Search Results - "2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST)"

Refine Results
  1. 1

    A Super Wideband printed antenna with enhanced gain using FSS structure by Naqvi, Aqeel H., Tahir, Farooq A.

    “…Super Wideband (SWB) printed antenna with enhanced gain covering the impedance bandwidth ranging from 3-20GHz is presented. Gain enhancement of the antenna is…”
    Get full text
    Conference Proceeding
  2. 2

    Cognitive frequency offset calculation for frequency diverse array radar by Basit, A., Qureshi, I. M., Khan, W., Khan, S. U.

    “…Frequency diverse array (FDA) radars have the ability to generate a beam pattern that is a function of range angle and time. The wavy beam pattern can be…”
    Get full text
    Conference Proceeding
  3. 3

    Analysis of LEACH protocol(s) using formal verification by Ihsan, A., Saghar, K., Fatima, T.

    “…WSN nodes operate in an unattended environment and thus have irreplaceable batteries. Thus an important concern is the network lifetime; we need to utilize…”
    Get full text
    Conference Proceeding
  4. 4

    Finite element analysis of residual stresses and thin plate distortion after face milling by Ma, Y., Liu, S., Feng, P. F., Yu, D. W.

    “…Thin-walled structures are now widely used in aerospace structural components, turbines and many other applications, while the control of machining distortion…”
    Get full text
    Conference Proceeding
  5. 5

    Correction of faulty pattern using cuckoo search algorithm and symmetrical element failure technique along with distance adjustment between the antenna array by Khan, Shafqat Ullah, Qureshi, Ijaz Mansoor, Shoaib, Bilal, Basit, Abdul

    “…In this work, we propose a cuckoo search algorithm (CSA) based on symmetrical element failure technique along with distance adjustment between the array…”
    Get full text
    Conference Proceeding
  6. 6

    Optimizing nodes proportion for intrusion detection in uniform and Gaussian distributed heterogeneous WSN by Raza, F., Bashir, S., Tauseef, K., Shah, S. I.

    “…In wireless sensor networks (WSN), intrusion detection applications have gained significant importance because of diverse implementations including tracking…”
    Get full text
    Conference Proceeding
  7. 7

    DNS security challenges and best practices to deploy secure DNS with digital signatures by Jalalzai, M. H., Shahid, W. B., Iqbal, M. M. W.

    “…This paper is meant to discuss the DNS security vulnerabilities and best practices to address DNS security challenges. The Domain Name System (DNS) is the…”
    Get full text
    Conference Proceeding
  8. 8

    On-body textile antenna design and development for body-centric wireless communication systems by Nawaz, Hamza, Ali Babar Abbasi, M.

    “…In this paper an X-band textile antenna is proposed having bandwidth of 200 MHz; the anticipated antenna is probe-feed rectangular antenna, having slots to…”
    Get full text
    Conference Proceeding
  9. 9

    Reduction of Four Wave Mixing by employing circular polarizers in DWDM optical networks by Manzoor, Habib Ullah, Salfi, Abaid Ullah, Mehmood, Tayyab, Manzoor, Tareq

    “…Next generation optical communication networks demand the use of the lower channel spacing and high input power in Wavelength Division Multiplexing (WDM)…”
    Get full text
    Conference Proceeding
  10. 10

    Design and fabrication of a GaN HEMT based amplifier for wideband applications by Mughal, F. A., Kashif, A., Cheema, N. B., Imran, M., Azam, S.

    “…This paper reports design, fabrication and measurements of a wideband amplifier for UHF applications. A technology based on Gallium Nitride (GaN) transistor is…”
    Get full text
    Conference Proceeding
  11. 11

    Shape optimization of non-linear swept ceiling fan blades through RANS simulations and Response Surface Methods by Adeeb, Ehsan, Maqsood, Adnan, Mushtaq, Ammar, Hussain, Zamir

    “…Ceiling fans are the most used resource for providing indoor thermal comfort in hot climates because of factors like low cost, easy availability and less…”
    Get full text
    Conference Proceeding
  12. 12

    RAEED: A solution for hello flood attack by Saghar, Kashif, Kendall, David, Bouridane, Ahmed

    “…Hello flood attack has long been a problem in ad-hoc and wireless networks during data routing. Although numerous solutions have been proposed, they all have…”
    Get full text
    Conference Proceeding
  13. 13

    Distributed trust protocol for IaaS Cloud Computing by Kashif, Ubaidullah Alias, Memon, Zulfiqar Ali, Balouch, Abdul Rasheed, Chandio, Jamil Ahmed

    “…Due to economic benefits of cloud computing, consumers have rushed to adopt Cloud Computing. Apart from rushing into cloud, security concerns are also raised…”
    Get full text
    Conference Proceeding
  14. 14

    dsPIC-based advanced data acquisition system for Monitoring, Control and Security Applications by Siddiqui, Raees A., Grosvenor, Roger I., Prickett, Paul W.

    “…This paper reports on design and implementation of data acquisition system based on dsPIC Microcontroller for Monitoring, Control and Security Application…”
    Get full text
    Conference Proceeding
  15. 15

    Gossip routing protocol for forest fire detection using wireless sensor networks by Yasin, D., Saghar, K., Younis, S.

    “…Multicast routing protocols such as flooding are inefficient for large scale wireless sensor networks. The Gossip protocol provides a better approach with less…”
    Get full text
    Conference Proceeding
  16. 16

    U slot microstrip patch antenna with truncated corners and its performance improvement using EBG structures by Babar, Adil Zaman, Bashir, S., Khan, Muhammad Salman

    “…The use of wireless communication is not omissible in the present era. Nowadays, in most wireless systems multiband Circular Polarized antennas play an epochal…”
    Get full text
    Conference Proceeding
  17. 17

    Path tracking of a heavy weight torpedo in diving plane using an output feedback sliding mode controller by Adeely, Usman, Zaidiz, Adeel A., Memon, Attaullah Y.

    “…In this paper, a nonlinear robust output feedback control is proposed for a class of autonomous underwater vehicles. In specific, we consider the nonlinear…”
    Get full text
    Conference Proceeding
  18. 18

    Evaluation of a sensor network node communication using formal verification by Tariq, Mamoona, Saghar, Kashif

    “…Sensor networks are low power and low cost embedded system they have limitations like speed and memory. Most sensor networks communicate wirelessly and have…”
    Get full text
    Conference Proceeding
  19. 19

    Evaluation of model checkers SPIN AND UPPAAL for testing wireless sensor network routing protocols by Fatima, T., Saghar, K., Ihsan, A.

    “…Formal modeling and verification has been under consid-erable attraction of researchers these days. Using formal methods one can find bugs and hidden errors in…”
    Get full text
    Conference Proceeding
  20. 20

    Fatigue life estimation of large-scale composite wind turbine blades by Hayat, K., Asif, M., Ali, H. T., Ijaz, H., Mustafa, G.

    “…The fatigue life of a large-scale 5MW composite wind turbine blade is carried out in accordance with the simplified stress-based fatigue life estimation method…”
    Get full text
    Conference Proceeding