Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shahzad Memon is active.

Publication


Featured researches published by Shahzad Memon.


business information systems | 2010

On demand radio frequency identification based vehicle tracking system

Shahzad Memon; Khalil Khoumbati; Asad Shaikh

Over the years, many systems have addressed the problem of location sensing. In the past, geographic positioning systems (GPS) have been widely used to track moving objects located outside environments. These systems have several problems such as operational, environmental and high cost. The fixed GPS infrastructure causes several problems in wireless systems. Thus, GPS is considered not a suitable solution for the fixed environment. Due to this, there is a need for the system that can be replaced with less effort to meet future needs. Thus, the purpose of this paper is to discuss the available wireless technologies like radio frequency identification (RFID) techniques and mobile ad hoc sensor network. In doing so, the application of these technologies for remote objects information acquisition and tracking of moving objects is discussed. Further, the authors attempt to develop a communications setup for highways of Pakistan by using RFID and wireless sensor networks techniques to build a network that can be used for object tracking and information acquisition of moving vehicles on highways. This system may be used for variety of purposes especially for security enhancements at highways.


International Journal of Advanced Computer Science and Applications | 2017

Conceptual Model for WWBAN (Wearable Wireless Body Area Network)

Jawad Hussain Awan; Shahzad Memon; Nisar Ahmed Memon; Raza Shah; Zulifqar Bhutto; Rahat Ali Khan

Modern world advances in sensors miniaturization and wireless networking which enables exploiting wireless sensor networking to monitor and control the environment. Human health monitoring is promising applications of sensor networks in a healthcare environment. Sensor system was worn by the human that creates wireless body area network to monitor and provide synchronized response to the patients for medical contextual information received by sensors. Though, challenging tasks are encountered by researchers to address habitually conflicting necessities for size, time to operate, correctness of data, reliability and time to store that data and provide responses accordingly. This paper encompasses the structural design of hardware as well as software in a wireless sensor network system for monitoring health issues. The paper outlines few healthcare services, innovations latest trends those monitor patients in the health care systems and propose some of the other future trends where they might be helpful for future research to be used in handheld.


SAI Computing Conference (SAI), 2016 | 2016

Security of eGovernment services and challenges in Pakistan

Jawad Hussain Awan; Shahzad Memon; Mahmood Hussain Shah; Fawad Hussain Awan

In this modern age, as time passes new emerging technologies, cyber services have been introduced. In this regard, most of the developing countries have deployed and implemented these technologies and services Such as: e Banking, eCommerce and eBusiness in their countries. Pakistan is also one of these developing countries, who has implemented and currently using for the citizen, users, businessmen and also offers these services as government offers user-oriented services. This type of services save the users time and also provides efficient services as well as enhance the economical and social reputation in the market. But, these services may raise a crucial challenge about their security. At this time cyber criminals are active to breach the security measures. Pakistan is also facing the security problem because of limited resources, technical personals and lack of standardized policies. Moreover, this paper highlights the cyber threats and attacks, cyber laws as well as some eGovernment service challenges and recommends cyber protection policies for policy makers. This paper also helps the policy makers and service oriented organizations to design new security policies and strategies for citizens of Pakistan.


2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) | 2015

Social Video Streaming (SVS): A prototype application for street crime reporting

Zulfiqar Ali Bhutto; Kamran Dahri; Iqra Kanwal Lakho; Shahzad Memon

The use of smartphones and android applications has become a part of our everyday life. People use it for communication, entertainment and socialization purposes. Many of these applications available in online application markets can be used to broadcast live video and most of these applications are for socializing purposes. In this paper an android application idea is presented to broadcast a video to help in stopping street crime. SVS(Social Video Streaming) enables mobile users to stream live videos of street crimes anywhere, using 3G/4GLTE or Wi-Fi connection This proposed prototype will provide a facility of live streaming of crimes onto a server through a mobile device which will let police or law enforcement agents get information on the spot to enhance a more robust policing. SVS is developed to enable users participate in reducing street crime. It uses the RTSP (Real Time Streaming Protocol) to transmit data in packets over a streaming media server.


