Nowadays many people are enjoying the services offered through the mobile computing, it is become... more Nowadays many people are enjoying the services offered through the mobile computing, it is becomes a new trend in this generation. As we all know with new devices their comes different problems same is the case with mobile computing, securing mobile computing is being difficult day by day and requires more attention from developers to secure it. From the last decade the quantity of computing machinery is increasing rapidly, integrated by increasing in their computing power has led to the increased computing devices. It allows users to communicate with different people's from anywhere in the world and also connect us to get notification of important news, these device's solved our so much of hard work like writing letters to the ones who are living far away from us. As we all know due to the increase of these devices there comes many problems to be dealt with the major one of them is its security and the security of data which is stored in these devices. In this paper the security issues are discussed in mobile computing and how to protect ourselves from these issues.
In education technologies play a vital role to empower a student. Technological innovation and st... more In education technologies play a vital role to empower a student. Technological innovation and student demands are the better way of learning are dramatically changing the nature of education. The smart university is the best approach to give an interactive environment to the students for better learning and a place where knowledge is shared between students, teachers, employees and all stakeholders in their own way. The goal of undertaken study to present the aims and objectives of Smart University, Smart Class rooms and also addressed a way to covert simple learning environment in to Smart Education System. The primary focus of this study is to introduce a secure and smart infrastructure for "SHAH ABDUL Latif UNIVERSITY". The introduced infrastructure has covered all aspect regarding secure education such as E-learning, management, administration, security and environmental protection. This study will be helpful for the scholars, researchers and academicians.
Cloud computing is a computing framework and software model for empowering ubiquitous access to s... more Cloud computing is a computing framework and software model for empowering ubiquitous access to shared pools of configurable assets i.e. Server, networks, services and storage applications which can be quickly provisioned least managements activities often over the web. Cloud computing is a moderately new innovation that will only become widespread and very much researched. Cloud computing do not require extraordinary equipment for customers and offers ease of use. It is beneficial for clients. It is accepted that Cloud Computing has many potential advantages but at the same time there are some security issues need to resolve. The undertaken study aims to present the various Cloud Service Delivery Models, Cloud Deployed Models and mainly focuses on Security issues at each service model. This study will be helpful for the scholars, researchers and academicians.
Wireless Sensor Network is a network of devices that can convey the information congregated from ... more Wireless Sensor Network is a network of devices that can convey the information congregated from a tested field through wireless connections. The data is sent from numerous nodes and gateways, the data is associated with other networks. Wireless Sensor Network has various potential advantages. It is an emergent technology utilized as a part of numerous application which incorporates security issues in this manner security plays an important role in Wireless Sensor Network. Wireless Sensor Network undergo from numerous restrictions including little memory, low calculation ability, restricted vitality assets and unreliable remote channels. These restraints make security a challenge in Wireless Sensor Network. The undertaken study aims to present the various security issues in Wireless Sensor Network and also discusses the protocols used to deal with these security challenges. This study is helpful for scholars, researchers and academicians.
Biometrics refers to innovations for measuring and investigating a person's physiological or beha... more Biometrics refers to innovations for measuring and investigating a person's physiological or behavioral qualities which are remarkable to people subsequently can be utilized to recognize a man. Biometrics is a developing technology which is utilized as a part of different fields like legal sciences, security system and secured territory. These are utilized as a part of different applications like mobiles, protectedentreein a building and ATM.Biometrics are intended to upgrade the safety and diminish defenselessness. The undertaken study aims to present the distinctive biometrics techniques i.e. Fingerprint recognition, Hand geometry recognition, Iris recognition,Face Recognition and Voice recognition which are accessible to implement a biometric system.This study will be helpful for the scholars, researchers and academicians.
