In recent few years, flying ad hoc networks are utilized more for interconnectivity. In the topol... more In recent few years, flying ad hoc networks are utilized more for interconnectivity. In the topological scenario of FANETs, IoT nodes are available on ground where UAVs collect information. Due to high mobility patterns of UAVs cause disruption where intruders easily deploy cyberattacks like DoS/DDoS. Flying ad hoc networks use to have UAVs, satellite, and base station in the physical structure. IoT-based UAV networks are having many applications which include agriculture, rescue operations, tracking, and surveillance. However, DoS/DDoS attacks disturb the behaviour of entire FANET which lead to unbalance energy, end-to-end delay, and packet loss. This research study is focused about the detail study of machine learning-based IDS. Also, cognitive lightweight-LR approach is modeled using UNSW-NB 15 dataset. IoT-based UAV network is introduced using machine learning to detect possible security attacks. The queuing and data traffic model is utilized to implement DT, RF, XGBoost, AdaBoo...
Sir Syed University Research Journal of Engineering & Technology
Conversational agents like Alexa from Amazon, Siri from Apple, Assistant from Google, and Cortana... more Conversational agents like Alexa from Amazon, Siri from Apple, Assistant from Google, and Cortana from Microsoft demonstrate extraordinary research and potential in conversational agents. A conversational agent, chatter-bot, or chatbot is a piece of computer software supposed to communicate at a level of intelligence comparable to a person's. Chatbots are designed for various purposes, such as task-oriented helpers and creators of open-ended discourse. Numerous approaches have been studied, from primitive types of hard-coded response generators to contemporary ways of constructing artificial intelligence. These are classified as rule-based or neural network-based systems. Unlike the rule-based technique, which is based on pre-defined templates and responses, the neural network approach is based on deep learning models. Rule-based communication is optimal for more straightforward, task-oriented conversations. Open-domain conversational modeling is a more complicated topic that de...
The world has advanced more than two centuries in the last 20 years in every aspect of existence.... more The world has advanced more than two centuries in the last 20 years in every aspect of existence. Every day, new inventions are made that improve our quality of life and make our lives easier. One aspect of contemporary innovation is the idea of the smart city. Many businesses and governments are embracing the idea of the "smart city" to improve quality of life for citizens while cutting costs. This model is made up of a variety of different technologies. Internet of Things, cloud and fog computing, UAV, and other technologies are among them. On the other hand, in order to achieve these important goals, it is necessary to provide the multiple system components with the necessary synchronisation and mechanism, which calls for well-organized interaction and communication protocols. In this study, we categorise the networking requirements and characteristics of smart.
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018
This review plans to survey the nature of users experience of responsive website design on cell p... more This review plans to survey the nature of users experience of responsive website design on cell phones (mobile devices) and desktop. Information were gathered from 150 understudies of Universities of Islamabad and Rawalpindi, who were included to assess users experience from website outline on one of the accompanying environments (conditions): responsive website composition in both work area and PDA (mobile devices) environment and non-responsive website architecture in cell phone (mobile devices) environment. The observations of the quantity of scrolls and clicks as well as information (data) quality that has been encountered by client were taken for the measurement of user experience quality The consequences of the ANOVA test demonstrated that responsive website architecture could keep up the client encounter nature of webpage home usefulness, content coherence, and satisfaction utilizing site yet not on the data engineering. In like manner, responsive site engineering was further...
The communicating nodes in Ad-hoc networks are dynamic in nature if we compare them by the tradit... more The communicating nodes in Ad-hoc networks are dynamic in nature if we compare them by the traditional network nodes which appears in any fixed network infrastructure and usually Adhoc networks are deployed in specific environment to achieve certain goals so therefore due to these features security challenges also increases in comparison with other traditional networks or we can say the method used in fixed infrastructure networks is not directly be applied in the case of Adhoc networks. So a short-range wireless channel has security problems that differ from those of more conventional networks. This paper focuses on the security issues concerned with Vehicular networks which are the most emerging forms of Adhoc network now days. Basically privacy is the main concerned under the security umbrella in the case of Adhoc networks because user private data need to be protected by the authorities such that from location profiling and from other attacks on their privacy. Goals like...
In the recent epidemic scenario of lockdown, everything has come to hold and businesses and trans... more In the recent epidemic scenario of lockdown, everything has come to hold and businesses and transactions are moving online. Similarly in the education sector, classes and training are being conducted remotely and via the internet. Consequently, the audio and video streams either offline or in real-time generate additional traffic on the internet. For smooth coverage of the educational material, an additional setup is being established by keeping expansion and up-gradation in mind. The basic question is how to choose the IP-Suite. In this research study based on key performance parameter; security, multicasting, automation IPv4 and IPv6 has been compared. Three working environments; Windows, Linux, and Mac-OS have been tested for the results to be driven and compared under the results section of this research study. Achieved results must be given consideration whenever the end-user application needs to be deployed in the networks.
