Engr. Prof. Dr. Shehnila Zardari.
Articles in Peer-reviewed International Journals
  • S. Alam, Shehnila Zardari, S. Noor, S. Ahmed and H. Mouratidis, "Trust Management in Social Internet of Things (SIoT): A Survey," in IEEE Access, 2022.  JCR Impact Factor ( 3.476) doi: 10.1109/ACCESS.2022.3213699. (W Category)
  • Shehnila Zardari, Sana Alam, Hamad A. Al Salem, Mana S. Al Reshan, Asadullah Shaikh, Aneeq F.K. Malik, Muhammad Masood ur Rehman, and Haralambos Mouratidis. 2022. "A Comprehensive Bibliometric Assessment on Software Testing (2016–2021)" Electronics 11, no. 13: 1984. JCR Impact Factor ( 2.690) https://doi.org/10.3390/electronics11131984 (W Category).
  • Sana Alam, Shehnila Zardari, Jawwad Ahmed Shamsi (2022). Comprehensive Three Phase Bibliometric Assessment on Blockchain (2012-2020). Library Hi Tech. JCR Impact Factor (2.357) https://doi.org/10.1108/LHT-07-2021-0244 (W Category).
  • Waseemullah Nazir, Fatima, Zainab, Shehnila Zardari, Muhammad Fahim, Maria Andleeb Siddiqui, Ag Ibrahim, Asri Ag, Kashif Nisar, and Laviza Falak Naz. "A Novel Approach for Semantic Extractive Text Summarization." Applied Sciences 12, no. 9 (2022): 4479. JCR Impact Factor (2.679) https://doi.org/10.3390/app12094479 (W Category).
  • Zainab Fatima, Muhammad Hassan Tanveer, Waseemullah Nazir, Shehnila Zardari, Laviza Falak Naz, Hina Khadim, Noorah Ahmed, Midha Tahir (2022). Production plant and Warehouse automation with IoT and Industry 5.0. Applied Sciences. JCR Impact Factor (2.679) (W Category)
  • Sana Alam, Shehnila Zardari, Muneera Bano (2021). Software Engineering and 12 Prominent Sub-Areas: Comprehensive Bibliometric Assessment on 13 Years (2007 – 2019). IET Software. JCR Listed. Impact Factor (1.258)
  • N.A. Khan, S. Zardari, A.A. Shaikh, M. Rafi, S. Shaukat (2017). Computer Vision Based Displacement Measurement of Shake Table. International Journal of Computer Science and Network Security, Vol 17 (5), ISSN: 1738-7906. ISI indexed.
  • Laghari, H. He, S. Zardari, M. Shafiq (2017). Systematic Analysis of Quality of Experience (QoE) Frameworks for Multimedia Services. International Journal of Computer Science and Network Security Vol. 17 (6), ISSN: 1738-7906. ISI indexed
  • S. Zardari, M.A. Sawand, N.A. Khan (2016). Dealing with Cloud Adoption Risks: a Goal-Oriented Requirements Negotiation Approach. International Journal of Computer Science and Information Security Vol. 14 (9), pp. 884-887, ISSN: 1947-5500. ISI indexed. Impact Factor (0.519)
  • S. Zardari, M.A. Memon, N.A. Khan (2016). Systematic Analysis of Risks in Cloud Architecture. International Journal of Computer Science and Information Security Vol. 14 (11), ISSN: 1947-5500. ISI indexed. Impact Factor (0.519)
  • N.A. Khan, S. Ali, S. Zardari, Y. Adnan, S. Saeed, S.H. Shamim (2016). Unsupervised Cancer Detection using Computer Vision Techniques. International Journal of Computer Science and Information Security Vol. 14 (10), pp. 724-732. ISSN: 1947-5500. ISI indexed. Impact Factor (0.519)
  • S. Katyara, M.A. Shah, S. Zardari, B.S. Chowdhry, W. Kumar (2016). WSN Based Smart Control and Remote Field Monitoring of Pakistan’s Irrigation System Using SCADA Applications. Wireless Personal Communications. Springer. ISSN: 0929-6212. ISI indexed. JCR listed. Impact Factor (0.701)
  • M. A. Sawand, N.A. Khan, S. Zardari (2016). Combining Weak DFAs to Build Strong Hypothesis Using AdaBoost Classification Algorithm. International Journal of Computer Science and Information Security Vol. 14 (9), pp. 894-899. ISSN: 1947-5500. ISI indexed. Impact Factor (0.519)
  • Najeed A. Khan, Shehnila Zardari, Shabeen Khan, Sehrish Saeed. A Method for Tumour Detection on Brain MRI Image by implementing SVM. International Journal of Computer Science and Information Security Vol. 14 (8), ISSN: 1947-5500. ISI indexed. SCI Impact Factor (0.519)
  • Syeda Uzma Gardazi, Shehnila Zardari. Realizing Compliance Tactics to Support Authentication: Bridging Gap Between Software Architecture and Regulatory Requirements. International Journal of Computer Science and Network Security, Vol. 17 (6), ISSN: 1738-7906. ISI indexed.
