{"title":"IoT Based Architecture for Basketball Supervision","authors":"Mubashir Ali","doi":"10.54692/lgurjcsit.2019.030490","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030490","url":null,"abstract":"Basketball is one of the most played games in the world with a huge amount of fan following and has a great number of basketballers. Sometimes players get severe lower body wounds such as ankle sprains, shortage of breath, head, teeth, hand, and fingers. Female players have a higher risk of knee injuries than male players. These are health issues that players face while playing basketball. Sports organizations spend millions to train fresh basketball players or for the development of the previous basketball players. The internet of things (IoT) made everyday things readable, controllable and recognizable through the internet and the wireless sensor networks. It is simply the network of interconnected devices that are embedded with sensors, software, and connectivity modules.Nowadays, with this growing technology it is possible to protect the life of players in the game as well as in training sessions, if we detect the problems early in players and appropriate actions will be taken to reduce adverse health effects which can be very dangerous. In this paper, we will propose an architecturefor basketball based on the internet of things (IoT). The main goal behind this approach is to introduce a healthcare system based upon sensors, actuators, devices and telecommunication technologies to communicating real-time stats.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122608129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallel Data Transmission using New Line Encoding Method","authors":"Waqas Ahmad, Awais Salman Qazi","doi":"10.54692/lgurjcsit.2019.030491","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030491","url":null,"abstract":"In our research paper, we have introduced a unique and new line code method/technique that will have the capability to send two different codes in parallel or concurrently using a single line code, and this will be achieved without any major loss in the shape of the signal. In our proposed new line code, the structure of our code is based on two already well-known line codes that have been used many times in the data communication field, both of them have been combined together. We can say that our new line coding method is a hybrid encoding scheme. This line code combines the properties of already existing line code techniques. At the receiver end, we have implemented a very easy and basic separation technique that shall help us to separate the real user codes from the added line code, and this will happen without any disturbance or major loss/distortion. There will be no effect on the signal of input data.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125623351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flower Detection in Digital Image Processing using Global Image Enhancement Method","authors":"Arfa hassan, Sarmad Zaheer Ahmad, Qurat ul Ain","doi":"10.54692/lgurjcsit.2019.030382","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030382","url":null,"abstract":"Flowers are plays an important role on the planet as they contain the reproduction part of plants. The only flower parts of plants have ability to produce different kinds of fruit, vegetable, and seeds for humans. Flower seeds also are used to produce oil. Honey bees collect nectar from flowers to produce honey. In this paper a new approach is proposed for flower detection. The proposed algorithm is use Global image enhancement and thresholdging technique for flower detection in digital images.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"99 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116908586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Zulkifl Hasan, M Zunnurain Hussain, Zaka Ullah
{"title":"Computer Viruses, Attacks, and Security Methods","authors":"Muhammad Zulkifl Hasan, M Zunnurain Hussain, Zaka Ullah","doi":"10.54692/lgurjcsit.2019.030380","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030380","url":null,"abstract":"with the fast growth of the Internet, computer threats and viruses have become a very serious issue for us, which attract public attention. Therefore, the distribution of computer viruses and worms were discussed in this study. This paper focuses on the effects of computer viruses. The main area of this paperis a brief discussion on computer viruses and security or detection methods. This study is very useful and helpful for computer users to use the different methods, possible steps to protect their system and information from any kind of possible attacks on their system.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126862673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Expert System Technique for Sentiment Analysis of Opinions","authors":"Sabreena Nawaz, Rabia Khan, Kashaf Ad Dooja","doi":"10.54692/lgurjcsit.2019.030383","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030383","url":null,"abstract":"To help the users and the product owners it is quite necessary to extract aspects from the online reviews, their sentiment polarities, and associations between them. There is a great deal of work done in the field of sentiment analysis. Lexical and learning-based systems can be combined to separate the assessments from online opinions and reviews. In learning-based techniques, the Gaussian mixture model can be used for getting probabilistic results for polarities against aspects and naïve baize classifiers for the problem of spam comments which produced better and competitive results against previous techniques.