322 research outputs found

    Pakistan Federation and Baloch Nationalism: A Prospect of Economic Development and Political Challenges

    Get PDF
    It is an old problem with deep wounds both in Islamabad and among the Baloch people that Baloch sub-nationalism intimidating to slash the nation separately, they like to pursue two main viewpoints while explanations of this problem vary. On the other hand, the blame for the difficulty between the Federal government of Pakistan and the Baloch people deceit in the policies and strategies adopted by the government of Pakistan. As well as, censure on lack of Baloch assimilation for the capabilities and culture of the Baloch people. The main centered hierarchical, society and potentials augmented by the internationally stress has pushed them away from integration with the centre. This paper evaluates both sides to determine that awareness more specifically reflect the authenticity innate in the Baloch-Islamabad dilemma. It exposed other elements of every verdict significantly contribute the dilemmas. In addition, the system of Sardari as explained by Pro-Islamabad viewpoint, presents tremendous obstacles for integration. The geo-strategic importance of Baluchistan, the Great Game in the region and the interests of regional and world big powers in Baluchistan would be explored. After discussing the theoretical framework and issues between the central government and the Baloch people, the operative factors that led to trust deficit between the both parties have been explored and comparative analyses have been offered

    On families of convex polytopes with constant metric dimension

    Get PDF
    AbstractLet G be a connected graph and d(x,y) be the distance between the vertices x and y. A subset of vertices W={w1,w2,…,wk} is called a resolving set for G if for every two distinct vertices x,y∈V(G), there is a vertex wi∈W such that d(x,wi)≠d(y,wi). A resolving set containing a minimum number of vertices is called a metric basis for G and the number of vertices in a metric basis is its metric dimension dim(G). A family G of connected graphs is a family with constant metric dimension if dim(G) is finite and does not depend upon the choice of G in G.In this paper, we study the metric dimension of some classes of convex polytopes which are obtained by the combinations of two different graph of convex polytopes. It is shown that these classes of convex polytopes have the constant metric dimension and only three vertices chosen appropriately suffice to resolve all the vertices of these classes of convex polytopes

    A Case Study of Tariq Road Underpass, Karachi: Environmental Analysis

    Get PDF
    The construction projects are rising in Pakistan to overcome the flow of traffic on the main road of big cities. Karachi is the metropolitan city of Pakistan facing uncontrolled growth and urbanization, which leads to an increase in the demand for urban transport facilities. The study focuses on the assessment of the environmental impacts of the Tariq Road underpass construction site. The data was collected with the help of community consultation using analytical methods. It includes public chat, site visits, interviews, questioners, and the samples collection of environmental components. The results show that the most common hazards were related to excavation, working practice variation, and personal protective equipment (PPEs). Faulty and unmaintained machinery with the lack of proper barrier producingnoise and air pollution

    An efficient network intrusion detection and classification system

    Get PDF
    Intrusion detection in computer networks is of great importance because of its effects on the different communication and security domains. The detection of network intrusion is a challenge. Moreover, network intrusion detection remains a challenging task as a massive amount of data is required to train the state-of-the-art machine learning models to detect network intrusion threats. Many approaches have already been proposed recently on network intrusion detection. However, they face critical challenges owing to the continuous increase in new threats that current systems do not understand. This paper compares multiple techniques to develop a network intrusion detection system. Optimum features are selected from the dataset based on the correlation between the features. Furthermore, we propose an AdaBoost-based approach for network intrusion detection based on these selected features and present its detailed functionality and performance. Unlike most previous studies, which employ the KDD99 dataset, we used a recent and comprehensive UNSW-NB 15 dataset for network anomaly detection. This dataset is a collection of network packets exchanged between hosts. It comprises 49 attributes, including nine types of threats such as DoS, Fuzzers, Exploit, Worm, shellcode, reconnaissance, generic, and analysis Backdoor. In this study, we employ SVM and MLP for comparison. Finally, we propose AdaBoost based on the decision tree classifier to classify normal activity and possible threats. We monitored the network traffic and classified it into either threats or non-threats. The experimental findings showed that our proposed method effectively detects different forms of network intrusions on computer networks and achieves an accuracy of 99.3% on the UNSW-NB15 dataset. The proposed system will be helpful in network security applications and research domains. © 2022 by the authors. Licensee MDPI, Basel, Switzerland

