Entity

Time filter

Source Type

Nawabshah, Pakistan

The Quaid-e-awam University of Engineering, science and Technology , is a public research university located in the urban neighborhood of Nawabshah, Sindh, Pakistan. The university is honored after the former Prime Minister of Pakistan, Zulfikar Ali Bhutto.It ranks 11th out of 13 engineering institutes in Pakistan as per latest HEC rankings Wikipedia.


Laghari J.A.,University of Malaya | Laghari J.A.,Quaid-e-Awam University of Engineering, Science & Technology | Mokhlis H.,University of Malaya | Karimi M.,University of Malaya | And 2 more authors.
Frontiers of Information Technology and Electronic Engineering | Year: 2015

An islanding operation of a distribution network is a topic of interest due to the significant penetration of distributed generation (DG) in a power system network. However, controlling the frequency of an islanded distribution system remains an unresolved issue, especially when the load exceeds the generation. This paper presents a new technique for a successful islanding operation of a distribution network connected with multiple mini hydro based DGs. The proposed technique is based on three main parts. The first part uses an islanding detection technique to detect the islanding event correctly. The second part consists of a power imbalance estimation module (PIEM), which determines the power imbalance between the generation and load demand. The third part consists of a load shedding controller, which receives the power imbalance value and performs load shedding according to load priority. The proposed technique is validated on an 11 kV existing Malaysia distribution network. The simulation results show that the proposed technique is effective in performing a successful islanding operation by shedding a significant number of loads. © 2015, Journal of Zhejiang University Science Editorial Office and Springer-Verlag Berlin Heidelberg.


Hussain Z.,Quaid-e-Awam University of Engineering, Science & Technology | Hussain Z.,Usability | Lechner M.,Graz University of Technology | Milchrahm H.,Graz University of Technology | And 7 more authors.
ACHI 2012 - 5th International Conference on Advances in Computer-Human Interactions | Year: 2012

This paper describes the experiences made and lessons learned in an Extreme Programming (XP) software development project. We investigate the potential of XP to produce user experience-optimized products by including HCI experts in the team. We relate the software development method to user-centered design instruments and propose solutions to different user experience integration problems. Additionally, the practicability of different HCI instruments regarding solving those problems is examined. The analyzed instruments and methods are: user studies, personas, usability tests, user experience expert evaluations, and extended unit tests. The conclusion provides tips and tricks for practitioners. Copyright © IARIA, 2012.


Ahmed A.,University of Technology Malaysia | Bakar K.A.,University of Technology Malaysia | Channa M.I.,Quaid-e-Awam University of Engineering, Science & Technology | Khan A.W.,King Abdulaziz University | Haseeb K.,University of Technology Malaysia
Peer-to-Peer Networking and Applications | Year: 2015

Wireless Sensor Network (WSN) is considered as a useful alternative to provide prompt communication services in post disaster relief operations where field information is exchanged with first responders and nearby emergency centers. However, such application environments expose the nodes to physical capture, damage and misbehaviour attacks. In addition, the compromised nodes potentially increase network congestion by advertizing false information. The loss of critical information due to significant congestion and node misbehavior attacks adversely affect emergency operations. The traditional cryptographic and authentication based secure schemes can’t be adopted due to their associated cost and incapability to counter nodes misbehaviour attacks. Furthermore, existing trust based routing protocols incur high control overheads in trust estimation and dissemination; lead to high number of dead nodes due to adopted route discovery mechanism and suffer from high route instability. In this paper, we present an Energy-aware Secure Routing with Trust (ESRT) scheme that maintains a trusted environment and isolate misbehaving nodes. ESRT incorporates trust, energy, and hop counts for making routing decisions. This multi-facet routing strategy helps to balance out energy consumption among trusted nodes while routing data using shorter paths. Simulation results demonstrate improved performance of the ESRT scheme when compared to existing work. © 2015 Springer Science+Business Media New York


Ahmed A.,University of Technology Malaysia | Abu Bakar K.,University of Technology Malaysia | Channa M.I.,Quaid-e-Awam University of Engineering, Science & Technology | Haseeb K.,University of Technology Malaysia | Khan A.W.,University of Technology Malaysia
Telecommunication Systems | Year: 2015

The reliable data delivery is a challenging task in Wireless Sensor Networks (WSNs) due to dynamic and unpredictable changing behaviors of nodes. The traditional cryptographic and authentication based schemes can’t be adopted due to their associated cost and incapability to counter nodes misbehavior attacks. Recently, trust based solutions have proved to be more effective to address nodes’ misbehavior attacks. Apart from isolating misbehaving nodes, the existing trust based schemes lacks the capability to minimize link failure notifications due to transient transmission disruption which consequently give rise to frequent route breakages thereby undermining throughput and route stability. Moreover, the existing solutions give rise to high energy consumption and control overhead in pursuit of trust estimation and network-wide dissemination which not only adds to network congestion but also undermines network lifetime. In this paper, we present a Trust and Energy aware Routing Protocol (TERP) that makes use of a distributed trust model for the detection and isolation of misbehaving nodes. TERP incorporates a composite routing function that encompasses trust, residual-energy, and hop count of neighbor nodes in making routing decisions. This multi-facet routing strategy helps to balance out energy consumption among trusted nodes while routing data using shorter paths. Moreover, TERP intelligently evaluates the actual link breakage thereby avoiding unnecessary route discoveries. Simulation results demonstrate improved throughput, network lifetime and route stability of TERP when compared to existing work. © 2015 Springer Science+Business Media New York


Shaikh A.,University Oberta Of Catalonia | Ali S.,Cursor Software Solutions | Ahmed J.,Cursor Software Solutions | Shaikh M.,Quaid-e-Awam University of Engineering, Science & Technology
2010 International Conference on Information and Emerging Technologies, ICIET 2010 | Year: 2010

Model-driven Architecture (MDA) is a development methodology that helps designers to define and communicate a solution. It is becoming popular day by day due to its transformation techniques from one model to another. In an industrial environment such as software and Business, MDA can play a major role in the development of software/embedded systems. In this peace of research we are considering that how software development in the industrial environment is affected by the models and transformations. As a result of this, a literature study is being done to highlight some real time models and transformations in the industrial environment. Couple of transformations have been investigated and explained with its benefits and use. ©2010 IEEE.

Discover hidden collaborations