International Journal of Emerging Trends in Engineering Research, Aug 7, 2021
The Corona Virus disease is a worldwide health care issue, and international efforts to manage it... more The Corona Virus disease is a worldwide health care issue, and international efforts to manage it have been suggested and discussed. Despite the fact that numerous studies have been done using clinical data and documented infected cases, there is always need for more study since a lot of complex factors are involved in future prediction. As a result, mathematical modeling is an essential tool for estimating critical transmission parameters and forecasting disease model dynamics. We analyze and offer various models for the Corona Virusin this study, which can answer significant concerns regarding global health care and provide crucial suggestions. Euler's method, Runge-Kutta method of order two (RK2) are two well-known numerical approaches for solving such problems. The results, which are based on the numerical approaches provide approximate solutions, provide critical answers to this worldwide challenge. The number of infected, recovered, and quarantined persons in the future can be estimated using numerical findings. The findings might also support worldwide efforts to develop more preventions and enhance intermediation programs. The proposed model can be refereed to be a realistic description of this pandemic.
In education technologies play a vital role to empower a student. Technological innovation and st... more In education technologies play a vital role to empower a student. Technological innovation and student demands are the better way of learning are dramatically changing the nature of education. The smart university is the best approach to give an interactive environment to the students for better learning and a place where knowledge is shared between students, teachers, employees and all stakeholders in their own way. The goal of undertaken study to present the aims and objectives of Smart University, Smart Class rooms and also addressed a way to covert simple learning environment in to Smart Education System. The primary focus of this study is to introduce a secure and smart infrastructure for “SHAH ABDUL Latif UNIVERSITY”. The introduced infrastructure has covered all aspect regarding secure education such as E-learning, management, administration, security and environmental protection. This study will be helpful for the scholars, researchers and academicians
Social media is being utilized to demonstrate communication skills. Social media provides a way t... more Social media is being utilized to demonstrate communication skills. Social media provides a way to connect with our loved ones any time anywhere. There are several social networks like Facebook, twitter, LinkedIn and so on are presented over the internet. These social networking sites make an online profile of a user which is shared freely with the public. It can have negative impact on our life. It can allow easy access to one’s privacy. In this paper, we have discussed privacy and network related issues and threats and proposes anti threats steps and preventive measures for users. Although these sites may work harmless but they always have malicious content. The undertaken study is helpful for researchers, scholars and academicians
Nowadays many people are enjoying the services offered through the mobile computing, it is become... more Nowadays many people are enjoying the services offered through the mobile computing, it is becomes a new trend in this generation. As we all know with new devices their comes different problems same is the case with mobile computing, securing mobile computing is being difficult day by day and requires more attention from developers to secure it. From the last decade the quantity of computing machinery is increasing rapidly, integrated by increasing in their computing power has led to the increased computing devices. It allows users to communicate with different people’s from anywhere in the world and also connect us to get notification of important news, these device’s solved our so much of hard work like writing letters to the ones who are living far away from us. As we all know due to the increase of these devices there comes many problems to be dealt with the major one of them is its security and the security of data which is stored in these devices. In this paper the security is...
International Journal of Advanced Trends in Computer Science and Engineering, 2021
By the emergence of Smart Phones and Internet of Things platforms, new software systems are conti... more By the emergence of Smart Phones and Internet of Things platforms, new software systems are continually sophisticated, deployed in high dynamic situations and permitting interactions across heterogeneous domains. As a result analyzing their security risks critical issue necessitates high level of stability and scalability in order to handle the dynamic inherent in such predictable systems. This article aims to discuss several security threats in traditional systems and their safety to deal with the new aspects of today's software systems. It focuses on the security of Internet of Things and Android Platforms. The undertaken study reveals the emergent software, their security challenges, features of Internet of Things and Android platforms, to detect the venerable and dangerous interactions between applications which shares the common devices and proposed a Threat detection model to find out the security risks in emerging software platforms. It helps the scholars, academicians and software developers to cope with real world problems.