Articles in Peer Reviewed National Journals
  • Mukhtiar Ali Unar, David J Murray-Smith, Shehnila Zardari, and Euan W. McGookin (2019). Simulation Studies Relating to Rudder Roll Stabilization of a Container Ship Using Neural Networks. Mehran University Research Journal of Engineering and Technology, Vol. 38 (2). ISSN: 0254-7821. HEC Recognized “X” Category Journal. ISI Indexed
  • S.F. Memon, M.A. Memon, S. Zardari (2017). Blind’s Eye: Employing Google Directions API for Outdoor Navigation of Visually Impaired Pedestrians.  Mehran University Research Journal of Engineering and Technology, Vol. 36 (3) . ISSN: 0254-7821.HEC Recognized “X” Category Journal.
  • G.B. Narejo, F. Azeem, S. Zardari (2017). An Enery Policy Analysis and Proposed Remedial Actions to Reduce Energy Crises in Pakistan.  Mehran University Research Journal of Engineering and Technology, Vol. 36 (2). ISSN: 0254-7821. HEC Recognized “X” Category Journal.
  • A.A. Siddiqui, G.B. Narejo, S.Zardari, M. Tariq, S. Andleeb (2017). Application of Image Processing Algorithms for Brain Tumor Analysis in 2D and 3D Leading to Tumor’s Positioning in Skull: Overview. Mehran University Research Journal of Engineering and Technology, Vol. 36 (1). ISSN: 0254-7821. HEC Recognized “X” Category Journal.
  • Z. Bhatti, I. A. Ismaili, S. Zardari, H.A.M. Malik, M. Karbasi (2016). Procedural Animation of 3D Humanoid Characters Using Trigonometric Expressions. The Journal of Bahria University Information and Communication Technologies, Vol. 9 (2).  ISSN: 1999-4974. HEC Recognized “Y” Category Journal
  • Z. Bhatti, I.A. Ismaili, S. Zardari, W.J. Soomro, A.W. Mahesar (2016). Design and Development of Unicode based Sindhi language Thesaurus. Sindh University Research Journal (Science Series),Vol. 48 (4). ISSN:1813-1743. ISI indexed. HEC Recognized “X” Category Journal.
  • R.A. Khan, S. Memon, S. Zardari, L.D. Dhomeja, M. Usman (2016).Transposition Technique for Minimization of Path Loss in Wireless On-Body Medical Sensors. Sindh University Research Journal (Science Series),Vol. 48 (4). ISSN: 1813-1743. ISI indexed. HEC Recognized “X” Category Journal
  • Parus Khuwaja, Sunder Ali Khowaja, Shehnila Zardari, Imdad Ali Ismaili. The effect of exchange rate volatility on current price and transitional behavior of brokers: A perspective from Agent-based modeling using financial market model. Sindh University Research Journal (Science Series). ISSN: 1813-1743. ISI indexed. HEC Recognized “X” Category Journal
  • Nisar Ahmed Memon, Fatima Abbasi, Shehnila Zardari. Glyph Identification and Character Recognition for Sindhi OCR. Mehran University Research Journal of Engineering & Technology. ISSN: 0254-7821. HEC Recognized “X” Category Journal
  • Z. Hussain, S. Memon, S. Zardari, R.H. Shah, Z.A. Bhutto (2016). Systematic Analysis of Smart Meter Technologies and Their Implementation Challenges in Pakistan. Science International, Vol. 28 (4), pp.113-120. ISSN:1013-5316. ISI indexed. HEC Recognized “Y” Category Journal
Book Chapters
  • S.Zardari, F. Faniyi, R. Bahsoon (2015). Using Obstacles for Systematically Modelling, Analysing and Mitigating Risks in Cloud Adoption. In the book on Cloud Technology: Concepts, Methodologies, Tools and Applications, IGI Global
  • S.Zardari, F. Faniyi, R. Bahsoon (2012). Using Obstacles for Systematically Modelling, Analysing and Mitigating Risks in Cloud Adoption. In the book on Aligning Enterprise, System and Software Architectures.PDF
Conference/Workshop Publications
  • S. Zardari, R. Bahsoon, A. Ekart (2014). Cloud Adoption: Prioritizing Obstacles and Obstacles Resolution Tactics Using AHP. Requirements Engineering Track, The 29th ACM Symposium On Applied Computing, Gyeongju, Korea March 24 – 28, 2014.  (Selection rate 24%) PDF
  • S.Zardari and R.Bahsoon (2011). Cloud Adoption: A Goal-Oriented Requirements Engineering Approach. In the Proceedings of the IEEE/ACM International Workshop on Cloud Software Engineering, the ACM/IEEE 33rd International Conference on Software Engineering (ICSE), Hawaii, USA. PDF
Dr. Raheela Asif.
