Karachi, Pakistan

Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology , is a private research university located with multiple campuses in the residential and commercial areas of Pakistan as well as UAE. Its main campus, however, is located in the residential town of Karachi, Sindh, Pakistan.Founded in 1995 with an efforts led by its founder Benazir Bhutto, the university is honored and named in the remembrance of Zulfikar Ali Bhutto. Financial endowment and research funding are coordinated by the leadership of the PPP. The university offers undergraduate, post-graduate and doctoral studies in various academic programmes. It is the member of the Association of Commonwealth Universities of the United Kingdom as well as the Association to Advance Collegiate Schools of Business and among other international education associations. It is regarded as one of the notable private research institution of higher learning in the country and ranked among top-ten institution by the HEC, as of 2013.In addition, its business management programme is notably listed in top ranking by the Business Week and ranked among noticeable science institution by the CNN & Time and Asiaweek. The university is identified as a major and one of the largest private universities in the country as an area-wise by the HEC. Wikipedia.


Time filter

Source Type

Bano S.,Pharmaceutical Research Center | Qader S.A.U.,University of Karachi | Aman A.,University of Karachi | Syed M.N.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology | Durrani K.,Pharmaceutical Research Center
Carbohydrate Polymers | Year: 2013

Sugarcane bagasse is a cheap carbon source for endo-1,4-β-d-glucanase production as it is easily available as by-product from sugar industries. Fermentation conditions for endo-1,4-β-d-glucanase production by Bacillus subtilis KIBGE HAS were optimized by using un-treated sugarcane bagasse for induction of endo-1,4-β-d-glucanase and it was found that 2.0 g% bagasse in fermentation medium induced maximum endo-1,4-β-d-glucanase production. It was also found that when sugarcane bagasse was supplemented with different carbon sources, the results showed that lactose, xylose, maltose and sucrose favored endo-1,4-β-d-glucanase production, whereas cellobiose and fructose inhibit enzyme production. Maximum endo-1,4-β-d-glucanase production was obtained at 40 °C keeping the initial pH of the medium at 7.0 before sterilization. Maximum endo-1,4-β-d-glucanase production was obtained after 48 h incubation. Among different nitrogen sources, ammonium nitrate enhanced endo-1,4-β-d-glucanase production. The optimal temperature and pH for enzyme activity were 60 °C and 7.0, respectively. © 2012 Elsevier Ltd.


Massan S.-U.-R.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology | Wagan A.I.,University of Karachi | Shaikh M.M.,Mehran University of Engineering and Technology | Abro R.,Institute of Industrial Electronics Engineering
Applied Soft Computing Journal | Year: 2015

Traditionally energy has been a burning issue of mankind, however, this trend has changed with the advent of clean technologies such as wind power. It is common knowledge that wind turbines need to be installed in an open, unobstructed area to obtain the maximal power output. This document attempts to solve the problem of optimization of the layout of large wind farms by the use of nature inspired algorithms. Particular reference is made to the use of the .re.y algorithm. A good comparison is made with the past approaches of the use of spread sheets and GA's for optimization. © 2014 Elsevier B.V. All rights reserved.


Habib M.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology | Ahmad M.,National University of Computer and Emerging Sciences
2nd International Conference on Communication Software and Networks, ICCSN 2010 | Year: 2010

The future for WiMAX-based mobile wireless access is so bright. With the increasing popularity of WiMAX, it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not secured as like others networking technologies. On the other side the trend is towards converged network in which the same networking infrastructure is used for both data and voice transmission. A lot of security concerns are needed to secure a converged network. This paper aims to review the study of WiMAX and converged network and security considerations for both the technologies. WiMAX security in converged network is studied. The security threats that can occur in converged network to WiMAX and countermeasures that can be taken against these threats are reviewed. © 2010 IEEE.


Safeer M.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology | Zafar S.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology
Proceedings of the 14th IEEE International Multitopic Conference 2011, INMIC 2011 | Year: 2011

With the start of current century, Business Intelligence (BI) has become an important and emerging tool, technique and technology in business world. Organizations of all types across the globe are adopting BI for promoting business and getting advantage over competitors. Business Intelligence is the processes, technologies, and tools that help organizations to change the data into information, information into knowledge and knowledge into plans that guide for better and effective decision making. A Business Intelligence Competency Center (BICC) is an eternal legal unit with an organization, which encompasses dedicated members from both IT and business divisions. The major reasons behind establishment of BICC are to ensure the adoption of BI at different levels of the organization by all stakeholders and to provide a platform to maintain and standardized the overall BI application. Responsibilities of BICC include defining and managing the execution of the organization's BI strategy. Moreover success of BI application within an organization can also be ensured through BICC. In this paper, we have reviewed and analyzed BI implementations having BICC versus BI executions having no concept of BICC. This study can also be used for future works like building Business Intelligence Competency Centers and/or measuring impact of Business Intelligence Competency Centers in success/failure of BI applications. © 2011 IEEE.


Arif M.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2011 | Year: 2011

An organization's success or failure in achieving or maintaining its competitive edge mostly depends on its Human Resource (HR). In a striking semblance! organizations both public and corporate around the world are awakening to this reality that security of their information that consists of data basis developed over years of learning as well as research and development, which are critical to their uniqueness may be lost in fraction of time due no one else's doing but their own very HR. Recently more trust was being placed in technology rather than human elements to ensure Information Security (IS), however, happenings over the time have turned the balance as more than 75 % cases reported around the world Pahnila et al. (2007) have been attributed to human factors like, Security Culture, Awareness, Training, Threat perception and Reinforcement. An empirical study employing both quantitative and qualitative research has been performed to validate the proposed Conceptual Framework based on above human factors deemed important for achieving willingness of the IT users to comply with organizations' Information Security Policies (ISPs). Findings confirm viability of conceptual framework as well as statistical model used. Organization's Security Culture emerges as leading human factor contributing to the overall IT security of an organization followed by Awareness and Training. Findings can be generalized for other geographical regions especially which have resemblance in terms of development, culture and literacy as of Karachi cosmopolitan city of Pakistan.


