Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kiran Ijaz is active.

Publication


Featured researches published by Kiran Ijaz.


computational intelligence for modelling, control and automation | 2006

A Fault Tolerant Infrastructure for Mobile Agen

Summiya Summiya; Kiran Ijaz; Umar Manzoor; Arshad Ali Shahid

Mobile agent technology is a promising paradigm for a myriad of real world applications. Owing to their tremendous capabilities, multiagent systems have been scoped in a large number of applications. However issues related to fault tolerance can hamper the suitability of mobile agents in these real world systems. In this paper we have proposed an infrastructure which provides agent fault tolerance. An algorithm similar to the sliding window model ensures a fault tolerant behavior. Different types of agents, work in collaboration to provide the desired system behavior by tolerating faults. The proposed infrastructure will be applicable in a variety of systems including, ecommerce, online banking etc. With the increasing market of electronic commerce it becomes an interesting aspect to use autonomous mobile agents for electronic business transactions.


world summit on the knowledge society | 2008

Distributed Dependable Enterprise Business System – DDEBS

Kiran Ijaz; Umar Manzoor; Arshad Ali Shahid

The inherent qualities of agent technology make it a perfect choice for many real world applications. However this usefulness can be undermined due to problems incurred by the lack of fault tolerance and security in Multi Agent Based Applications. In this paper we have proposed an infrastructure which provides fault tolerance (at both agent and system level) and security. An algorithm similar to the sliding window model ensures the agent level fault tolerance, while the system level fault tolerance has been provided by dynamic discovery of alternate paths. The proposed framework is envisaged to be used in critical financial applications like Banking applications, E-commerce, Stock exchange etc. Therefore security is provided by means of Triple DES Algorithm for encryption / decryption and MD5 Algorithm for the integrity of the message.


pakistan section multitopic conference | 2005

Applying Color Code Coordinated LRTA* (C3LRTA*) Algorithm on Multiple Targets

Muaz A. Niazi; Umar Manzoor; Kiran Ijaz

In this paper, we have modified original LRTA* and C3LRTA* Algorithms, instead of single target we have use multiple targets in randomly generated mazes. Both modified algorithms have been applied to solve randomly generated mazes with multiple targets. We have evaluated both modified algorithms on a large number of test cases with random obstacles and varying obstacle ratio. Through simulation experiments, we have shown that C3LRTA* is effective in both search time and solution quality. In addition, the strategy used in C3LRTA* can be made more efficient if the number of agents and/or obstacle ratio is increased


World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering | 2007

Ensuring Data Security and Consistency in FTIMA - A Fault Tolerant Infrastructure for Mobile Agents

Umar Manzoor; Kiran Ijaz; Wajiha Shamim; Arshad Ali Shahid


computational intelligence | 2005

C 3 LRTA*, color code coordinated LRTA* algorithm

Muaz A. Niazi; Umar Manzoor; Kiran Ijaz


international conference on artificial intelligence | 2008

Routing framework for FTIMA: a fault tolerance infrastructure for mobile agents

Kiran Ijaz; Umar Manzoor; Arshad Ali Shahid


IASTEDCI | 2005

C3LRTA*, Color Code Coordinated LRTA* Algorithm

Muaz A. Niazi; Umar Manzoor; Kiran Ijaz


international conference on artificial intelligence | 2008

Optimizing bandwidth usage and supporting block level synchronization in MultiSync: a multiagent system for ubiquitous file synchronization

Umar Manzoor; Kiran Ijaz


World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering | 2008

Capturing an Unknown Moving Target in Unknown Territory using Vision and Coordination

Kiran Ijaz; Umar Manzoor; Arshad Ali Shahid


annual conference on computers | 2006

Applying coordination in moving target search (MTS) algorithm

Umar Manzoor; Kiran Ijaz; Arshad Ali Shahid

Collaboration


Dive into the Kiran Ijaz's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Arshad Ali Shahid

National University of Computer and Emerging Sciences

View shared research outputs
Top Co-Authors

Avatar

Muaz A. Niazi

COMSATS Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Summiya Summiya

National University of Computer and Emerging Sciences

View shared research outputs
Researchain Logo
Decentralizing Knowledge