Journal Publications:
  • Ali, M., Asif, R., “A Framework for creation of designs of varying complexity for use in weaving/printing of textiles”, International Journal of Computer Science and Network Security (IJCSNS), Vol. 19, No. 5, May 2019.
  • Ali, S. A., Asif, R., Hina, S., Fatima, Z., “Cloud Based Remote Lab Platform: An Application of Internet of things (IoT)”, Mehran University Research Journal of Engineering & Technology, Vol. 37, No.4, Oct, 2018.
  • Ahmed, S., Hina, S., Asif, R., “Detection of Sentiment Polarity of Unstructured Multi-Language Text from Social Media”, International Journal of Advanced Computer Science and Applications, Vol. 9, Issue, 7, July, 2018.
  • Asif, R., Merceron, A. Ali, S. A., Haider, N., “Understanding Students’ Performance at Degree Level”, Computers & Education Journal, Volume 113, October 2017, Pages 177-194
  • Hina, S., Asif, R., Mushtaq, S., “Business Intelligence Solution for Food Industry", Journal of Basic and Applied Sciences. Vol. 13, 2017.
  • Ahmed, F., Asif, R., Hina, S, Muzammil, M., “Financial Market Prediction using Google Trends”, International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 8, No. 7, July, 2017.
  • Asif, R., Hina, S, Haque, S. I. “Predicting Student Academic Performance using Data Mining Methods”, International Journal of Computer Science and Network Security (IJCSNS), Vol. 17, No. 5, May 2017 .
  • Hina, S, Asif, R., Wahab, A., Noman, U., Ahmed, W., “Secure Information Exchange of Patient’s Health Records Using Anonymization Techniques”, International Journal of Computer Science and Network Security (IJCSNS), Vol. 17, No. 5, May 2017 .
  • Itrat, M., Ali, S. A., Asif, R., Khanzada, K., Rathi, M.K., "Automatic Language Identification for Languages of Pakistan”, International Journal of Computer Science and Network Security (IJCSNS), Vol. 17, No. 2, February, 2017.
  • Asif, R., Haque, S. I., Zaheer, M. T., Hasan, M. A., “Football (Soccer) Analytics: A Case Study on the Availability and Limitations of Data for Football Analytics Research”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 11, November, 2016.
  • Asif, R., Haider, N., Ali, S. A.” Prediction of Undergraduate Student’s Performance Using Data Mining Methods”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 5, May, 2016.
  • Ali, S. A., Andleeb, M., Asif, R., Rehman, D., “Performance Evaluation of Loss Functions for Margin Based Robust Speech Recognition”, International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 7, No. 2, February, 2016.
  • Asif, R., Merceron, A. & Pathan, M. “Predicting student academic performance at degree level: a case study” International Journal of Intelligent Systems and Applications (IJISA), Vol. 7, No. 1, 2015, 49-61. DOI: 10.5815/ijisa.2015.01.05.
  • Hina, S., Asif, R., Ali, S. A.”Anonymisation framework for securing protected health information (PHI) in a complex dataset of medical narratives”, Accepted and to be published in Mehran University Research Journal of Engineering & Technology.
