Spectrum of engineering sciences https://sesjournal.com/index.php/1 <p>Spectrum of engineering sciences (SEC), is a refereed research platform with a strong international focus. It is open-access, online, editorial-reviewed (blind), peer-reviewed (double-blind), and Quarterly Research journal (with continuous publications strategy).The main focus of the Spectrum of engineering sciences is to publish original research and review articles centred around the Computer science and Engineering Science and Lunched by the SOCIOLOGY EDUCATIONAL NEXUS RESEARCH INSTITUTE (SME-PV).This international focus is designed to attract authors and readers from diverse backgrounds. At the LASSIJ, we believe that including multiple academic disciplines helps pool the knowledge from two or more fields of study to handle better-suited problems by finding solutions established on new understandings.</p> SOCIOLOGY EDUCATIONAL NEXUS RESEARCH INSTITUTE en-US Spectrum of engineering sciences 3007-312X Combined Navigation Aids In Single User Virtual Environments: A Performance Study https://sesjournal.com/index.php/1/article/view/80 <p>Single User Virtual Environments (SUVEs) employ a range of interaction techniques tailored to specific tasks and applications. The variability in user needs and system requirements has prevented the emergence of a universally effective solution. Effective work in SUVEs often relies on communication channels that enable users to share task goals, manage task decomposition, and monitor progress. In this paper, we evaluate the impact of six combinations of navigation aids: 3DML + Arrows-Casting, 3DML + Audio, Audio + Arrows-Casting, Textual + Arrows-Casting, Audio + textual and 3DML + Textual. The assembly task in SUVE is guided by combined navigation aids and using the shortest path selection algorithm (Dijkstra's). Experiments were carried out on university students to evaluate their effectiveness on task performance in assembly activities of using six navigational aids. Our experiment involved 20 individuals. Findings show that the combination of audio + arrows-casting resulted in the most efficient task completion, while 3DML and textual aids support led to slower navigation performance. This study contributes to understanding the effectiveness of different navigation aids for enhanced user performance in SUVE in assembly tasks accomplishment.</p> <p><strong>Keywords</strong><strong>: </strong>3D virtual environments (VEs), combined navigational aids, Virtual reality (VR), Single User virtual environments (SUVEs), Navigational aids, Three dimensional map with liner (3DML) ·</p> Shah Khalid Abdur Rahman Sherin Aftab Alam Sohail Ghani Copyright (c) 2024 Spectrum of engineering sciences 2024-12-11 2024-12-11 2 4 313 337 5G and Advance Network Architecture Considering Challenges, Solutions and Future Perspectives: A Survey https://sesjournal.com/index.php/1/article/view/78 <p>In recent decades, the two most crucial and intelligent breakthroughs of IT in recent decades have been the categories represented by mobile and wireless communications, plus the Internet. These technologies are not only grown up fast but also make a revolution in human life. The near future targets of the goal of the higher capacity and high data rate Services beyond 4G, lower transmission delay, and better service performance. To accomplish such network objectives above, radical architectural changes of cellular networks are required the aim is to shed some light on what 5G is about: what are the building blocks of core 5G system concept, what the main challenges are and how to tackle them. This paper presents findings from a comprehensive study on fifth-generation (5G) cellular network architecture and emerging technologies that can enhance it to meet user demands. The primary focus of this extensive review is on 5G cellular network design, massive multiple input multiple output technologies, and device-to-device communication (D2D).</p> <p><strong>Keywords</strong><strong>: </strong>5G Architecture, Mobile and Wireless Communications, Cellular Network Design, Massive MIMO (Multiple Input Multiple Output), Device-to-Device Communication (D2D), Ultra-Dense Networks, Full-Duplex Radios, Millimeter Wave Solutions, Cloud Technologies, Software-Defined Networks (SDN), 5G Radio Access Networks (RAN), Internet of Things (IoT), Network Clouds, Enhanced Capacity, Reduced Latency, High Data Rates</p> Hasheem Ahmed Ansar Mehmood Usman Mukhtar Aurangzaib Ahmad Waleed Tahir Arslan Ali Copyright (c) 2024 Spectrum of engineering sciences 2024-11-28 2024-11-28 2 4 338 354 An Enhanced Approach of Exploring Digital Economy Using Modern Computer Networks https://sesjournal.com/index.php/1/article/view/79 <p>With globalization driving complex between state exchange labor and products, challenges have arisen around burdening Worldwide Undertakings (MNEs) in