Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kamran Ahsan is active.

Publication


Featured researches published by Kamran Ahsan.


Computer Networks | 2015

Application specific study, analysis and classification of body area wireless sensor network applications

Adnan Nadeem; Muhammad Azhar Hussain; Obaidullah Owais; Abdul Salam; Sarwat Iqbal; Kamran Ahsan

The evolution of wearable computing and advances in wearable sensor devices has motivated various applications of Body Area Sensor Networks (BASN). In the last few years body areas sensor networks have emerged as a major type of wireless sensor networks (WSN). This emerging networking technology can be used in various walks of life. A number of surveys have been published on MAC or the physical layer mechanism of BASN but very few have focused on studying it from the application point of view. In this paper, we first review, from literature, existing use of body area sensor network and classify and then its application domain. Within these application domains of BASN, we propose a feasibility of scenarios where BASN can be used for both application and technical aspects. In addition, we classify the use of BASN from literature, based on certain parameters. Finally, we discuss and highlight issues where further research can be conducted in the future.


Journal of Basic and Applied Sciences | 2016

Software Project Management as Team Building Intervention

Mohammad Khalid Shaikh; Akhtar Raza; Kamran Ahsan

The courses of software project management (SPM) and Software engineering (SE) are regularly taught at undergraduate degree program in computer science. Students of these programs also have to undertake projects as part of various courses during their degree program. The purpose of this research is to assess whether the software engineering or the software project management course had enhanced the cohesion among team members while undertaking a six month or a year-long project. The teaching of these two courses is considered as a team building intervention in this research. A total of 167 students returned a modified version of Group Environment Questionnaire distributed to 200 students. Off these, 81 were those who had taken the SE course and subsequently did a project before they had taken SPM course. The rest of the students (85) consisted of those who had taken SPM and had undertaken final project. The results of this paper indicates that the SPM as compared to SE as a team building intervention had a better effect on team cohesion. The paper has successfully identified a single course that can enhance the performance of students as a team in contrast to proposing all the courses taught at the undergraduate computer science degree program as intervention for better team building and team work as proposed by Hogan & Thomas, 2005.


International Journal of E-services and Mobile Applications | 2014

Assistive Technology For Night Blind Tourist: A Mobile Application Approach

Obaidullah Owais Khan; Kamran Ahsan; Abdul Salam

Tourism is one of the largest growing industry worldwide. A tourist will naturally keep on travelling to different countries and sub-continents. Several researchers have addressed and proposed Mobile applications to facilitate Tourist and Tourismin different areas. A Mobile application to assist nightblind tourist is still one of the unaddressed issues by the researchers. This paper proposes a Mobile application model for the Tourist who facesdifficulty in vision during dark times, referred to as night blindness. The proposed application model is based on the difference of current time with sunset time. The application module uses mobile technology and difference of time function to proactively alert the night blind tourist to reach its safe place or destination before sunset. This model also provides an alternate path and distance with respect to time and user location. This proposed mobile application is very useful for the apprehensive night blind tourist who feels fear in travelling during the close of day times.


Mehran University Research Journal of Engineering and Technology | 2017

Illustration, Detection & Prevention of Sleep Deprivation Anomaly in Mobile Ad Hoc Networks

Adnan Nadeem; Kamran Ahsan; Muhammad Sarim

MANETs (Mobile Ad Hoc Networks) have applications in various walks of life from rescue operations to battle fieled operations, personal and commercial. However, routing operations in MANETs are still vulnerable to anomalies and DoS (Denial of Service) attacks such as sleep deprivation. In SD (Sleep Deprivation) attack malicious node exploits the vulnerability in the route discovery function of the reactive routing protocol for example AODV (Ad Hoc On-Demand Distance Vector). In this paper, we first illustrate the SD anomaly in MANETs and then propose a SD detection and prevention algorithm which efficiently deals with this attack. We assess the performance of our proposed approach through simulation, evaluating its successfulness using different network scenarios.


Journal of Basic and Applied Sciences | 2017

A Review and Classification of Energy Efficient MAC Protocols for Underwater Wireless Sensor Network

Waheed Hyder; Adnan Nadeem; Abdul Basit; Kashif Rizwan; Kamran Ahsan; Nadeem Mehmood

Underwater wireless sensor network is an emerging wireless networking technology (UWSN). UWSN has various applications for example it can be used for monitoring seismic activities, underwater animal, pipeline etc. UWSN face challenges in their MAC later operations. Different energy efficient MAC protocols have been proposed for underwater wireless sensor networks (UWSN) to overcome the problem of propagation delays which is inherent in underwater acoustic networks. In this paper, we study the energy efficient MAC protocols including EE-MACU, R-MAC and T-Lohi. We classify UWSN MAC protocols into two broad categories contention free and contention based and we further categorize contention based protocol. We analyze and compare key UWSN MAC protocols based on certain parameters and suggest their suitability in various scenarios.