Wireless sensor network has been used in many state-of-the-art applications from home automation ... more Wireless sensor network has been used in many state-of-the-art applications from home automation to warfare. It has become an unavoidable technology that cannot be ignored for the development of modern sophisticated applications. In current era of rapid technological development where new threats are emerging every day, Wireless Sensor Network (WSN) cannot be deployed without the proper security implementations. But the sensor nodes are equipped with the resource constraint components in term of battery life, memory and communication range. In this paper we have highlighted security issue in Wireless Sensor Network and proposed a security mechanism for secure communication among nodes of Wireless Sensor Network. Various cryptographic algorithms are used to implement the proposed mechanism and compared with respect to time. It is concluded that elliptic cure is most suitable for WSN in term of efficiency and security.
Biometrics refers to innovations for measuring and investigating a person's physiological or ... more Biometrics refers to innovations for measuring and investigating a person's physiological or behavioral qualities which are remarkable to people subsequently can be utilized to recognize a man. Biometrics is a developing technology which is utilized as a part of different fields like legal sciences, security system and secured territory. These are utilized as a part of different applications like mobiles, protectedentreein a building and ATM.Biometrics are intended to upgrade the safety and diminish defenselessness. The undertaken study aims to present the distinctive biometrics techniques i.e. Fingerprint recognition, Hand geometry recognition, Iris recognition,Face Recognition and Voice recognition which are accessible to implement a biometric system.This study will be helpful for the scholars, researchers and academicians
International Journal of Advanced Trends in Computer Science and Engineering, 2021
By the emergence of Smart Phones and Internet of Things platforms, new software systems are conti... more By the emergence of Smart Phones and Internet of Things platforms, new software systems are continually sophisticated, deployed in high dynamic situations and permitting interactions across heterogeneous domains. As a result analyzing their security risks critical issue necessitates high level of stability and scalability in order to handle the dynamic inherent in such predictable systems. This article aims to discuss several security threats in traditional systems and their safety to deal with the new aspects of today's software systems. It focuses on the security of Internet of Things and Android Platforms. The undertaken study reveals the emergent software, their security challenges, features of Internet of Things and Android platforms, to detect the venerable and dangerous interactions between applications which shares the common devices and proposed a Threat detection model to find out the security risks in emerging software platforms. It helps the scholars, academicians and software developers to cope with real world problems.
Nowadays many people are enjoying the services offered through the mobile computing, it is become... more Nowadays many people are enjoying the services offered through the mobile computing, it is becomes a new trend in this generation. As we all know with new devices their comes different problems same is the case with mobile computing, securing mobile computing is being difficult day by day and requires more attention from developers to secure it. From the last decade the quantity of computing machinery is increasing rapidly, integrated by increasing in their computing power has led to the increased computing devices. It allows users to communicate with different people's from anywhere in the world and also connect us to get notification of important news, these device's solved our so much of hard work like writing letters to the ones who are living far away from us. As we all know due to the increase of these devices there comes many problems to be dealt with the major one of them is its security and the security of data which is stored in these devices. In this paper the security issues are discussed in mobile computing and how to protect ourselves from these issues.
In education technologies play a vital role to empower a student. Technological innovation and st... more In education technologies play a vital role to empower a student. Technological innovation and student demands are the better way of learning are dramatically changing the nature of education. The smart university is the best approach to give an interactive environment to the students for better learning and a place where knowledge is shared between students, teachers, employees and all stakeholders in their own way. The goal of undertaken study to present the aims and objectives of Smart University, Smart Class rooms and also addressed a way to covert simple learning environment in to Smart Education System. The primary focus of this study is to introduce a secure and smart infrastructure for "SHAH ABDUL Latif UNIVERSITY". The introduced infrastructure has covered all aspect regarding secure education such as E-learning, management, administration, security and environmental protection. This study will be helpful for the scholars, researchers and academicians.
Cloud computing is a computing framework and software model for empowering ubiquitous access to s... more Cloud computing is a computing framework and software model for empowering ubiquitous access to shared pools of configurable assets i.e. Server, networks, services and storage applications which can be quickly provisioned least managements activities often over the web. Cloud computing is a moderately new innovation that will only become widespread and very much researched. Cloud computing do not require extraordinary equipment for customers and offers ease of use. It is beneficial for clients. It is accepted that Cloud Computing has many potential advantages but at the same time there are some security issues need to resolve. The undertaken study aims to present the various Cloud Service Delivery Models, Cloud Deployed Models and mainly focuses on Security issues at each service model. This study will be helpful for the scholars, researchers and academicians.
