Sadia Anayat

Work place: Govt College Women University, Sialkot, 51040,Pakistan



Research Interests: Artificial Intelligence, Wireless Networks, Wireless Communication, Image Compression, Image Manipulation, Image Processing, Models of Computation


Sadia Anayat is doing her BS (Hons) in Computer Science (CS) from Govt College Women University Sialkot. She is also certified as Microsoft Office specialist. Currently she is working on research in Blochain technology and comparison between bitcoin and ethereum, cloud computing and green computing topic, artificial intelligence. Her main areas of research interest is wireless sensor network.

Author Articles
A Review of Data Security Challenges and their Solutions in Cloud Computing

By Isma Zulifqar Sadia Anayat Imtiaz Kharal

DOI:, Pub. Date: 8 Jun. 2021

Cloud computing is the newest web based computing network that offers the users with convenient and flexible resources to access or function with different cloud applications. Cloud computing is the availability of the computer network services, mainly storing data and computational power, without explicit user active control. The data in cloud computing is stored and accessed on a distant server by using cloud service provider’ applications. Providing protection is a main issue because information is transferred to the remote server through a medium. It is important to tackle the security issues of cloud computing before implementing it in an organization. In this paper, we call attention to the data related security issues and solution to be addressed in the cloud computing network. To protect our data from malicious users we can implement encryption. We have discussed the advantages of cloud computing in our paper.

[...] Read more.
Value-Risk Analysis of Crowdsourcing in Pakistanā€˜s Perspective

By Muhammad Saady Qurat ul Ain Sidra Anwar Sadia Anayat Samia Rafique

DOI:, Pub. Date: 8 Apr. 2021

The benefits of crowdsourcing are enabled by open environments where multiple external stakeholders contribute to a firm's outcomes. In recent years, crowdsourcing has emerged as a distributed model of problem-solving and market development. Here, model assignments are assigned to networked individuals to complete so that the manufacturing expense of a business can be minimized considerably. The main objective of this research is to develop a methodology which will capture the value generation process in the presence of uncertainties (Risk factors) in crowdsourcing context. This study is designed to make an important contribution to the field of practice and knowledge. Value-Risk Analysis of crowd souring is one of the under studies Worldwide, especially in Pakistan. Provided the need, we have discussed the crowdsourcing as business process and presented an understanding of the risks associated with crowdsourcing use and possible strategies that can be used to maximize the value and minimize the identified risks.
For the better understanding of crowdsourcing practices in Pakistan, three case studies were conducted based on three well reputed organizations of Pakistan and results gathered to help understand its practices, some of the risks associated with it and how they manage those risks.

[...] Read more.
A Deep Analysis of Image Based Video Searching Techniques

By Sadia Anayat Arfa Sikandar Sheeza butt Saher butt

DOI:, Pub. Date: 8 Aug. 2020

For many applications like brand monitoring, it’s important to search a video from large database using image as query[1]. Numerous visual search technologies have emerged with the passage of time such as image to video retrieval(I2V), video to video retrieval(V2V), color base video retrieval and image to image retrieval. Video searching in large libraries has become a new area of research. Because of advance in technology, there is a need of introducing the well established searching techniques for image base video retrieval task. The main purpose of this study is to find out the best image based video retieving technquie. This research shows the importance of image base video retrieving in the searching field and addresses the problem of selecting the most accurate I2V retrieval technique. A comparison of different searching techniques is presented with respect to some characteristics to analyze and furnish a decision regarding the best among them. The accuracy and retrieval time of different techniques is different. This research shows that there are a number of visual search techniques, all those techniques perform same function in different way with different accuracy and speed. This study shows that CNN is best as compare to others techniques. In future, the best among these techniques can be implemented to reduce the searching time and produce the promising result. 

[...] Read more.
Generation Analysis of Blockchain Technology: Bitcoin and Ethereum

By Sidra Anwar Sadia Anayat Sheeza butt Saher butt Muhammad Saad

DOI:, Pub. Date: 8 Aug. 2020

In this paper, the importance of blockchain technology have been discussed and the generations of blockchain (Bitcoin and Ethereum) have been compared provided different aspects. The blockchain is a technology which allows direct transaction without involving third party. Also, it offers many facilities like high translucency, high safety and security, improved trace-ability, greater proficient and transactions’ speed, and reduced costs. Moreover, the cryptocurrencies provide advance security level. The basic purpose of this study is to highlight different aspects of Blockchain, Bitcoin and Ethereum and to show which cryptocurrency is better approach. The research contributes to show the impact of this technology in different fields and a comparison of bitcoin and ethereum is presented to analyze and furnish a decision regarding the best among them.
The use of blochchain technology in government applications can bring a drastic change in the world because it is safer and faster. Also, the comparison shows that ethereum is better than bitcoin as it is efficient and has more applications as compared to bitcoin. It offers more advanced services such as smart contracts. All in all, the analysis has concluded with Ethereum as faster and securer approach.

[...] Read more.
A Deep Analysis of Applications and Challenges of Wireless Sensor Network

By Sadia Anayat Sheeza butt Isma zulfiqar Saher butt

DOI:, Pub. Date: 8 Jun. 2020

Wireless sensor network refer to a community of a spatially dispersed and allocated sensors to track, record the enviromental physical conditions and to coordinate the collected information at a central point. WSN are becoming increasingly important with their wide range of business applications. WSN are being used in multiple fields such as health care, agriculture, systematic observation and condition based serviliance. WSN contain multiple sensors and because of features of implementing nodes, protection and authenticity, wireless sensor network become more complex. Security has drawn much attention in WSN in the last few years. But the transmission work done by sensors, is typically critical because there are large ammount of data and sensor devices are limited. Due to small number of sensers, the system is vulnerable to multiple attacks.  The basic goal of this paper is to highlight the areas where the WSN is being used and multiple  challenges to wireless sensor network. The multiple attacks and challenges to WSN are mentioned in this study. This research shows that although there are many challenges to WSN but still the use of wireless sensor network  in multiple field such as agricultural and healthcare helps a lot to improve the efficiency, quality and performance of the those areas.

[...] Read more.
A Study of Power Management Techniques in Green Computing

By Sadia Anayat

DOI:, Pub. Date: 8 Jun. 2020

Cloud computing is a mechanism for allowing effective, easy and on-demand network access to a shared pool of computer resources. Instead of storing data on PCs and upgrading softwares to match your requirements, the internet services are used to save data or use its apps remotely. It perform the function of processing and storing a database to provide consumers with versatility. For specialized computational needs, the supercomputers are used in cloud computing. Because of execution of such high performances computers, a great deal of power devoured and the result is that certain dangerous gases are often emitted in a comparable amounts of energy. Green computing is the philosophy that aim to restrict this technique by introducing latest models that would work effectively while devouring less resources and having less people. The basic goal of this study is to discuss the techniques of green computing for achieving low power consumption. We analyze multiple power management techniques used in the virtual enviroment and further green computing uses are mentioned. The advantages of green computing discussed in this study have shown that it help in cutting cost of companies, save enviroment and maintain its sustainability. This work suggested that researchers are becoming ever more invloved in green computing technology.

[...] Read more.
Other Articles