بحوث أعضاء هيئة التدريس

أنت هنا

Selected Publications 2018-2019 نيسار كوتاكاران سوبي

1.      K.S. Nisar, H. Sarangal, and S.S. Thapar. Performance evaluation of newly constructed NZCC for SAC-OCDMA using direct detection technique. Photonic Network Communications, 37(1), 75–82 (2019). https://doi.org/10.1007/s11107-018-0794-4 , Number of citations: 2

2.      K.S. Nisar, Further Extension of the Generalized Hurwitz-Lerch Zeta Function of Two Variables, Mathematics 2019, 7(1), 48; 5 Jan 2019, https://doi.org/10.3390/math7010048

3.      K.S. Nisar, D.L. Suthar, M. Bohra, S.D. Purohit, Generalized Fractional integral operators pertaining to the by-product of Srivastava's polynomials and generalized Mathieu Series, Mathematics, Mathematics 2019, 7(2), 206; https://doi.org/10.3390/math7020206

4.      NU Khan, T Usman, K.S Nisar, A Study of Generalized Laguerre Poly-Genocchi Polynomials, Mathematics 2019, 7(3), 219; https://doi.org/10.3390/math7030219

5.      Junesang Choi, K.S. Nisar, Certain families of integral formulas involving Struve function, Boletim da Sociedade Paranaense de Matematica, Scopus, 37, 3, (2019), 27—35., https://doi.org/10.5269/bspm.v37i3.31890  

6.      Chuan-Jun Huang, Gauhar Rahman, Nisar K S, Feng Qi, Some inequalities of the Hermite-Hadamard type for k-fractional conformable integrals, January 2019, Australian Journal of Mathematical Analysis and Applications 16(1):9 pages

7. Sirazul Haq, Abdul Hakim Khan, Kottakkaran Sooppy Nisar, A study of new class of integrals associated with generalized Struve function and Polynomials, Commun. Korean Math. Soc. 2019, Jan 31,  Vol. 34, No. 1, 169-183, https://doi.org/10.4134/CKMS.c170490

...
Conferences/chair نيسار كوتاكاران سوبي
Member International conference committee  of 24’ICFIDCAA-2016

2.       http://anandice.ac.in/24icfidcaa-2016/international-committee-members-2/

Conference session chair, ICM2017, Ooty Keynote speaker, IIT Indore, 2017. ...
Research Projects نيسار كوتاكاران سوبي

1. Fractional Integration of Generalized Bessel-type Functions and Application to Strong Stabilization of Linear Time Invariant Systems, Deanship of Scientific Research, project No 2014/01/2152, Salman bin Abdulaziz University, Saudi Arabia, 2014 (finished)

2. Twin Support Vector Machine System identification, FT131015, King Fahd University of Petroleum and Minerals, Saudi Arabia. 2013 (Finished)

3. Subordination property of Bessel functions, Deanship of Scientific Research in University of Dammam, project ID#2014219., University of Dammam, Saudi Arabia.2013 (in Progress)

4. Modeling and Simulation of 10Gbit/s of optical fiber network based on   optical code division multiple access (OCDMA) system, Deanship of Scientific Research , project No 877/1/2014., Salman bin Abdulaziz University, Saudi Arabia.2014 (in Progress)

5. Optimization methods and non-parallel support vector machines, project No 2015/01/4329, Prince Sattam bin Abdulaziz University, Saudi Arabia. (2015), (Finished)

6. Fractional q-calculus operators and their inequalities, Specialized Research Grant program, Prince Sattam bin Abdulaziz University, Saudi Arabia, (2015), (Finished)

7. Applications of Advanced Mathematical and Signal Processing Engineering Techniques to Machine Learning and Communications Technology (Progress) ...
Performance evaluation of framework of VoIP/SIP server under virtualization environment along with the most common security threats غلام مغيث . مجتبى

Virtualization is the central point empowering cloud infrastructure. Many services, such as web-based applications, databases, and instant messaging servers, are running on virtual systems to reduce total cost ownership and generate immediate return on investment. However, applications concerned with latency, such as the Voice over Internet Protocol (VoIP) application, are limited in virtual systems. Hence, in this research, we aim to study the VoIP behavior under virtualization environment. VoIP infrastructure should be equipped with security shield to protect itself from various forms of security threats; this security setup provides additional response time overhead. In this study, we implement VoIP on a virtual machine (VM) and measure various elements, such as signaling and medium transmission. The performance of the proposed system is studied with and without security shield. Virtualization environment never induces delay to the VM–VoIP system, even if it is deployed with security solutions

...
An Online Lab Examination Management System (OLEMS) to Avoid Malpractice مانجور كولهار سيد باداشا

Examination and evaluation are two important phases of education at any level of a student’s curriculum. However, these assessment processes are problematic in the sense that they encourage learners to devise ways to be dishonest. The traditional way of conducting exams is particularly conducive to dishonesty. In view of this, this letter proposes an online lab examination management system to prevent misconduct and to secure the process of lab examination.

