oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2020 ( 4 )

2019 ( 14 )

2018 ( 10 )

2017 ( 14 )

Custom range...

Search Results: 1 - 10 of 1044 matches for " Arif Mehmood "
All listed articles are free for downloading (OA Articles)
Page 1 /1044
Display every page Item
Evaluating impact of demerit points system on speeding behavior of drivers
Arif Mehmood
European Transport Research Review , 2010, DOI: 10.1007/s12544-010-0027-0
Abstract: The results revealed that the demerit points system has statistically no significant impact on the speeding behavior of drivers in Al Ain. One of the plausible reasons for insignificance affect of the demerit point system could be the lack of effective traffic monitoring system. This study recommends that to influence the drivers’ behavior an effective traffic monitoring system should be provided to achieve the desired outcomes of introducing tougher laws such as demerit point system. The study also recommends to collect more data to investigate the changes in the speeding behavior of drivers.
Design of Grid-Connected Photovoltaic System  [PDF]
Naseer Khan, Muhammad Aamir, Faisal Mehmood, Muhammad Aslam, Muhammad Arif
Journal of Power and Energy Engineering (JPEE) , 2017, DOI: 10.4236/jpee.2017.58001
Abstract: This paper presents a grid connected photovoltaic system (PV) with a proposed high voltage conversion ratio DC-DC converter which steps up the variable low input voltages of photovoltaic module to the required DC link voltage. This voltage is applied to an H-bridge inverter which converts DC voltage into AC voltage and a low pass filter is used to filter the output. By adjusting the duty ratio of switches in DC-DC converter, the magnitude of inverter’s output voltage is controlled. The frequency and phase synchronization are ensured by a feedback signal taken from the grid. In this way, inverter is synchronized and connected with the grid to meet the energy demand. The PV system has been designed and simulated.
Serosurveillance of Canine Leptospirosis under Different Climatic Conditions in and Around Lahore, Pakistan
Muhammad Hassan Saleem*, Muhammad Sarwar Khan, Muhammad Arif Khan, Muhammad Athar Khan1, Muhammad Ijaz, Ayesha Hassan and Khalid Mehmood
Pakistan Veterinary Journal , 2013,
Abstract: Leptospirosis is an important zoonotic problem occurring globally. To study the serosurveillance of canine leptospirosis, 429 dogs (265 males; 164 females) blood samples were collected around Lahore city and its peri-urban areas and processed by using canine Leptospira IgG ELISA kit. Of 429 samples, 36.1% were positive serologically for canine leptospirosis. Among 265 male and 164 female dogs, 38.5 and 32.3% male and female dogs were found positive, respectively. Canine leptospirosis was more (38.4%) in adults as compared to pups (27.9%). While season wise serosurveillance was 21.2, 35.8, 40.3 and 49.3% in winter, spring, summer and fall, respectively. It is concluded that highest prevalence of canine leptospirosis is recorded in summer and fall months.
Security Approaches in IEEE 802.11 MANET—Performance Evaluation of USM and RAS  [PDF]
Arif Sari
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2014, DOI: 10.4236/ijcns.2014.79038
Abstract: Evaluation of IEEE 802.11 Mobile Ad Hoc Networks (MANET) security issues becomes significant concern for researchers since Denial of Service (DoS) attacks are recognized as one of the most harmful threats. A variety of security mechanisms are proposed to solve security dilemma in MANETs against different layers of DoS attacks. Physical Layer jamming attacks exhaust the victim’s network resources such as bandwidth, computing power, battery, etc. Unified Security Mechanism (USM) and Rate Adaptation Scheme (RAS) are two of the proposed methods by researchers against DoS attacks. USM and RAS mechanisms are simulated through OPNET simulator and Jamming Attack is generated on the network for each security mechanisms to compare specific performance metrics on the network.
Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks  [PDF]
Arif Sari
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2015, DOI: 10.4236/ijcns.2015.83003
Abstract: The Gossip-Based Relay Protocol (GRP) is developed based on Ad Hoc on Demand Distance Vector Protocol (AODV) and proposed to increase the efficiency of package routing functionality in ad hoc networks through specific flooding scheme. This lightweight protocol reduced the collisions on the network through specific mechanisms. Request to Send/Clear to Send (RTS/CTS) mechanism is widely used in ad hoc environment with Temporarily Ordered Routing Algorithm (TORA) in order to eliminate collisions and allow access to the shared medium through proposed authentication methods. Since GRP contains specific mechanism of directed acyclic Graph (DAG) mechanism to mitigate overhead problem, RTS/CTS modified TORA might result in similar performance metrics. In this paper, TORA protocol has a modification of new RTS/CTS mechanism and has been simulated in order to be compared with proposed lightweight robust forwarding GRP scheme in terms of specific performance metrics such as network throughput, end-to-end delay and message flooding rate over the network through OPNET simulation package in order to expose the optimal solution to increase overall network throughput in ad hoc environment.
A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications  [PDF]
