You are on page 1of 63

Message from Chairman PEC Engr. Dr.

Muhammad Akram Sheikh


It gives me immense pleasure and satisfaction to see the completion of the second edition of Engineer PEC. I congratulate the editorial board for putting in their best to bring out a magazine of such high calibre containing thought provoking articles and research papers. I also thank the authors for sparing time and contributing towards this noble cause. Taking the opportunity of this forum, I request all members of the engineering community to contribute new ideas, unpublished research and development (R&D) projects/papers and other articles for betterment of the engineering profession in general and Pakistans prosperity and development in particular. I would also welcome my fellow engineers to express their feelings with respect to the virtues of maintaining high standards of professional ethics. Any suggestions for improvement of this magazine are welcome. I wish you all the best and assure you of my full support.

EDITORIAL BOARD
PATRON: EDITOR-IN-CHIEF: EDITORS: Engr. Dr. M. Akram Sheikh HI Engr. Maj. Gen (R) Mahboob-ul-Muzaffar Engr. Lt. Col (R) Muhammad Iqbal Mahmood Rehmani COMPILER: PUBLISHER:
Message from the Editorial Board The second issue of Engineer (PEC) is in your hands! It is more progressive and contains a greater number of thought provoking articles related to various engineering disciplines. The aim is to make it a magazine of National and International repute. We are slowly and gradually moving towards our cherished goal of making it a peer reviewed/ referred Journal. This aim can only be achieved through the cooperation and scholarly efforts of our engineering community. We expect all engineers to come forward and join hands to make this dream come true. Using this forum, we request the engineering community to share their experiences, thoughts, R&D activities, unpublished thesis and genuine efforts related to their profession. Contributions related to accreditation of engineering programs are also welcome. Hopefully Engineer (PEC) will become a Journal, wherein publishing of research papers would be the desire of any one involved in the engineering profession. Your views, suggestions and contributions may be addressed to:Editor Engineer (PEC) Pakistan Engineering Council, Attaturk Avenue (East), Sector G-5/2, Islamabad. Telephone:+92-51-2829248, 2829311, 2829296 E-mail: info@pec.org.pk The Editorial Board wishes to convey its deep appreciation for the scholarly efforts of all authors whose papers appear in this magazine. We expect all engineers to contribute articles for Engineer (PEC) which is their own magazine. We would also like to say a special word of thanks to the enthusiastic team of management and staff who remained behind the scene yet put in their heart and soul to make this magazine reach your hands. Happy reading!!! This issue of Engineer (PEC) can be downloaded from our website: www.pec.org.pk

Sajid Hussain Bhatti Pakistan Engineering Council

CONTENTS
Topic An Improved Network Security Perimeter For Proficient Resistance At Maligned Endpoints Seismic Architecture Development of GFPS for planning and management of finances Essential of earth quake designs Hydro-energy and water vision in Pakistan Frontiers of science and engineering entail women scientists and engineers Lets affiliate PEC with ABET & FEANI Page # 2

7 12 18 24 40 48

Quality assurance and accreditation of higher learning

54

ENGINEER

PEC

September 2007
the users, administrators and hackers scale the security solutions through the nuisance or ease of working. In fact, the seller buys the solution and not the security. At the end of the day, the blame of failure is deposited to not updating timely. Today, a corporate network consists of security devices, applications, firewalls, sensors, fingerprint agents, filters, intrusion detection, and prevention systems to participate in security perimeter design [6][9][14]. Our research is based on the analysis of providing an enhanced and synchronized version of security perimeter. The solutions must be designed to respond the security needs of a network and not the vice-versa. Another critical situation arises when internal network is turned internally for attacks. During HELLO, the catalyst considers the node(s) as privileged and enters its MAC in CAM table without knowing destination address [16][17]. It creates traffic by forwarding the frame for authentication on all ports except the one, it came from. Authentication is responded and MAC of the server is entered with destination entry to establish an authentic link for further communication. In traditional network, usually, this is the time for seeking updates of various profiles including antivirus. What, if a malicious endpoint corrupts or attacks its switched-neighbors before the antivirus updates this client. Now, whatever the solution exists, it shall be the reactive. Searching for some proactive measures shall take you buying another tool without scaled security but doubtful promises. The only thing growing as quickly as the number of security threats to the network is the number of tools one has to deploy to guard against them. How many security tools do we have in our existing network today? More to the point, how much time does a security administrator spend managing these tools installing upgrades, downloading new signature files, and so on? It's overwhelming [18]. We make following contributions in this paper: We tried to achieve maximum synchronization among components of existing security perimeter by redefining the service points. This improves performance metric of core layer of the network concerning the speed, traffic load and transparent control. We presented a more secure framework of network security perimeter that addresses potential threats in node and helps defining modularity among security components effectively. It also works with existing blocks of the traditional networks. We identified critical challenges, the components facing in the internal-network and emulated the proposed framework in components at access layer. This speeds-up and liberates the core layer from unwanted traffic to confirm its efficiency.

An Improved Network Security Perimeter for Proficient Resistance at Maligned Endpoints


Engr. Adnan A. Arain , Dr. Abdul Qadeer Khan Rajput , Engr M.I. Khan, M.Sc Telecom & Electronics Abstract Designing network security perimeters to nullify security threats, is the objective of giants involved in the development of security applications and devices. An organization, not compromising on security, dedicates a hefty budget proportion for deploying security plans and updates. Fighting and chasing the modern attackers 24x7 has enforced thoughts of redesigning security framework. Existing perimeter is layered of border routers, firewalls, IDS, IPS, VPN devices, software architecture over DMZs and subnets, beside server and host filters and antivirus applications. These are not fully customizable against adversaries in providing strong security framework. The current deployment nature of security perimeter where these layered components are prone to various egress and ingress nasty activities raises some serious questions. The traditional perimeters do not provide sufficient security to overcome these limitations in order to provide uncompromised security nodes. To address security needs efficiently, at critical knots within a network, we introduce a security framework. The proposed framework focuses three key areas related to defense-in-depth; (1) maximizing synchronization among layered security services (2) modularizing various services for better endpoint security (3) reducing traffic while providing secure mechanism for passive updates in traditional networks. We show through analysis and emulation that our proposed framework meets the unique security needs of network infrastructure in a better way. Key words Security perimeter, Distributed security services, Network access control (NAC) Introduction Advancements in interception, intrusion, modification and fabrication posed potential threats to security perimeter of the time. Inescapable battle has been set and various mature hijacking and sniffing systems have been developed. This is why a large portion of corporate budget sinks in buying competitive security solutions. These solutions projects lists of precautions indicating the way a network should be accessed. Instead of molding the solution for the network, the network is asked to change the priorities. In fact, the level of security of these solutions is not scaled accurately for responsiveness, efficiency and reliability by vendors themselves. The history proves that

ENGINEER

PEC

September 2007
bandwidth management, virus scanning, anti-spam, antiphishing and more [5][11]. Our proposed network security framework Our proposed framework is detailed for understanding in following paragraphs. Maximizing synchronization Success rests in the fact that the policy-based services or firewall, secure routing schemes, authentication mechanisms, antivirus, applications and hardware must be, theoretically, one entity [10]. It is achieved by distributing services carefully and capitalizing the synchronization among these services. Figure 1 next, shows a theoretical defense-in-depth single window solution.
AUTHENTICATION

We put forward a secure mechanism for sending antivirus updates in traditional networks from access layer or distribution layer instead of servers themselves. This helps to reduce the amount of traffic on the core layer. Rest of the paper is organized as follows. Section 2 provides summary of related work in security perimeter building blocks. Section 3 presents our security framework while discussing the synchronization of policy based services, antivirus applications, role of catalyst, handshaking of routing components with communication nodes down the network, mechanism and arrival of updates before the authentication process of an endpoint occurs. Section 4 gives analysis of our proposed security framework, evaluation and comparison of results. Section 5 portrays the future roadmap, whereas sections 6 and 7 have been summarized for conclusion and recommendations for an integrated framework in modern designs of hardware. Related work We dealt the security issues with an equal perspective of both, the hackers, and of them who research in security. The attackers to the security are one step ahead of implanted security solutions [14][15]. They like to hack the image or identity of any point from client or server and beyond. Few waits for an opportunity to attack but generally they are in process of perceiving the faults in systems that the security builders, often do not know while launching solutions. Researchers have addressed many areas of the network security perimeter. Majority of the research has focused on strengthening the individual perception of components like firewall, activity filter, antivirus sensitivity, secure routing, secure key distribution and securing server or node privacy. Whereas, work in bits is found on the components synchronization and interdependencies while providing logical separation among all components to provide defense-in-depth. The security fence needs to be quantified as a whole. Developing platform independent prevention and detection tools [1][4][8], enforcement and approaching new security policies [2][4][6][7], and strengthening antivirus applications [10][13][15] have been a few kinds of work in this direction. Introducing endpoint security with network access control (NAC) has challenged the security consultants to revise the corporate security needs and number of tools employed for the desired security [3][12]. Learning that it is vain to do with more what can be done with fewer - William of Ockham - a few gateways are free to install as a replacement of personal hodge-podge of security solution. These claim to be a single, integrated, enterprise-grade tool that provides a firewall, VPN,

FIREWALL (Client-Server)

SPECIAL FILTERS (server)

BORDER ROUTER

ANTIVIRUS (Client-Server)

LOG MAINTENANCE

DIRECT REGULAR UPDATES FOR EACH

NEED BASE SERVICE

` Host or Client

ID and IP SENSORS

ALERTS/ NOTIFICATIONS

VPN DEVICES

IPS (Host/Server)

IDS (Host/Server)

Figure 1 Ideal security perimeter: The window view Modularizing the solution for potential threats In order to take real-time advantages from the system in existing infrastructure the existing perimeter was appended to analyze the performance and tolerance to the network. Today the existing designs of network security perimeter present the layers-of-devices but functionally overlapping of results of these devices cause failure of the perimeter fence [4][6]. Figure 2 below shows a logically separated services view to achieve fundamental objectives from the security perimeter. Minimizing the unnecessary traffic load and avoiding threats at core layer The main issue at the backbone or core layer is that any failure (even in terms of delay) will likely be felt everyone within the inter-network. The Speed plays a vital role at core layer. Due to sheer volume of traffic that will be entering the backbone, few activities that consume routing or switching resources should be applied in this layer. In other words, routing, ACL-access lists, ACE-access entries compression encryption, and other resource

ENGINEER

PEC

September 2007
a single log. The single logger can be a powerful analyzing tool or administrator. We were accustomed with Snort in our scenario. The antivirus server performs the following functions. Antivirus server shall PUSH passive updates once on each destination (catalyst) as soon as, routers flood framed <HELLO> for authentication. This contains updates in passive format and are, usually, in kilobytes. Every time a membership changes on joining or disjoining group, the server serves the query if any update is received from the builder of the antivirus. The switch with passive virus updates is responsible for following tasks. If this is a distribution layer switch then, it shall PUSH updates to access layers configurable switch. Once these updates reached the destination LAN switch, <AV-HELLO> may be forwarded only to those hosts interested in <HELLO> or flooded to all hosts by a non multicast-enable layer 2 switch. In any of the above case, each <HELLO> must be followed by <AV-HELLO> packet. It must receive ACK for each <HELLO>. Otherwise check for retransmission of <HELLO>. Storage of these bytes require more pace at switches. It shall behave similarly to any alert or notification as, if <HELLO> acknowledge is not received, i.e. MAC should be removed from the CAM table and report is generated for servers at core-layer. Upon successful echo replies for both, the frame is forwarded known communication link furnishing destination port in CAM table of switch. The updating part of proposed framework, in the model given in figure 3, is performed by routing and information server. It played the role of flash-memory updater in switches. Consequently, we propagate memory resident passive elements among the hosts linked to our special PC-router at access layer. Application sat antivirus server signs a contract with available access layer catalyst through the device API. It overrides passive elements in the flash memory of the manageable catalyst. Assessment of the proposed framework This section consists of two parts. The first part gives an analysis of the presented proposal through arguments, and second part analyzes the results of the evaluation which support the arguments presented in the first part. Analysis of the proposed framework

consuming activities should be done before the packet arrives at the core [8][14][16][17], as shown in Figure 3.
AUTHENTICATION ALERTS/ NOTIFICATIONS

AVAILABIITY

VPN DEVICES

LOG MAINTENANCE

INTEGRITY

DIRECT REGULAR UPDATES FOR EACH

FIREWALL (Client-Server)

`
ANTIVIRUS (Client-Server)

IPS (Host/Server)

SECURITY

ID and IP SENSORS

CONFIDENTIALITY

SPECIAL FILTERS (server)

BORDER ROUTER

IDS (Host/Server)

Figure 2. Objectives of modularized traditional network Similarly, the traffic during antivirus updates must be shed and can be either placed at configurable switches of distribution layer (provided that hardware vendor reserve space) or access layer. This clearly sheds the load on core layer as well as, maintains the integrity within these switches. Firewall rules are distributed passively in the same way and exploit the features of these switches unlike hackers that do in the opposite directions. This also prevents from the malicious opportunists to write virus code and flooding in form of hello to neighbors in a group.