In the modernworld, natural fiber reinforced polymer composites (NFRP) are gaining too much atten... more In the modernworld, natural fiber reinforced polymer composites (NFRP) are gaining too much attention due to thelower manufacturing cost and favorable effects on the environment after use. Besides this, the processing problems ofsuch materials always remain a challenge. The bio/natural fiber has some protective layers and coatings causing hindrance for good interactions with polymer for good performance characteristics. Although numerous processes are already developed for overcoming the processing parameters but the desired goals are still not achieved. This short review focus on some useful properties and pre-treatment of fibers used for the manufacturing NFRP along with problems associated with effective remedial solutions. The viewers of this paper will get the basic knowledge and may select the area to study further in this field
Wearable technology provides number of opportunities in today’s world that trigged all the imagin... more Wearable technology provides number of opportunities in today’s world that trigged all the imaginations for the people. In today’s era we are more and more dependent on computers and to be compatible with the technology we have to be omnipresent and embrace new developments. Our daily use material is imposed by factor such as battery life, processor power, display brightness, network coverage and form factor have led to the delay in the widespread introduction of wearable computers. In this paper we will review wearable early design that was merely used for aircraft and military purpose and compare that with its today’s application that how nowadays they are used for personal activities. It also highlights the scope and market of wearable computers and how it is emerging day by day.
In this article, Bayesian estimation for Rayleigh distribution using progressive type-II censorin... more In this article, Bayesian estimation for Rayleigh distribution using progressive type-II censoring in the presence of outliers is considered. Inverse Gamma prior and Jeffrey’s prior are used for Bayesian estimation. Squared Error Loss Function (SELF), Precautionary Loss Function (PLF) and K Loss Function (KLF) are used for obtaining the expressions of Bayes estimators and posterior risks. Credible intervals are also derived. Simulation study is presented to discuss the behavior of Bayes estimators. Graphs of simulated Bayes estimators are also provided. Applicability of the undertaken study is highlighted using three real data sets.
Segmentation of cursive text remains the challenging phase in the recognition of text. In OCR sys... more Segmentation of cursive text remains the challenging phase in the recognition of text. In OCR systems, the recognition accuracy of text is directly dependent on the quality of segmentation. In cursive text OCR systems, the segmentation of handwritten Urdu language text is a complex task because of the context sensitivity and diagonality of the text. This paper presents a line segmentation algorithm for Urdu handwritten and printed text and subsequently to ligatures. In the proposed technique, the counting pixel approach is employed for modified header and baseline detection, in which the system first removes the skewness of the text page, and then the page is converted into lines and ligatures. The algorithm is evaluated on manually generated Urdu printed and handwritten dataset. The proposed algorithm is tested separately on handwritten and printed text, showing 96.7% and 98.3% line accuracy, respectively. Furthermore, the proposed line segmentation algorithm correctly extracts the...
Examinations scheduling is highly significant institutes to finalize the academic events of a sem... more Examinations scheduling is highly significant institutes to finalize the academic events of a semester. The is largely noticed by researchers of various domains as well. In this research work, PSO is involved to manage the overall hyper-heuristic solving method. The particle contains an ordered set of low level heuristics, each implement one by one on identical tentative solutions so the effectiveness of their order placement and selection mechanism can be measured by PSO. Consequently, each new generation gets converged set of particles. The partial but improved result promotes and furnishes to successive process whereas the substandard may be discarded. The research work has produced quite satisfactory and applicable results at end.
This research paper accentuates on the technologies utilized as a part of the virtual classroom (... more This research paper accentuates on the technologies utilized as a part of the virtual classroom (VCR) and favourable circumstances of VCR over conventional classroom framework. This paper centres around Interactive learning Methodologies utilizing HTML5 and another web-based tool to draw in the student in assembling exercises and individual assignments. This examination paper additionally gives a short perspective of hindrances and conceivable outcomes for the appropriation of VCR. Meanwhile, likewise decides the requests of showing techniques, programs, material, video learning and online free courses by means of various scholastic sites.
Computer networks and telecommunication systems use a wide range of applications. Therefore, the ... more Computer networks and telecommunication systems use a wide range of applications. Therefore, the power and complexity of computer networks are increasing every day which enhances the possibilities of the end user, but also makes harder the work of those who have to design, maintain and make a network efficient, optimized and secure. Ethernet functionality testing as a generic term used for checking connectivity, throughput and capability to transfer packets over the network. Especially in the packet-switch environment, Ethernet testing has become an essential part for deploying a reliable network. A platform and vendor independent framework is required to verify and test the functionality of the Ethernet network and to verify the functionality and performance of the TCP/IP stack. “NetBurst” is developed for Ethernet functionality testing.