Arif Sari
Journal of Information Security (JIS) , 2015, DOI: 10.4236/jis.2015.62015
Abstract: Cloud computing has become one of the most projecting words in the IT world due to its design for providing computing service as a utility. The typical use of cloud computing as a resource has changed the scenery of computing. Due to the increased flexibility, better reliability, great scalability, and decreased costs have captivated businesses and individuals alike because of the pay-per-use form of the cloud environment. Cloud computing is a completely internet dependent technology where client data are stored and maintained in the data center of a cloud provider like Google, Amazon, Apple Inc., Microsoft etc. The Anomaly Detection System is one of the Intrusion Detection techniques. It’s an area in the cloud environment that is been developed in the detection of unusual activities in the cloud networks. Although, there are a variety of Intrusion Detection techniques available in the cloud environment, this review paper exposes and focuses on different IDS in cloud networks through different categorizations and conducts comparative study on the security measures of Dropbox, Google Drive and iCloud, to illuminate their strength and weakness in terms of security.
International Law of the Sea: An Overlook and Case Study  [PDF]
Arif Ahmed
Beijing Law Review (BLR) , 2017, DOI: 10.4236/blr.2017.81003
Abstract: Sea is a large body of water that is surrounded by the land. It is a crucial part of human trade and commerce, voyage, mineral extraction, power generation and is also considered as an essential source of blue economy nowadays. International law of the sea is a law of maritime space that peacefully settles the global disputes on maritime boundary between or among the States and defines various jurisdictions of the maritime zones as well as the rights and obligations of the coastal States in these zones, especially with regard to the conservation of marine environment and biodiversity. The key objective of this piece of academic research is to demonstrate a brief overview of the international law of the sea with a special emphasize on the sources and legal framework of this law. This study also strives to focus the civil and criminal liability, jurisdictions, rights and obligations of the coastal states with regard to the different maritime zones. Furthermore this study delineates the rules and extent of using these maritime zones in the light of various treaty provisions on the international law of the sea where different adjudicated cases are also presented along with a profound scrutiny upon their fact, issues, judgment and reasoning.
Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite  [PDF]
Arif Sari
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2015, DOI: 10.4236/ijcns.2015.83004
Abstract: The 802.15.4 Wireless Sensor Networks (WSN) becomes more economical, feasible and sustainable for new generation communication environment, however their limited resource constraints such as limited power capacity make them difficult to detect and defend themselves against variety of attacks. The radio interference attacks that generate for WSN at the Physical Layer cannot be defeated through conventional security mechanisms proposed for 802.15.4 standards. The first section introduces the deployment model of two-tier hierarchical cluster topology architecture and investigates different jamming techniques proposed for WSN by creating specific classification of different types of jamming attacks. The following sections expose the mitigation techniques and possible built-in mechanisms to mitigate the link layer jamming attacks on proposed two-tier hierarchical clustered WSN topology. The two-tier hierarchical cluster based topology is investigated based on contention based protocol suite through OPNET simulation scenarios.
Integrating Formal Methods in XP—A Conceptual Solution  [PDF]
Shagufta Shafiq, Nasir Mehmood Minhas
Journal of Software Engineering and Applications (JSEA) , 2014, DOI: 10.4236/jsea.2014.74029
Abstract:

Formal methods can be used at any stage of product development process to improve the software quality and efficiency using mathematical models for analysis and verification. From last decade, researchers and practitioners are trying to establish successful transfer of practices of formal methods into industrial process development. In the last couple of years, numerous analysis approaches and formal methods have been applied in different settings to improve software quality. In today’s highly competitive software development industry, companies are striving to deliver fast with low cost and improve quality solutions and agile methodologies have proved their efficiency in acquiring these. Here, we will present an integration of formal methods, specifications and verification practices in the most renowned process development methodology of agile i.e. extreme programming with a conceptual solution. That leads towards the development of a complete formalized XP process in future. This will help the practitioners to understand the effectiveness of formal methods using in agile methods that can be helpful in utilizing the benefits of formal methods in industry.

PROSTATIC ABSCESS
Mehmood Ahmad
The Professional Medical Journal , 1998,
Abstract:
Page 1 /1044
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.