1 Gbps
AV-update AV -update

Server farm AV-update

Gigabit Switch

ps Mb 00 1

Router

10 0

Mb ps

10/ 100 Mbps

AV-update Switch AV-update AV-update

AV-update Switch

10/ 100 s Mbp

Client

Client

Figure 3. Updates in the traditional security framework Secure framework Acclimatizing a traditional network with core, distribution and access layer devices and each service is running from the farm-of-servers obliging the results from each other at This section presents an analysis of the features of the proposed framework [refer section 3]. Those features make the framework feasible to implement in existing network infrastructures. Unlike other security perimeters,

ENGINEER

PEC

September 2007
configurable switches into consideration that do not participate in storing and sending <AV-HELLO> related elements. These switches can not use IGMP to find out the multicast hosts. Now router can direct these switches about multicast group membership using CGMP. This allows multicast-enabled switches to forward multicasts only to hosts that are new and participating in the group. This shall save further need of processing cost in switches to accommodate this framework. The switches deployed can be further reprogrammed to remove MAC of corrupt node for the strict security in the network by employing some rules. Assuming the ongoing developments in network infrastructure, catalyst processing and storage, adaptive networks, it can be proclaimed that the framework may be deployed in even larger networks. The customizable nature of the framework makes it viable for small and medium size organizations. Methods for future integration

the switches in the proposed framework do not generate or direct the redundant traffic at every nook and cranny of the core layer. This traffic reduction is due to the nearby accessibility of regularly deemed updates, alerts, notifications, acknowledgements and log reports maintenance by endpoint security applications. As, the execution of compatible updates is only at client side therefore, neither complexity nor memory upgrade is required in the switches of the access layer. This makes the updating process. For these reasons, the constraint of hardcode has negligible effect on the results. Whereas, the proposed flow of the update mechanism in figure 4 provides stronger resilience towards various internal attacks and malicious code, e.g. sinkhole, continuous ping, hello flood. The flow of security information and the update is proposed in such a way that, only the privileged applications at server can resend or rewrite the entries. The passive elements at client require temporarily acquired permission from the client operating system. This quantifies the ownership of updating <AV-HELLO> [1][3][9][18]. Distinctiveness of the framework is its ability to give maximum protection at first step, from trojans, logic bombs, virus, trapdoors, backdoors and information leaks. The model lab is set over MUET-campus with 30 nodes with single authentication server. Now the next phase is to check the stability and scalability of the solution with all nodes all over the campus.
Switch with resident virus updates

Now, we intend to project efforts in two directions. One is to scale this solution over a larger heterogeneous network of computers and handheld devices. That development shall help adaptive rules to veto or pass the communication through the endpoint. An open standard APIs development thatll help loosing monopolized control of companies in security products. On the other hand, it shall help customizing the varying demands of security perimeter in organizations.The cooperation of catalyst vendors can be sought to design a service-oriented hardware that inherits the potential to implement this framework. Only a powerful module (a catalyst in our case) can perform great for security perimeter. In general, a dedicated hardware helps to implement a strong security policy. The verification of passive updates can be sought by knowledge consistency checker at distribution or access layer device. Conclusion

Requires HELLOs?

NO

YES

HELLO handshake

AV-HELLO handshake

ACK error ?

NO

Frame for Authenticity

YES

Check if retransmit HELLOs?

YES

Request to retransmit

NO

Discard MAC entry & Report

This work presents a novel network security perimeter for a true defense-in-depth approach which is designed from a healthy synchronization approach embedded at first place of the network. We have presented a hierarchical model with true logical separations among different services. Some services were pre-deployed as the security was a priority. We plan to recommend this framework having confidence as first step towards merger of antivirus services with other network resident services. Recommendations Analyzing the bottlenecks of network security devices and

Figure 4. Switch communicating updates The technique presented in this framework takes non-

ENGINEER

PEC

September 2007
Characterization Symposium, 2005. Proceedings of the IEEE International 6-8 Oct. 2005 Page(s):188 196 Jiang-Neng Yi; Wei-Dong Meng; Wei-Min Ma; Jin-Jun Du; Assess model of network sec Engr. Adnan A. Arain PhD Scholar, Institute of Information Technology, Mehran UET, Jamshoro-PAK Dr. Abdul Qadeer Khan Rajput Engr. Muhammad Iqbal ( PEC telecomm / 74)

tools for delivering the proper support, we suggest that a reserved space may be endorsed into catalyst. It shall serve the purpose of a base station in antivirus clientserver architecture for sending passive updates to each host in the network. References 1. Hae-Jin Jeong; Il-Seop Song; et-al; A Multidimension Rule Update in a TCAM-based HighPerformance Network Security SystemAdvanced Information Networking and Applications, 2006. AINA 2006, 20th International Conference on Volume 2, 1820 July 2006 Page(s):62 66 2. Al-Shaer, E; Network Security Policies: Verification, Optimization and Testing Network Operations and Management Symposium, 2006. NOMS 2006, 10th IEEE/IFIP, 2006 Page(s):584 584 3. Magic quadrant, Symantec network access control; the key to endpoint security advertising section report 2006, www.symantec.com/endpoint 4. Hamed, H.; Al-Shaer, E; Taxonomy of conflicts in network security policies Communications Magazine, IEEE, Volume 44,Issue 3,July 2006 Page(s):134-141 5. Salim, R.; Rao, G.S.V.R.K; Design and Development of Network Intrusion Detection System Detection Scheme on Network Processing Unit Advanced Communication Technology, 2006. ICACT 2006, the 8th International Conference, Volume 2,-22 Feb. 2006 Page(s):1023 - 1025 6. Adnan A. Arain, Marvie, Manzoor Hashmani, et-al, An analytical revelation for a safer network security perimeter, 2006 proceedings of Intentional Conference on Information and Networks-ICOIN2006 Sendai, Japan, 14-17 January 2006 7. Schaelicke, L.; Freeland, J.C.; Characterizing sources and remedies for packet loss in network intrusion detection systems Workload

8. 9. 10. 11.

About Author Dr. Abdul Qadir Khan. Rajput is a Meritorious professor, Chief-Patron IT Vision Magazine and Vice-Chancellor of Mehran University of Engineering & Technology, Jamshoro. He is winner of the Best Teacher Award, 2000, awarded by the University Grants Commission. He has participated in the Advance Learning Workshop on Microprocessor, Data communications and At, organized by ICTP, TRIESTRE, Italy. He is founder member of the National Committee for Development courses in the field of computer studies at class IX, X, XI, XII, level (formed by the MOE curriculum wing) and has edited various books on Computer Studies written at the platform of MOE and also by the Oxford University Press. He is member and convenor of National Committee for Development courses for BCS, BS(IT), MS(IT), MCS, BS(CS), MS(CS), BE(CSE), BE(Software Engineering) (formed by University Grants Commission) and has participated and published more than 60 Research Papers at National and International level. He is also Co-author of books on Data Communication CompuPedia, The Art of Learning C and MS-Access and Digital Media Technology.

MET CO
Marketing Engineering & Trading Co. (Pvt.) Ltd.
METCO (PVT) Limited is committed to achieve complete customer satisfaction through provision of high quality engineering services in accordance with contracted specifications and seek continual improvement through compliance of ISO 9001-2000 Quality Management System.
6

ENGINEER

PEC

September 2007
Optimal seismic design has to be compromised and needs to be reasonable architecturally. If the design is not functional and economical, there is hardly any need of that kind of structure. For regular design the following consideration are made: ? Lower height to base ratio. ? Equal floor heights. ? Symmetrical plan. ? on both axes. Identical ? sections and elevations. Uniform ? Maximum torsion resistance. ? Short spans. ? Redundancy. ? No Cantilevers.

Seismic Architecture
Hazrat Sultan Kashmir earthquake An earthquake of magnitude 7.6 shook northern Pakistan and Kashmir killing seventy thousand and injuring eighty thousand people and millions became homeless. The losses were over five billion dollar in economic terms. The damages were due to poor quality of construction, as modern reinforced concrete structures were not designed to resist earthquake action. Besides poor design, slope failure, site response and topography attributed to the devastations. The earthquake is associated with the great plate boundary region, where Indian plate is sub ducting under the Asian plate. The census data indicate that about four hundred and thirty nine thousand and eight hundred and eighty were in the effected area of which two 261990 houses were completely destroyed, while 177,890 were damaged. The main cause of the collapse is the heavy weight of the roof, which attracts inertia forces. The slender unreinforced wall without connectivity to the roof, use of smooth bars and insufficient stirrups for confinement resulted in the structural damage. In Balakot city, even the reinforced concrete and masonry buildings collapsed due the ridge-effect as the ridge amplify the periods corresponding to their own vibration modes as well as their energy for using effects. The first soft story is the common cause of failure of these buildings. Lack of lateral resistant allowed the sliding of the Balakot Bridge on the Kunhar River, which resulted in the loss of bearing supports of the girders. The design and construction in the earthquake areas, hitherto warrants the development of seismic code for important civil projects based on the latest technologies, adapted to Pakistan. A set of demand-to-Satisfy bye-laws using local practice having no calculations requirements for small family residences, in seismic areas also needs to be developed. Architectural design The architecture should be strictly based on the effective seismic design. The building configuration (geometry), sizes of structural member and dangerous non-structural members lead to architect / engineer relationship. A building with regular configuration is ideal with respect to dealing with lateral forces but the architecture is for occupancy, as a solid block, which is free from irregularities, may be ideal seismic design, but it is sculptor not architecture.

For structures with reentrant corners, diaphragm discontinuity, out of plan offsets the design forces should be increased to 25%. Structures with nonarallel system and structures without plan offsets must have the design strength to resist horizontal, vertical and axial forces. Diaphragms should be connected to vertical elements and collectors. The irregular structures with weak story structures havin extreme vertical irregularity of two floors or 30 feet in height and extreme soft story structures are not allowed. All these procedures are exposed to errors and therefore, it would be better to remove irregularities to a minimum and further, the designparameters are left to judgment of a good engineer. Seismic forces and size of building are interrelated. Increasing the height of a building is similar to providing long cantilever. The building period will change and its response will change. Limits on heights are provided in different codes varying up to100 feet in seismic areas. However, experience has shown that three stories have behaved well even in areas where soil support pressures were very low. One thing is to be kept in mind, that large span and diaphragms are to be avoided and in case it is notpractical, than shear wallsor frames may be added to the structures. The architect can sub divide large building into blocks and thus long wings and reentrant corners are avoided. The building proportion which is height / depth ratio for tall building should be 3 or 4, for seismic esign. The pounding risk of adjacent building be carefully worked out and building separated to a desired values. A new trend to keep the height / depth ratio within limits and closely place units will act as big unit in an earthquake response. The symmetry forms are better because torsion and stress concentration is reduced. The bottom storey carries its own load in addition to shear forces. . The density, which is area of vertical structural elements in comparison to gross area of floor. Normaly in modern building, the density is not more than 2% while in old building it was up to 25%. The requirement is opposite of most efficient seismic configuration, which would provide resisting elements at

ENGINEER

PEC

September 2007
A soft storey has less lateral stiffness than immediately above and weak storey has less strength compared to above. It is very critical if this condition occur at the first story because the forces are greater at this level. Owing to discontinuity at the second story causes extreme deflection in the first story and concentration of forces at

the base. In nutshell redundancy plays a positiverole in seismic performance as it results in higher plan density. Configuration 1. The plan configuration problems of a building are the reentrant corner (Inside corner). These corners produce rigidity due to different parts of the building resulting local tress concentration at the notch of the reentrant corner. If the ground motion is orthouth, the wings of Northouth will be stiffer than wings of Eastestthe former wing would deflect less than the later, if it were separate but are tied together and differentially move at notch, pulling and pushing each other. In addition torsion is created, as the center of mass and center of rigidity cannot coincide forall possible earthquakes directions. The rotation of joint depends on the mass of building, structural system, length of wings and height / depth ratio. There are two alternatives either to separate building structurally into simple shape or to tie the bulding together strongly, at the lines of stress and torsion. The variation in perimeter strength and stiffness has detrimental effect, which provides seismic resistance. If the resistance is not balanced the detrimental effects are extreme, as the center of mass and center of resistance will not coincidethe torsion will rotate the building on its axis. Open front buildings have three shearing walls with opennd and produces torsion. The opennd can be catered for by designing frame structure for entire perimeter, shear walls at opennd corner and braced frame at openront.

Types of vertical Irregularities

2.

In case of building which are not on parallel and have a shape of triangle or other than rectangular, the center of mass can not coincide and highest quantum of torsion forces are generated under a ground motion. In this form of wedge shape building, opaqu walls may be introduced.iaphragms are roofs or floors and perform a role in earthquake nd its connection to shear wallsas great significance. Opening and penetration in diaphragms such as staircases, lifts should be carefully placed preferable at distance from one another so a keep the strength and stiffness of diaphragm constant. Though it is not possible to keep stiffness of all the floors of multistory building constant, yet it is beneficial to obviate to minimum soft and weak stories.

junction to second storey. Normally the problem is created due to change in height of floor, changes in materials, discontinuous shear walls and changes in horizontal / vertical structure at second storey. The problems are to be resolved, otherwise, introduce bracing, and add columns and to change design of first story columns. Moreover, opaque walls of soft story would be lightweight and detached from resistance system. In no condition long walls are allowed in subsequent stories. The basic principle of seismic design is that in case of severe earthquakes beams will deform plastically before columns, to avoid total collapse. The weak column, strong because condition should always be avoided. It is important that column should be isolated from bearing walls so as to obviate short column condition. The design of vertical set back (offset) to a building brings discontinuity resulting in change of strength and stiffness. Inverted setbacks, which make building larger at top but the overturning aspects is more pronounced. The set back should be limited to three fourth in area of storey below it. Buildings having more setbacks should be analyzed as special cases. The inverted setback in earthquake area should be altogether avoided. Pounding to adjacent building hitting one another should be avoided. The vertical deflection or drift of adjoining buildings is worked out. A space is to be provided between these buildings. A few stories building may drift 3 to 8 feet and therefore, needs a separation place double to it. The cluster of building in congested areas behaves differently and earthquake effects are more significant on end building, while less damage in the inner zone. Adjacent building, cause some time damages to other buildings and has to be catered for. On very early, the engineer and architect should know concept and jointly proceed with architectural design in earthquake areas. The architect must understand seismic engineering to conceptual degree and be comfortable with such shear walls bracing, moment frames, diaphragms and base isolation. The engineer should also understand functional needs and aspiration of architect.

