Shahzad Memon
University of Sindh
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Shahzad Memon.
business information systems | 2010
Shahzad Memon; Khalil Khoumbati; Asad Shaikh
Over the years, many systems have addressed the problem of location sensing. In the past, geographic positioning systems (GPS) have been widely used to track moving objects located outside environments. These systems have several problems such as operational, environmental and high cost. The fixed GPS infrastructure causes several problems in wireless systems. Thus, GPS is considered not a suitable solution for the fixed environment. Due to this, there is a need for the system that can be replaced with less effort to meet future needs. Thus, the purpose of this paper is to discuss the available wireless technologies like radio frequency identification (RFID) techniques and mobile ad hoc sensor network. In doing so, the application of these technologies for remote objects information acquisition and tracking of moving objects is discussed. Further, the authors attempt to develop a communications setup for highways of Pakistan by using RFID and wireless sensor networks techniques to build a network that can be used for object tracking and information acquisition of moving vehicles on highways. This system may be used for variety of purposes especially for security enhancements at highways.
International Journal of Advanced Computer Science and Applications | 2017
Jawad Hussain Awan; Shahzad Memon; Nisar Ahmed Memon; Raza Shah; Zulifqar Bhutto; Rahat Ali Khan
Modern world advances in sensors miniaturization and wireless networking which enables exploiting wireless sensor networking to monitor and control the environment. Human health monitoring is promising applications of sensor networks in a healthcare environment. Sensor system was worn by the human that creates wireless body area network to monitor and provide synchronized response to the patients for medical contextual information received by sensors. Though, challenging tasks are encountered by researchers to address habitually conflicting necessities for size, time to operate, correctness of data, reliability and time to store that data and provide responses accordingly. This paper encompasses the structural design of hardware as well as software in a wireless sensor network system for monitoring health issues. The paper outlines few healthcare services, innovations latest trends those monitor patients in the health care systems and propose some of the other future trends where they might be helpful for future research to be used in handheld.
SAI Computing Conference (SAI), 2016 | 2016
Jawad Hussain Awan; Shahzad Memon; Mahmood Hussain Shah; Fawad Hussain Awan
In this modern age, as time passes new emerging technologies, cyber services have been introduced. In this regard, most of the developing countries have deployed and implemented these technologies and services Such as: e Banking, eCommerce and eBusiness in their countries. Pakistan is also one of these developing countries, who has implemented and currently using for the citizen, users, businessmen and also offers these services as government offers user-oriented services. This type of services save the users time and also provides efficient services as well as enhance the economical and social reputation in the market. But, these services may raise a crucial challenge about their security. At this time cyber criminals are active to breach the security measures. Pakistan is also facing the security problem because of limited resources, technical personals and lack of standardized policies. Moreover, this paper highlights the cyber threats and attacks, cyber laws as well as some eGovernment service challenges and recommends cyber protection policies for policy makers. This paper also helps the policy makers and service oriented organizations to design new security policies and strategies for citizens of Pakistan.
2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) | 2015
Zulfiqar Ali Bhutto; Kamran Dahri; Iqra Kanwal Lakho; Shahzad Memon
The use of smartphones and android applications has become a part of our everyday life. People use it for communication, entertainment and socialization purposes. Many of these applications available in online application markets can be used to broadcast live video and most of these applications are for socializing purposes. In this paper an android application idea is presented to broadcast a video to help in stopping street crime. SVS(Social Video Streaming) enables mobile users to stream live videos of street crimes anywhere, using 3G/4GLTE or Wi-Fi connection This proposed prototype will provide a facility of live streaming of crimes onto a server through a mobile device which will let police or law enforcement agents get information on the spot to enhance a more robust policing. SVS is developed to enable users participate in reducing street crime. It uses the RTSP (Real Time Streaming Protocol) to transmit data in packets over a streaming media server.