an undeniably computerized economy. This report inspects current two-sided charge arrangements between South Center Part States and countries where most computerized MNEs are settled, zeroing in on MNEs with yearly incomes surpassing EUR 750 million. The investigation gives key information on the source burdening freedoms of South Center Part States, investigating the effect on settlement exchanges and suggesting the reception of Article 12B from the Assembled Countries (UN) Model Assessment Show to help successful advanced tax collection. Also, the review recognizes settlements with restricted source burdening freedoms that might require exhaustive renegotiation past Article 12B's consideration. The report likewise surveys how "PC Programming" is treated in these arrangements, finishing with proposals for future&nbsp;activity.</p> <p><strong>Keywords:</strong><strong>&nbsp;</strong>Digital technologies; digital transformation; digital literacy; digitalization; big data; data analytics; artificial intelligence; blockchain; cybersecurity; challenges.</p> Ghufran Ali Habib ullah Huzaifa Shahbaz M Ahmad Hassan Muhammad Ahmad Muhammad Waleed Copyright (c) 2024 Spectrum of engineering sciences 2024-11-28 2024-11-28 2 4 292 312 Criticality and Security Evaluation of Events: Insights for Luxury Hotel Management https://sesjournal.com/index.php/1/article/view/77 <p>In this research paper, we present a comprehensive Business Intelligence (BI) framework tailored specifically for luxury hotels to optimize their digital marketing strategies through sentiment analysis of customer reviews. By employing advanced Machine Learning (ML) and Deep Learning (DL) methods, we aim to provide valuable insights into customer sentiments to accurately classify sentiments into positive and negative polarities. We utilize Support Vector Machine (SVM), Random Forests (RF), Naive Bayes classifier (NB), and long short-term memory networks (LSTM) networks to effectively classify insights derived from hotel reviews. To begin, we initially perform data acquisition, followed by the identification of implicit and explicit features, and finally, sentiment classification. To evaluate the performance of our approach, we measure precision, recall, True Positive Rate (TPR), False Positive Rate (FPR), loss, and validation accuracy. Substantially, we conduct a comprehensive comparison of different regularization and optimization methods. Our proposed framework demonstrates exceptional accuracy, particularly on the LSTM network, when compared to SVM, RF, and NB classifiers. This outstanding accuracy establishes the superiority of our approach in effectively categorizing hotel review sentiments.</p> <p><strong>Index Terms</strong><strong>:</strong>&nbsp;Sentiment Analysis, security evaluation Review Classification, Luxury hotel Reviews, Smart marketing, Business intelligence, Machine Learning.</p> Asadullah Kehar Mashooque Ali Mahar Zubair Uddin Shaikh Israr ahmed Raja Sohail Ahmed Larik Abdul Rehman Nangraj Copyright (c) 2024 Spectrum of engineering sciences 2024-11-29 2024-11-29 2 4 272 291 Exploring the Impact of Advance 5G Connectivity Revolutionizing Technology: A Survey https://sesjournal.com/index.php/1/article/view/72 <p>The arrival of 5G technology represents a major advancement in connectivity, revolutionizing how people and businesses engage with digital platforms. This paper delves into the various impacts of 5G, highlighting its exceptional speed, minimal latency, and extensive device connectivity. Through its contributions to areas such as autonomous vehicles, smart cities, healthcare, and the Internet of Things (IoT), 5G acts as a catalyst for fostering innovation and enhancing efficiency. The research emphasizes the transformative impact of 5G on communication, the promotion of economic growth, and the reshaping of global digital environments. The examination also covers challenges like infrastructure deployment, cybersecurity risks, and policy implications. In conclusion, this paper highlights the potential of 5G to reshape technological advancement and its crucial role in shaping a connected future.</p> <p><strong>Keywords-</strong> Exploring the Impact of Advance 5G Connectivity Revolutionizing Technology: A Survey</p> Ayesha Urooj Abdul Sami Muhammad Saqib Ahmad Sadaqat Muhammad Abdullah Copyright (c) 2024 Spectrum of engineering sciences 2024-12-09 2024-12-09 2 4 258 271 A Survey of Software-Defined Networks Based on Advance Machine Learning Based Techniques https://sesjournal.com/index.php/1/article/view/73 <p>Presently, networks have opportunities to build systems with improved and intelligent solutions which can be easily tailored for different users. In conventional networking, the software defined networking (SDN) work separately for its control plane and data plane, which makes it better in managing, more secure and affordable. Since