In recent few years, flying ad hoc networks are utilized more for interconnectivity. In the topol... more In recent few years, flying ad hoc networks are utilized more for interconnectivity. In the topological scenario of FANETs, IoT nodes are available on ground where UAVs collect information. Due to high mobility patterns of UAVs cause disruption where intruders easily deploy cyberattacks like DoS/DDoS. Flying ad hoc networks use to have UAVs, satellite, and base station in the physical structure. IoT-based UAV networks are having many applications which include agriculture, rescue operations, tracking, and surveillance. However, DoS/DDoS attacks disturb the behaviour of entire FANET which lead to unbalance energy, end-to-end delay, and packet loss. This research study is focused about the detail study of machine learning-based IDS. Also, cognitive lightweight-LR approach is modeled using UNSW-NB 15 dataset. IoT-based UAV network is introduced using machine learning to detect possible security attacks. The queuing and data traffic model is utilized to implement DT, RF, XGBoost, AdaBoo...
Sir Syed University Research Journal of Engineering & Technology
Conversational agents like Alexa from Amazon, Siri from Apple, Assistant from Google, and Cortana... more Conversational agents like Alexa from Amazon, Siri from Apple, Assistant from Google, and Cortana from Microsoft demonstrate extraordinary research and potential in conversational agents. A conversational agent, chatter-bot, or chatbot is a piece of computer software supposed to communicate at a level of intelligence comparable to a person's. Chatbots are designed for various purposes, such as task-oriented helpers and creators of open-ended discourse. Numerous approaches have been studied, from primitive types of hard-coded response generators to contemporary ways of constructing artificial intelligence. These are classified as rule-based or neural network-based systems. Unlike the rule-based technique, which is based on pre-defined templates and responses, the neural network approach is based on deep learning models. Rule-based communication is optimal for more straightforward, task-oriented conversations. Open-domain conversational modeling is a more complicated topic that de...
The world has advanced more than two centuries in the last 20 years in every aspect of existence.... more The world has advanced more than two centuries in the last 20 years in every aspect of existence. Every day, new inventions are made that improve our quality of life and make our lives easier. One aspect of contemporary innovation is the idea of the smart city. Many businesses and governments are embracing the idea of the "smart city" to improve quality of life for citizens while cutting costs. This model is made up of a variety of different technologies. Internet of Things, cloud and fog computing, UAV, and other technologies are among them. On the other hand, in order to achieve these important goals, it is necessary to provide the multiple system components with the necessary synchronisation and mechanism, which calls for well-organized interaction and communication protocols. In this study, we categorise the networking requirements and characteristics of smart.
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018
This review plans to survey the nature of users experience of responsive website design on cell p... more This review plans to survey the nature of users experience of responsive website design on cell phones (mobile devices) and desktop. Information were gathered from 150 understudies of Universities of Islamabad and Rawalpindi, who were included to assess users experience from website outline on one of the accompanying environments (conditions): responsive website composition in both work area and PDA (mobile devices) environment and non-responsive website architecture in cell phone (mobile devices) environment. The observations of the quantity of scrolls and clicks as well as information (data) quality that has been encountered by client were taken for the measurement of user experience quality The consequences of the ANOVA test demonstrated that responsive website architecture could keep up the client encounter nature of webpage home usefulness, content coherence, and satisfaction utilizing site yet not on the data engineering. In like manner, responsive site engineering was further...
The communicating nodes in Ad-hoc networks are dynamic in nature if we compare them by the tradit... more The communicating nodes in Ad-hoc networks are dynamic in nature if we compare them by the traditional network nodes which appears in any fixed network infrastructure and usually Adhoc networks are deployed in specific environment to achieve certain goals so therefore due to these features security challenges also increases in comparison with other traditional networks or we can say the method used in fixed infrastructure networks is not directly be applied in the case of Adhoc networks. So a short-range wireless channel has security problems that differ from those of more conventional networks. This paper focuses on the security issues concerned with Vehicular networks which are the most emerging forms of Adhoc network now days. Basically privacy is the main concerned under the security umbrella in the case of Adhoc networks because user private data need to be protected by the authorities such that from location profiling and from other attacks on their privacy. Goals like...
In the recent epidemic scenario of lockdown, everything has come to hold and businesses and trans... more In the recent epidemic scenario of lockdown, everything has come to hold and businesses and transactions are moving online. Similarly in the education sector, classes and training are being conducted remotely and via the internet. Consequently, the audio and video streams either offline or in real-time generate additional traffic on the internet. For smooth coverage of the educational material, an additional setup is being established by keeping expansion and up-gradation in mind. The basic question is how to choose the IP-Suite. In this research study based on key performance parameter; security, multicasting, automation IPv4 and IPv6 has been compared. Three working environments; Windows, Linux, and Mac-OS have been tested for the results to be driven and compared under the results section of this research study. Achieved results must be given consideration whenever the end-user application needs to be deployed in the networks.