ENGINEER

PEC

September 2007
stiffness below and above diaphragms can cause problem. In buildings having many wings such as L-shape, H-shape etc. junctions are to be dealt carefully as stress at joints of wings may increase. The diaphragms are designed according to codes and deflection of diaphragms shall not exceed the permissible deflection of attached elements. Diaphragms designs can be further simplified for three-storey building or lower according to codes. The continuous ties are to be provided between the supported walls and the diaphragms in order to distribute anchorage forces. In wooden diaphragms the ends should be perfectly embedded in walls and projected wings properly designed. The floor slab and topping should not be less than two inches. Miscellaneous design techniques Masonry walls Two procedure are adopted, one for slender walls designed for out of plan forces (perpendicular to wall), the second one for in plan forces (parallel to wall length)

Lateral displacement After the earthquake or wind the building move which is known as drift. In tall building the design is controlled by drift design and structural stability is dependent on it. The ratio of maximum lateral displacement to the height of the building is called drift ratio. A story drift is relative displacement of a floor to the story height at that level. Drift limitation by seismic codes serves as guide to safe guard the structural integrity. The increase in lateral stiffness, the critical load of building increases, reducing failures. However, the gravity loads play a key factor against lateral stability and rotation at the base structure. Diaphragms The diaphragms support the entire gravity load and transfer these to columns and walls. Further, these transmit the wind and seismic forces to frames and structural walls. The building acts as a unit and redundancy and strength is increased. In design, the floor

Flexible 1st floor is like horizontal continuous beam supported by vertical lateral load resisting elements. (Floor deck as web and periphery beam as flanges of continuous beam). The shear and bending moments are worked out and three dimension analyses are needed for distribution of forces on vertical elements. For few stories, a simple analysis is sufficient to determine the distribution of lateral forces. The diaphragm rigidity plays a major role in the design, as the diaphragms can be rigid, flexible and semi-rigid. The definitions of rigid means that lateral forces are transferred as per relative stiffness. In flexible diaphragms, horizontal forces to the vertical load resisting elements are independent of their stiffness. The diaphragms are semirigid, when deflection of diaphragms and vertical elements can not be assured rigid or flexible. The diaphragms problems are more in low-rise building and in stiffer column / shear walls, in taller buildings. Abrupt changes in wall

Change of stiffness

Discontinuous Shear Wall

requiring steel at ends for support to resist shear, moments and over turning. Walls having height, 30 times of thickness are called slender walls. The block masonry whether hollow or solid may be used in panel walls subject to condition that the minimum thickness should be six inches. The ratio of unsupported height may not exceed 30-time thickness. Minimum steel for temperature /shrinkage (.003 each direction) and maximum not exceeding, 3% of cell area be provided. No splicing of the main steel in the wall be allowed and units continuously poured and joined to each other. Existing structures The existing structures should be made earthquake resistant to a level desired by the requirements. The strength, materials, detailing and quality affect the performance. Other considerations are the age of structure, economy, occupancy, losses, history, site

ENGINEER

PEC

September 2007
utility attachment to the structure. The connection of reentrant corner by collector, out of plane anchor and continuity ties across diaphragms, makes the walls and diaphragms one piece eliminating deformations. The insufficient bearing in existing building should be improved by enlarging beam area, stiffening the lateral stiffeners and providing additional vertical supports. The brittle structure such as masonry and unreinforced works need special attention. It is most important in the masonry that diaphragms and walls are tied, as these are very low in strength both in plane and out of plane. In plane shortcomings use shotcrete on one face of the wall, infilling exiting windows and adding supplementary walls. Out of plan shortcoming are dealt with shotcrete, center coring of the wall, installing dowels and adding strong-backs to stiffen the wall. The selection depends upon the aesthetic requirements of the building. The concrete frames can be added with shear wall but the whole system is to be redesigned from foundation to top as retrofit work. The shotcrete thickness should not be less than three inches. The existing diaphragms may have several shortcomings such as shear/flexure capacity, flexibility, connectivity and continuity. These defects need to be rectified.

deficiencies and cost appraisal of alternatives. Unlike new structure, the concept of old structures is to control deformation whereas in new structure, it has a little significance. Due to lack of ductility, the design of seismic retrofits revolves totally on the control of deformation. For a ground motion and performance level, the control of deformations is to be within accepted levels. The interstory drift can reduce the damage to non-structural elements (partitions, face work, ceiling). The beam/column, shear wall and diaphragms damages cannot be controlled due to built in deficit ductility. By some changes, sometime it is possible to control such structural deformation. The expansion joints should not be interconnected in any upgrade system. The inelastic deformation is beyond prediction by direct elastic analysis. The most difficult case of building is load-bearing walls of simple masonry. Apart from provision in the codes, it should be kept in mind that inertia forces generated in any direction can be transmitted back to the ground. The open storefronts, house over garage, sky windows and expansion joints, lacks in lateral force resisting system and warrants improvement. Neither excessive flexibility of structure nor its brittle nature is desirable. Flexibility reduces long periods of vibration while brittle materials

Conventional

Isolated

Isolation Bearings

such as brick masonry etc loose strength rapidly. Out of plane demands of slender walls, inadequate anchorage to diaphragms and limited strength cause failure. The upgrading of open storefront needs vertical line of resistance along the sides of building. The braced steel frames, shear walls and collectors to distribute loads to diaphragms are used. The skylights are provided with vertical/ horizontal steel trusses. In addition shear walls or braced frame can be added to meet deficiencies caused by discontinuity of diaphragms. For expansion joint a new lateral resisting elements on each side of joints can be added for transferring horizontal shear across the joint. All columns should be connected to foundation and roofing members connected to walls, including architectural and

Seismic isolation The detachment of building from the ground in order to stop transmission of earthquake motion isolates the building. In comparison to the conventional method of stopping acceleration in stiff building and controlling interstorey drifts in flexible structure, the isolation removes defects and building can be made safer. The vertical forces in conventional design are controlled but performance of seismic forces makes the structure expensive and unpredictable. The seismic isolation introduces flexibility at the base in a horizontal plan along with damping to restrict the amplitude of motion resulting from the earthquake.

10

ENGINEER

PEC

September 2007
level where plan isolation is provided, in contrary to conventional buildings where structural elements are added everywhere. 7. The uplift of structure on the bearing should be in limits of resistance of softening of the bearing. Method of proportions of loads and loose bolts to absorb uplift is used. The bearing should be located which permit inspection and replacement. The bearings can be located in sub-basement or at first story column or top of basement.

Mechanical dissipater and elastomers can limit displacements and forces. Low and medium stiff buildings, nuclear plants and bridges are ideally suited; with due care to soil and very high-risk area. The elastomeric (rubber) pads called bearings support the weight of structure and counteract earthquake forces. The dissipaters (absorbers) and elastomers reduce movements across the bearings to acceptable level. The computer software and shaking tables are used to validate results. Apart from several other reasons for going for isolation design, the main criteria are increased building safety and its operability after the earthquake. The force response is reduced by the flexible mounting as the period of vibration is lengthened. The deflections are controlled by a damper and rigidity is also provided under low service loads of wind and minor earthquakes. Elastomeric bearing is most common but rollers slip plates; suspension, sleeved piles and stepping foundation techniques are also used. It must be kept in mind that when lateral flexibility is introduced than there is no loss to vertical rigidity. The rubber bearings in layers, sandwiching steel shims between layers properly bonded constrain lateral deformation of the rubber. The bearing may be leadrubber, high-dampening rubber and friction pendulum system. The cardinal principle is to increase in a stiff building, the fundamental period from a second to twice or thrice by providing isolation. The force is reduced and yield strength remains the same, reducing ductility demand in turn reducing forces to 50%. The seismic isolation is desirable: 1. 2. 3. 4. 5. 6. The soil does not produce predominance of long period ground motion. The low- rise structure is heavy. Squat structure and wind loads are 10% of the structure. The fundamental period of vibration is low, which is quite high in taller buildings. Soil stiffness is good for isolation. In existing structures, structure should be confined to a

8. 9.

References 1. 2. University of Urbane-Champaign Report Seismic design handbook by Farzad Naeim.

About Author Hazrat Sultan Registration: PEC 2440 (Civil). Bachelor of Engineering (B.E). Educational buildings designs Amman & Whitney of United States. Transportation projects form E.D.I. World Band. Advance management from University of Connecticut U.S.A. Member Executive Committee P.E.C for the term 97-99. Civil Engineer with 39 years of Experience in Planning, designing, construction and supervision of civil engineering works. Specific projects are construction of highways, buildings and water and power development projects from 1964 to 1999. Investigation and survey of Mangla Dam form 1961-1963. With Water and Power Development Authority. Structural design of multistory buildings. Major project comprehensive Higher schools at Pesha3war and Abbottabad. Structural design of medical store Depot at Peshawar. Structural design Polytechnic Institute at Peshawar. Advancer knowledge in Seismic Resistant Building including Moment resistant frame, Shear walls, up grading of seismic effete building and seismic isolation. Supervision of Dozens of road, building and Bridge Projects. Remained sub-divisional officer, Executive Engineer, Supervising Engineer and Chief Engineer communications and works department from 1964 to 1999.

11

ENGINEER

PEC

September 2007
Financial procedures concept Both non-development and development expenditure requests lies in any finance department of each enterprise in the world. In non-development each organization has different departments. Each department has a unique function. However, two or more departments can perform the same function. Function details are defined according to function heads. Each function head is five digits long. Last two digits are reserved for those function heads that has value D (D for Detail) or T (T for Total). If a function head has a value D then it means that it has no further subsection and if it has value T then we can define its sub function heads as shown below: Func Head 01000 01200 01600 Description Publicity and Information General Commission and Inquiry Election Commission(150) Status T T D 01000 01000 Parent Head

Development of GFPS for Planning and Management of Finances


Dr. Muhammad Younus Javed Mr. Munawwar Iqbal Abstract An automated environment used to create containers and to hold and manage the financial expenditure data can be conceptualized as Generalized Financial Planning System (GFPS). This paper briefly describes financial procedure concepts and levels of a security system within GFPS. The Finance Department of Government, Semi Government and private organizations has been emphasizing the need to carry out software development in order to computerize the annual expenditure requests including nondevelopment and development expenditure. The computerization of financial expenditure data and requests processing is required to provide better support to the higher management for making efficient operational decisions and their execution. Efficient computerization requires a detailed study and analysis of the working of different finance departments and development of generalized financial procedures and mechanism of the related data recording and processing methodologies. After a detailed analysis, a GFPS has been developed. The requirements of the software for GFPS have been identified and specified in detail including nondevelopment expenditure and development expenditures, cut on non-development and keeping track of development releases. The system has been designed and developed to meet requirements of different finance departments with an easy to use interface for tentative users. The system is implemented using powerful features of the available DBMS. The development tools and environments selected are the most advanced keeping in mind all kinds of enterprises. In view of the essential requirements of finance departments, the necessary data security and integrity mechanisms have been incorporated and built into the system after taking a detailed feedback from the users. Six users of the selected enterprise evaluated the developed system to check its efficacy and usefulness. Results have been analyzed and the team members found that the developed system is easy to operate, very accurate, highly secure, reliable and userfriendly. Moreover, it successfully meets all financial requirements to plan and execute a series of projects and other related expenditures

There are different demands under which different departments exist. One demand may contain several departments. Nature of the demand may be capital, revenue or repayment of debts. Expenditure type within a demand may be charged or non-charged. Another concept in allocation of finances is object head. Amount is always requested and allocated against object head. Each object head can be five digits long. Last two digits are reserved for those object heads that has value D. Detail about object heads is shown below
Object Head 10000 11000 12000 30000 35000 35100 35101 35102 35103 Description Purchase of Durable Goods Transport Machinery and Equipments Construction of Works Telecommunication Works Lines and Wires Lines and Wires (Telegraph) Lines and Wires (Telephone) Lines and Wires (Radio) Status T D D T T T D D D 30000 35000 35100 35100 35100 10000 10000 Parent Head

12

ENGINEER

PEC

September 2007
users view of data [1,2]. It is the most important task in the development of GFPS application. The functions of the GFPS are to materialize forms, reports and queries by reading or writing the database data. The GFPS is an intermediary between the user and the operating system. It receives the requests stated in terms of tables and rows and columns and translates those requests into read and write requests. A process that involves inferring from users statements, forms, reports and queries are gathered and the developers work backwards to infer the structure that depicts the users vision and constructs the data models for GFPS. This is necessary because most users cannot describe their data models directly. The Entity Relationship (E-R) model is used to interpret, specify and document the requirements for database processing systems [5]. Since it provides constructs for showing the overall structures of the users data requirements, it is specifically used for top down database design. The major objective in designing phase, for GFPS, is to suggest such a system, which is organized, smooth in running, proficient in handling information and adequate in all respects. But the point to be kept in mind is that the prescribed organizational limitations should not be dominating, more over the proposed system should be applicable and should overcome the drawbacks which exist in the present system. Computerized system, known as GFPS, is being presented to meet the requirements of the organization and is designed so that all the objectives are achieved [3]. The existing manual system does not satisfy all the objectives of different finance departments. Typical organizational objective is to provide better service to its users. These objectives can only be achieved if a better computer based system is satisfying the requirements. The main goals of the early stages of database development are to build a Data Model that documents the stages to be represented in the database, and to establish the relationships among them [8]. Since topdown database development approach has been adopted to design the GFPS, the E-R model has been used to design and develop the system. A software design is a model of real world system that has many participating entities and the relationships [1] as shown in Figure 1.

