Entity

Time filter

Source Type

Dubai, United Arab Emirates

Alomari K.M.,Abu Dhabi University | Soomro T.R.,SZABIST Dubai | Shaalan K.,The British University in Dubai
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2016

The study tries to find out the most important features in building games based on the grossing. The study is limited to fifty iPhone games that have achieved top grossing in the USA. The game features were extracted from a previous study [1] and classified through ARM funnel into five groups (“A”, “R”, “M”, “AR”, and “RM”). The paper follows CRISP-DM approach under SPSS Modeler through business and data understanding, Data preparation, model building and evaluation. The researcher uses Decision Tree model since the features have closed value i.e. (Yes/No) on the grossing weight. The study reached to the most important 10 features out of 31. These features are important to build successful mobile games. The study emphasizes on the availability of (Acquisition, Retention and Monetization) elements on every successful game and if any is missed, will lead to the failure of the game. © Springer International Publishing Switzerland 2016. Source


Jafri M.R.,COMSATS Institute of Information Technology | Ahmed S.,COMSATS Institute of Information Technology | Ahmed S.,Abasyn University | Javaid N.,COMSATS Institute of Information Technology | And 2 more authors.
Proceedings - 2013 8th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2013 | Year: 2013

In dense underwater sensor networks (UWSN), the major confronts are high error probability, incessant variation in topology of sensor nodes, and much energy consumption for data transmission. However, there are some remarkable applications of UWSN such as management of seabed and oil reservoirs, exploration of deep sea situation and prevention of aqueous disasters. In order to accomplish these applications, ignorance of the limitations of acoustic communications such as high delay and low bandwidth is not feasible. In this paper, we propose Adaptive mobility of Courier nodes in Threshold-optimized Depth-based routing (AMCTD), exploring the proficient amendments in depth threshold and implementing the optimal weight function to achieve longer network lifetime. We segregate our scheme in 3 major phases of weight updating, depth threshold variation and adaptive mobility of courier nodes. During data forwarding, we provide the framework for alterations in threshold to cope with the sparse condition of network. We ultimately perform detailed simulations to scrutinize the performance of our proposed scheme and its comparison with other two notable routing protocols in term of network lifetime and other essential parameters. The simulations results verify that our scheme performs better than the other techniques and near to optimal in the field of UWSN. © 2013 IEEE. Source


Mirza Z.,Al Madad Engineering | Brohi M.N.,SZABIST Dubai
Journal of Computer Science | Year: 2013

Several measures had been taken to ameliorate security technology at campuses using latest technologies available. Radio Frequency Identification (RFID) technology in campuses is mainly used for recording attendance which is further extended to activity monitoring and individual security. This research paper proposes a framework of RFID integrated solution for enhanced campus IT security including human, campus IT asset traceability, student's valuables tracking, exam papers leakage security and issue authentic certificates. In order to meet the growing requirements of campus security system, the use of RFID technology in existing campus application has to be expanded where RFID technology certain performance issues may arise. Designing RFID enabled scalable and reliable applications is difficult due to managing and handling data banks generated by RFID tags, which further requires enhancing the entire IT infrastructure, inconvenient for Small and Medium Enterprise (SME) such as academic institutions having budgetary constraints. Therefore in order to take RFID campus implementation to the next level and create internet of things based applications, campuses have to embrace the concept of using the leading edge technology of cloud computing due to its both technological and economic benefits for supporting RFID technology. © 2013 Science Publications. Source


Ali A.,SZABIST Dubai | Soomro T.R.,University of Sindh
Research Journal of Applied Sciences, Engineering and Technology | Year: 2014

To achieve organizational and business specific goals, IT plays a very important and crucial role. IT Services Management increases the efficiency of the IT Department to provide standardized and effective services to the organization stakeholders and it leads to a better IT Governance for the organization. IT Governance helps the organization to achieve its goals with the help of acclaimed best IT practices in the industry. This and explores how mapping of Information Technology Service Management (ITSM), IT Governance and Information Security helps to meet organization and business specific goals and needs. © Maxwell Scientific Organization, 2014. Source


SZABIST Dubai | Entity website

SZABIST Alumni Stay in touch with the University The University is proud of its alumni and this page aim to recognise some of the achievements they have made since studying at SZABIST. Don't forget to update your details and let us know where your degree has taken you ...

Discover hidden collaborations