Ali I.,SZABIST |
Faisal M.,University of Malakand |
Abbas S.,University of Sharjah
International Journal of Cooperative Information Systems | Year: 2017
Lightweight authentication is one of the solutions proposed in order to reduce the time required for authentication during vertical handoff across heterogeneous networks. Reducing the handoff latency is considered to be a challenging issue. It arises when a user requires maintaining its service continuity while traveling across heterogeneous networks. For example, a mobile user may change access networks while being engaged in different scenarios, such as browsing Internet, using real-time applications or collaborating in cooperative information systems. Delay in the vertical handoff creates many problems, i.e. packet loss, service interruption, security problems, etc. Fast and lightweight authentication schemes are always tempted in such application domains because of many benefits, for instance seamless and efficient handoff, service continuity, guaranteed quality of service (QoS) and suitability for real-time applications while maintaining security. Various techniques have been proposed in this domain to reduce authentication delay. However, these methods do not fully address all the issues in the problem domain; for example, these methods have deficiencies in terms of security, monetary cost, signaling cost and packet latency. In this paper, a comparative study of different lightweight authentication methods is presented but the main focus of this work is one of the different implementations. An overview of major problems and their solutions are presented along with their strengths and limitations. Different emerging research areas are also presented in the domain of lightweight authentication in the vertical handoff. © 2017 World Scientific Publishing Company.
Khan K.,SZABIST |
Rehman S.U.,Mohammad Ali Jinnah University |
Aziz K.,Mohammad Ali Jinnah University |
Fong S.,University of Macau |
And 2 more authors.
5th International Conference on the Applications of Digital Information and Web Technologies, ICADIWT 2014 | Year: 2014
Data Mining is all about data analysis techniques. It is useful for extracting hidden and interesting patterns from large datasets. Clustering techniques are important when it comes to extracting knowledge from large amount of spatial data collected from various applications including GIS, satellite images, X-ray crystallography, remote sensing and environmental assessment and planning etc. To extract useful pattern from these complex data sources several popular spatial data clustering techniques have been proposed. DBSCAN (Density Based Spatial Clustering of Applications with Noise) is a pioneer density based algorithm. It can discover clusters of any arbitrary shape and size in databases containing even noise and outliers. DBSCAN however are known to have a number of problems such as: (a) it requires user's input to specify parameter values for executing the algorithm; (b) it is prone to dilemma in deciding meaningful clusters from datasets with varying densities; (c) and it incurs certain computational complexity. Many researchers attempted to enhance the basic DBSCAN algorithm, in order to overcome these drawbacks, such as VDBSCAN, FDBSCAN, DD-DBSCAN, and IDBSCAN. In this study, we survey over different variations of DBSCAN algorithms that were proposed so far. These variations are critically evaluated and their limitations are also listed. © 2014 IEEE.
Gul I.,SZABIST |
Ur Rehman A.,SZABIST
Proceedings - 2nd International Conference on Next Generation Information Technology, ICNIT 2011 | Year: 2011
In the recent era, cloud computing has evolved as a net centric, service oriented computing model. Consumers purchase computing resources as on-demand basis and get worry free with the underlying technologies used. Cloud computing model is composed of three service models Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) and four deployment models Public, Private, Community and Hybrid. A third party service provider, stores & maintains data, application or infrastructure of Cloud user. Relinquishing the control over data and application poses challenges of security, performance, availability and privacy. Security issues in Cloud computing are most significant among all others. Information Technology (IT) auditing mechanisms and framework in cloud can play an important role in compliance of Cloud IT security policies. In this paper, we focus on cloud security audit mechanisms and models. © 2011 AICIT.
Wahid F.,Jeju National University |
Fayaz M.,University of Malakand |
International Journal of Bio-Science and Bio-Technology | Year: 2016
Image processing is a technique developed by computer and Information technology scientist and being used in all field of research including medical sciences. The focus of this paper is the use of image processing in tumor detection from the brain Magnetic Resonance Imaging (MRI). For the brain tumor detection, Computed Tomography (CT) and Magnetic Resonance Imaging (MRI) are the prominent imaging techniques, but most of the experts prefer MRI over CT. The traditional method of tumor detection in MRI images is a manual inspection which provides variations in the results when analyzed by different experts, therefore, in view of the limitations of the manual analysis of MRI, there is a need for an automated system that can produce globally acceptable and accurate results. There is enough amount of published literature available to replace the manual inspection process of MRI images with the digital computer system using image processing techniques. In this paper, we have provided a review of digital image processing techniques in the context of brain MRI processing and critically analyzed them for the identification of the gaps and limitations of the techniques so that the gaps can be filled and limitations of various techniques can be improved for precise and better results. © 2016 SERSC.
Abbasi E.,SZABIST |
Abbasi K.,Hamdard University
ICICT 2013 - Proceedings of the 2013 5th International Conference on Information and Communication Technologies: Using Technology to Create a Better World | Year: 2013
Business Process Modeling (BPM) is a technique used to model business processes and helps in better understanding of these processes. BPM helps in improving organizational efficiency by either helping in making the business processes more efficient or even helps in automation of the business processes. There are many BPM techniques used till date but none of these techniques being used supports the decision making requirements for an organization. To address this problem the paper suggests a model that can help integrate decision making with the prevailing Business Process Models. The paper firstly reviews foundations of Business Process Modeling (BPM) and the Decision Model (DM) to establish the basis for the conceptual understanding of BPM and DM. With these theoretical bases, then a model has been proposed where the Decision Model has been integrated with the Business Process Model to meet the decision making needs for the decision makers. Finally, the implications of this model are discussed with directions for further research. © 2013 IEEE.