    Pathways and LegislationTowards Hospital Wastewater Discharged Around Globe

    Get PDF
    In every section of the environment pharmaceuticals are now can be observed and detected. Hospitals are one of the major sources of pollution via either through environment or wastewater treatment plants (WWTPs). The treatment plants are not prepared for effective treatment of emerging contaminants (ECs). This paper further illustrates the lack of understanding of the ecotoxicity of certain large concentrations of pharmaceutical compounds in HWW (mg L-1). In order to expand this analysis, the ecotoxic risks associated with numerous pollution scenarios, particularly water-dilution and metabolite processing, particularly during transit inside WWPs, have now to be investigated. Furthermore, in hospitals, the average water demand is reported to be between 200-1200 L bed– 1 day–1. Water is consumed in the hospital system with equivalent wastewater discharge. There is also domestic waste disposal in hospital fluids from kitchens, washrooms, and toilets. This paper reviews about characteristics of hospital wastewater, legislation around the globe and its paths ways in biotics system. This review also provides an overview of the pathways of ECs and focused few of its characteristics in biological treatment

    On the metric dimension of rotationally-symmetric convex polytopes

    Get PDF
    Metric dimension is a~generalization of affine dimension to arbitrary metric spaces (provided a resolving set exists). Let F\mathcal{F} be a family of connected graphs GnG_{n} : F=(Gn)n1\mathcal{F} = (G_{n})_{n}\geq 1 depending on nn as follows: the order V(G)=φ(n)|V(G)| = \varphi(n) and limnφ(n)=\lim\limits_{n\rightarrow \infty}\varphi(n)=\infty. If there exists a constant C > 0 such that dim(Gn)Cdim(G_{n}) \leq C for every n1n \geq 1 then we shall say that F\mathcal{F} has bounded metric dimension, otherwise F\mathcal{F} has unbounded metric dimension. If all graphs in F\mathcal{F} have the same metric dimension, then F\mathcal{F} is called a family of graphs with constant metric dimension.\\ In this paper, we study the metric dimension of some classes of convex polytopes which are rotationally-symmetric. It is shown that these classes of convex polytoes have the constant metric dimension and only three vertices chosen appropriately suffice to resolve all the vertices of these classes of convex polytopes. It is natural to ask for the characterization of classes of convex polytopes with constant metric dimension

    Machine Learning Techniques for 5G and beyond

    Get PDF
    Wireless communication systems play a very crucial role in modern society for entertainment, business, commercial, health and safety applications. These systems keep evolving from one generation to next generation and currently we are seeing deployment of fifth generation (5G) wireless systems around the world. Academics and industries are already discussing beyond 5G wireless systems which will be sixth generation (6G) of the evolution. One of the main and key components of 6G systems will be the use of Artificial Intelligence (AI) and Machine Learning (ML) for such wireless networks. Every component and building block of a wireless system that we currently are familiar with from our knowledge of wireless technologies up to 5G, such as physical, network and application layers, will involve one or another AI/ML techniques. This overview paper, presents an up-to-date review of future wireless system concepts such as 6G and role of ML techniques in these future wireless systems. In particular, we present a conceptual model for 6G and show the use and role of ML techniques in each layer of the model. We review some classical and contemporary ML techniques such as supervised and un-supervised learning, Reinforcement Learning (RL), Deep Learning (DL) and Federated Learning (FL) in the context of wireless communication systems. We conclude the paper with some future applications and research challenges in the area of ML and AI for 6G networks. © 2013 IEEE
    corecore