Shehzad R.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology | Khan M.N.A.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology
International Journal of Software Engineering and its Applications | Year: 2013

Knowledge Management (KM), either in a tacit or explicit form, plays an important role in decision making. Business Intelligence (BI) has acquired significant importance in the business world due to the recent technological advancements and availability of state-of-the-art software tools. Presently, most of the organizations across the globe are adopting BI solutions to promote business, retain customers, earn maximum profits, reduce recurring expenditures, etc. KM, on the other hand, has not gained significant acknowledgement from an implementation perspective. Moreover, the effect of BI on KM and vice versa is rarely observed. In this paper, we propose a model where KM and BI can benefit from each other. Since both of the said fields have a wide range of features, the proposed model is based on specific features. For that purpose, we have identified a number of Critical Success Factors (CSFs) related to both BI and KM technologies reported in contemporary research. Afterwards, we have drawn a comparison pertinent to the effectiveness of these CSFs with the similar research studies. The comparison shows that our model that combines both BI and KM technologies is more useful as compared to their individual utilization.


Hussain M.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology
2010 International Conference on Information and Emerging Technologies, ICIET 2010 | Year: 2010

Steganography is the science of hiding a message signal to host signal, without any distortion in the hosted signal. Using steganography, information can be hidden in hosted carrier such as images, videos, sounds files, text files, and data transmission. In image steganography, to improve the capacity of hidden data into hosted image without causing any statistically significant modification has a major concern. Many novel data hiding method based on Least Significant Bits (LSB) and Pixel Value Differencing (PVD) to increase the hiding capacity have been proposed with imperceptible quality. In this paper we have improved the Modified Kekre's Algorithm (MKA) which is based on LSB method. The improved scheme increases the embedding capacity while retaining the good quality of stego-image (carrying hidden data) as good as MKA. Experimental results show that the improved scheme outperform the original comparative scheme especially in capacity of hidden data-bits. ©2010 IEEE.


Iqbal S.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology | Khalid M.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology | Khan M.N.A.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology
International Journal of Software Engineering and its Applications | Year: 2013

Software metrics proposed in various theories and literature have considerable variation among them. The sole purpose of all these theories is to improve the quality of software projects by producing and using quantitative measures. All these theories improve the quality of a software project and mend all the issues relating to software refactoring. As the software industry moves to a more mature state, the need for employing more effective tools, techniques and benchmarks for managing software projects has become significantly critical to minimize the negative risk factors as well as ensuring augmented adherence to quality assurance. In this study, we intend to explore how distinctive metrics with respect to different knowledge areas, especially in design engineering, could be useful to manage knowledgeably the software projects. The focus of this research study is to evaluate and highlight the importance of various performance metrics and measures to track the software project performance followed by some already proposed metrics for software design, development and management © 2013 SERSC.


Umar M.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology | Khan N.A.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology
ICSESS 2011 - Proceedings: 2011 IEEE 2nd International Conference on Software Engineering and Service Science | Year: 2011

Non-Functional Requirements (NFRs) along with Functional Requirements (FRs) are the most significant and critical requirements for software development. NFRs are often ignored and inadequately specified during software development. If NFRs are not properly considered at early stages of software development, it may become very complex and expensive to address them later on. This paper analyzes various techniques, frameworks and recommendations from various literatures and identifies their limitations as well. Further, the paper discusses different techniques for individual NFRs specified in FURPS quality attribute model. The objective of this study is to provide an analytical comparison of NFRs techniques and perform critical analysis on NFRs. © 2011 IEEE.


Iqbal S.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology | Naeem Ahmed Khan M.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology
International Journal of Software Engineering and its Applications | Year: 2012

Software project management has emerged as a new discipline with wide-ranging ideas and across-the-board insights for effectively managing key areas of software projects. The remarkable work of the software project managers, professionals and researchers across the globe have resulted in substantial improvements in this field. Likewise, software project failure rate has decreased considerably due to the use of effective software project management tools and techniques by the software houses. Now more efficient, robust and quantitative measures are being practiced in the areas of software requirement gathering, analysis, design, architecture, development, quality assurance, integration, deployment and support. A number of metrics are used by the requirement engineers, system analysts, software engineers, team leads, software project managers and other professionals to successfully manage, execute and complete the software projects. As the software industry moves towards a more mature state, the need for employing more effective tools, techniques and benchmarks for managing software projects has become indispensable to minimize the negative risk factors and improved adherence to quality assurance. Particularly, requirement metrics are useful in identifying risks of a project by locating errors in the requirements document. These metrics validate the gathered requirements against the actual requirements by evaluating whether the requirements are complete or not. A range of metrics are used for measuring the requirements e.g., volatility metrics check changes in the requirements, traceability evaluates links among the requirements within a document and requirements completeness metrics verifies whether the specified requirements are complete or not. Multiple metrics are recommended to be used to assess the health of a software project to ensure overall quality as a single metric cannot suffice. In this paper, we explore how different metrics relating to different areas of software project, especially in requirement engineering, can be useful to manage the software projects for knowledgeably. The focus of this research study is to evaluate and highlight the importance of various performance metrics and propose additional metrics for requirement gathering and management.

Loading Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology collaborators
Loading Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology collaborators