Request of amount needed from each department is presented to the finance department containing a unique diary number whose data is necessary to be maintained, consulted and updated. Request contains a total requested amount and shows different volumes (if exists) in which request is being considered. In addition, various queries are to be answered and reports are required to be generated. In the present system, a request of financial needs contains development as well as non-development request. Total requested amount is further subdivided into object heads. Each object head has two levels of categories that is T or D. If an object head has a level value D then it mean that it has no further child object head and if it has value T then one can define its child object heads. Amount is initially specified against each object head containing level D. Sum of amount against each object head contains level D within a parent object head which must be equal to amount of parent object head. No amount can be directly specified against object head that is at level T. If amount is requested against salary object head then detail of each post is also given against that object head. In case of development expenditure request, an enterprise has different sectors in which different projects are running. A sector may have many projects running in it and each project belongs to only one sector. Development request for each project, along with previous year amount spent on it, comes in a year requesting for capital or revenue amount request. Amount is first allocated for a particular project. After allocating, it is authorized. Authorization amount may be split into different intervals. For a particular project total amount authorized cannot be greater than total amount allocated. After a particular authorization is made then amount against authorized amount is released and total released amount cannot be greater than total amount authorized. Recently the data is collected from different departments on papers. Request papers for finance are sent to each department in advance. After filling these papers each department sends its request back to finance department where each incoming request is allocated a unique diary number. There can be a possibility that requested non-development expenditure amount from a single or many departments may not be fulfilled because no excessive amount of current income is available. In such a case cut is applied on requested amount on one or more departments as in the form of percentage. Software design A design for GFPS has been developed in DBMS for automating financial procedures. Data modeling is the next step in GFPS after Requirements Specification for undertaking design and development of an automated system. It is a process of creating a representation of the

Figure 1 Partial view of normalized schema of GFPS

13

ENGINEER

PEC

September 2007
programs written in either DBMS specific language SQL or standard languages like COBOL. The design of GFPS defines the database and the structure of applications. The design tool comprises a set of tools to facilitate the design and to create the database and its applications [1]. It includes the typical tools for creating tables, designing forms, answering queries and generating the reports. The GFPS developer uses the Design Tools sub-systems such as data, free tables, queries, documents, forms, reports, code, and programs. The GFPS processes the application components that are developed by using design tools. During run-time, all the functions are automatic, neither the users nor the developers need to put any effort once the form is created. The runtime processors answer the queries and print the reports. There is a runtime component also that processes the applicationprogram requests for reading and writing the database information. GFPS receives requests from the other two components stated in terms of tables, rows and columns. It then translates these requests into commands and sends them to the operating system to read and write the data on physical media. The GFPS is also involved in transaction management, locking, backup and recovery. GFPS has integrated selection of data which is organized to meet requirements of different users within an enterprise. It can also be defined as a self-describing collection of integrated records. GFPS itself is a collection of data that is treated as a unit. It is composed of logical and physical structures, which are designed to store and retrieve the related information. A GFPS schema defines a databases structure its tables, relationships, domains and the business rules. A database schema is a design, the foundation on which the database and the applications are built [6]. For creating the database, we need to build the schema, and after normalization create the tables. A schema is a description of the structure of a database [9]. The database schema defines the databases structure, its tables, relationships, domains and the business rules. The rows of one table can be related to the rows of other tables. A domain is a set of values that a column may have. One must specify a domain for each column of each table. The business rules are restrictions on the business activities that must be reflected in a database and the database applications. Once the schema has been designed, the next step is to create the GFPS Tables using the DBMSs Data option. Each tables column name is typed in the field Column Name and the data type is specified in the field Data Type. The used DBMS is very powerful which can coordinate with other DBMS as well [7] for data sharing. The additional information about the column, such as width, field format, and caption and data constraints are specified in the remaining entry fields of the table creation form. The final component of a GFPS application is the application program. The application program is written in

Data Modeling is a basis for all the subsequent work in the development of the database and their applications. GFPS may be defined as a self-describing collection of integrated records. GFPS is composed of a set of programs that are used to define, administer and process the financial information. A partial schema for request of development expenditure is shown in Figure 2.

Figure 2 Partial view of development schema in GFPS If the data model incorrectly represents the users view of the data, they will find application difficult to use, incomplete and very frustrating. Economy, reliability, responsiveness and modularity are taken into account while designing; system has been designed on the basis of user requirements to meet the needs of respective enterprise. The data is processed by the GFPS, which is used by the database developers and the database users; both can use the GFPS either directly or indirectly via the application programs. Software development A simulator has been developed in DBMS for automating financial procedures. It contains four major modules (i.e. CODE, EXPENDITURE, POSTING and CUT). In GFPS pull down operated menu interface has been designed to provide a good interface to the users. The main components of a GFPS system are the GFPS Management and the Application Programs which are utilized by both developers and users. The database is processed by the GFPS, which is used by the database developers and database users. The GFPS is composed of a set of programs that are used to define, administer and process the information. The facilities of DMBS can be used to create table structure to define relationships and to create forms, reports and the menus [10,11]. The GFPS also include the facilities for interacting with application

14

ENGINEER

PEC

September 2007
in Figure 4. A Report is a formatted display of the database information. Developing a report is similar to developing a data entry form, although in some ways it is easier since a report can be considered as a write-only form. In other ways, constructing a report is more difficult since reports often have a more complicated structure than the forms do.

a standard procedural language that interfaces with the GFPS through a pre-defined program interface. In GFPS, the Structured Query Language (SQL) and language specific commands are used as a standard language for defining the structures and processing of a relational database [4]. SQL is used as a stand alone query language. The purpose of GFPS Application is to provide forms, queries and reports so that the users can record data and obtain the information they need about the entities or objects of their interest. A form is a display on the computer screen, which is used to present, enter and modify the data. In Figure 3, the menus are used to organize the application components so as to make them more accessible to the end user. Pull Down menus as well as Buttons operated menus have been developed according to the requirements. The buttons operated menus are explicit and easier to use. GFPS has been designed to operate with the help of pull down option. Various steps are undertaken during the development phase of GFPS. It covers creating the new users in the database, creating the tables in project manager data option, building the blocks using the forms, creating the master detail relationships in forms, writing the procedures, making the list items, compiling the forms and removing the compilation errors, integrating the forms together, generating the reports and using report option based on specific queries as shown in Figure 3.

Figure 4 Development released amount form in GFPS

Evaluation Results
The usefulness and efficacy of any system can only be ascertained when subjected to practical use. The objectives of system evaluation are to determine whether the desired objectives have been accomplished or not. This is concerned with the detailed study of the developed system from implementation point of view. A team consisting of six members was selected to evaluate the developed GFPS. Every team member had more than five years working experience in the selected establishment. The evaluation exercise was conducted in two parts. In the first part the members of the evaluation team were thoroughly familiarized with the developed system. They were given a detailed briefing on its concept, design and physical working. This was followed by a practical demonstration of the system. Once the members of the team had developed a modicum of understanding they were invited to practically handle the system. The team members were encouraged to monitor the system acting as proxy financial management system. In the second part of the evaluation the team members were handed over the questionnaire. All questions were designed and framed keeping in view real life requirements of the GFPS. Seventeen multiple-choice sample questions were prepared to cover the complete range of activities of the developed system. It was

Figure 3 Non-development amount form in GFPS From time to time, the users want to query the data to answer the questions or to identify the problems in particular situations. There are a number of ways in which a query can be expressed. One way is to use the data access language that is SQL; another way is to use Query by Example (QBE). To create a query, the user has to place the relevant names of the tables that are to be queried, into the query windows. A sample for project releases is shown

15

ENGINEER

PEC

September 2007
which is in harmony with the inherent requirements of the end users in terms of hardware, software and finance personnel. This software development is a step forward towards the overall computerization plan for finance department. The guidance given by the higher management of different finance departments proved to be the main drive behind this achievement. The design and development work, undertaken for the GFPS, has been covered in detail. This software design and development was purposefully undertaken since no software development work was previously carried out to develop the database system for finance department. The goals set at the start of this research have been achieved. The requirement specifications have been fully implemented, and the designed system truly represents and satisfies the users requirements. This research has led to the development of a real working of a financial management system, which can be readily deployed and practically utilized by the finance department. This software has been purposefully designed and developed to meet the requirements of a fast and reliable information system for the user in order to improve significantly the capability of any department dealing with finances. The application software for GFPS is developed for carrying out detailed system study and analysis of finance department books. The developed package is an integrated system, which would ultimately take care of most of the aspects of finance procedures. The emphasis has been laid to develop a structured system, which is user friendly, easy to handle, easy to use and covers almost all the essential aspects of expenditures in respective departments. The effort is aimed at producing software that is functionally acceptable, quickly adaptable, highly reliable and most efficient in processing. It is easy to handle, simple to operate while economical to maintain. The GFPS has automated the record of expenditures for codes, expenditure, cut, posting and system functions. The complete details of requested expenditure with respect to particular diary number within a year have been automated. Each departments request can be recorded and achieved independently using GFPS. Project authorization on day as well as weekly basis, authorization number, authorization date and amount authorized is completely processed. Project releases on day as well as weekly basis, released number, released date and amount released is completely recorded. The reports have been designed on standard format based on specific queries. A set of standard queries has been identified with a complete support built in the system. Security is of paramount importance regarding the finance department daily routine matters with respect to expenditure. It carries top priority once it comes to the data handling of the department.

emphasized upon the team members that they should be deliberate and forthright in answering the questions. The first set of five questions dealt with the overall system performance. Ease of handling, ease in monitoring the GFPS, confidence level and reliability of the system were the parameters evaluated in this set of questions. The idea was to ascertain the general level of acceptability of the developed system in the minds of the financial experts. The second set of four questions pertained to procedural data incorporated in the system. As these procedures were directly responsible in enhancing the financial status of the establishment it was imperative that their efficacy be ascertained and their acceptability determined. Another important factor was to assess whether the members of the evaluation team were ready to trust these gadgets. The third set of two questions dealt with the security functions of the GFPS. It was considered necessary to obtain feedback on this utility. The alerts play a very important role in enhancing the performance of the GFPS. The fourth set of questions contained queries about cut procedure. The fifth set of questions pertained to the software. The software must be failsafe and at the same time it must be extremely user-friendly [1]. The final two questions were about the requirements. While developing the software great pains were taken to ensure the integrity of the data. A set of questionnaires were checked in detail to assess the opinion of each member of the evaluation team about the developed system. Users response for the first five questions shows that the developed system was easy to learn and use, imparted a feeling of high level of confidence. Users found that the GFPS utility was highly useful. Salient advantages of this system are: (1) provides enhanced access control and monitoring in real time, (2) is more robust and reliable, (3) gives faster access to data, (4) exhibits a better level of financial procedures being less dependent on human skills/failings, (5) always generates true results of cut financial routine, and (6) presents economy of force (lesser number of persons required). The developed GFPS system is efficient in processing. It has solved the data handling and storage problem of the financial data in the department. It can provide quick answers to single as well as multiple queries quickly. It also has the capability to provide on-line information retrieval and automated report generation for the users. The developed system is quite user friendly, so that any person can obtain the required information effectively out of the database, after few weeks raining and practice. Furthermore, self explanatory menus will keep guiding the user. Conclusion The developed GFPS system creates an environment,

16

ENGINEER

PEC

September 2007
Date, C. J., An Introduction To Database Systems, 6th Edition, Addison Wesley Publishing Company, 2000. 9. McFadden, F. R. and Hoffer, J. A., Modern Database Management, Benjamin/Cummings Publishing Company Inc., 2002. 10. Ricardo, CM. Database Systems, Principles, Design and Implementation, Macmillan Publishing Company, New York, 1998. 11. Visual FoxPro 8.0, Complete Command reference with tutorial, 2003. 8. About the Author PEC Registration No. Elect/5228 Dr Muhammad Younus Javed did his PhD (Adaptive Communication Interfaces) from University of Dundee, United Kingdom in 1991 and MS (Disambiguation Systems) from the same university in 1988. He completed BE Electrical Engineering from UET Lahore in 1982. He is serving in the College of Electrical and Mechanical Engineering (C of E&ME) since 1991 and has taught a number of courses at undergraduate and postgraduate level. He is currently Head of the Computer Engineering Department at C of E&ME, National University of Sciences & Technology, (NUST), Rawalpindi. Five PhD scholars are working under his supervision. He is recipient of ORS Award from the University of Dundee for his outstanding PhD research work. His areas of interest are Digital Image Processing, Operating Systems, Database Systems, Algorithmics and Communication Interfaces. He has 78 national / international publications to his credit. Mr Munawar iqbal is student of MS Computer Engineering at NUST and is presently pursuing Thesis work under the supervision of Dr Younus Javed.

Keeping its significance in view, GFPS is equipped with necessary security features to deny access to unauthorized intrusions and thus keeping away any illegal attempts. Further research can be made on rules of finance allocation as they may change from time to time and a detailed reporting mechanism can be established. The software development work can be undertaken in future to further enhance the features of GFPS, in connection with the computerization plan of finance department. It can be established as short-term or long-term plans. GFPS has been thoroughly evaluated by financial experts who tested it on real-time financial projects. It remained under trials for four weeks. It has provided promising results and all the users have found it extremely useful, highly reliable and accurate, very secure, user-friendly, very fast and excellent financial management system. References 1. 2. 3. 4. 5. 6. 7. Somerville, I., Software Engineering, Addison Wesley Publishing Company, 5th Edition, 1996. Kroenke, D. M., Database Processing Fundamental Design and Implementation, A Simon & Schuster Company, 6th Edition,1998. Robinson, B. and . Prior, M., System Analysis Techniques, International Thomson Publishing Company, 1995. Gruber, M., Understanding SQL, BPB Publications, 1990. Shepherd , J. C., Database Management, Theory and Application, 1990. Rishe, N., Database Design, RR Donnelley & Sons Company, 1992. Jennings, R., Using Access 95, 1997.

17

ENGINEER

PEC

September 2007
Richter maximum wave amplitude defined as logarithm to base ten and recorded on seismograph. The rise of one mean ten rise of the wave were period of half second. The instruments record the components of ground acceleration, two in horizontal direction and one in the vertical. Special geological engineering studies for each site consisting of occupancy, map showing faults (active) and existing structural type are to be carried out. The quantum of studies depends upon the type of structure but revolve around two pre-requisites. 1. Measurements of density, water content, shear strength, behavior under flooding, attenuation in situ and laboratory of boreholes samples. 2. Determination of wave speeds. In short prediction of ground acceleration, duration, frequency strong portion of earthquake is compulsory for designing a structure. The response of the structure is complicated and it depends on several factors such as amplification, soil condition and source distance. Moderate earthquake with long duration may cause more damages. In addition when the frequency of structure and ground motion is close, ground motion is amplified. Foundations The super-structure interfaces foundation and under static load generally the vertical loads are transferred to supporting soil. In seismic areas the loads imposed can exceed the vertical loads of a structure and also produce uplift coupled with horizontal forces and movements at foundation level. Experience has shown that building on rock suffer very little damage in respect to building on deep soils. The liquefaction, which kills the supporting soil pressure, is also worked-out. The design base shear was formulated to be directly proportional to seismic zone factor, importance factor and variable further proportioned to site coefficient and fundamental building period. All these factors, which can be examined from the earthquake codes, are used in the formula for design shear. Liquefaction Loose saturated sand deposits are exposed to soil liquefaction and causes settlement of structure and landslides. Loose sand deposits have tendency to compact and decrease in volume. Water can not drain rapidly and there is increase in pore water pressure. Shaking increase the pore water pressure more than over burden pressure, the sand shear strength shall reduce and is in liquefied stage. The sand boils at surface during an earthquake. Evaluating the potential of soil is difficult task and standard penetration, cone penetration and other methods are used to determine design parameters. For all new constructions, a choice is to be made between designing for liquefaction or move the project. Sometime it is preferable to modify the soil conditions by:1. Excavation and replacement of soils. 2. Compaction piles and grouting.

