Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology

www.szabist.edu.pk
Karachi, Pakistan

Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology , is a private research university located with multiple campuses in the residential and commercial areas of Pakistan as well as UAE. Its main campus, however, is located in the residential town of Karachi, Sindh, Pakistan.Founded in 1995 with an efforts led by its founder Benazir Bhutto, the university is honored and named in the remembrance of Zulfikar Ali Bhutto. Financial endowment and research funding are coordinated by the leadership of the PPP. The university offers undergraduate, post-graduate and doctoral studies in various academic programmes. It is the member of the Association of Commonwealth Universities of the United Kingdom as well as the Association to Advance Collegiate Schools of Business and among other international education associations. It is regarded as one of the notable private research institution of higher learning in the country and ranked among top-ten institution by the HEC, as of 2013.In addition, its business management programme is notably listed in top ranking by the Business Week and ranked among noticeable science institution by the CNN & Time and Asiaweek. The university is identified as a major and one of the largest private universities in the country as an area-wise by the HEC. Wikipedia.

SEARCH FILTERS
Time filter
Source Type

Ali Z.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology | Usman M.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology
FTC 2016 - Proceedings of Future Technologies Conference | Year: 2016

In the last decade, the gaming industry has grown greatly in scale, and many companies around the globe are now developing games. The development of these games uses some common functionality, including the implementation of graphics rendering, artificial intelligence, sound, video, physics and network capability. Implementation of these functionalities requires high levels of skill, resources and time. To overcome these issues, such core functions are built and bundled together in the form of a game engine. A game engine provides the basic framework for developing games. All engines include the aforementioned common functions, but each engine has pros and cons. So, to choose a suitable engine, a thorough study of the attributes of the various engines is required. Choosing the appropriate engine for a specific gaming application is not straightforward. The games being developed today have big budgets, and the selection of the wrong gaming engine can lead to big financial loses, as the product developed may not be up to standards due to lack of features in the selected engine. It is therefore necessary to have a framework to help pick the right engine. In recent years, a number of game engine selection methodology paradigms have been proposed, but these have certain limitations and weaknesses. The purpose of this paper is to propose a more robust framework to help game analysts and developers identify the best available game engine for serious games and gamified applications. © 2016 IEEE.


Rehman M.U.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology | Rashid M.,COMSATS Institute of Information Technology
Renewable Energy | Year: 2017

This study aims to investigate the role of energy consumption on environmental degradation under multivariate framework for emerging and frontier Asian markets. We have included CO2 emission, GDP and population growth with energy consumption as additional determinants of environmental degradation. The application of panel unit root test suggests non-stationary properties of included variables however we report significant co-integration among these variables. Furthermore, presence of Environmental Kuznets Curve (EKC) was detected using the application of fully modified OLS and dynamic OLS. Level of energy consumption tends to increase environmental degradation thereby confirming the Pollution Haven Hypothesis (PHH). Bidirectional causality was also observed between CO2 emission and economic growth. Results of this study are variable to different countries and present sound economic policy implications for the improvement of environmental standards. © 2017 Elsevier Ltd


Ahmed Khan M.N.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology | Ullah S.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology
Computer Fraud and Security | Year: 2017

Cloud computing has emerged in the past decade to provide wide-ranging computational facilities at cheaper cost. Cloud computing facilitates the sharing of processing units, storage devices and applications. The National Institute of Standards and Technology describes cloud computing as a model for facilitating on-demand ubiquitous network access to a combined pool of computing resources – eg, networks, storage, servers, services and applications. These resources can easily be provisioned and released without the service provider's interaction. Cloud computing is now in widespread use. But it does pose a number of security challenges. Muhammad Naeem Ahmed Khan and ShahWali Ullah of the Shaheed Zulfikar Ali Bhutto Institute of Science and Technology propose an analysis model based on aggregating available logs from clients and servers that could help identify and detail suspicious activity on cloud-based systems. © 2017 Elsevier Ltd


Massan S.-U.-R.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology | Wagan A.I.,University of Karachi | Shaikh M.M.,Mehran University of Engineering and Technology | Abro R.,Institute of Industrial Electronics Engineering
Applied Soft Computing Journal | Year: 2015

Traditionally energy has been a burning issue of mankind, however, this trend has changed with the advent of clean technologies such as wind power. It is common knowledge that wind turbines need to be installed in an open, unobstructed area to obtain the maximal power output. This document attempts to solve the problem of optimization of the layout of large wind farms by the use of nature inspired algorithms. Particular reference is made to the use of the .re.y algorithm. A good comparison is made with the past approaches of the use of spread sheets and GA's for optimization. © 2014 Elsevier B.V. All rights reserved.


Habib M.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology | Ahmad M.,National University of Computer and Emerging Sciences
2nd International Conference on Communication Software and Networks, ICCSN 2010 | Year: 2010

The future for WiMAX-based mobile wireless access is so bright. With the increasing popularity of WiMAX, it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not secured as like others networking technologies. On the other side the trend is towards converged network in which the same networking infrastructure is used for both data and voice transmission. A lot of security concerns are needed to secure a converged network. This paper aims to review the study of WiMAX and converged network and security considerations for both the technologies. WiMAX security in converged network is studied. The security threats that can occur in converged network to WiMAX and countermeasures that can be taken against these threats are reviewed. © 2010 IEEE.