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128686364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Things: Architectural Components, Protocols and Its Implementation for Ubiquitous Environment","authors":"Waqar Azeem, Aftab Ahmad Malik","doi":"10.54692/lgurjcsit.2019.030384","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030384","url":null,"abstract":"Ubiquitous data processing of the sensing nodes has revolutionized the development of electronic industries manufacturing. The concept of the Internet of Things (IoT) is the connectivity of distributed sensing and processing nodes from anywhere rather than fixed computing. For the Implementation of Ubiquitous smart environment, anything and everything can be converted to smart IO Things, and where things have sensing and processing abilities for automation and analysis of environmental processes. Sensors, actuators, embedded processing systems, networking gateways, and IoT Cloud Services are the building blocks of IoT implementation. This paper presents a brief discussion on the connectivity of building blocks with various enabling technologies for the implementation of the Internet of Things. Moreover, many of data link standards and the internet of things data communication protocols will be in the discussion.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134424120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mehreen Qamar, Fouzia, Sowaiba Khan, Aqsa, Aneela Mehmood, Raeena
{"title":"MANet vs VANet- The Applications & Challenges","authors":"Mehreen Qamar, Fouzia, Sowaiba Khan, Aqsa, Aneela Mehmood, Raeena","doi":"10.54692/lgurjcsit.2019.030381","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030381","url":null,"abstract":"Vehicular Ad hoc Networks (VANet) and Mobile Ad hoc Networks (MANet) have evolved into one of the very capable fields of research work in wireless networking. VANet is termed as a stimulating form of MANet owing to its highly erratic dynamic topology, frequently occurring disconnections and lifethreateningissues. This paper is a comparative review of MANet, VANet and their applications along with challenges.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130560696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prof Dr Aftab Malik, Dr. Haroon Ur-Rashid Rashid, Waqar Azeem
{"title":"ANALYSIS OF BORDER GATEWAY PROTOCOL, ITS TYPES AND MEASURES TO AVOID RISK","authors":"Prof Dr Aftab Malik, Dr. Haroon Ur-Rashid Rashid, Waqar Azeem","doi":"10.54692/lgurjcsit.2019.030379","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030379","url":null,"abstract":"This is the age of digital communication. The process involves sending messages from one end of the network to other end using the internet, extranets and the Internet of Things (IOT) Technologies. Initially, the internet is a small community. But today internet becomes a global community as thousands of different administrative entities own and operate the internet. The process of transferring data across the network is known as routing. The process of routing is performed by using routers. Routers use certain protocols to achieve this task. The Broader Gateway Protocol (BGP) is an interdomain routing protocol that is used to connect two different autonomous systems. The autonomous system is collection of network that runs under a single administrative entity. This paper includes analysis and important techniques of border gateway protocol, types of BGP, its attributes, security threats and measures to avoid risks.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130847035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flying Ad Hoc network (FANET) Communication between UAV's","authors":"Saman Abdi","doi":"10.54692/lgurjcsit.2019.030277","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030277","url":null,"abstract":"In FANET network communication is one of the major concern, and also communication between multi-UAV frameworks. The communication is established between UAV's and base terminal through satellite or any other structure. This kind of communication create issue between UAV's, the long distance between UAV's can create blackouts in communication, because of these issues the ad hoc network can be used among the UAV's, this kind of communication network is called FANET. In this paper I will discuss the implementation of the network and how the network structure can provide reliable communication ad transfer of data between the unnamed aerial vehicles UAV's and the base terminals.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114507209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Use of SPAN for Identified Network Traffic via Machine Learning","authors":"Akifa Abbas, Danish Ali, Sidra Noureen, Rehmatullah","doi":"10.54692/lgurjcsit.2019.030276","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030276","url":null,"abstract":"Few years back the number of wireless devices and their use in our daily life has been increased a lot. All devices cell phones, laptops, tablets, camera, TVs, home appliances have become a part of network now. As the network devices are growing and getting connected to each other the security risks are getting higher. All the companies and organizations are now establishing and implanting the public and private wireless networks. Organization have to pay heavy cost to implement and integrate all devices together on a network. As wireless networks are more vulnerable to threats and in security's a huge network all the devices should be identified whenever they enter or leave a network traffic pool the experimental work in this paper will elaborate the methods to identify the network traffic identification under encryption. This paper emphases on identification of devices based on layer 2 functionality by MAC (Media Access Code). Later on, the identification was improved using labeled or tagged traffic methods by use of SPAN (Switch port analyzer technique) technology or protocol with assistance ofVirtual Local Area Network. Many Supervised learning methods were examined during experiment and were referenced on data collected by real time traffic. The network traffic of multiple deceives gradually passes through network so incremental learning method is implemented as classification for streaming data.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132501292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}