ICICT 2011 - Proceedings of the 4th International Conference on Information and Communication Technologies | Year: 2011
Covert channel is secret communication path, which existence is not expected in original system of design. It allows different users access to the same information, at the same time, but from different points-of-view. It is being more and more studying due to the grooming of internet. Always high-bandwidth network covert channel pose the significant risk of detection over network. Although the existing technique utilized the reserved bits of header, timestamp, initial sequence number, packet length etc for network covert channel, to some extend these have good temper resistance. But when increase their covert data capacity they becomes to fail to persist their original characteristics and vulnerable to network traffic detector. We are motivated to design to achieve a high bandwidth covert channel in network protocols. We simulated our proposed technique in ns2 simulator utilizing TCP protocol. Through experimental results, our proposed model is very high capacity covert channel with temper resistance and time efficient as compared to previous techniques. © 2011 IEEE.
Aamir M.,SZABIST |
Ali Zaidi S.M.,SZABIST
2013 3rd IEEE International Conference on Computer, Control and Communication, IC4 2013 | Year: 2013
We introduce a new protocol called VQAPM to assure quality voice in VoIP perspective when communicating nodes are the part of some MANET. We use two specific parameters of voice communication over IP: one is voice codec and the other is IP packet length. A node in MANET is selected as MVCH (MANET Voice Communication Head) that applies the proposed algorithm to determine an optimum combination of bit rate and packet length and assigns it to the requesting node for a VoIP session to ensure efficient voice quality. VQAPM considers the congestion factor in multiple route MANETs and is applied on the best available path determined through a traffic allocation algorithm keeping in view the level of congestion on the route so that overall efficiency of the system is not compromised. Our simulation study reveals that VQAPM increases voice quality in a communication session when results are obtained for a few key metrics of Quality of Service. © 2013 IEEE.
Khan A.S.,SZABIST |
International Journal of Project Management | Year: 2015
Research on the relationship amongst "HR practices" and perceived "project success" in project-based Pakistani organizations is stimulating. Islam deliberates on ethics as a vital factor in day to day life. This study builds direct and moderating hypotheses for the relationship between four selected HR practices (Employees Recruitment & Selection, Employees Training & Development, Employees Performance Appraisals and Employees Compensation System), "project success" (PS) and "Islamic Work Ethics" (IWE) in project-based Pakistani organizations. The hypotheses have been confirmed using survey data collected from "4" major cities of the country using cross sectional design. The findings suggest that less "ETD" all other three HR practices influence PS in project-based Pakistani organizations; moreover, they reveal moderating effects of IWE only on the relationship between practice of "Employees Recruitment & Selection" and PS as perceived by employees in the organizations. The significance, implications and limitations of results have also been deliberated for further research. © 2014 Elsevier Ltd and International Project Management Association.
Aamir M.,SZABIST |
2012 15th International Multitopic Conference, INMIC 2012 | Year: 2012
Voice over IP (VoIP) is nowadays a common component of multimedia converged networks. In this paper, Quality of Service (QoS) analysis of VoIP traffic is presented in a multimedia network having other types of network traffic also deployed i.e. video, database and web. In such traffic occupied network, VoIP is configured with different codecs and frame counts per packet to observe the effect of these variations on the QoS of VoIP in terms of queuing delay, jitter, packet end-to-end delay and packet delay variation (end-to-end jitter) metrics. The significance of this paper is the emphasis on QoS evaluations in a VoIP deployment while observing the effects of variations in voice codecs and packet lengths. Many previous research papers focus on the perceived speech quality and packet losses; whereas queuing delays and end-to-end latency are usually not considered when analysis is done for different codecs and packet lengths at a time. We consider three main voice codecs (G.711, G.729 and G.723.1) and three frame counts per packet values (10, 25 and 50 voice frames per packet) under each codec. The simulation results show that G.723.1 voice encoding experiences higher queuing delays and queue delay variations (jitter) for higher numbers of frames per packet. However, the least packet end-to-end delay is observed in voice packets encoded with G.729 codec for all configured values of frames per packet. © 2012 IEEE.
2011 7th International Conference on Emerging Technologies, ICET 2011 | Year: 2011
Data hiding is one of the most significant aspects in information security. Generally data embedding is achieved in communication, image, text, voice, or multimedia content for copyright, military communication, authentication and many other purposes. Currently available data hiding techniques do not pay much attention on stego-object (hidden information in original object) with respect to its originality with cover (original) object. Both cover and stego-objects are drifted in context of (quality measure in image, like) Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE) aspects. This paper proposes a data hiding method around the edge boundary of an object with high PSNR. The stego-image can be utilized for further processing aspects (segmentation etc). The experimental results show very high rate of PSNR. Proposed scheme is targeted for low rate of hidden data capacity with high PSNR. © 2011 IEEE.