In the modernworld, natural fiber reinforced polymer composites (NFRP) are gaining too much atten... more In the modernworld, natural fiber reinforced polymer composites (NFRP) are gaining too much attention due to thelower manufacturing cost and favorable effects on the environment after use. Besides this, the processing problems ofsuch materials always remain a challenge. The bio/natural fiber has some protective layers and coatings causing hindrance for good interactions with polymer for good performance characteristics. Although numerous processes are already developed for overcoming the processing parameters but the desired goals are still not achieved. This short review focus on some useful properties and pre-treatment of fibers used for the manufacturing NFRP along with problems associated with effective remedial solutions. The viewers of this paper will get the basic knowledge and may select the area to study further in this field
Wearable technology provides number of opportunities in today’s world that trigged all the imagin... more Wearable technology provides number of opportunities in today’s world that trigged all the imaginations for the people. In today’s era we are more and more dependent on computers and to be compatible with the technology we have to be omnipresent and embrace new developments. Our daily use material is imposed by factor such as battery life, processor power, display brightness, network coverage and form factor have led to the delay in the widespread introduction of wearable computers. In this paper we will review wearable early design that was merely used for aircraft and military purpose and compare that with its today’s application that how nowadays they are used for personal activities. It also highlights the scope and market of wearable computers and how it is emerging day by day.
In this article, Bayesian estimation for Rayleigh distribution using progressive type-II censorin... more In this article, Bayesian estimation for Rayleigh distribution using progressive type-II censoring in the presence of outliers is considered. Inverse Gamma prior and Jeffrey’s prior are used for Bayesian estimation. Squared Error Loss Function (SELF), Precautionary Loss Function (PLF) and K Loss Function (KLF) are used for obtaining the expressions of Bayes estimators and posterior risks. Credible intervals are also derived. Simulation study is presented to discuss the behavior of Bayes estimators. Graphs of simulated Bayes estimators are also provided. Applicability of the undertaken study is highlighted using three real data sets.
Segmentation of cursive text remains the challenging phase in the recognition of text. In OCR sys... more Segmentation of cursive text remains the challenging phase in the recognition of text. In OCR systems, the recognition accuracy of text is directly dependent on the quality of segmentation. In cursive text OCR systems, the segmentation of handwritten Urdu language text is a complex task because of the context sensitivity and diagonality of the text. This paper presents a line segmentation algorithm for Urdu handwritten and printed text and subsequently to ligatures. In the proposed technique, the counting pixel approach is employed for modified header and baseline detection, in which the system first removes the skewness of the text page, and then the page is converted into lines and ligatures. The algorithm is evaluated on manually generated Urdu printed and handwritten dataset. The proposed algorithm is tested separately on handwritten and printed text, showing 96.7% and 98.3% line accuracy, respectively. Furthermore, the proposed line segmentation algorithm correctly extracts the...
Examinations scheduling is highly significant institutes to finalize the academic events of a sem... more Examinations scheduling is highly significant institutes to finalize the academic events of a semester. The is largely noticed by researchers of various domains as well. In this research work, PSO is involved to manage the overall hyper-heuristic solving method. The particle contains an ordered set of low level heuristics, each implement one by one on identical tentative solutions so the effectiveness of their order placement and selection mechanism can be measured by PSO. Consequently, each new generation gets converged set of particles. The partial but improved result promotes and furnishes to successive process whereas the substandard may be discarded. The research work has produced quite satisfactory and applicable results at end.
This research paper accentuates on the technologies utilized as a part of the virtual classroom (... more This research paper accentuates on the technologies utilized as a part of the virtual classroom (VCR) and favourable circumstances of VCR over conventional classroom framework. This paper centres around Interactive learning Methodologies utilizing HTML5 and another web-based tool to draw in the student in assembling exercises and individual assignments. This examination paper additionally gives a short perspective of hindrances and conceivable outcomes for the appropriation of VCR. Meanwhile, likewise decides the requests of showing techniques, programs, material, video learning and online free courses by means of various scholastic sites.
Computer networks and telecommunication systems use a wide range of applications. Therefore, the ... more Computer networks and telecommunication systems use a wide range of applications. Therefore, the power and complexity of computer networks are increasing every day which enhances the possibilities of the end user, but also makes harder the work of those who have to design, maintain and make a network efficient, optimized and secure. Ethernet functionality testing as a generic term used for checking connectivity, throughput and capability to transfer packets over the network. Especially in the packet-switch environment, Ethernet testing has become an essential part for deploying a reliable network. A platform and vendor independent framework is required to verify and test the functionality of the Ethernet network and to verify the functionality and performance of the TCP/IP stack. “NetBurst” is developed for Ethernet functionality testing.
Uploads
Papers