Essentials of Earthquake Designs


Junaid Sultan Khan Earthquake Earthquake kills ten thousands people every year. The knowledge has now increased and the structures are designed using quantitative dynamic analysis, using spectra of defining parameters. From the wave readings observed in different stations the position of the center of earthquake can be calculated. The seismic waves radiate from the source below the ground surface as opposite sides of the fault, rebound to decrease the strain energy in the rocks. The point is called focus and directly above this is called the epicenter. Earthquakes with foci 70 kms or less are shallow and below 300s km are called deep. Smaller earthquakes, known as after shocks follow most earthquake of the shallow origin. Foreshocks before major earthquake sometime predict the main shock. Major earthquakes were attributed to volcanoes previously, but global geology explained the plate tectonics phenomena. The lithosphere, which is outermost part, consists of stable rocks (plates) 80 km in depth and the movement of these plates produces seismic activities. Three types of elastic waves cause shaking and produce earthquake. The forth wave is called P-wave and its motion is same as sound wave i.e. alternately pushes and pulls the rock or other medias. The slower wave is called Swave and at ground level it produces both vertical and horizontal motion. These waves can not travel through liquids such as oceans. The speed of both waves depend upon the density of rock, the first to reach are P-waves effecting like a sonic boom and some seconds later the Swaves arrive with components of side to side motion, causing horizontal and vertical motions. The S- waves are destructive. Both waves are dependent on density and elastic modulus. The third type is called surface- wave, further sub-divided into love-wave and Raleigh-wave. The love-wave moves ground side to side without vertical movement, while the Raleigh-wave moves in a vertical plane. Both types are slower in speed than body waves of P&S wave types. Nevertheless, love-wave is faster than Raleigh-wave with unpredictable pattern. The shaking at ground level is more pronounced than in deep basement, tunnel and mines as amplitude of waves is doubled at the surface. Earthquake waves are affected by both soil conditions and topography. Seismic waves in addition to simple shake-up has rotational element having strong effect due to torsion forces. Earthquake forces damage structures directly and indirectly resulting in fires, abrupt changes in soil pressures, displacement, landslides, sea waves and changes in levels. Magnitude Wadati in Japan originated in 1931 and later, Charles Richter in California in 1935, invented Richter scale. The

18

ENGINEER
3. 4.

PEC

September 2007
inelastic range. The location of all components, which are likely to be damaged, should not affect gravity load capacity of the structure. All other components remain in the elastic range. The design force level depends on the first yield level of structure when deviations start from the plastic response. Modification factors prescribed further reduce the design force level. Seismic design of structural steel system covers moment resisting frames, simple braced frames and eccentrically braced frames. The ductility of steel reduces yield strength and therefore, its limits lower than 50 Ksi is prescribed in the code for structural components during the design earthquake. The other components are expected to yield during the strong earthquake. The first system consists of moment resisting frames of steel columns and beams are bolted, riveted or welded at joints. This system is most ductile and is preferred for earthquake areas. Beam to column connection and panel zone carries paramount importance. All connections should be strong, stiff (rigid) and having post-yield deformation capacity without loss of strength. Reinforced connections having cover plates, welded flange plates, triangular haunches, strait haunches and vertical plate ribs are used. A beam-to-column panel zone flexible component of steel moment resisting frame is to be catered for local stresses generated and strengthened according to design procedures. The second system consists of simple braced frames, which provide lateral strength and stiffness against earthquake forces and wind. The philosophy of bracing is that the failure occurs only in braces, leaving the columns / beam connection undamaged; thus structure survives earthquake without losing gravity-load resistance. Beams and column in braced frames must be designed to remain elastic when all braces reach maximum tension or compression capacity. The third system consists of a mixture of moment resistant frame and braced frames having benefits of ductility derived from first system and energy dissipation from the braced frames. The loads in the braces are transferred to column or another brace through shear and bending in segment of beam. This small beam (link) is designed to dissipate the earthquake-induced energy. All other components of system are designed to remain elastic during the earthquake. Reinforced Concrete Structures Reinforced concrete is widely used in construction industry and experience shows of last few decades that buildings are designed after finding out expected demands matching with capacity in earthquake areas. The ground motion and structural parameters are worked out and consist of structural fundamental period, yield levels, and force displacement characteristics. The demands have been worked out from shaking tests and performance of structure to actual destructive earthquake. The structural engineer, apart from normal design has to take a great care of ductility or inelastic deformation

Chemical stabilization using additives. Dewatering systems.

Dynamic motion Structural dynamic is applied to calculate stresses and deflections. In earthquake, the loading is time varying and maximum values are worked for structural design. Simple structure system is represented in terms of single degree of freedom, which ultimately leads to multiple degrees of freedom. Dynamic equilibrium is derived from static equations that the applied force is equal to stiffness resistance and resultant displacement. In case of dynamic equilibrium, a time varying force (force multiplied by time) and its mathematical solution derives formula for calculating the design parameters. Time dependent force on a simple structure (single storey) the assumptions are made: 1. Mass at roof level 2. Roof system is rigid 3. Axial deformation of column neglected. The base motion is product of mass and ground acceleration. The earthquake forces are classified into harmonic and impulse types. The harmonic loading consists of train of sinusoidal waves having given amplitude, while impulse loading are of short duration, having impulses of different shapes. The seismic design forces are calculated by two procedures: The equivalent static force procedure and dynamic analysis. The static force procedures are based on empirical formulas and are commonly used for regular structures having uniform distribution of mass and stiffness. For irregular structures, dynamic analysis is used. Under the code regular structures are up to 240 feet height and irregular structures are 65 feet or less. Above these heights, for poor soil pressures and earthquake greater than 0.7 seconds period, the dynamic analysis is required. The design base shear is directly proportional to the seismic importance factor, soil condition factor at site and seismic dead load and inversely proportional to fundamental period of the structure and ductility / strength factor. The design shears is not to exceed or decrease the limits under the code. The Seismic zone factor (peak-ground acceleration) has to be scaled from seismic zone map and range from 0.075 to 0.4. The importance factor is for margin of safety, especially hospitals and fire-brigade station buildings and range from 1 to 1.25. The building period is directly proportioned to a fixed factor depending on steel or concrete frame (range .02 to .035) and height of building. Structural system coefficient depends on ductility and strength of system. Steel Structures: The ductility of steel makes it ideal for seismic design. It has strength and toughness but what is more important is welding and riveting. Structural members are designed as fuses and detailed to dissipate earthquake energy in the

19

ENGINEER

PEC

September 2007

capacity. A good design concept of is structural redundancy to be achieved by continuity between resisting elements by monolithic construction of reinforced cement concrete. All parts of the structure should be tied to act as unit together, which also caters for shear forces and torsion. Sufficient ductility has to be built in case the strength of structure can not insure elastic response. Ductility demand is the ratio of maximum hinge rotation to rotation at first yield. The cardinal principle is to avoid shear failure in members. It is imperative that structural members should first fail in flexure not in shear and bond/anchorage. Shear walls having height to width ratio of 2 or 3 may be carefully designed and diagonal steel also added.

Plastic Hinge Locations the stability of frame in earthquake excitation. The collapse of the column, results in the collapse of the structure at and above. The bi-directional loading in column may shift hinging from beam, to column and therefore, in such cases, the column should be 1.5 times stronger than the beam in flexure. The ideal location for plastic hinge should be in the beams and bases of the first or lower story columns and all other members should remain elastic under the design earthquake. However, slab column connection should have stirrups and steel going into the column for safety. Shear Walls

Hinging Region from the face of the column Loads i. ii.

Anchorage with hooks The structural wall reduces inter-story damage during strong earthquakes. Simple walls with height / width ratio limited to 2.0 are common in multistory buildings. In the cantilever walls horizontal and vertical steel is provided and resists all shear and moments. A horizontal force acts at some distance above the base, causing flexure hinging at the base of the wall. The walls are designed so that as to Section of the yield at the base. The horizontal force wall at the base distance above the base is of importance. In case it is higher above the base, it will take lesser flexure hinging force in comparison to nearer position at the base. Dynamic analysis of shear walls show that maximum shear calculated at the base of the wall can go 3.5 times greater than shear needed to produce flexure yielding at the base. The shear depends on fundamental time period and rotational ductility of the wall. Further, it is assumed that the hinging region where destruction occurs is roughly an equal to thickness of the wall. Shear walls having stiff and well-confined flanges or boundaries (column) are better than plan rectangular sections. Where, geometry changes along the height of wall, special confinement steel is provided. The designs of coupled walls are used instead of simple shear walls. The walls are coupled by beams and the beams serve as primary unit to absorb shock and save the structure. In reinforced concrete design, the provision of ASCE-95, IBC-2000,

Static: One direction, in increment until deformation. Reverse: Loading cycle in predetermined amplitude until deformation. iii. Dynamic: Time varying displacements are applied to selected points of structure. iv. Shaking Tables: Computer control actuators are used for input already worked out. Effective lateral confinement of concrete increases strength of concrete and deformation capacity, lateral ties or spiral steel, covered by thin concrete confines concrete and increases ductility. Rectangular hoops are weak at corners and therefore, not as effective as spiral steel for members subject to axial loads. Flexure deformation capacity of hinge is closely related to curvature at that section. The curvature varies over the length of Plastic Hinge. Beams and column joints critically stress and beams design near intersection is of particular interest. These potential hinging regions are provided with spiral and lateral ties for earthquake areas. The lateral steel in hinging regions of beams confines the steel, resist against buckling and works against transverse shear. Further, it should be insured that the beams develop their full strength in flexure rather than the shear. In column design, it has to be insured that the failure of the frame should not occur in column. Plastic hinging should occur in the beam and thus column collapse is saved. The strong column weak beam practice is intended to insure,

20

ENGINEER

PEC

September 2007
1.4D+1.7L+(1.7H or 1.4F) 0.9D+(1.7H or 1.4F) 0.75 (1.4D + 1.7L + 1.4T) Where = Required Strength. = Dead load. = Live Load. = Wind Load. = Earthquake Load. = Load due to fluids. = Load due to soil pressures. = Load due to temperature and shrinkage The equations are given to give an idea that to what extent the earthquake affects the design, but in actual practice there are variation in different codes. The code limits the concrete strength to 3000 lhs /in2 and maximum yield strength of steel to 60,000 lbs. /in2. In no case over specified steel be used in beams as it effect plastic hinging at the ends and the shear strength of beam gets lower than the moment capacity. The beams section should be with width / depth ratio of greater than 0.3. The width should be more than 10 inches and equal or less than width of supporting column with the bearing, 1.5 times depth of beam. Laps should not be within 2 times depth of beam near the ends. Hoops should support longitudinal bars firmly. The shear force in concrete should be neglected for design.

Plan

Elevation

U D L W E F H T 7. 8.

UBC-97 and ACI chapter 21 are used. A horizontal force acts at some distance above the base, causing flexure hinging at the base of the wall. The walls are designed so that as to yield at the base. The horizontal force distance above the base is of importance. In case it is higher above the base, it will take lesser flexure hinging force in comparison to nearer position at the base. Dynamic analysis of shear walls show that maximum shear calculated at the base of the wall can go 3.5 times greater than shear needed to produce flexure yielding at the base. The shear depends on fundamental time period and rotational ductility of the wall. Further, it is assumed that the hinging region where destruction occurs is roughly an equal to thickness of the wall. Shear walls having stiff and well-confined flanges or boundaries (column) are better than plan rectangular sections. Where, geometry changes along the height of wall, special confinement steel is provided. The designs of coupled walls are used instead of simple shear walls. The walls are coupled by beams and the beams serve as primary unit to absorb shock and save the structure. In reinforced concrete design, the provision of ASCE-95, IBC-2000, UBC-97 and ACI chapter 21 are used. Principal Steps 1. Earthquake forces, base shear and estimated fundamental period of vibration of structure are calculated while distribution of shear over the height is estimated for the design. 2. The design forces and story drift ratio are calculated on basis of base shear, gravity and wind loads. 3. All the member and joints are designed for most unfavorable conditions to insure ductile behavior in each principal direction. 4. For all buildings over 24 stories, dynamic analysis is warranted under the codes. 5. Ultimate strength methods (strength design) are used by adopting load factors, reduction factors and combination, according to design codes. The required strength is based on the most critical combination of factored loads and capacity. 6. A.C.I code requires the strength: 1.4D + 1.7L U = 0.75 [1.4D + 1.7L (1.7W or1.87E) 0.9D(1.3W or 1.43E)

9.

References 1. Seismic design handbook by Farzad Naeim. 2. NEHRP guidelines for seismic design of buildings. 3. Recommended lateral force requirements and commentary (1999 SEAOC bluebook) About the Author Junaid Sultan Khan PEC Registration Number: Civil/ 21813, Bachelor of Engineering (2001) Major in Civil Engineering, from University of Engineering and Technology, Peshawar, N-W.F.P, 1ST Division throughout Engineering University. Did final project on Design of Flexible Pavement of the Peshawar-Islamabad Motorway (M-1). It was based upon American Association of State Highway and Transportation Officials (AASHTO), Road Note 29, TRL Road Note 31 (For Tropical Countries) Codes. Including a brief over view of Motorway Economic study. Completed first semester of Masters in Structures from University of Engineering and Technology, Peshawar, N-W.F.P and Masters will be completed in the start of 2007. Working as a Junior Engineer (J.E) with Associated Consulting Engineers (From July 2003 and still working). Worked as Engineer with Creative Construction Company (September 2001 to July 2003).