ML is the most fundamental branch of AI when amalgamated with SDN it will provide an efficiency and effectiveness in the management of resources such as bandwidth mapping, flow control, error control and security on the network. In this paper you will find the use of network alongside ML implemented on SDN concepts in two ways. First it describes how appropriate ML algorithms are integrated with SDN based networks following assessment. On the other hand, it provides reasonable recommendations for various network applications based on SDN. And toward the end, it discusses the extra development needed for Machine Learning (ML) algorithms and SDN concepts. The common point of AI, Big data, computer networking and similar fields is discussed in this paper. Researchers from different professions and ages have their findings with regards to AI for various uses since it is a young and intricate area. Thus, this paper will assist these researchers to point out these main faults more accurately.</p> <p><strong>Keywords:</strong>&nbsp;&nbsp;Artificial intelligence, machine learning, network management, software-defined networking.</p> Fazeel Mahmood Muhammad Shehroz Zoha Ansari Zain-ul-Abideen Faizan Rauf Copyright (c) 2024 Spectrum of engineering sciences 2024-12-09 2024-12-09 2 4 232 257 A Survey on Tor’s Multi Layer Architecture and Web Implications in Dark Web https://sesjournal.com/index.php/1/article/view/74 <p>The Tor network is a fundamental element of the dark web that provides users with secure and shadowy access to data and communication. Originally tor was developed for privacy and protection purposes but later it turned into a platform where both legal and illegal activities are done. The study looks into the architectural components of Tor, onion routing, encryption layer, and node structure that facilitate obscurity. &nbsp;Moreover, it explores both the positive and negative sides of the network, examining how its architecture works and supports illegal activities. Law enforcement investigates the activities, highlighting the challenges in balancing the benefits of the network against the need to tackle security risks. By reviewing recent research, technical advancement, and structural study, this paper presents a deep understanding of the Tor network in enhancing privacy, security, and unidentified communication. Also highlighting the related risks, challenges, and ethical considerations &nbsp;&nbsp;</p> <p><strong>Keywords:</strong>&nbsp;Tor network, Dark web, onion routing, privacy protection, law enforcement, ethical considerations &nbsp;</p> Noman Aqeel Absar Alam Zahir Bhatti Ammar Amir Hamayun Khan Copyright (c) 2024 Spectrum of engineering sciences 2024-12-09 2024-12-09 2 4 212 231 A Detailed Review of latest Trends, Technologies Applications of Artificial Intelligence in Modern System Network https://sesjournal.com/index.php/1/article/view/75 <p>The application of artificial intelligence (AI), a cutting-edge technology that emulates human intelligence and learning abilities, holds immense potential for advancing computer networks. This article aims to explore AI-based applications in computer networks, emphasizing their role in improving network security and performance. The study highlights the innovations and advancements brought by AI to network technology by examining its applications in areas such as network operations and maintenance, intelligent security systems, intrusion detection, and performance optimization. Additionally, the article provides key recommendations to promote the seamless integration of AI into computer networks, introducing new ideas and strategies for developing secure and efficient network infrastructures.</p> <p><strong>Keywords- </strong>Review of latest Trends, Technologies Applications, Artificial Intelligence &amp; Modern System Network</p> Saud Ismaeel Husnain Saleemi Usman Amir Sayyam Ashraf Ameer Hamza Copyright (c) 2024 Spectrum of engineering sciences 2024-11-12 2024-11-12 2 4 198 211 Research Trends In Deep Learning and Machine Learning for Cloud Computing Security https://sesjournal.com/index.php/1/article/view/76 <p>Meanwhile, security concerns of cloud computing services have grown more diverse and pressurizing with evolution of existing cloud services known to overtake traditional security solutions. Consequently, this paper aims at identifying the contribution of the two most crucial advanced technologies known as machine learning and deep learning in strengthening cloud security. These are techniques that use Artificial Intelligence to detect threats and respond to, or prevent them, automating the identification of abnormalities in cloud traffic. This study focuses on discussing how ML and DL work and their uses, such as fraud detection, real-time authentication in the Zero Trust models, and building security into an application at the software