Peer Reviewed Conference Publications:
  • Asif, R., Merceron, A. & Pathan, M. “Investigating Performance of Students: a Longitudinal Study”, Proceedings of the Fifth International Conference on Learning Analytics and Knowledge, Poughkeepsie, NY, USA, March 16 - 20, 2015, 108-112. DOI: 10.1145/2723576.2723579.
  • Asif, R., Merceron, A. & Pathan, M. “Mining Student’s Admission Data And Predicting Student’s Performance Using Decision Trees”, Proceedings of ICERI2012 Conference, Madrid, Spain, November 19-21, 2012 , 5121-5129, ISBN: 978-84-616-0763-1
  • Mustafa, R. “Characterization of Internal Learning Parameters in Artificial Neural Networks”, Proceedings of 2009 International Association of Computer Science and Information Technology - Spring Conference, Singapore, April 17-20, 2009. DOI: 10.1109/IACSIT-SC.2009.92
Workshop Publication:
  • Asif, R., Merceron, A. & Pathan, M. “Investigating Performances’ Progress of Students”, Proceedings of the Workshop Learning Analytics, 12th e-Learning Conference of the German Computer Society (DeLFI 2014), Freiburg, Germany, September 15, 2014, 116-123.
Dr. Faraz Hyder
Journals:
  • M. F. Hyder, Waseemullah, M. U. Farooq, “Towards Countering the Insider Reconnaissance Using a Combination of Shuffling and Diversity Moving Target Defense Techniques”, Eng. Technol. Appl. Sci. Res., vol. 11, no. 6, pp. 7745-7749, Dec. 2021.
  • Waseemullah, M. F. Hyder, M. A. Siddiqui, and M. Mukarram, “TV Ad Detection Using the Base64 Encoding Technique”, Eng. Technol. Appl. Sci. Res., vol. 11, no. 5, pp. 7605–7609, Oct. 2021.
  • M. F. Hyder and T. Fatima, "Towards Crossfire Distributed Denial of Service Attack Protection Using Intent-Based Moving Target Defense Over Software-Defined Networking," in IEEE Access, vol. 9, pp. 112792-112804, 2021, doi: 10.1109/ACCESS.2021.3103845
  • M. F. Hyder,. Waseemullah, M. U. Farooq, U. Ahmed, and W. Raza, “Towards Enhancing the Endpoint Security using Moving Target Defense (Shuffle-based Approach) in Software Defined Networking”, Eng. Technol. Appl. Sci. Res., vol. 11, no. 4, pp. 7483–7488, Aug. 2021. 
  • M. F. Hyder, S. Tooba, and . Waseemullah, “Performance Evaluation of RSA-based Secure Cloud Storage Protocol using OpenStack”, Eng. Technol. Appl. Sci. Res., vol. 11, no. 4, pp. 7321–7325, Aug. 2021. 4 | P a g e 
  • M. F. Hyder and M. A. Ismail, "Toward Domain Name System privacy enhancement using intent‐based Moving Target Defense framework over software defined networks," Transactions on Emerging Telecommunications Technologies, vol. 32, p. e4318, 2021.
  • M. F. Hyder and M. A. Ismail, "Securing Control and Data Planes From Reconnaissance Attacks Using Distributed Shadow Controllers, Reactive and Proactive Approaches," in IEEE Access, vol. 9, pp. 21881-21894, 2021, doi: 10.1109/ACCESS.2021.3055577.
  • M. F. Hyder and M. A. Ismail, “INMTD: Intent-based Moving Target Defense Framework using Software Defined Networks”, Eng. Technol. Appl. Sci. Res., vol. 10, no. 1, pp. 5142–5147, Feb. 2020.
  • Muhammad Faraz Hyder and Muhammad Ali Ismail, “Distributed Shadow Controllers based Moving Target Defense Framework for Control Plane Security” International Journal of Advanced Computer Science and Applications (IJACSA), 10(12), 2019. http://dx.doi.org/10.14569/IJACSA.2019.0101221.
  • H. Ahmed, M. A. Ismail, M. F. Hyder, S. M. Sheraz, and N. Fouq, "Performance Comparison of Spark Clusters Configured Conventionally and a Cloud Service," Procedia Computer Science, vol. 82, pp. 99-106, 2016.
  • H. Ahmed, M. A. Ismail, M. F. Hyder, S. M. Sheraz, and N. Fouq, "Performance Comparison of Spark Clusters Configured Conventionally and a Cloud Service," Procedia Computer Science, vol. 82, pp. 99-106, 2016.