21

ENGINEER

PEC

September 2007
survival, at least, requires the reversal of this ratio. If exploited properly, even in the existing (Tarbella, GBHP Project, Mangla) arrangement, with the introduction of pumped storage and generation, the annual power shortages can be greatly minimized if not eliminated. Regulated water releases are permitted through all the main hydel power plants in Pakistan. Capabilities of Tarbela, Mangla and Barotha remain as 760 MW (load factor= 21%), 400 MW (load factor = 40%) and 580 MW (load factor = 40%) against the installed capacities of 3478, 1000 and 1450 MW in winter. The balance of installed capacity in winter and peak demand throughout the year is met through thermal generation. Power generation, especially after the present oil crises, oil fired stations are the costliest among various thermal power

Hydro-Energy and Water Vision in Pakistan


Engr. Abdul Qayyum Introduction Tomorrow belongs to hydro energy. There are three naturally compatible types of hydro power (Fig. 1); a. Impoundment like Tarbella and Mangla. b. Diversion like GBHP Project and, c. Pumped Storage. Pakistan is well suited for all the three hydro powers, and it, can meet its all present and future electricity requirements only by this inexpensive type of hydro-energy, due to its unique

100% Impoundment hydro

1-Impoundment

20 to 30% wastage in pumping

2-Diversion

3- Pumped Storage

70 - 80% to grid (or a portion to grid and the remaining to upper reservoir in the form of water/ energy storage system)

25 to 30% wastage in pumping 100% Diversion/ Impoundment hydro


Fig 1 - Three efficient types of hydro power generation favorable environment for them. With proper planning, it should be possible for Pakistan to export this type of hydroenergy. A careful study has shown that the total potential of hydro energy in the world is not less then 15 billion MW. Out of this, only 20% has yet been exploited and most of the unused and untapped hydro potential is in the under developed/developing countries. Pakistan is one of them. In financial year 2003-2004, the total generation in Pakistan was 68,987 MKwh, in which hydel component was only 27,358 MKwh (39.6%) and the thermal component was 41,629 MKwh (60.4%). In 2004-2005 the total generation was 73,000 MKwh, in which the hydel component was 25500 MKwh and the ratio of hydel to total was further decreased to 0.349. Pakistans economical units. The thermal units also require to be shut down during annual maintenance. To meet the varying power demands, the provision of thermal and hydel mix of power stations (plants) is adopted both for the improvement of load factor of the base plant and the adjustment of the power generation to match the daily and seasonal load fluctuation of the national grid. But increasing the energy production by the present pattern can not help reduce unit price of electrical energy. The most reasonable means to increase the productivity of plants or decreasing the unit cost of energy in Pakistan is the use of pumped storage plants and generation (Fig 2 & 11). When the load enters in base phase (Fig 7) of the plant or when productivity is less due to limited water flows,

24

ENGINEER

PEC

September 2007

pumped storage starts working and there are more than one mode of its configuration. The net result is that the unit cost of generation comes down as the load on the unit increases and is minimum at full load. Therefore, if during the low demand period or during low load factor due to limited water flows an artificial load is created, the unit cost of power generation will come down, benefiting the network (Fig 2). Base load plants work for a period of 5,000 hours or more in a year (i.e. > 57% of time). Medium load plants work between 2,000 and 5,000 hours a year and peak load plants work for less than 2,000 hours in a year i.e. < 22% of time. Base load plants have to run continuously and, therefore, there is very little operational flexibility. Medium load plants are operational predominantly on week days. These plants may have some operational flexibility. production at an appropriate load factor (table-2). This stored water is used for power generation during the peak demand period. Figures-4 & 6 show the load curve of a network with a pumped storage plant working in conjunction with the base plant. It will be seen from the figure that the load fluctuation for the base plant has been considerably reduced. Also there is a bulk transfer of energy from the low-demand period to peak period. The pumped storage plant assists the network in two ways (1) It improves the load factor during the low-demand period, benefiting the network and (2) It reduces the demand on the base plant by generating peak power making it possible to use lower capacity units. Thus it is prudent to explore feasibility of pumped storage and generation on existing hydropower plants and on most of the future hydroplants, so that the availability of water and production of hydro-energy is increased to the required level.

The peak load plants are used for a short duration, the load factor being 10% to 25%, investment in these is comparatively less and corresponding reduction of productivity is, in general, acceptable and economically justifiable. Fossil fuels are getting exhausted rapidly therefore the world is turning its attention towards renewable resources of energy such as hydro-power, solar-energy etc. In Pakistan, the bulk of our known reserves of hydro-power potential are yet to be tapped. However, great fluctuations in river flows do not permit uniform production round the year. Pumped storage / plant and generation is one such type of energy production which promises filling the gaps. In this type of plant, energy is stored up in a high level lake by pumping up water during low demand periods such as the nights, during weekends, and in countries like Pakistan throughout the winter, when our limited availability of water does not allow the impoundment/diversion hydro energy

25

ENGINEER

PEC

September 2007
channel. The only difference is an additional lake at the lower end in which tail water is stored up for pumping in the existing powerhouse, additional machinery has to be provided for pumping. Reversible units would be used for new powerhouse. The conduit system in some cases has to be designed for the two-way movement of water. The transmission lines connecting the powerhouse to the grid can also be used to draw power from the grid during pumping operations. Figure-8, typically represents the pumped storage scheme configuration. In the year 2000 the United States had 19500 MW capacity of pumped storage. They consume more power filling their reservoirs than they generate by emptying them. Still the technique is considered a worthwhile addition to the electrical grid as the most cost effective means for regulation of electrical power.
Load Factors (LF) of Tarbela, Mangla and GBHP at 4 Representative Days and the Average Daily Load Factor (LF) Table - 2 % LF Date TARBELA 16.3 31.3 94.7 44.1 46.6 MANGLA 41.1 78.0 46.0 53.6 54.675 GHAZI BAROTHA 33.1 57.4 87.2 29.3 51.75

Why pumped storage/generation? Electricity itself cannot be stored, but the potential to generate electricity can ---- for example, in a battery. Pumped storage plants provide a way to store the potential energy of water. This enables meetings peak power demands by pumping tail basin water to upstream reservoir during low demand period and utilizing this additional water to generate electricity during peak demand period of the day. a. i. Economic Justification Many countries have a special tariff for peak-load power which is about 2 to 3 times more than the normal tariff. In future, a similar situation may develop in Pakistan. Therefore, the plant can be made to earn additional revenues because of the conversion of cheap off-peak power to costlier peak power. These revenues can pay back the investments made in the plant. The alternative of generating peak power by using fossil fuels is prohibitively costlier.

Jan 10, 04 Apr 20, 04 Aug 20, 04 Dec 20, 04 Average daily LF

ii.

b. Need of Reserve Plant The base units are deficit in providing the peak demand. The deficiencies of a base unit can be over come by providing pumped storage as an auxiliary plant which should be able to perform following functions:i. To generate peak power quickly and efficiently during the peak demand period ii. To create an artificial load during low demand period and to improve the load factor of the base plant iii. To adjust the power generation to match the load fluctuations of the network iv. To be able to take the full load quickly from the stand-still or from shut down position. Constitution The plant has most of the components of a normal hydroelectric plant namely the high level lake, the power tunnel or penstocks, the powerhouse and the tail race

26

ENGINEER

PEC

September 2007
Table 1: Installed Capacity & Capability of WAPDA System As of July 2005

Sr. No. 1. 2. 3. 4. 5. 6. Tarbela Mangla

Name of Power Station

Installed Capacity (MW) 3478 1000 184 1450 243 108 6463 850 174 1024 640 1015 35 1690 1350 130 244 132 59 1915 150 4779 11242 1638 1292 131 362 365 117 140 450 134 157 135 586 10.5 30 235 325 6107.5 17349

Capability (MW) Summer Winter 3691 1020 184 1450 195 68 6608 695 130 825 430 875 22 1327 1260 100 175 100 40 1675 35 3862 10470 1342 1200 120 351 344 112 126 395 123 150 107 548 10 30 210 300 5468 15938 760 400 75 580 145 34 1994 695 150 845 430 945 22 1397 1260 100 210 100 40 1710 35 3987 5981 1342 1200 120 351 344 112 126 395 123 150 107 548 10 6 210 300 5444 11425

Chashma Low Head Ghazi Barotha Warsak Small Hydels Sub-Total (Hydel) GENCO-I: TPS Jamshoro #1-4 GTPS Kotri #1-7 Sub-Total GENCO-I GENCO-II:

7. 8.

9. 10. 11.

TPS Guddu Steam #1-4 TPS Guddu C.C. #5-13 TPS Quetta Sub-Total GENCO-II GENCO-III: TPS Muzaffargarh #1-6 NGPS Multan #1&2 GTPS Faisalabad #1-9 SPS Faisalabad #1&2 Shahdra G.T. Sub-Total GENCO-III: GENCO-IV: FBC Lakhra Sub-Total WAPDA Thermal Total Capacity (WAPDA) Private Projects

12. 13. 14. 15. 16.

17.

18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33.

KAPCO Hub Power Project Kohinoor Energy Ltd. AES Lalpir Ltd. AES Pak Gen (Pvt) Ltd. Southern Electric Power Co. Ltd. Habibullah Energy Ltd. Rouch (Pak) Power Ltd. Saba Power Company Fauji Kabirwala Japan Power Generation Ltd. Uch Power Project Altern Energy Ltd. Jagran Hydel Liberty Power Project Chashma Nuclear (PAEC) Sub-Total (Private) Total (WAPDA System)

27

ENGINEER

PEC

September 2007
over from one mode of operation to another mode. These features help the network in efficiently meeting sudden peaks and shock loads. The set can do spinning reserve duty at a very low cost, compared to a thermal set. (Presently used in Pakistan). d. In Pakistan unutilized capacity in winter at Tarbela, and Ghazi-Barotha and even at Mangla can be activated at very low cost along-with meeting the peak demand by hydropower. This provision should be considered in the feasibility of all future plants at Indus and Jhelum to increase their load factor. Because of these advantages, a pumped storage unit of 100 MW in U.K. was equated to a thermal unit of 120 MW, when the preliminary estimates were prepared. These days when new power plants are being planned, a provision for a pumped storage plant with a capacity of 1520 per cent of the thermal capacity is provided for. It is found that a combination of a pumped storage plant of 500 MW capacity along with a thermal plant of 2000 MW capacity benefits the network more than a thermal plant of 2500 MW capacity. Scenario in Pakistan Pumped storage generation in Pakistan has special attraction due to the reason that at major hydropower plants almost 71% of their capacity (4200 MW) remains unutilized during winter season. Load factor lowers down up to 3% on some days. In other words the potential exists much more than to fulfill the peak demand only. In deed the present ratio of hydel to thermal production can be reversed by the use of this type of hydro energy by exploiting it in existing setup. (Fig 10(a-d)) Pumped storage generation - scope in Pakistan a. Pattern of demand The demand for power fluctuates from minute to minute,

In 1999, EU had 32 GW capacity of pumped storage out of a total of 188 GW of hydropower and representing 5.5% of total electrical capacity in the EU. A worldwide list of some pumped storage plants may be seen at Annexure-1. Cycle efficiency of a pumped storage plant The cycle can be divided into two portions the pumping cycle and the generating cycle. While pumping, losses will be incurred in the transformers, motors, the pumps and the penstock pipes. While generating, losses will be incurred in the penstocks, the turbines, the generators and the transformers. The efficiencies of the machines are given below:Transformer - 98 per cent Motor-generator - 96 per cent Turbine - 92 per cent Pump - 88 per cent Penstocks - 96-98 per cent (depending upon the length) There are 20 - 30 percent losses, therefore, the overall cycle efficiency obtained ranges from 70 to 80 percent. That means for every 3 to 4 MW drawn from the network during off-peak period and throughout the winter in Pakistan, 2 to 3 MW are returned back to the network while about 1 MW is consumed and may be considered as waste. Advantages of pumped storage plant a. The plant has a long life. Plants are giving efficient service even after 25 years of operation. b. There is reliability of operations. Outages are low and maintenance costs are small. c. There is a great flexibility of operations. The unit can be fully loaded from standstill within few minutes and it can be shut down quickly. There can be rapid change

Table 3 Daily Average with/without Pumped Storage Load Factor (LF) and the Generation Capabilities

Present Plant % LF Tarbela Mangla Ghazi Barotha Told Daily average 46.6 54.67 51.75 51.00 Capabilities (MW) 1697 556 749 3002

Unutilized (Potential) %LF 53.4 45.33 48.25 49.00

75% of Unutilized LF

LF/Capabilities Accumulative with Pumped Storage Capabilities (MW)

% LF 86.7 87.67 87.75 87.37

40.1 34.00 36 36.7

3174 894 1272 5340

28

ENGINEER

PEC

September 2007

day to day and season to season (Figure-10(a-d)). To study the pattern, the quantitative scenario in tabulated form of all the sources, as of July 2005, is shown on next page: In Pakistan the total installed capacity (hydel & thermal) is 17349 MW where as the average daily demand is less then 8000 MW (table 1& Fig 10(a-d)). Therefore, the todays need, to decrease the unit cost is to increase the load factor (LF) of existing system and not to enhance the conventional (hydel or thermal) installed capacity. This requirement be maintained for future plants also. From the above Table the ratio between installed capacity of hydel and thermal component is:Hydel/Thermal = 6463 / 10886 = 0.59 .A Ratio of capability in winter between hydel and thermal = 1994 / 9431 = 0.21.B Our emphasis is to increase both ratios A and B and this objective can be obtained by increasing the hydel component both in summer and winter. For simplicity, the load factor of hydel component in winter may be taken as (Tarbela, Mangla & Ghazi-Barotha). Capability in Winter / Installed Capacity = 1740 / 5928 = 0.29 ...C Present average daily capability/installed Capacity = Load Factor (LF) = 3002/5928 [Table 1 & 3] = 0.51 D Capacity to be installed in MW = Installed Capacity /Average Load Factor (D) = 5928 / 0.51 = 11623 MW. In other words to get 5928 MW effectively, in the conventional manner, we have to install 11623 MW, which is extremely expensive.

b.