development stage. In addition, it covers important aspects that were previously omitted in other surveys of DL, including privacy, and describes important methods for DL privacy, including federated learning and homomorphic encryption. The paper also explores the issue of model interpretability before highlighting the need for explainable AI frameworks in order to confidence the security administrators. Besides, it explores the threat of adversarial attacks against ML models and also presents a guide to improving model resilience. In conclusion, it is recommended that continuous research should be conducted, and cooperation between researches, practitioners, and policy makers establish to come up with effective and dynamic secure cloud solutions.</p> <p><strong>Keywords</strong><strong>: </strong>Machine Learning, Deep Learning, Cloud Computing, Software Development, AI framework, Cloud traffic, Cloud security</p> Shoaib Mohsin Ali Junaid Baber Zain ul Abidien Muavia Hasan Copyright (c) 2024 Spectrum of engineering sciences 2024-11-20 2024-11-20 2 4 185 197 Enhancing Supplier Capability Through Waste Minimization: A Quality Matrix Perspective https://sesjournal.com/index.php/1/article/view/68 <p>In the packaging sector, even minor deviations in product specifications can lead to increased waste, operational inefficiencies, and compromised product quality. This research focuses on addressing critical manufacturing challenges faced by Company A in maintaining ovality standards for polymer cans exceeding the acceptable threshold (≤3%) or 1.2mm which is pivotal for packaging integrity. Using a combination of advanced tools like the Hoshin Kanri X-Matrix methodology for strategic alignment and integrates tools like root cause analysis (Ishikawa), Pareto analysis, and experimental validation to identify key factors influencing deformation, including load, packaging, and temperature variations. The samples were analyzed, controlled experiments and correlation analyses confirmed that load management significantly reduces deformation, while temperature has minimal impact. By implementing improved packaging designs, including the use of 5-ply separators, floor rejections were reduced from 5% to 1.1%, reduced man-hours by 50%, yielding financial savings of 8.76 MN PKR annually and enhancing operational efficiency.</p> <p><strong>Keywords:</strong>&nbsp;Continuous improvement, Defect reduction, Lean manufacturing, Load management, Packaging quality, Supplier capability, Waste minimization.</p> Zainab Bibi Dr. Rehman Akhtar Ishrat Noor Dr. Ishtiaq Ahmad Copyright (c) 2024 Spectrum of engineering sciences 2024-12-06 2024-12-06 2 4 166 184 SD Network based on Machine Learning: An Overview of Applications and Solutions https://sesjournal.com/index.php/1/article/view/64 <p>The integration of Software-Defined Networking (SDN) and Machine Learning (ML) provides a promising framework for creating adaptive, secure, and responsive networks. This method allows for resource allocation, traffic routing, and security optimization by fusing the&nbsp;centralized control structure of SDN with the data-driven insights of machine learning. This review assesses important studies in SDN-ML applications, emphasizing both important contributions and noteworthy drawbacks, such as limited experimental validation,&nbsp;scalability, and problems with data quality. Future research should investigate sophisticated machine learning techniques, provide scalable frameworks, and improve dataset quality in order to tackle these issues. This study demonstrates how SDN-ML integration may be used to build network environments that are secure, intelligent, and responsive.</p> <p><strong>Keywords-</strong> SD Network based, Machine Learning, Applications and Solutions</p> Abdul Rafay Hamayun Khan Wajiha Salman Gulzar Yahya Uzair Malik Copyright (c) 2024 Spectrum of engineering sciences 2024-11-16 2024-11-16 2 4 150 165 A Survey on Enhanced Approaches for Cyber Security Challenges Based on Deep Fake Technology in Computing Networks https://sesjournal.com/index.php/1/article/view/65 <p>With the help of artificial intelligence methods like as generative adversarial networks (GANs), deepfake technology has developed to produce incredibly lifelike but fraudulent audio, video, and image content. This technology presents significant cybersecurity risks, including as identity theft, social engineering, and public opinion manipulation, even while it has uses in creative media and entertainment. This study explores public awareness and views of deepfake concerns, focusing on people's attitudes toward potential remedies and their level of knowledge regarding potential misuse. An online poll was included in the mixed-methods approach to collect quantitative information on public awareness, perceived risks, and views on technical or regulatory actions.