Wireless Sensor Network is a network of devices that can convey the information congregated from ... more Wireless Sensor Network is a network of devices that can convey the information congregated from a tested field through wireless connections. The data is sent from numerous nodes and gateways, the data is associated with other networks. Wireless Sensor Network has various potential advantages. It is an emergent technology utilized as a part of numerous application which incorporates security issues in this manner security plays an important role in Wireless Sensor Network. Wireless Sensor Network undergo from numerous restrictions including little memory, low calculation ability, restricted vitality assets and unreliable remote channels. These restraints make security a challenge in Wireless Sensor Network. The undertaken study aims to present the various security issues in Wireless Sensor Network and also discusses the protocols used to deal with these security challenges. This study is helpful for scholars, researchers and academicians.
Biometrics refers to innovations for measuring and investigating a person's physiological or beha... more Biometrics refers to innovations for measuring and investigating a person's physiological or behavioral qualities which are remarkable to people subsequently can be utilized to recognize a man. Biometrics is a developing technology which is utilized as a part of different fields like legal sciences, security system and secured territory. These are utilized as a part of different applications like mobiles, protectedentreein a building and ATM.Biometrics are intended to upgrade the safety and diminish defenselessness. The undertaken study aims to present the distinctive biometrics techniques i.e. Fingerprint recognition, Hand geometry recognition, Iris recognition,Face Recognition and Voice recognition which are accessible to implement a biometric system.This study will be helpful for the scholars, researchers and academicians.
International Journal of Emerging Trends in Engineering Research, Aug 7, 2021
The Corona Virus disease is a worldwide health care issue, and international efforts to manage it... more The Corona Virus disease is a worldwide health care issue, and international efforts to manage it have been suggested and discussed. Despite the fact that numerous studies have been done using clinical data and documented infected cases, there is always need for more study since a lot of complex factors are involved in future prediction. As a result, mathematical modeling is an essential tool for estimating critical transmission parameters and forecasting disease model dynamics. We analyze and offer various models for the Corona Virusin this study, which can answer significant concerns regarding global health care and provide crucial suggestions. Euler's method, Runge-Kutta method of order two (RK2) are two well-known numerical approaches for solving such problems. The results, which are based on the numerical approaches provide approximate solutions, provide critical answers to this worldwide challenge. The number of infected, recovered, and quarantined persons in the future can be estimated using numerical findings. The findings might also support worldwide efforts to develop more preventions and enhance intermediation programs. The proposed model can be refereed to be a realistic description of this pandemic.
In education technologies play a vital role to empower a student. Technological innovation and st... more In education technologies play a vital role to empower a student. Technological innovation and student demands are the better way of learning are dramatically changing the nature of education. The smart university is the best approach to give an interactive environment to the students for better learning and a place where knowledge is shared between students, teachers, employees and all stakeholders in their own way. The goal of undertaken study to present the aims and objectives of Smart University, Smart Class rooms and also addressed a way to covert simple learning environment in to Smart Education System. The primary focus of this study is to introduce a secure and smart infrastructure for “SHAH ABDUL Latif UNIVERSITY”. The introduced infrastructure has covered all aspect regarding secure education such as E-learning, management, administration, security and environmental protection. This study will be helpful for the scholars, researchers and academicians
Social media is being utilized to demonstrate communication skills. Social media provides a way t... more Social media is being utilized to demonstrate communication skills. Social media provides a way to connect with our loved ones any time anywhere. There are several social networks like Facebook, twitter, LinkedIn and so on are presented over the internet. These social networking sites make an online profile of a user which is shared freely with the public. It can have negative impact on our life. It can allow easy access to one’s privacy. In this paper, we have discussed privacy and network related issues and threats and proposes anti threats steps and preventive measures for users. Although these sites may work harmless but they always have malicious content. The undertaken study is helpful for researchers, scholars and academicians
Nowadays many people are enjoying the services offered through the mobile computing, it is become... more Nowadays many people are enjoying the services offered through the mobile computing, it is becomes a new trend in this generation. As we all know with new devices their comes different problems same is the case with mobile computing, securing mobile computing is being difficult day by day and requires more attention from developers to secure it. From the last decade the quantity of computing machinery is increasing rapidly, integrated by increasing in their computing power has led to the increased computing devices. It allows users to communicate with different people’s from anywhere in the world and also connect us to get notification of important news, these device’s solved our so much of hard work like writing letters to the ones who are living far away from us. As we all know due to the increase of these devices there comes many problems to be dealt with the major one of them is its security and the security of data which is stored in these devices. In this paper the security is...