2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) | 2015

Prospects and challenges for social media in Pakistan

Shahzad Memon; Sorath Mahar; Lachhman Das Dhomeja; Farman Pirzado

Advanced and rapid developments in the field of computer and wireless technologies makes easy and possible to be a direct part of electronic media. Social media is an attractive, informative, useful, and approachable way to get information. In last few years, there is an increase observed in the smartphone, smart tablet, and wireless broadband market in Pakistan. It is because of the popularity of social media, its access, and usage in most of citizens. It is a positive prospect for the country, however; there are many issues are rising with the usage of social networking sites. In this paper, the social media technologies were and reasons behind the increase in usage of social media Pakistani netizens (Internet users) is discussed. Moreover, the challenges regarding social media such as cyber-crimes, cyber blackmailing, ethics, security and identity protection in Pakistan is discussed in this Paper.


international conference cloud and big data computing | 2018

Challenges and Solutions in Cloud Forensics

Syed Ahmed Ali; Shahzad Memon; Farhan Sahito

Cloud computing is cutting-edge platform in this information age, where organizations are shifting their business due to its elasticity, ubiquity, cost-effectiveness. Unfortunately the cyber criminals has used these characteristics for the criminal activities and victimizing multiple users at the same time, by their single exploitation which was impossible in before. Cloud forensics is a special branch of digital forensics, which aims to find the evidences of the exploitation in order to present these evidences in the court of law and bring the culprit to accountability. Collection of evidences in the cloud is not as simple as the traditional digital forensics because of its complex distributed architecture which is scattered globally. In this paper, various issues and challenges in the field of cloud forensics research and their proposed solutions have been critically reviewed, summarized and presented.


international conference on emerging technologies | 2015

Theoretical and empirical based extinction coefficients for fog attenuation in terms of visibility at 850 nm

Shahnawaz Shah; Samreen Mughal; Shahzad Memon

Free space optics (FSO) is the transmission of Infrared (IR) signals through LASER in free space with point to point link and receiving through photo diode. Now a days FSO is most preferable last mile solution. In last 15 years researchers focused for designing fog model which convert the visibility value in fog attenuation factor. In the literature two approaches, theoretical and empirical, were used for estimating fog attenuation factor. In theoretical approach fog attenuation formula were derived by using rigorous Mie scattering theory, six fog models based on theoretical approach were selected these are Kruse, Kim, Al Naboulsi advection and convection, Ferdinandov and Grabner models. These models convert the visibility statistics available on meteorological sites into predict specific optical attenuation. In empirical approaches, fog models were derived by a hardware setup form which visibility and optical power at both transmitting and receiving sides were measured statistically and a relation is obtained by applying regression analysis. Three different empirical based models were selected from the literature on the basis of their practical deployment such as continental fog, dense maritime fog and under controlled laboratory condition setup. Selected nine models including theoretical and empirical were simulated in Matlab and comparison results is discussed in this paper.


2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) | 2015

Smart Activities Monitoring System (SAMS) for security applications

Kamran Dahri; Shakeel Rajput; Shahzad Memon; Lachhman Das Dhomeja

In this paper, an android based SAMS (Smart Activities Monitoring System) application for smart phone is proposed. This application is developed with the aim of increasing the national security in Pakistan. In last decade, various incidents including militant attacks and ransom-demands have been reported in which cell phones played a central role in communication between the culprits. The tracking of these criminals is very important and the government needs to adopt technologies to track mobile phones if they are being used for dangerous activities. In this paper, an android based application is presented which is designed and tested to track a suspect without his/her attention. This application tracks a smartphone by obtaining its current location and monitors a suspect remotely by retrieving information such as call logs, message logs etc. It also detects the face of the suspect and covertly captures the picture using cell phone camera and then sends it via multiple messages. Moreover, the monitoring user can also make calls to the phone which the culprit is using in stealth mode to hear the conversation happening in surroundings of the user without the knowledge of suspect.


Journal of Power and Energy Engineering | 2016

Methods and Techniques of Electricity Thieving in Pakistan

Zahoor Hussain; Shahzad Memon; Razahussain Shah; Zulfiqar Ali Bhutto; Mahmoud Aljawarneh


Information Technology Journal | 2007

Internet Based Multimedia Services and Technologies in the Context of e-government: A Conceptual Framework

Shahzad Memon; Khalil Khoumbati; Syed Raza Hussain

Collaboration


Dive into the Shahzad Memon's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Asghar Ali Chandio

University of New South Wales

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge