Quaid-i-Azam University, Islamabad, Pakistan
Department of Computer Science
The main motivation of the research paper is to analyze different performance parameters of three well known Ad-hoc network routing protocols (AODV, DSDV, DSR) with varying node density and velocity. As in real world the movements of... more
DDoS attacks are launched through sending a large quantity of packets to a target machine, using instantaneous teamwork of multiple hosts which are distributed throughout the Grid computing environment. Today DDoS attacks on the Internet... more
A real-time system must respond fast enough that it can serve the task in a particular time interval. The key constraints in real-time systems are to meet timing bounds and for these systems it is necessary to complete all of their tasks... more
A vehicular Ad-hoc network is composed of moving cars as nodes without any infrastructure. Nodes selforganize to form a network over radio links. Security issues are commonly observed in vehicular ad hoc networks; like authentication and... more
Named Data Networking (NDN) is one of the future envisioned networking paradigm used to provide fast and efficient content dissemination with interest-based content retrieval, name-based routing and in-network content caching. On the one... more
Unlike commercial networks, the tactical networks drive in a critical environment and without a backbone infrastructure. These networks involve mission-critical operations that are dependent on the rapid and reliable transfer of... more
With population growth, the demand for vehicles has increased tremendously, which has created an alarming situation in terms of traffic hazards and road accidents. The road accidents percentage is growing exponentially and so are the... more
Transactions related to vehicles include manufacturing, buying, selling, paying insurance(takaful), obtaining regular inspection, leasing a vehicle from banks, getting in an accident, engaging in a traffic violation, calculating price... more
With the exponential rise in government and private health-supported schemes, the number of fraudulent billing cases is also increasing. Detection of fraudulent transactions in healthcare systems is an exigent task due to intricate... more
In the task of data routing in Internet of Things enabled volatile underwater environments, providing better transmission and maximizing network communication performance are always challenging. Many network issues such as void holes and... more
Gender inclusion and female participation in STEM courses have always been challenging in a patriarchal country like Pakistan. Women are often underrepresented in engineering fields, as engineering fields are usually considered manly.... more
Fog computing is a technology that brings computing and storage resources near to the end user. Being in its infancy, fog computing lacks standardization in terms of architectures and simulation platforms. There are a number of fog... more
Streaming large amounts of data to cloud data centers cause network congestion resulting in high network and energy consumption. The concept of fog computing is introduced to reduce workload from backbone networks and support... more
The main motivation of the research paper is to analyze different performance parameters of three well known Ad-hoc network routing protocols (AODV, DSDV, DSR) with varying node density and velocity. As in real world the movements of... more