  • M. F. Hyder, M. A. Ismail "Hybrid Trust Model for Enhancing Operational Trust in Cloud Computing,” 2016 International Electrical Engineering Congress (IEEC), Karachi, 2016,
  • M. F. Hyder and M. A. Ismail, "Application Level Trust Mechanisms for Enhancing the Operational Trust in a Cloud," 2015 International Conference on Cloud Computing (ICCC), Riyadh, 2015, pp. 1-6
  • M. A. Ismail, M. F. Hyder and H. Ahmed, "Openstack Cloud Performance Optimization using Linux Services," 2015 International Conference on Cloud Computing (ICCC), Riyadh, 2015, pp. 1-4.
  • M. F. Hyder, M. A. Ismail and H. Ahmed, "Performance comparison of Hadoop Clusters configured on virtual machines and as a cloud service," 2014 International Conference on Emerging Technologies (ICET), Islamabad, 2014, pp. 60-64
  • H. Ahmed, M. A. Ismail and M. F. Hyder, "Performance optimization of Hadoop cluster using Linux services," 17th IEEE International Multi Topic Conference 2014, Karachi, 2014, pp. 167-172
Conferences:
  • Syed Muhammad Sheraz, Muhammad Faraz Hyder, Muhammad Ali Ismail and Nida Fouq, “Forensic Analysis of Cross-Site Scripting Attacks”, in proceeding of 2nd International Conference on Anti-Cyber Crimes (ICACC 2017), 27-28 March 2017, Riyadh KSA.
  • Syed Muneeb Arif, Muhammad Ali Ismail, Muhammad Faraz Hyder, Marwan Qaiser, Yousuf Siddiqui, Sonia Ali, “Soft Firewall: Firewall as a Service”, in proceeding of 2 nd International Conference on Anti-Cyber Crimes (ICACC 2017), 27-28 March 2017, Riyadh KSA.
  • M. F. Hyder, M. A. Ismail “Hybrid Trust Model for Enhancing Operational Trust in Cloud Computing”, 2016 International Electrical Engineering Congress (IEEC), Karachi, 2016.
  • M. F. Hyder and M. AIsmail, “Application Level Trust Mechanisms for Enhancing the Operational Trust in a Cloud”, 2015 International Conference on Cloud Computing (ICCC), Riyadh, 2015, pp. 1-6.
  • M. A. Ismail, M. F. Hyder and H. Ahmed, “Openstack Cloud Performance Optimization using Linux Services”, 2015 International Conference on Cloud Computing (ICCC), Riyadh, 2015, pp. 1-4.
  • M. F. Hyder, M. A. Ismail and H. Ahmed, “Performance comparison of Hadoop Clusters configured on virtual machines and as a cloud service”, 2014 International Conference on Emerging Technologies (ICET), Islamabad, 2014, pp. 60-64
  • H. Ahmed, M. A. Ismail and M. F. Hyder, “Performance optimization of Hadoop cluster using linux services”, 17th IEEE International Multi Topic Conference 2014, Karachi, 2014, pp. 167-172.
 
    Ms. Asma Khan
    • “Modeling and simulation of Mean Square Error for Packet Loss Criterion in Multiplexing   Environment”, published in Mehran University of Engg. & Technology Research Journal, Volume 22, Number 2, April, 2003, pp 129-132.
    • “Sensitivity of compressed speech signal energies in relation to human perception”, published in Sindh University Research Journal.(Sci.Ser), Vol: 34-B(02) September 2002 pp.117-119.
    • “Analysis of MANNET Routing Protocols using scenario based Mobility Models”, has been published in International Conference at Pakistan Navy Engineering College.
    • “A study of software protection techniques”, has been published in CISSE 2007(International Conference)
    • “Modeling and Simulation of LPC Envelop difference Criterion”, in process for publication.
    • “An improved Numerical Technique for the Solution of Integration” , in process for publication
    • “Analysis of MANET Routing Protocols under TCP VEGAS with Mobility Consideration” , has been   published in IMTIC'08  11- 12 April 2008  (International Conference )
    • “Performance comparison of  Non Criterion based Schemes for  low bit rate speech based multiplexer Architetecture” ,has been presented in IEEE  Sconest 2003 at Bahria University Karachi
    • “Time Synchronization for mobile wireless sensor network” International Journal of Computer and Electrical Engineering, Vol. 6, No. 2, April 2014
    • “Analysis of Proactive and Reactive MANnet routing protocols under selected TCP variants”.