Safeer M.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology | Zafar S.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology
Proceedings of the 14th IEEE International Multitopic Conference 2011, INMIC 2011 | Year: 2011

With the start of current century, Business Intelligence (BI) has become an important and emerging tool, technique and technology in business world. Organizations of all types across the globe are adopting BI for promoting business and getting advantage over competitors. Business Intelligence is the processes, technologies, and tools that help organizations to change the data into information, information into knowledge and knowledge into plans that guide for better and effective decision making. A Business Intelligence Competency Center (BICC) is an eternal legal unit with an organization, which encompasses dedicated members from both IT and business divisions. The major reasons behind establishment of BICC are to ensure the adoption of BI at different levels of the organization by all stakeholders and to provide a platform to maintain and standardized the overall BI application. Responsibilities of BICC include defining and managing the execution of the organization's BI strategy. Moreover success of BI application within an organization can also be ensured through BICC. In this paper, we have reviewed and analyzed BI implementations having BICC versus BI executions having no concept of BICC. This study can also be used for future works like building Business Intelligence Competency Centers and/or measuring impact of Business Intelligence Competency Centers in success/failure of BI applications. © 2011 IEEE.


Shehzad R.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology | Khan M.N.A.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology
International Journal of Software Engineering and its Applications | Year: 2013

Knowledge Management (KM), either in a tacit or explicit form, plays an important role in decision making. Business Intelligence (BI) has acquired significant importance in the business world due to the recent technological advancements and availability of state-of-the-art software tools. Presently, most of the organizations across the globe are adopting BI solutions to promote business, retain customers, earn maximum profits, reduce recurring expenditures, etc. KM, on the other hand, has not gained significant acknowledgement from an implementation perspective. Moreover, the effect of BI on KM and vice versa is rarely observed. In this paper, we propose a model where KM and BI can benefit from each other. Since both of the said fields have a wide range of features, the proposed model is based on specific features. For that purpose, we have identified a number of Critical Success Factors (CSFs) related to both BI and KM technologies reported in contemporary research. Afterwards, we have drawn a comparison pertinent to the effectiveness of these CSFs with the similar research studies. The comparison shows that our model that combines both BI and KM technologies is more useful as compared to their individual utilization.


Hussain M.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology
2010 International Conference on Information and Emerging Technologies, ICIET 2010 | Year: 2010

Steganography is the science of hiding a message signal to host signal, without any distortion in the hosted signal. Using steganography, information can be hidden in hosted carrier such as images, videos, sounds files, text files, and data transmission. In image steganography, to improve the capacity of hidden data into hosted image without causing any statistically significant modification has a major concern. Many novel data hiding method based on Least Significant Bits (LSB) and Pixel Value Differencing (PVD) to increase the hiding capacity have been proposed with imperceptible quality. In this paper we have improved the Modified Kekre's Algorithm (MKA) which is based on LSB method. The improved scheme increases the embedding capacity while retaining the good quality of stego-image (carrying hidden data) as good as MKA. Experimental results show that the improved scheme outperform the original comparative scheme especially in capacity of hidden data-bits. ©2010 IEEE.


Umar M.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology | Khan N.A.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology
ICSESS 2011 - Proceedings: 2011 IEEE 2nd International Conference on Software Engineering and Service Science | Year: 2011

Non-Functional Requirements (NFRs) along with Functional Requirements (FRs) are the most significant and critical requirements for software development. NFRs are often ignored and inadequately specified during software development. If NFRs are not properly considered at early stages of software development, it may become very complex and expensive to address them later on. This paper analyzes various techniques, frameworks and recommendations from various literatures and identifies their limitations as well. Further, the paper discusses different techniques for individual NFRs specified in FURPS quality attribute model. The objective of this study is to provide an analytical comparison of NFRs techniques and perform critical analysis on NFRs. © 2011 IEEE.


Iqbal S.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology | Naeem Ahmed Khan M.,Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology
International Journal of Software Engineering and its Applications | Year: 2012

Software project management has emerged as a new discipline with wide-ranging ideas and across-the-board insights for effectively managing key areas of software projects. The remarkable work of the software project managers, professionals and researchers across the globe have resulted in substantial improvements in this field. Likewise, software project failure rate has decreased considerably due to the use of effective software project management tools and techniques by the software houses. Now more efficient, robust and quantitative measures are being practiced in the areas of software requirement gathering, analysis, design, architecture, development, quality assurance, integration, deployment and support. A number of metrics are used by the requirement engineers, system analysts, software engineers, team leads, software project managers and other professionals to successfully manage, execute and complete the software projects. As the software industry moves towards a more mature state, the need for employing more effective tools, techniques and benchmarks for managing software projects has become indispensable to minimize the negative risk factors and improved adherence to quality assurance. Particularly, requirement metrics are useful in identifying risks of a project by locating errors in the requirements document. These metrics validate the gathered requirements against the actual requirements by evaluating whether the requirements are complete or not. A range of metrics are used for measuring the requirements e.g., volatility metrics check changes in the requirements, traceability evaluates links among the requirements within a document and requirements completeness metrics verifies whether the specified requirements are complete or not. Multiple metrics are recommended to be used to assess the health of a software project to ensure overall quality as a single metric cannot suffice. In this paper, we explore how different metrics relating to different areas of software project, especially in requirement engineering, can be useful to manage the software projects for knowledgeably. The focus of this research study is to evaluate and highlight the importance of various performance metrics and propose additional metrics for requirement gathering and management.

Loading Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology collaborators
Loading Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology collaborators