Dubai, United Arab Emirates
Dubai, United Arab Emirates
Time filter
Source Type

Mirza Z.,Al Madad Engineering | Brohi M.N.,SZABIST Dubai
Journal of Computer Science | Year: 2013

Several measures had been taken to ameliorate security technology at campuses using latest technologies available. Radio Frequency Identification (RFID) technology in campuses is mainly used for recording attendance which is further extended to activity monitoring and individual security. This research paper proposes a framework of RFID integrated solution for enhanced campus IT security including human, campus IT asset traceability, student's valuables tracking, exam papers leakage security and issue authentic certificates. In order to meet the growing requirements of campus security system, the use of RFID technology in existing campus application has to be expanded where RFID technology certain performance issues may arise. Designing RFID enabled scalable and reliable applications is difficult due to managing and handling data banks generated by RFID tags, which further requires enhancing the entire IT infrastructure, inconvenient for Small and Medium Enterprise (SME) such as academic institutions having budgetary constraints. Therefore in order to take RFID campus implementation to the next level and create internet of things based applications, campuses have to embrace the concept of using the leading edge technology of cloud computing due to its both technological and economic benefits for supporting RFID technology. © 2013 Science Publications.

Ali A.,SZABIST Dubai | Soomro T.R.,University of Sindh
Research Journal of Applied Sciences, Engineering and Technology | Year: 2014

To achieve organizational and business specific goals, IT plays a very important and crucial role. IT Services Management increases the efficiency of the IT Department to provide standardized and effective services to the organization stakeholders and it leads to a better IT Governance for the organization. IT Governance helps the organization to achieve its goals with the help of acclaimed best IT practices in the industry. This and explores how mapping of Information Technology Service Management (ITSM), IT Governance and Information Security helps to meet organization and business specific goals and needs. © Maxwell Scientific Organization, 2014.

Alomari K.M.,Abu Dhabi University | Soomro T.R.,SZABIST Dubai | Shaalan K.,The British University in Dubai
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2016

The study tries to find out the most important features in building games based on the grossing. The study is limited to fifty iPhone games that have achieved top grossing in the USA. The game features were extracted from a previous study [1] and classified through ARM funnel into five groups (“A”, “R”, “M”, “AR”, and “RM”). The paper follows CRISP-DM approach under SPSS Modeler through business and data understanding, Data preparation, model building and evaluation. The researcher uses Decision Tree model since the features have closed value i.e. (Yes/No) on the grossing weight. The study reached to the most important 10 features out of 31. These features are important to build successful mobile games. The study emphasizes on the availability of (Acquisition, Retention and Monetization) elements on every successful game and if any is missed, will lead to the failure of the game. © Springer International Publishing Switzerland 2016.

Al-Rajab M.,ALHOSN University | Khelifi A.,ALHOSN University | UI Haq I.,SZABIST Dubai
Proceedings of the European, Mediterranean and Middle Eastern Conference on Information Systems: Global Information Systems Challenges in Management, EMCIS 2010 | Year: 2010

Cancer kills about half a million people

Jafri M.R.,COMSATS Institute of Information Technology | Ahmed S.,COMSATS Institute of Information Technology | Ahmed S.,Abasyn University | Javaid N.,COMSATS Institute of Information Technology | And 2 more authors.
Proceedings - 2013 8th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2013 | Year: 2013

In dense underwater sensor networks (UWSN), the major confronts are high error probability, incessant variation in topology of sensor nodes, and much energy consumption for data transmission. However, there are some remarkable applications of UWSN such as management of seabed and oil reservoirs, exploration of deep sea situation and prevention of aqueous disasters. In order to accomplish these applications, ignorance of the limitations of acoustic communications such as high delay and low bandwidth is not feasible. In this paper, we propose Adaptive mobility of Courier nodes in Threshold-optimized Depth-based routing (AMCTD), exploring the proficient amendments in depth threshold and implementing the optimal weight function to achieve longer network lifetime. We segregate our scheme in 3 major phases of weight updating, depth threshold variation and adaptive mobility of courier nodes. During data forwarding, we provide the framework for alterations in threshold to cope with the sparse condition of network. We ultimately perform detailed simulations to scrutinize the performance of our proposed scheme and its comparison with other two notable routing protocols in term of network lifetime and other essential parameters. The simulations results verify that our scheme performs better than the other techniques and near to optimal in the field of UWSN. © 2013 IEEE.

Wahab A.,SZABIST Dubai | Soomro T.R.,University of Karachi
Journal of Engineering Science and Technology | Year: 2015

Service Oriented Architecture (SOA) principles normally allows the software applications to integrate with other software applications by means of a service in order to achieve the reusability, interoperability and this can also reduce the time of the other applications, which results in the support of new or changed business processes. However the expectation with SOA based applications in enterprise system was quite extensive and which hasn’t been completely fulfilled for both IT and business. This paper proposes guidance in the implementation of SOA using the Information Technology Infrastructure Library (ITIL) best practices and from this a realization will come about the planning, designing and operating the SOA. © School of Engineering, Taylor’s University.

Ul Iman M.,SZABIST Dubai | Ishaq A.F.M.,SZABIST Dubai
2010 2nd International Conference on Engineering System Management and Applications, ICESMA 2010 | Year: 2010

Intellectual property theft has become a major problem in the recent years. In this paper we primarily focus on software components as intellectual property. Availability of high speed internet has played an important role in distribution of illegal software. Reverse engineering techniques are used to bypass security of software components. These techniques are also used by forensics analysts and researchers against anti reversing techniques of malware. In this paper we try to evaluate some of these anti-reversing protection techniques used by malware which prevent researchers from disassembling their code. We also see how we can use the same techniques for protection of software against reverse engineering.

Mirza Z.R.,Al Madad Engineering Services AjmanUAE | Brohi M.N.,SZABIST Dubai
Journal of Computer Science | Year: 2014

The purpose of this study is building a web and windows based intelligent system using web technologies, biometric and Radio Frequency Identification technologies (RFID) to strengthen an Academic Management System (AMS) in a campus for monitoring and improving academic performance of teachers and students. A campus mobile phone application will allow guardians to monitor student's movement history at campus, e-payments and food choices at canteen, class attendance, exam attendance and academic performance on daily basis. Mobile application for students will allow students to view their class schedules, teacher appointments, e-payment statement, warnings or announcements, locate their exam halls and search for classrooms. © 2014 Science Publications.

SZABIST Dubai | Entity website

Admissions Welcome to SZABIST Dubai. We are the perfect choice for the start of your higher education journey ...

SZABIST Dubai | Entity website

SZABIST Alumni Stay in touch with the University The University is proud of its alumni and this page aim to recognise some of the achievements they have made since studying at SZABIST. Don't forget to update your details and let us know where your degree has taken you ...

Loading SZABIST Dubai collaborators
Loading SZABIST Dubai collaborators