International Journal of Advanced Trends in Computer Science and Engineering, 2021
By the emergence of Smart Phones and Internet of Things platforms, new software systems are conti... more By the emergence of Smart Phones and Internet of Things platforms, new software systems are continually sophisticated, deployed in high dynamic situations and permitting interactions across heterogeneous domains. As a result analyzing their security risks critical issue necessitates high level of stability and scalability in order to handle the dynamic inherent in such predictable systems. This article aims to discuss several security threats in traditional systems and their safety to deal with the new aspects of today's software systems. It focuses on the security of Internet of Things and Android Platforms. The undertaken study reveals the emergent software, their security challenges, features of Internet of Things and Android platforms, to detect the venerable and dangerous interactions between applications which shares the common devices and proposed a Threat detection model to find out the security risks in emerging software platforms. It helps the scholars, academicians and software developers to cope with real world problems.
Wireless sensor network has been used in many state-of-the-art applications from home automation ... more Wireless sensor network has been used in many state-of-the-art applications from home automation to warfare. It has become an unavoidable technology that cannot be ignored for the development of modern sophisticated applications. In current era of rapid technological development where new threats are emerging every day, Wireless Sensor Network (WSN) cannot be deployed without the proper security implementations. But the sensor nodes are equipped with the resource constraint components in term of battery life, memory and communication range. In this paper we have highlighted security issue in Wireless Sensor Network and proposed a security mechanism for secure communication among nodes of Wireless Sensor Network. Various cryptographic algorithms are used to implement the proposed mechanism and compared with respect to time. It is concluded that elliptic cure is most suitable for WSN in term of efficiency and security.
Biometrics refers to innovations for measuring and investigating a person's physiological or ... more Biometrics refers to innovations for measuring and investigating a person's physiological or behavioral qualities which are remarkable to people subsequently can be utilized to recognize a man. Biometrics is a developing technology which is utilized as a part of different fields like legal sciences, security system and secured territory. These are utilized as a part of different applications like mobiles, protectedentreein a building and ATM.Biometrics are intended to upgrade the safety and diminish defenselessness. The undertaken study aims to present the distinctive biometrics techniques i.e. Fingerprint recognition, Hand geometry recognition, Iris recognition,Face Recognition and Voice recognition which are accessible to implement a biometric system.This study will be helpful for the scholars, researchers and academicians
International Journal of Advanced Trends in Computer Science and Engineering, 2021
By the emergence of Smart Phones and Internet of Things platforms, new software systems are conti... more By the emergence of Smart Phones and Internet of Things platforms, new software systems are continually sophisticated, deployed in high dynamic situations and permitting interactions across heterogeneous domains. As a result analyzing their security risks critical issue necessitates high level of stability and scalability in order to handle the dynamic inherent in such predictable systems. This article aims to discuss several security threats in traditional systems and their safety to deal with the new aspects of today's software systems. It focuses on the security of Internet of Things and Android Platforms. The undertaken study reveals the emergent software, their security challenges, features of Internet of Things and Android platforms, to detect the venerable and dangerous interactions between applications which shares the common devices and proposed a Threat detection model to find out the security risks in emerging software platforms. It helps the scholars, academicians and software developers to cope with real world problems.
Uploads
Papers by saima shoro