Search or add a thesis

Advanced Search (Beta)
Home > E-Pat Electric-Power Analytics Tool

E-Pat Electric-Power Analytics Tool

Thesis Info

Author

Famia Inayat

Supervisor

Syed Ali Zahir

Department

Department of Computer Science

Program

BCS

Institute

COMSATS University Islamabad

Institute Type

Public

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2016

Thesis Completion Status

Completed

Subject

Computer Science

Language

English

Added

2021-02-17 19:49:13

Modified

2023-02-17 21:08:06

ARI ID

1676719894456

Similar


Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

76. Al-Insan/The Human Being

76. Al-Insan/The Human Being

I/We begin by the Blessed Name of Allah

The Immensely Merciful to all, The Infinitely Compassionate to everyone.

76:01
a. Was there not a time in the past when the human being was nothing even to be mentioned?!

76:02
a. Indeed, it is WE WHO created human being of a drop of the mingling of seminal and
ovarian fluid of male and female, so that WE may test him during his lifetime.
b. Then WE enabled him with hearing and seeing and intellect.

76:03
a. And WE guided him on to the Right Path
b. to see whether he be grateful by following the Right Path, or be ungrateful by straying off the Right Path.

76:04
a. WE have definitely prepared for the ungrateful - by being sinful - chains and shackles and
a blazing fire.

76:05
a. As for the grateful - by being righteous - they will drink from cups containing a mixture of camphor/musk -

76:06
a. from a spring at which the servants of Allah will drink,
b. - making it gush out abundantly.

76:07
a. The righteous are the ones who used to fulfill their vows, and
b. stand in awe of the Time the evil of which will be encompassing everyone.

76:08
a. And they - the righteous – used to give food
- to the needy, for the love of HIM,
- and also to the orphan,
- and to the captive/prisoner of war,

700 Surah 76 * Al-Insan

76:09
a. saying within themselves:
b. ‘We feed you only for the Face...

Pengaruh Motivasi Kerja Dan Efektivitas Kerja Terhadap Produktivitas Kerja Dengan Kualitas Kerja Sebagai Variabel Intervening

Penelitian ini untuk mengetahui pengaruh motivasi kerja dan efektivitas kerja terhadap produktivitas kerja dengan kualitas kerja sebagai variabel intervening. Jenis penelitian ini adalah jenis penelitian kuantitatif. Populasi penelitian ini seluruh pegawai dinas UPTD Puskesmas Bawomataluo kecamatan Fanayama Kabupaten Nias Selatan yang berjumlah 117 orang. Teknik pemilihan sampel menggunakan teknik sampel non probability. Jenis data yang digunakan dalam penelitian ini adalah data primer dan data sekunder. Teknik pengumpulan data dalam penelitian ini menggunakan alat bantu pengumpulan data yaitu teknik kuesioner, teknik pengumpulan data yang diperlukan dengan cara mengajukan pertanyaan yang langsung diberikan kepada responden yang dalam hal ini adalah sampel penelitian. Analisis data menggunakan pendekatan Patrial Least Square (PLS). Hasil dari penelitian ini menunjukkan setiap variabel motivasi kerja dan maupun variabel efektivitas kerja meningkat dengan hasil yang baik, maka secara langsung maupun tidak langsung produktivitas pegawai di dinas UPTD Puskesmas Bawomataluo akan mengahasilkan output yang meningkat dan hasil yang lebih berkualitas lagi.

Trust Based Security Framework for Secure Routing in Mobile Ad Hoc Networks

Trust Based Security Framework for Secure Routing in Mobile Adhoc Networks Mobile Ad hoc Networks (MANETs) are infrastructure-less networks without central authority. Messages among distant nodes are exchange using multi-hop communication with an assumption that all nodes are trustworthy. However, aforementioned assumption is beyond reality in a network, such as MANETs. A relay node may misbehave by dropping or altering messages either to save resources or due to the malicious intention. To cater for the aforementioned security issues, range of trust-based security schemes has been proposed in the literature to detect and mitigate the adverse e ect of the misbehaving nodes in MANETs. Most of the existing trust-based security schemes in MANETs lack comprehensive and adaptive trust criteria. Proposed schemes are based on single trust attribute, such as packet loss. Each packet loss is considered as an indicator of possible attack by a malicious node. However, there can be several reasons of packet loss, such as interference, queue over ow, and node mobility. Moreover, single trust attribute may cause the bootstrapping problem, which refers to the time required for the evaluation of the trustworthiness of a node. Because of the bootstrapping problem, malicious nodes remain undetected for longer period of time, thus providing more opportunities to malicious nodes to carry out adverse activities. Furthermore, use of static trust parameters, such as trust threshold, weights assignment torst-hand and second-hand reputation information, and trust update frequency in existing trust-based security schemes may result in high false positives rate, low malicious node detection rate, and network partitioning. To address the aforementioned challenges, we have presented an Adaptive Trustbased Security Framework (ATSF) that is based on the comprehensive trust criteria with adaptive trust parameters. The ATSF is based on the multi-attribute trust criteria with a mechanism to identify the real underlying causes of packet losses. Moreover, the ATSF adapts and update the trust parameters, such as xi trust threshold, weights assignment torst-hand and second-hand reputation information, and trust update frequency, based on the run-time network conditions. We provide an implementation of ATSF on a standard routing protocol, the Optimized Link State Routing (OLSR) protocol, and evaluate it through extensive simulations with NS-2 under varying network conditions. We have evaluated the e ectiveness and performance of the ATSF in comparison to existing trust based security schemes under di erent network parameters and con gurations. The experimental results show that the ATSF achieves 98{100% detection rate of malicious nodes with only 1{2% false positives. Moreover, ATSF achieves 75{90% packet delivery ratio compared to 65{80% of static scheme with slight increase in end-to-end delay and energy dissipation of the nodes.