Alternatively if 11623 MW is installed with pumped storage;

Already installed capacity = 5928 MW. Pumped Storage cushion = 5695 MW. 25% wastage during pumping = 1424 MW. Net achievable pumped storage generation = 11623 1424 MW 5,928 = 4271 MW. May be it is just theoretical and hence optimistic figure to some extent but practicable generation has to be worked out and this needs to study whether appertain with main structures can be accommodated Annex-2 or otherwise on prorate basis. Even if part of the net achievable 4271 MW, (average daily) is obtained additionally, from our existing hydel stations, it will; i. Increase the productivity of already installed hydel units by using their unutilized capacities throughout the year. ii. This arrangement will decrease the per unit generation, capital as well as maintenance costs many folds.(Fig-11) iii. Make possible the best utilization of national resources and reduction in production cost will lead to real economical growth. c. A statistical analysis of present scenario/scope in Pakistan is produced below. Fig 2 shows the relation between the unit cost and the load factor of a plant. Fig-11 depicts that the present cost of production at the three plants in Pakistan can theoretically be decreased more than fifty percent of the present cost by utilizing pumped storage hydro energy. As in the conventional design of future plants at Indus/Jhelum, the load factor cannot be increased to an acceptable value, the

Table - 4- Daily Average with/without Pumped Storage Load Factor (LF) and the Generation Capabilities (With two Future Plants) Average Load Factor in Conventional Method % 46 46 55 52 51 (Liberal side) 51 (Liberal side) Load Factor with Pumped Storage % 87 100 88 88 88 88 Average Capability in Conventional Method MW 1697 441 556 749 1836 2300 7579 Average Capability with Pumped Storage MW 3174 960 894 1272 3200 4000 13500

Plant Tarbela Tarbela Ext. - 4 Mangla Ghazi Barotha HPP Kalabagh Basha Total

29

ENGINEER

PEC

September 2007
Thus, it emerges that during the year, the unutilized hydel capacity of existing plants can be used in pumping and future hydel plants can be designed in conjunction with pumped storage generation so that the maximum hydel component is achieved. (Table-1 to 3, Fig 10 (a-d)) Planning for the Future Prior planning prevents poor performance. It should be possible to think in term of international super grids in the future for which a number of countries may cooperate with each other to make the best use of the different resources available for power generation. Example is the EU, which is getting the benefits of cooperative efforts in the integrated thermal, nuclear and hydel power stations. There should, therefore, be no hesitation to change/improve our present stations of = 60% load factor and design future plants having load factor > 80% throughout the year. For this purpose; paras 3 & 4 in view, presently, at Tarbela (Figure-9) we have; a. b. High Level Reservoir (Tarbela) with, i. Maximum conservation level - 472.41 m. ii. Crest of Main Dam - 477.90 m. Low Level Reservoir (Ghazi) with, i. Maximum conservation level - 341.50 m ii. Crest of Barrage - 342.00 m iii. Live storage capacity - 60.20M. m3

provision of pumped storage be considered. Table-3 depicts, both, capabilities/load factors of all the main existing plants, individually and when combined together. For Pakistan, we find that through the conventional (without increasing the load factor by use of pumped storage generation) design/ construction of hydro/ thermal plants. There seems no hope to meet our energy requirements in an economical way. Present/ Future average scenario of load factor/ generation/ capabilities is shown in Table-4. Present Load = 8000 MW Load in 2016 at the increase of 400 MW/ year = 12000 MW Above discussion leads to the following conclusions i. Without Pumped Storage; Total average daily generation (in year 2003-2004) in Pakistan 189.00 Mkwh Average daily hydel generation 71.23 Mkwh Ratio between Hydel and total generation 0.376 ii. With pumped storage only at Tarbela: Average daily hydel generation 4479 /1000 x 24 Mkwh = 107.49 Mkwh Ratio between Hydel and total generation = 0.568 iii. With pumped storage at all the three existing plants Average daily hydel generation 128.16 Mkwh Ratio between Hydel and total generation 0.678 iv. Tarbela 4th extension- By providing reversible Pumped Storage generation in the future extension 4 project, we can get further 960 MW which is equivalent to 23.04 MKwh. v. Changing the present conventional design of Kala Bagh Dam plant to the mixture (55% conventional + 45% reversible pumped storage) the total average generation can be increased to 76.68 MKwh. = (3600x0.55) + [(3600x0.45) x 0.75] = 1980+1215=3195 MW Daily average generation = 76.68 MKwh Total hydel daily generation = 151.2+76.68= 227.88 MKwh vi. Changing the present conventional design of Basha Dam Project to the mixture (55% conventional+45% reversible pumped storage) Total average hydel increase= (4500x0.55) +[(4500x0.45)x0.75] = 2475+1518.75 = 3994 MW Daily average generation = 95.86 MKwh Total hydel daily generation = 227.88 + 95.86 = 323.74 MKwh say 324 MKwh 324 MKwh average daily hydel generation is about 70% more than the total (hydel + thermal) present generation in Pakistan. It means that we will become self sufficient with some surplus for possible export and simultaneously we can get rid of or at least reasonably reduce the thermal component just after the construction of Kala Bagh Dam Project and Basha Dam Projects.

The Conduit system for generation, Transmission lines connecting to / from the National Grid. Only additional machinery along with pipe system has to be provided for pumping. Similarly the provision of pumped generation at future plants at Indus / Jhelum rivers should be checked.

30

ENGINEER

PEC

September 2007
storage plants should be taken care of through proper feasibility studies and reports.

At present the average daily capability of Tarbela is about 1700 MW due to low reservoir and average daily generation is 41 Mkwh. By installing pumping we can enhance the average daily capability to say 3174 Mw where as average daily generation can be increased from 41 Mkwh to 83.4 Mkwh. Load factor of the system will increase accordingly. Hence Tarbela can be upgraded in two phases. In first phase only pumping upto 1500 MW is suggested and in 2nd phase extension 4 of Tarbela be carried out by installation of reversible units. For 100 cumecs of pumping nearly 192 MW motor is required at Terbela. Experts services are available in the market. Even for Mangla and Barotha powerhouses, it appears feasible that by installing the pumping arrangements and providing suitable downstream ponding weirs, the hydel capability can be increased to 5340 MW and average daily hydel generation can be enhanced to 128.16 Mkwh. A proper feasibility study should be carried out. Construction of future dams through conventional design, method /systems at Indus/Jhelum rivers cannot increase the load factor, and hence, it cannot decrease the unit cost of generation. Therefore, there is pressing need that conventional design be changed, and about 45% provision of the pumped storage generation be incorporated in all the future plants. Other Requirements / Implications This is a Concept Paper and, the other important aspects such as type and working of plant, site selection, lake classification / machinery and power house for pumped

Upper reservoir

Generating Pumping

Lower reservoir

Pumped storage power plant

Figure 6 Pumped storage scheme configuration


Pumped storage stations can adopt a number of roles within the operation of an electrical supply grid, and can perform some of these roles concurrently. It is common for the operation of pumped storage plant to vary over time as they are to respond to changing market conditions. (Annex-2)

31

ENGINEER

PEC

September 2007
installation of pumps / reversible plants. For future plants, it is recommended to study the possibility for about 45% supplemental provision of pumped storage generation. d. When the cheap hydro-energy and water are made available in abundance the agricultural areas can be increased through tube wells by extending transmission lines in those areas. c.

The environmental impact of pumped storage stations is usually much less than that of a conventional hydropower station since the required downstream water storage is usually much smaller in size. The need for a pump-priming head usually positions the pump-turbine below the level of lower reservoir, often underground. The typical design life of a pumped storage station is 80-100 years. The principle areas of pumped storage benefits can be summarized as under: a. Improved energy regulation and operation of the supply grid b. Delivers ancillary services to the supply grid, such as standby and reserve duties, frequency control, and flexible reactive loading c. No gaseous emissions and have little environmental impact during its operation d. Allows flexible and rewarding commercial operations across a variety of electrical power supply scenarios. e. Availability of water is enhanced through recirculation. Agricultural areas can be increased. Recommendations a. Pumped storage and generation appears most feasible for Tarbela Dam. A proper feasibility should be carried out by HEPO or through some outside consulting firm. b. A study of all existing hydel plants be conducted to investigate the potential for pumped storage and

32

ENGINEER

PEC

September 2007
China
u Guangzhou, (2000), 2,400 MW u Tienhuangping (2001), 1,800 MW u Germany u Goldisthal (2002)1,060 MW u Markersbach (1981), 1,050 MW

Ireland
u Hill 292 MW Turlough

Italy
u Edolo (1982), 1,020 MW Piastra u (1981), 1,184 MW Chiotas u Presenzano (1992), 1,000 MW

u Lago Delio (1971), 1,040 MW

France
u Grand Maison (1997), 1,070 MW u La Coche, 285 MW u Le Cheylas, 485 MW u Mortzic, 920 MW u Revin, 800 Mw u Super Bissorte, 720 MW

e.

Construction of future thermal plants be avoided or discouraged and taken up only under special circumstances.

Japan
u (1991), 1,050 MW Imaichi u Kannagawa (2005), 2,700 MW is under construction.

References a. b. c. Hydro-Electric and Pumped Storage Plants by MG. Jog, Published by WILEY EASTERN LIMITED ISBN 81-224-0074-4 Dehli. ICOLD proceedings May 2005. Generation data of financial year 2003-2004, 20042005 and that of load curves load factors of Jan 10, 2004, July 10, 2004, August 20, 2004 and December 10, 2004 from National Power Control Centre letter No. 133/ LO-38 dated 06.12.2005. VOITH SIEMIENS HYDRO POWER GENERATION Germany. TOSHIBA Power systems & Services Australia. Colenco Power Engineering Ltd. Switzerland.

d. e. f.

Annexure 1 Worldwide List of Pumped Storage Plants Australia


u Bendeela, 80 MW u Jindabyne Pumping Station u Kangaroo Valley, 160 MW uThree, (973, 1,500 MW Tumut u Wivenhoe Power Station, 500 MW

When completed in 2005, it will be the world's largest pumped storage plant. u Kazunogawa (2001), 1,600 MW u Kisenyama, 466 MW u Matanoagawa (1999), 1,200 MW u 122 MW Midono, u 200 MW Niikappu, u Okawachi (1995), 1,280 MW u Okutataragi (1998), 1,932 MW u Okuyoshino, 1,206 MW u Shin-Takasegawa, 1,280 MW u 900 MW Shiobara, u 200 MW Takami, u Tamahara (1986), 1,200 MW u Yagisawa, 240 MW u (1999), 30 MW is the first seawater pumped Yanbaru hydro plant. Poland
u arnowiec, 716 MW u Porbka-ar, 500 MW u200 MW Solina, u ydowo, 150 MW u 92.6 MW Niedzica,

33

ENGINEER

PEC

September 2007

u 79.5 MW Dychw,

Russia
u (1994) 1,200 MW Zagorsk u Kaishador (1993) 1,600 MW u (1996) 2,268 MW Dneister

Taiwan
u (1985) 1,000 MW Minghu u (1994) 1,620 MW Mingtan

United Kingdom
u Cruachan, Scotland u Wales (1984), 1320 MW Dinorwig, u Ffestiniog, Wales 360 MW u Scotland Foyers,

United States
u Blenheim-Gilboa, NY (1973), 1,200 MW u CA (1978), 1,566 M Castaic, u Cannon, MO (1983), 58 MW Clarence u CA (1984), Helms, u (Niagra), NY (1961), 2,880 MW Lewiston u Ludington, MI (1973), 1,872 MW u Mount Elbert, 200 MW, 1,212 MW u Mt. Hope, 2,000 MW u Mountain, TN (1979), 1,530 MW Raccoon u Pumped Water Plant, 1500 MW Summit u Taum Sauk, MO, 450 MW u Bath County, VA, 420 MW

Other
u Siah Bisheh, Iran, (1996), 1,140 MW uRiver, St. Malo, France 240 MW hybrid Rance u water-tidal plant pumped u Drakensberg Pumped Storage Scheme, South

Africa, (1983) 1,000 MW.


u Sweden Juktan,

Salt water (ocean)


u Village, Okinawa, Japan Kunigami

[1](http://www.jcold.or.jp/Eng/Seawater/Seawater.ht m)[2](http://www.hitachi.com/rev/1998/revoct98/r4_1 08.pdf) u K o k o C r a t e r, O a h u , H a w a i i [3](http://www.hawaii.gov/dbedt/ert/pshpps/pshpps.ht ml) (Proposed)

34

ENGINEER

PEC

September 2007

35

ENGINEER

PEC

September 2007

36

ENGINEER

PEC

September 2007

37

ENGINEER
About the Author

PEC

September 2007
T/Lines) passing through difficult and weak soils. By dint of his engineering judgement and optimised designed foundations, we saved more than Rs. 15 Million of the Department. Remedies regarding site problems were also advised by him through frequent site visits. July 1998 to August 2002. Joined Pakistan Hydro-Consultants for the supervision of Ghazi Baortha Hydro-Project. Worked as Assistant Resident Engineer Structures from July 1998 to December 1999. Worked as Assistant Resident Engineer Earth Works from January 2000 to October 2000. Worked as Claim / Contract Engineer from November 2000 to December 2002. Joined Mangla Dam Rising Project Joint Venture Consultants. (January 2003 to August) Worked as Principal Engineer Design Structures. Joined General Consultants WAPDA Vision 2025 Programme. Worked as Contract / Tender Documentation Engineer from August 2003 to May 2004. Working as Principal Engineer Design Structures from May 2004 to date. The officer has state-of-the-art knowledge, hardworking, commitment to his profession and fully confident in his approach which helped a lot to higher authorities in taking crucial engineering decisions to save the costs. As recognition of his above meritorious services, the officer was strongly recommended for first prize in 1995-96 & 1996-97.

