Gomal University

Displaying 1-8 of 8 results

  • White Papers // Sep 2012

    A Hybrid Approach for Gender Classification of Web Images

    In recent times, gender recognition of facial images has achieved lots of attraction. It can be useful in many places e.g. security, web searching, human computer interaction etc. In this paper, an approach containing both face detection and gender classification tasks has been proposed. In face detection part, Haar features...

    Provided By Gomal University

  • White Papers // Aug 2011

    Identifying Design Requirements for Wireless Routing Link Metrics

    In this paper, the authors identify and analyze the requirements to design a new routing link metric for wireless multi-hop networks. Considering these requirements, when a link metric is proposed, then both the design and implementation of the link metric with a routing protocol become easy. Secondly, the underlying network...

    Provided By Gomal University

  • White Papers // Aug 2011

    Transformation of Flat File into Data Warehouse

    A Flat file (Semi Structured) Data comes from different sources or operational systems for storage in the data warehouse. Extraction, transformation and loading of the data could be necessary. Moreover, input flat file data must be transformed into a uniform format which could be more suitable for analytical purposes. Aim...

    Provided By Gomal University

  • White Papers // Apr 2011

    Comparison of Random Waypoint & Random Walk Mobility Model Under DSR, AODV & DSDV MANET Routing Protocols

    Mobile Adhoc Network is a kind of wireless ad hoc network where nodes are connected wirelessly and the network is self configuring. MANET may work in a standalone manner or may be a part of another network. In this paper, the authors have compared Random Walk Mobility Model and Random...

    Provided By Gomal University

  • White Papers // Nov 2010

    Interference and Bandwidth Adjusted ETX in Wireless Multi-Hop Networks

    In this paper, the authors propose a new quality link metric, Interference and Bandwidth adjusted ETX (IBETX) for wireless multi-hop networks. As MAC layer affects the link performance and consequently the route quality, the metric therefore, tackles the issue by achieving twofold MAC-awareness. Firstly, interference is calculated using cross-layered approach...

    Provided By Gomal University

  • White Papers // Dec 2009

    Comparative Study of Congestion Control Techniques in High Speed Networks

    Congestion in network occurs due to exceed in aggregate demand as compared to the accessible capacity of the resources. Network congestion will increase as network speed increases and new effective congestion control methods are needed, especially to handle "Bursty" traffic of today's very high speed networks. Since late 90's numerous...

    Provided By Gomal University

  • White Papers // Nov 2009

    Exception Agent Detection System for IP Spoofing Over Online Environments

    Over the recent years, IP and email spoofing gained much importance for security concerns due to the current changes in manipulating the system performance in different online environments. Intrusion Detection System (IDS) has been used to secure these environments for sharing their data over network and host based IDS approaches....

    Provided By Gomal University

  • White Papers // Sep 2009

    A Step Towards Software Corrective Maintenance: Using RCM Model

    From the preliminary stage of software engineering, selection of appropriate enforcement of standards remained a challenge for stakeholders during entire cycle of software development, but it can lead to reduce the efforts desired for software maintenance phase. Corrective maintenance is the reactive modification of a software product performed after delivery...

    Provided By Gomal University

  • White Papers // Sep 2012

    A Hybrid Approach for Gender Classification of Web Images

    In recent times, gender recognition of facial images has achieved lots of attraction. It can be useful in many places e.g. security, web searching, human computer interaction etc. In this paper, an approach containing both face detection and gender classification tasks has been proposed. In face detection part, Haar features...

    Provided By Gomal University

  • White Papers // Nov 2010

    Interference and Bandwidth Adjusted ETX in Wireless Multi-Hop Networks

    In this paper, the authors propose a new quality link metric, Interference and Bandwidth adjusted ETX (IBETX) for wireless multi-hop networks. As MAC layer affects the link performance and consequently the route quality, the metric therefore, tackles the issue by achieving twofold MAC-awareness. Firstly, interference is calculated using cross-layered approach...

    Provided By Gomal University

  • White Papers // Dec 2009

    Comparative Study of Congestion Control Techniques in High Speed Networks

    Congestion in network occurs due to exceed in aggregate demand as compared to the accessible capacity of the resources. Network congestion will increase as network speed increases and new effective congestion control methods are needed, especially to handle "Bursty" traffic of today's very high speed networks. Since late 90's numerous...

    Provided By Gomal University

  • White Papers // Sep 2009

    A Step Towards Software Corrective Maintenance: Using RCM Model

    From the preliminary stage of software engineering, selection of appropriate enforcement of standards remained a challenge for stakeholders during entire cycle of software development, but it can lead to reduce the efforts desired for software maintenance phase. Corrective maintenance is the reactive modification of a software product performed after delivery...

    Provided By Gomal University

  • White Papers // Nov 2009

    Exception Agent Detection System for IP Spoofing Over Online Environments

    Over the recent years, IP and email spoofing gained much importance for security concerns due to the current changes in manipulating the system performance in different online environments. Intrusion Detection System (IDS) has been used to secure these environments for sharing their data over network and host based IDS approaches....

    Provided By Gomal University

  • White Papers // Aug 2011

    Identifying Design Requirements for Wireless Routing Link Metrics

    In this paper, the authors identify and analyze the requirements to design a new routing link metric for wireless multi-hop networks. Considering these requirements, when a link metric is proposed, then both the design and implementation of the link metric with a routing protocol become easy. Secondly, the underlying network...

    Provided By Gomal University

  • White Papers // Apr 2011

    Comparison of Random Waypoint & Random Walk Mobility Model Under DSR, AODV & DSDV MANET Routing Protocols

    Mobile Adhoc Network is a kind of wireless ad hoc network where nodes are connected wirelessly and the network is self configuring. MANET may work in a standalone manner or may be a part of another network. In this paper, the authors have compared Random Walk Mobility Model and Random...

    Provided By Gomal University

  • White Papers // Aug 2011

    Transformation of Flat File into Data Warehouse

    A Flat file (Semi Structured) Data comes from different sources or operational systems for storage in the data warehouse. Extraction, transformation and loading of the data could be necessary. Moreover, input flat file data must be transformed into a uniform format which could be more suitable for analytical purposes. Aim...

    Provided By Gomal University