&nbsp;The findings indicate that respondents are generally aware of deepfakes and are particularly concerned about the threats to their privacy, their confidence in digital information, and the possibility of malevolent usage in corporate or political contexts. Most participants support proactive measures to lessen these risks, such as public awareness campaigns, improved regulatory frameworks, and the creation of detecting technology. Findings show that in order to defend against deepfake dangers, lawmakers, software developers, and cybersecurity experts must act quickly to coordinate their reaction. This study adds to the expanding corpus of research on the effects of deepfakes by highlighting the significance of multi-stakeholder cooperation and educated public engagement in addressing this changing cybersecurity threat.</p> <p><strong>Keywords:</strong><strong>&nbsp;</strong>Cybersecurity, Deepfake Technology, Generative Adversarial Networks (GANs), Artificial Intelligence (AI), Digital Media, Identity Theft, Social Engineering, National Security, Misinformation, Detection Algorithms, Public Awareness, Mitigation Strategies, Fraud Political.</p> Jawad Ahmad Hamayun Khan Wajiha Salman Muzamal Amin Zain Ali Shumail Shokat Copyright (c) 2024 Spectrum of engineering sciences 2024-12-04 2024-12-04 2 4 133 149 Investigating the Most Effective AI/ML-Based Strategies for Predictive Network Maintenance to Minimize Downtime and Enhance Service Reliability https://sesjournal.com/index.php/1/article/view/66 <p>The increasing complexity of modern network infrastructures presents significant challenges in maintaining performance and service reliability. Traditional reactive maintenance approaches, which rely on manual troubleshooting and scheduled checks, are often insufficient to prevent unplanned downtime, resulting in financial losses and decreased customer satisfaction. This research proposal explores the most effective AI/ML-based strategies for predictive network maintenance to minimize downtime and enhance service reliability. By leveraging advanced data-driven models, AI and ML technologies can forecast network failures, detect anomalies, and optimize resource allocation, enabling proactive management of network operations. The primary objectives of this study are to identify the most effective AI/ML algorithms, develop predictive models capable of real-time failure forecasting, and assess the impact of these strategies on network performance. The research will evaluate various algorithms, including time-series forecasting (LSTM, ARIMA), supervised learning (Random Forest, SVM), and unsupervised learning models for anomaly detection. By combining historical network data analysis with simulations, this study aims to build a scalable framework for predictive network maintenance. The findings are expected to provide actionable insights, guiding organizations in adopting AI-driven network automation solutions to enhance operational efficiency, reduce costs, and improve network resilience, ultimately supporting the growing demand for reliable digital connectivity across multiple sectors.</p> <p><strong>Keywords</strong><strong>: </strong>Predictive Network Maintenance, Artificial Intelligence (AI), Machine Learning (ML), Network Downtime, Service Reliability, Network Automation, Anomaly Detection, Time-Series Forecasting, AI/ML Algorithms, Proactive Network Management, Network Resilience,&nbsp;Data-Driven Insights, Network Optimization, Operational Efficiency</p> Muhammad Waleed Khawar Hamayun Khan Wajiha Salman Samra Shaheen Ariba Shakil Fatima Iftikhar Khawaja Muhammad Ismail Faisal Copyright (c) 2024 Spectrum of engineering sciences 2024-12-04 2024-12-04 2 4 115 132 A Survey on Latest Trends and Technologies of Computer Systems Network https://sesjournal.com/index.php/1/article/view/67 <p>Zero trust (ZT) represents a set of evolving cybersecurity principles that shift defense strategies from fixed, network-centered perimeters to a focus on users, assets, and resources. A zero trust architecture (ZTA) applies these principles to design industrial and enterprise infrastructure and workflows. Zero trust operates on the idea that no implicit trust is granted to any asset or user account based solely on physical or network location (e.g., a local network versus the internet) or asset ownership (whether enterprise-owned or personal). Both authentication and authorization (of the user and device) are separate steps that must be completed before access to an enterprise resource is allowed. Zero trust is a response to modern network trends such as remote work, bring your own device (BYOD) practices, and the use of cloud-based resources outside an organization’s direct network boundary. Rather than focusing on network segments, zero trust prioritizes securing resources—like assets, services, workflows, and user accounts—because network location alone is no longer considered a main factor in assessing the security posture of a resource. This document provides an outline of zero trust architecture (ZTA), along with general deployment models and use cases where zero trust can enhance an organization’s overall IT security posture.