Journal of Basic and Applied Sciences | 2017

Huge and Real-Time Database Systems: A Comparative Study and Review for SQL Server 2016, Oracle 12c & MySQL 5.7 for Personal Computer

Khawar Islam; Kamran Ahsan; Syed Abdul Khaliq Bari; Muhammad Saeed; Syed Asim Ali

Complexity, and Handling of huge data is a crucial target for all management systems. Databases are the backbone, central and core component of a computer application to store data in a logical way, which define the structure and mechanism for manipulation of data. Many Databases are available for handling and saving huge data including commercial and non-commercial like Microsoft SQL Server, Oracle Database, and MYSQL etc. Many vendors are working on modern techniques of databases spatio-temporal, object-relational, parallel databases etc. This novel research evaluates the comparative study and execution performance of top three databases according to their particular scenario and situation, after reading the paper the computer related experts especially developers easily judge, which database is most reliable in particular scenario, choosing the right decision for development of huge computer applications for hospitals, banks, and industries.


International Journal of Advanced Computer Science and Applications | 2017

Recognizing Human Actions by Local Space Time and LS-TSVM over CUDA

Mohsin Raza Siyal; Muhammad Qasim Saeed; Jibran Khan; Farhan Ahmed Siddiqui; Kamran Ahsan

Local space-time features can be used to make the events adapted to the velocity of moving patterns, size of the object and the frequency in captured video. This paper purposed the new implementation approach of Human Action Reorganization (HAR) using Compute Unified Device Architecture (CUDA). Initially, local space-time features extracted from the customized dataset of videos. The video features are extracted by utilizing the Histogram of Optical Flow (HOF) and Harris detector algorithm descriptor. A new extended version of SVM classifier which is four time faster and has better precision than classical SVM known as the Least Square Twin SVM (LS-TSVM); a binary classifier which use two non-parallel hyperplanes, is applied on extracted video features. Paper evaluates the LS-TSVM performance on the customized data and experimental result showed the significant improvements.


Jistem Journal of Information Systems and Technology Management | 2015

DIGITAL FORENSIC INVESTIGATION MODELS: AN EVOLUTION STUDY

Khuram Mushtaque; Kamran Ahsan; Ahmer Umer

In business today, one of the most important segments that enable any business to get competitive advantage over others is appropriate, effective adaptation of Information Technology into business and then managing and governing it on their will. To govern IT organizations need to identify value of acquiring services of forensic firms to compete cyber criminals. Digital forensic firms follow different mechanisms to perform investigation. Time by time forensic firms are facilitated with different models for investigation containing phases for different purposes of the entire process. Along with forensic firms, enterprises also need to build a secure and supportive platform to make successful investigation process possible. We have underlined different elements of organizations in Pakistan; need to be addressed to provide support to forensic firms.


Jistem Journal of Information Systems and Technology Management | 2015

ROLE OF ENTERPRISE ARCHITECTURE IN HEALTHCARE ORGANIZATIONS AND KNOWLEDGE-BASED MEDICAL DIAGNOSIS SYSTEM

Muhammad Sajid; Kamran Ahsan

Enterprise architecture (EA) is a tool that aligns organization’s business-process with application and information technology (IT) through EAmodels. This EA model allows the organization to cut off unnecessary IT expenses and determines the future and current IT requirements and boosts organizational performance. Enterprise architecture may be employed in every firm where the firm or organization requires configurations between information technology and business functions. This research investigates the role of enterprise architecture in healthcare organizations and suggests the suitable EA framework for knowledge-based medical diagnostic system for EA modeling by comparing the two most widely used EA frameworks. The results of the comparison identified that the proposed EA has a better framework for knowledge-based medical diagnostic system.


International Journal of Mobile Learning and Organisation | 2013

Assistive technology for night blindness: a mobile application approach

Kamran Ahsan; Obaidullah Owais Khan; Abdul Salam

Night blindness is one of the commonly observed problems of the eyes around the world. The night blindness is estimated to affect 5.2 million preschool-age children. The increase in the night-blind population around the world demands technology assistance to those people for avoiding darkness. Lots of efforts so far have been put up by researchers to address different health issues with several mobile applications for providing assistance to affected people. The mobile application model to assist night-blind person is still one of the unaddressed issues by researchers. In this paper, we propose a mobile application model for night-blind persons to avoid them from travelling in darkness. The proposed application model is based on the difference of current time and sunset time. The proposed application uses difference of time function to proactively alert the night-blind person to reach safer place or destination before sunset. The application is useful for avoiding darkness.

Collaboration


Dive into the Kamran Ahsan's collaboration.

Top Co-Authors

Avatar

Adnan Nadeem

Federal Urdu University

View shared research outputs
Top Co-Authors

Avatar

Abdul Salam

Federal Urdu University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sarwat Iqbal

Federal Urdu University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge