Entity

Time filter

Source Type

Karachi, Pakistan

Abbasi E.,SZABIST | Abbasi K.,Hamdard University
ICICT 2013 - Proceedings of the 2013 5th International Conference on Information and Communication Technologies: Using Technology to Create a Better World | Year: 2013

Business Process Modeling (BPM) is a technique used to model business processes and helps in better understanding of these processes. BPM helps in improving organizational efficiency by either helping in making the business processes more efficient or even helps in automation of the business processes. There are many BPM techniques used till date but none of these techniques being used supports the decision making requirements for an organization. To address this problem the paper suggests a model that can help integrate decision making with the prevailing Business Process Models. The paper firstly reviews foundations of Business Process Modeling (BPM) and the Decision Model (DM) to establish the basis for the conceptual understanding of BPM and DM. With these theoretical bases, then a model has been proposed where the Decision Model has been integrated with the Business Process Model to meet the decision making needs for the decision makers. Finally, the implications of this model are discussed with directions for further research. © 2013 IEEE. Source


Xu D.,National Engineering School of Tarbes | Archimede B.,National Engineering School of Tarbes | Memon M.A.,SZABIST
Proceedings of 2015 International Conference on Industrial Engineering and Systems Management, IEEE IESM 2015 | Year: 2015

Due to the globalization, today's manufacturing industry has to mobilize as many as resources in order to satisfy needs of every customer. At the same time, the production resources are more often geographically distributed. In this context, the necessary shifting of intermediate products as well as the final delivery requires transportation among different manufacturing sites, warehouses, consumers, etc. As the business of enterprises grows, transportation demands also grow with that, resulting problems of increasing transportation cost, environmental pollution and coordination between production and transportation operations. In order to address these problems, a possible solution is to better define the routing for transportation requests. This paper proposes an environment friendly method based on a reduced weighted graph with transportation resources competencies to generate dynamic routing between pickup and delivery locations according to shortest distance and time in order to facilitate consolidation and consequently cost and pollution reduction. © 2015 International Institute for Innovation, Industrial Engineering and Entrepreneurship - I4e2. Source


Wahid F.,Jeju National University | Fayaz M.,University of Malakand | Shah A.S.,SZABIST
International Journal of Bio-Science and Bio-Technology | Year: 2016

Image processing is a technique developed by computer and Information technology scientist and being used in all field of research including medical sciences. The focus of this paper is the use of image processing in tumor detection from the brain Magnetic Resonance Imaging (MRI). For the brain tumor detection, Computed Tomography (CT) and Magnetic Resonance Imaging (MRI) are the prominent imaging techniques, but most of the experts prefer MRI over CT. The traditional method of tumor detection in MRI images is a manual inspection which provides variations in the results when analyzed by different experts, therefore, in view of the limitations of the manual analysis of MRI, there is a need for an automated system that can produce globally acceptable and accurate results. There is enough amount of published literature available to replace the manual inspection process of MRI images with the digital computer system using image processing techniques. In this paper, we have provided a review of digital image processing techniques in the context of brain MRI processing and critically analyzed them for the identification of the gaps and limitations of the techniques so that the gaps can be filled and limitations of various techniques can be improved for precise and better results. © 2016 SERSC. Source


Aamir M.,SZABIST | Ali Zaidi S.M.,SZABIST
2013 3rd IEEE International Conference on Computer, Control and Communication, IC4 2013 | Year: 2013

We introduce a new protocol called VQAPM to assure quality voice in VoIP perspective when communicating nodes are the part of some MANET. We use two specific parameters of voice communication over IP: one is voice codec and the other is IP packet length. A node in MANET is selected as MVCH (MANET Voice Communication Head) that applies the proposed algorithm to determine an optimum combination of bit rate and packet length and assigns it to the requesting node for a VoIP session to ensure efficient voice quality. VQAPM considers the congestion factor in multiple route MANETs and is applied on the best available path determined through a traffic allocation algorithm keeping in view the level of congestion on the route so that overall efficiency of the system is not compromised. Our simulation study reveals that VQAPM increases voice quality in a communication session when results are obtained for a few key metrics of Quality of Service. © 2013 IEEE. Source


Hussain M.,SZABIST
ICICT 2011 - Proceedings of the 4th International Conference on Information and Communication Technologies | Year: 2011

Covert channel is secret communication path, which existence is not expected in original system of design. It allows different users access to the same information, at the same time, but from different points-of-view. It is being more and more studying due to the grooming of internet. Always high-bandwidth network covert channel pose the significant risk of detection over network. Although the existing technique utilized the reserved bits of header, timestamp, initial sequence number, packet length etc for network covert channel, to some extend these have good temper resistance. But when increase their covert data capacity they becomes to fail to persist their original characteristics and vulnerable to network traffic detector. We are motivated to design to achieve a high bandwidth covert channel in network protocols. We simulated our proposed technique in ns2 simulator utilizing TCP protocol. Through experimental results, our proposed model is very high capacity covert channel with temper resistance and time efficient as compared to previous techniques. © 2011 IEEE. Source

Discover hidden collaborations