    International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.4, No.4, August 2013.
    • “Information Leakage in Cloud “, has been presented in IEEE ICOSST 2014, 8th international Conference on open Source Systems and Technologies .
    • “Designing of dual band patch antenna using U-slot technique for wireless communication” has been published in Bahria University Research Journal BUJICT.
    • HEPO: The hepatitis ontology for abductive medical diagnostic systems
    • A Khan, A Sadia, S Ahmed, H Tabassum, MS Khan Communication, Computing and Digital Systems (C-CODE), International …
    • Smart Tutor an Intelligent Tutoring System for C Sharp Programming
    • Asma Khan,Junaid Quadri International Journal of Computer Applications 180 (180(27):28-33), 6
    • SUMRATE PERFORMANCE OF PRECODING TECHNIQUES IN MULTIUSER MIMO SYSTEMS
    • Asma Khan Aisha Danish,Farukh Shahid ENGINEERING SCIENCE AND TECHNOLOGY INTERNATIONAL RESEARCH JOURNAL, 2 (1), 6
    Ms. Shumaila Ashfaque
    • "Design of Fast Parallel Adders using Memristors " in ICCEEE  Aug,2017
    Syed Muhammad Sheraz
    • Syed, Sheraz, Asad Arfeen, Riaz Uddin, and Umaima Haider. "An Analysis of Renewable Energy Usage by Mobile Data Network Operators." Sustainability 13, no. 4 (2021): 1886.
    • S. M. Sheraz, M. F. Hyder, M. A. Ismail, N. Fouq, and H. Ahmed. Forensic Analysis of Cross-Site Scripting Attacks. 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 242-246.
    • Ahmed H, Ismail MA, Hyder MF, Sheraz SM, Fouq N. Performance comparison of spark clusters configured conventionally and a cloud servicE. Procedia Computer Science. 2016 Jan 1; 82:99-106.
    • Syed Muhammad Sheraz, Syed Ali Abbas, Dr. Humera Noor, “Fuzzy Rule Based Traffic Signal Control System for Oversaturated Intersections," cinc, vol. 2, pp.162- 165, 2009 International Conference on Computational Intelligence and Natural Computing, 2009.
    • H. Ahmed, M. A. Ismail, M. F. Hyder, S. M. Sheraz, and N. Fouq, Performance Comparison of Spark Clusters Configured Conventionally and a Cloud Service," Procedia Computer Science, vol. 82, pp. 99-106, 2016.
    • Syed Muhammad Sheraz, Syed Ali Abbas, Dr. Humera Noor, "Fuzzy Rule Based Traffic Signal Control System for Oversaturated Intersections," cinc, vol. 2, pp.162-165, 2009 International Conference on Computational Intelligence and Natural Computing, 2009.
    Ms. Zainab Fatima
    • Zainab Fatima,Inshal-ud-din, M.Khurram Design of “On-Cloud Laboratory Platform” to Bring Internet of Things to Laboratories ”IEEEPMulti Topic Symposium 2015, Karachi.
    • Zainab Fatima, Umm-e-farwa, Ali Hussain, M.Khurram”Smart Irrigation for Agricultural Areas of Pakistan using WSN ”International DEWSNET Conference on Dependable Embedded Wireless and Sensing Networks2015.
    • Zainab Fatima,Umm-e-farwa, Ali Hussain, M.Khurram “Matlab Based Implementation of IEEE 802.11B DSSS Transimitter” Applied science and Technology(IBCAST) 13th International Bhurban Conference 2016.
    • Zainab Fatima,Umm-e-farwa, Ali Hussain,M.Khurram “ On cloud Water Resource Management and Smart Irrigation” Ist International conference on Dependabale Embedded wireless and Sensing Networks 2015.
    • Zainab Fatima, Syed Abbas Haider “Online Lab for FPGA Devices” in MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY, Volume: 3,Issue: 4( ISSN:0254-7821)
    Engr. Mustafa Latif
    • Latif, Mustafa, and Muhammad Ali Ismail. "Towards Multi-objective Optimization of Automatic Design Space Exploration for Computer Architecture through Hyper- heuristic." Engineering, Technology & Applied Science Research 9, no. 3 (2019): 4292- 4297.