...
QoS Design Consideration for Enterprise and Provider's Network at Ingress and Egress Router for VoIP protocols مانجور كولهار سيد باداشا

Compliance with the Service Level Agreement (SLA) metric is a major challenge in 
a Multiprotocol Label Switching Virtual Private Network (MPLS VPN) because mandatory 
models must be maintained on both sides of the MPLS VPN in order to achieve end-to-end 
service levels. The end-to-end service of an MPLS VPN can be degraded owing to various 
issues such as distributed denial of service (DDoS), and Random Early Detection (RED) that 
prevents congestion and differentiates between legitimate and illegitimate user traffic.

...
Multiplexing VoIP Packets over Wireless Mesh Networks: A Survey مانجور كولهار سيد باداشا

 Wireless mesh networks (WMNs) have been increasingly applied in private and public networks during the last decade. In a different context, voice over IP (VoIP) has emerged as a new technology for making voice calls around the world over IP networks and is replacing traditional telecommunication systems. The popularity of the two technologies motivated the deployment of VoIP over WMNs. However, VoIP over WMNs suffers from inefficient bandwidth utilization because of two reasons: i) attaching 40-byte RTP/UDP/IP header to a small VoIP payload (e.g., 10 bytes) and ii) 841 μs delay overhead of each packet in WMNs. Among several solutions, VoIP packet multiplexing is the most prominent one. This technique combines several VoIP packets in one header. In this study, we will survey all the VoIP multiplexing methods over WMNs. This study provides a clear understanding of the VoIP bandwidth utilization problem over WMNs, discusses the general approaches in which packet multiplexing methods could be performed, provides a detailed study of present multiplexing techniques, shows the aspects that hinder the VoIP multiplexing methods, discusses the factors affected by VoIP multiplexing schemes, shows the merits and demerits of different multiplexing approaches, provides guidelines for designing a new improved multiplexing technique, and provides directions for future research. This study contributes by providing guidance for designing a suitable and robust method to multiplex VoIP packets over WMNs.

...
Performance evaluation of framework of VoIP/SIP server under virtualization environment along with the most common security threats مانجور كولهار سيد باداشا

irtualization is the central point empowering cloud infrastructure. Many services, such as web-based applications, databases, and instant messaging servers, are running on virtual systems to reduce total cost ownership and generate immediate return on investment. However, applications concerned with latency, such as the Voice over Internet Protocol (VoIP) application, are limited in virtual systems. Hence, in this research, we aim to study the VoIP behavior under virtualization environment. VoIP infrastructure should be equipped with security shield to protect itself from various forms of security threats; this security setup provides additional response time overhead. In this study, we implement VoIP on a virtual machine (VM) and measure various elements, such as signaling and medium transmission. The performance of the proposed system is studied with and without security shield. Virtualization environment never induces delay to the VM–VoIP system, even if it is deployed with security solutions.

...
Cloud Data Auditing Techniques with a Focus on Privacy and Security مانجور كولهار سيد باداشا

Nowadays, large amounts of data are stored with cloud service providers. Third-
party auditors (TPAs), with the help of cryptography, are often used to verify this data. 
However, most auditing schemes don't protect cloud user data from TPAs. A review of the 
state of the art and research in cloud data auditing techniques highlights integrity and 
privacy challenges, current solutions, and future research directions

...
Creating Self-Learning Environments for Students of English at PSAU. Azra Rafath Liyaakat

CREATING “SELF-LEARNING”ENVIRONMENTS FOR

     STUDENTS  OF ENGLISH @ THE COLLEGE OF

ARTS & SCIENCES FOR GIRLS IN WADI ADDAWASIR

...
QR Code for https://casw.psau.edu.sa/ar/sources/research/4