2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) | 2015
Shahzad Memon; Sorath Mahar; Lachhman Das Dhomeja; Farman Pirzado
Advanced and rapid developments in the field of computer and wireless technologies makes easy and possible to be a direct part of electronic media. Social media is an attractive, informative, useful, and approachable way to get information. In last few years, there is an increase observed in the smartphone, smart tablet, and wireless broadband market in Pakistan. It is because of the popularity of social media, its access, and usage in most of citizens. It is a positive prospect for the country, however; there are many issues are rising with the usage of social networking sites. In this paper, the social media technologies were and reasons behind the increase in usage of social media Pakistani netizens (Internet users) is discussed. Moreover, the challenges regarding social media such as cyber-crimes, cyber blackmailing, ethics, security and identity protection in Pakistan is discussed in this Paper.
international conference cloud and big data computing | 2018
Syed Ahmed Ali; Shahzad Memon; Farhan Sahito
Cloud computing is cutting-edge platform in this information age, where organizations are shifting their business due to its elasticity, ubiquity, cost-effectiveness. Unfortunately the cyber criminals has used these characteristics for the criminal activities and victimizing multiple users at the same time, by their single exploitation which was impossible in before. Cloud forensics is a special branch of digital forensics, which aims to find the evidences of the exploitation in order to present these evidences in the court of law and bring the culprit to accountability. Collection of evidences in the cloud is not as simple as the traditional digital forensics because of its complex distributed architecture which is scattered globally. In this paper, various issues and challenges in the field of cloud forensics research and their proposed solutions have been critically reviewed, summarized and presented.
international conference on emerging technologies | 2015
Shahnawaz Shah; Samreen Mughal; Shahzad Memon
Free space optics (FSO) is the transmission of Infrared (IR) signals through LASER in free space with point to point link and receiving through photo diode. Now a days FSO is most preferable last mile solution. In last 15 years researchers focused for designing fog model which convert the visibility value in fog attenuation factor. In the literature two approaches, theoretical and empirical, were used for estimating fog attenuation factor. In theoretical approach fog attenuation formula were derived by using rigorous Mie scattering theory, six fog models based on theoretical approach were selected these are Kruse, Kim, Al Naboulsi advection and convection, Ferdinandov and Grabner models. These models convert the visibility statistics available on meteorological sites into predict specific optical attenuation. In empirical approaches, fog models were derived by a hardware setup form which visibility and optical power at both transmitting and receiving sides were measured statistically and a relation is obtained by applying regression analysis. Three different empirical based models were selected from the literature on the basis of their practical deployment such as continental fog, dense maritime fog and under controlled laboratory condition setup. Selected nine models including theoretical and empirical were simulated in Matlab and comparison results is discussed in this paper.
2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) | 2015
Kamran Dahri; Shakeel Rajput; Shahzad Memon; Lachhman Das Dhomeja
In this paper, an android based SAMS (Smart Activities Monitoring System) application for smart phone is proposed. This application is developed with the aim of increasing the national security in Pakistan. In last decade, various incidents including militant attacks and ransom-demands have been reported in which cell phones played a central role in communication between the culprits. The tracking of these criminals is very important and the government needs to adopt technologies to track mobile phones if they are being used for dangerous activities. In this paper, an android based application is presented which is designed and tested to track a suspect without his/her attention. This application tracks a smartphone by obtaining its current location and monitors a suspect remotely by retrieving information such as call logs, message logs etc. It also detects the face of the suspect and covertly captures the picture using cell phone camera and then sends it via multiple messages. Moreover, the monitoring user can also make calls to the phone which the culprit is using in stealth mode to hear the conversation happening in surroundings of the user without the knowledge of suspect.
Journal of Power and Energy Engineering | 2016
Zahoor Hussain; Shahzad Memon; Razahussain Shah; Zulfiqar Ali Bhutto; Mahmoud Aljawarneh
Information Technology Journal | 2007
Shahzad Memon; Khalil Khoumbati; Syed Raza Hussain