&nbsp;</p> <p><strong>Keywords</strong><strong>: </strong>Architecture; Cybersecurity; Enterprise; Network Security; Zero Trust.</p> Shehreyar Nawaz Hamayun Khan Wajiha Salman Umer Shahid Momin Latif Khokhar M Zaid Iqbal Abdullah Hamid Copyright (c) 2024 Spectrum of engineering sciences 2024-11-14 2024-11-14 2 4 85 114 Internet of Things (IoT's) in Agriculture: Unexplored Opportunities in Cross – Platform https://sesjournal.com/index.php/1/article/view/60 <p>Through precision agriculture, IoT has taken it to the real-time observation and optimization of resources; moreover, the improved productivity within that particular area. Although with numerous developments in the respective areas, most of the agricultural IoT systems lack integration from cross-platform, giving a fragmentation effect on the data and very limited inter- device interoperability between them of different manufacturers. Cross-platform IoT integration in the area of agriculture is also examined here to discuss what seamless data exchange, strong decision-support systems, and even improved automation can gain in agriculture. This study shall review case studies and analyses of technical details to study the existing challenges in areas of standardization, security, and scalability. Its findings show that a singular platform for IoT devices in agriculture can transform agricultural systems, including better resource utilizations, automation, and transparency in the supply chain. Therefore, most probably, cross- platform IoT could overcome such integration barriers and create a more sustainable, connected, and intelligent agricultural ecosystem.</p> <p><strong>Keywords:</strong> Internet of Things (IoT), Precision agriculture, Cross-platform integration, Data interoperability, Agricultural automation, IoT standardization, Sustainable farming, Decision support systems (DSS), Smart farming technology, Agricultural data security</p> Muhammad Abdullah Hamayun Khan Ayesha Shafqat Muhammad Daniyal Muhammad Bilal Muhammad Anas Copyright (c) 2024 Spectrum of engineering sciences 2024-11-13 2024-11-13 2 4 57 84 Strategic Planning for Sustainable Energy Towards Greener Future: Geospatial Analysis of Hydroelectric Power Generation Sites in Pakistan https://sesjournal.com/index.php/1/article/view/62 <p>The unexploited possibilities of hydropower energy in Khyber Pakhtunkhwa (KPK) province, Pakistan, pose a considerable challenge to advancing sustainable energy solutions. This study performs an initial feasibility evaluation to determine appropriate sites for runoff river hydropower initiatives in KPK. The study uses sophisticated geospatial tools like Geographic Information Systems (GIS), remote sensing, and satellite imagery data to pinpoint locations where adequate head and discharge are present. The findings aid in pinpointing potential locations for hydropower development, offering essential insights into sustainable energy alternatives for the region's advancement.</p> <p><strong>Keywords:</strong>&nbsp;Hydroelectric power generation, runoff river hydropower projects, GIS, remote sensing, satellite imagery, geospatial analysis.</p> Saad Zaheer1 Naheed Akhtar2 Ghassan Sattar Khan3 Arslan Soomro4 Muhammad Anwar Ullah5 Ubaid ur Rehman6 Copyright (c) 2024 Spectrum of engineering sciences 2024-11-11 2024-11-11 2 4 33 56 An Enhanced Cost Effective and Scalable Network Architecture for Data Centers https://sesjournal.com/index.php/1/article/view/61 <p>Large-scale data centers, comprises tens of thousands of computers, require significant total of bandwidth. The network infrastructure typically adopts a hierarchical tree configuration of routing and switching components, with higher levels featuring increasingly specialized and expensive equipment. Despite the implementation of advanced IP switches and routers, the resulting setups often utilize only 50% of the total bandwidth available at the network edge, while still incurring significant costs. Its modular, scalable design allows expansion with minimal disruption or cost, supporting big data, AI, and other demanding applications. In this architecture balances efficiency, scalability, and compatibility, making it a future-ready, low-cost choice for data centers modernizing for the digital era and expanding data-driven services.</p> <p><strong>Keywords:</strong>&nbsp;Data Center, Network, Network Architecture, Scalable Network Architecture, Data, Cost Effective.</p> Hafiz M. Saqlain Khan Hamayun Khan Ch. Muhammad Akhtar Hayat Hassan Tayyab Kashif Ali Copyright (c) 2024 Spectrum of engineering sciences 2024-11-09 2024-11-09 2 4 1 32