions and standards ...

Institute of Business & Technology | Entity website

The IBT Graduate Program has been encouraging the development of future leaders and the promotion of excellence since 2001. Our programs are preparing students for future management responsibilities ...

Loading Institute of Business & Technology collaborators
Loading Institute of Business & Technology collaborators