Engr. Abdul Qayyum, presently working as Principal Engineer Design structures in GC, M.Sc. in Structural Engineering from UET Lahore and Advanced Structural Engineering from USA is author of four Research Papers presented as follows: Structural Behaviour of Light Weight Concrete at the Annual Convention of American Concrete Institute in 1989 at Atlanta (USA) February 18 21, 1989. Structural Engineering and Construction published in the proceedings of Second East Asia Pacific Conference on Structural Engineering and Construction held on 11 13 November 1989 in Thailand. Concept Paper on Hydro-Energy and Water Vision in Pakistan, Introduction, Scope / Future Planning and Recommendations presented in IEP seminar on 1 February 2006 in Lahore. (Revised) Hydro-Energy and Water Vision in Pakistan Concept Paper for Pumped Storage & Generation in a Seminar at WAPDA Auditorium Lahore on July 22, 2006. Experience June 1981 June 1998 The officer worked in WAPDA Design T&G (Transmission Lines and Grid Stations Now NTDC) from dawn to disk over and above the call of his duties and met targets assigned to him. In August 1994, M.D. (T&G) assigned him the challenging task of protection of two 220 kV D/C T/Lines between Mangla Ghakkar being in very vulnerable condition when no WAPDA officer was accepting the challenge. The officer took strong cognizance of the situation / site parameters and proposed very timely, economical and effective remedial measures for protection of Sakator Nalla peripheral foundations. Recognising his efforts, M.D. (T&G) issued him an appreciation letter. In 1995-96 the officer protected 500 kV Terbella-Gatti Transmission Line Tower on the River Chenab crossing at nominal cost and saved Rs. 10 millions of the Department as worked out by NESPAK for making new piles foundations besides other irreparable national loss if the line Tower had been collapsed. During 1996-97 he provided services in the construction of three 220kV Grid Stations and completed the design of three Transmission Lines (220 kV T/Lines AES LALPIR PHASE I & II, 220 kV D/B CHASHMA (N) DAUD-KHAIL

38

ENGINEER

PEC

September 2007
engineer in UK in 1994. By now in 2006 the women scientists and engineers are executing all the national level mega projects as sole responsible officers in almost all the countries. According to US vision of the engineer 2020 [2] and new century engineering programs for women [3] the world population will increase to 9 Billion by 2020 out of which some 8 Billion will reside in South East Asia so we need to train women to cope with the impending economic stresses. National Academic Press (NAP) publications and others [2-11] have focused existing generic and future potential

Frontiers of Science and Engineering Entail Women Scientists and Engineers


Dr. N. Khan, Z. Saleem , A. M. Chaudhary, M. Mirza
Abstract This work reviews some of the major achievements of elite women scientists & engineers and explores the unique frontiers in science and engineering where probably women naturally suit better than men. There are several frontiers in science and engineering that have to do with ultra-short time scales such a nanotechnology and subattosecond events; ultra-large large scale system such as information technology and telecommunication; and ultracomplex scale systems such as biotechnology and neural networks. Theses frontiers have to merge environmental, life, and applied sciences for stunning new unexplored possibilities. Research and exploration needs patience and continued hard work that entails women full participation in all programs. Natural forces of this world are forcing faculty and students to work together across traditional disciplinary boundaries. This is the world of energy, environment, biotechnology, complex manufacturing methods, product development, logistics and communications. These frontiers address some of the very scary challenges to the future of the world. There are many compelling reasons for opening the doors, removing the barriers, and encouraging the full access participation of woman wisdom in all fields of science and engineering as researcher, educator, sales engineer and project manager. Keywords Women education, Women scientists, Women engineers, Minority education. History of Women Scientists and Engineers It matters little who was the first woman scientist or engineer; however, it matters if one deems women not equivalently intellectual as the men. In certain cases women have proved even to be superior researchers and innovators than the men i.e. Madame Marie Curie [1] won noble prize twice, first in physics and later in chemistry. It is what men scientists or engineers could not do to date. First women who got engineering degree in UK is Alice Jacqueline Perry who graduated with a first class honors degree in Civil Engineering from Queen's College Galway in 1906 and Nina Cameron Graham who graduated at Liverpool University in 1912. Women engineers due to domestic pressure did not practice but now they do. First woman was appointed as government chief highway
*

A.

Fig.1 NAP free online books on woman (Courtesy of National Academic Press).

issues of women scientists and engineers. Few samples are shown in Fig.1. It is important for Moslem countries to let the women share its responsibility in national development. In fact, Moslem women due to combined impact of religion and culture are not being allowed enough opportunities with full access. Responding furiously elite educated Moslem women even accuse men as unprepared, unwilling and unfit for era of information technology [4]. However, it is local issue that is evolving as self sustaining revolution in Moslem countries and is likely to make its own way. Women involvement in science and technology is since the start of history. Frontiers of science and engineering research have become too entangled and complex [5]. I believe the furtherance in research now requires full women participation in science and engineering to connect up the missing links to synthesize the realism of nonlinear nature. Some of the most famous earlier women scientists and engineers are shown in Fig.2.

40

ENGINEER

PEC

September 2007
her part but Asian woman need to transform herself from shy lady into a professional engineer or scientist. Who likes to be the first Moslem woman Nobel Laureate? Women journey from dark ages to full participation level is the sun way lagoon. Marie Curie obtained Nobel Prize twice; firstly in chemistry (1903) and secondly in physics (1911). Her daughter, Irene Curie, also got Nobel Prize in chemistry (1935). Females have proved their worth by obtaining Noble Prizes in all disciplines including literature (8), Sciences (10) and Piece (11). In fact woman is considered a symbol of piece in all the cultures. Percentage of women Nobel Laureates in different disciplines is shown in Fig.3.
40 Percent of Nobel Laureates 35 30 25 20 15 10 5 0 Literature Science Broader disciplines Piece

(Courtesy of http://www.rice.iit.edu/engineersweek/timeline.htm)

Fig.3 Percent of women Nobel Prize winners (29) in various disciplines Fig.2 Some well known woman engineers and inventors.

Toady women are participating in science and engineering but its full utilization is essential for both economic as well as technical reasons. Western woman is reasonably doing

Percent of Nobel Laureates

Hypatia was the first Egyptian woman mathematician and philosopher who developed the hydrometer to measure the specific gravity of fluids and an astrolabe to determine position of sun and stars. She served as a great philosopher teacher in Alexandria University. Fundamentalist Christian monks of Church St. Cyril killed this great woman in 415 [6]. Augusta Ada daughter of English Poet Lord Byron is the first woman, tutored by famous mathematician Augustus De Morgin, who developed computer programming skills like looping, indexing along with binary system used by todays supercomputers. Margaret Knight developed paper bagging machine and a rotary engine. Emily Roebling (civil engineer) husband died and she continued his job to supervise construction of famous Brooklyn Bridge in New York. Madame Marie Curie extended human vision to Xrays and got Nobel price twice. Lise Meither (innocent depth) is considered to be the mother of atomic bomb technology. H.E. Maria Liesler extended normal communication technology to present age spread spectrum communication concepts. Maria Telkes introduced solar energy technology to lay down basis of renewable energy.

To authors perspective if an innocent girl (Lise Meither) can be mother of atomic bomb then what the individuals prove by raising discrimination barriers on their way. Todays woman is Master of Science and can do as much engineered job as the professional men of course. Women scientists such as L. Buck (2004), B. MaClintock (1983), R. L. Montalicini (1986), G. Elion (1988), R. S. Yalow (1977) and C. Nusslein (1995) have got Nobel Prizes in medicines; Marie Curie (1903), Irene Curie (1935), G. R. Cori (1947) and D. C. Hodgkin (1964) in chemistry; Marie Curie (1911) and M. G. Mayer (1963) in physics; have track record of excellence in innovatory, enabling and emerging fields of science and technology. In sciences they have demonstrated their capabilities by winning Nobel Prizes in Physics (2), Chemistry (3), Biochemistry (1) and Medicines (5). Percentage of women Nobel Laureates in pure or applied sciences is shown in Fig.4.
50 45 40 35 30 25 20 15 10 5 0 Physics Chemistry Medicine Subjects Biochemistry Engineering

Fig.4 Percent of women Nobel Prize winners in sciences (11)

41

ENGINEER

PEC

September 2007
too intellectual just to call attention of others with apparently rude and unladylike attributes. As a result of it some other good inventing ladies could not get recognition of their truly acceptable attributes. Similarly, a black Negro woman E. Eglin developed clothes wringer but did not patent in her name because white women will not buy it. The still waters are often unfathomable. Time has shown an innocent mother surrounded by victims of her atomic wisdom. Although, same knowledge can be often used for destructive purposes but we do not believe Lise Meither wanted her wisdom to end up as shown in Fig.5. She would have cried exactly as the real mothers of these children seeing the after affects of her wisdom after US nuclear attack on Heroshima and Nagasaki in Japan. Generic Issues in Science & Engineering Career-related statistics for women in academe can vary greatly across scientific and engineering fields. Some of this variability is related directly to issues that are of a particular nature: the public image of a specific field; its visibility to science and engineering majors as a career opportunity; the demand for it in the private sector; and its distribution among the academic programs of doctorategranting universities. These issues are perhaps of lesser importance than the broad, generic issues that affect most, if not all, career patterns of women scientists and engineers who choose to work in higher education. It is the generic issues that interventions are expected to address first and foremost. Given the persistent, low percentages of women who become tenured on science and engineering faculties, despite enlargement of the pool of female applicants for entry-level appointments, the tentative conclusion can be drawn that the "glass ceiling" operates at the associate professor rank in most research universities [2-5]. Most of the recent literature on career patterns of women scientists and engineers reviews the perennial issue of the apparent conflict between the demands of motherhood (or other familial obligations) and those of the profession. This conflict has taken an especially acute form in the context of academe because of the requirements for tenure. Recognition of the "biological clock" and, more generally, of a faculty member's familial obligations is still treated as a variance to normal professional activity instead of as an integral part of it. These three generic issues do not exhaust the tableau of problems that face women who choose careers in academe to do teaching and research in scientific or engineering fields. But they do surface repeatedly in a number of recent self-evaluations undertaken by major research universities to assess the academic environment for women on science faculties. Major findings in these studies echo the concerns such as with few exceptions women in science are but a small minority in their peer groups, and their proportion drops

Women have got enough excellence in the fields of sciences, especially medical sciences. Now they need to focus on other disciplines such as telecommunication, electronics engineering. Emerging and enabling technologies suitable for women scientists and engineers may include photonics engineering, nanotechnology, artificial intelligence, fuzzy logic and neural networks. Research requires devotion, patience, tolerance and endurance that are the unique features of women community. They have demonstrated their research capabilities by inventing telescope (S. Mather: 1870), washing machine (M. Colvin: 1871), sewing machine (H. Blanchard: 1873), anti-pollution device and noise absorber coating (M. Walton: 1879), ice cream freezer, hair curler and air pump (B. L. Henry but nick name Lady Edison: 1887), elevator safety (H. Tracy: 1892), syringe (L.Geer:1899), radioactivity and X-rays (M. M. Curie: 1903), engine (M. Knight: 1904), refrigerator (F. Parpart: 1914), electric heater (I. Forbes: 1917), invisible glass, antireflection coating, artificial raining (K. Blodgett: 1917), permanent wave machine for hair dressing (M. Joyner: 1928), atomic bomb (L. Meither: 1939), jam proof radio communication system (H. Lamarr: 1940), telephone switching system (E. S. Hoover: 1954), tunable dye laser (M. Spaeth: 1964), polymers, optical fibers, kevlar, bullet proof vests, radial tires and airplane fuselages (S. L. Kwolek: 1965), correction fluid (B. N. Graham: 1956), antifungal and antibiotic (R. F. Brown: 1957), petroleum fuel and gasoline (E. M. Flanigen:1958), drinking fountain device (L.ODonnell: 1985), cancer drugs and kidney transplant (G.B. Elion :Nobel Laureate: 1988), Barbie doll and breast prosthesis (R. Handler: 1995). Besides it women scientists have developed cancer drugs, pain relievers, security system and wave machines. The first woman patent was registered in USA in 1809. Woman scientists and engineers patents registration rate was about 1% by 1888 that has increased to 6% by now [7-9]. However, according to Marry Ruthsdotter, director Womens History Project, some women in West after death of their husbands started projecting themselves seeming

Fig.5 Mother of atomic bomb surrounded by affected Japanese children.

42

ENGINEER

PEC

September 2007
monitor student progress to assess why women scientists and engineers loose interest in the discipline. Specific funding sources should be targeted at women to attract them to applied science and engineering. Comprehensive interventions should be targeted toward women and implemented in diverse institutions to attract more female students. The research based on interventions for women in science and engineering at the undergraduate level should be expanded by funding longitudinal evaluations of selected programs. Newer models and strategies should be developed, evaluated and revised where necessary for involving faculty members in strategies to increase the participation of undergraduate women in science and engineering. Graduate and Postdoctoral Initiatives

sharply as they advance through their careers. The resulting isolation impedes research, increases stress, and may lead to abandonment of a scientific or engineering career. The period when successful scientific or engineering careers are usually forged corresponds to the period of childbearing. Experimental work, which makes extraordinary demands on availability in time or location, raises conflicts with the family responsibilities that continue to be disproportionately borne by women. Women graduate students are often dissuaded from pursuing certain areas of science. In some disciplines they are discouraged by faculty and student colleagues from pursuing mathematical or theoretical investigations; in other fields women are discouraged from pursuing experimental work [2-5]. Women on Frontiers of Science & Engineering We cannot succeed on many critically important policy matters without the full participation of women and minorities, in both the development and the support of effective policy and action. The fraction of working women participating in the scientific and engineering work force is smaller than that of men. However, as the need for scientists and engineers increases for the R&D enterprise, women should find greater opportunities to pursue careers in these fields. Nonetheless, to increase women's participation in science and engineering, many barriers must be overcome. HEC has several important roles related to these challenges. One of these roles is to inform both the science and engineering community and the public of the need to increase the participation of women in scientific and engineering careersto increase not only economic competitiveness but also educational and occupational equity. Three important factors have seriously been realized by the educators around the globe. To examine a sample of interventions from the wide spectrum known to have been established in the private and public sectors both men and women, in science and engineering careers; To determine the characteristics shared by programs considered to meet that objective; and to discuss methods of implementing such programs on a broader scale. Finally, it heightened awareness of what universities are doing to increase the quantity and quality of students pursuing careers in the sciences and engineering. We need to look for the practical strategies for increasing the participation of women in science and engineeringat the undergraduate and graduate levels of studies [2-3]. Undergraduate Study Initiatives Senior educators and international expert reports recommend increasing initiatives for escalating women participation in science and engineering at the undergraduate level. Higher education institutions should

To promote graduate education of women in science and engineering requires a lot to do such as confidence building or financial prosperity aspects need to be awakened in women graduate students to gain scientific expertise and effective communication skills to go forward in careers in science and engineering. To retain graduate students in the sciences and engineering, departments and institutions must develop programs of positive incentives for faculty. For instance, initially proportional seats may be reserved for women researchers. The level playing field concept for women graduate students must be articulately and concretely demonstrated by upper management of the academic institution. University management should consider women graduate student problems such as child bearing/rearing issues and personal family issues of talented females. If such facilities are not provided to the female candidates then they will look for alternate options giving above facilities. Resolving issues related to balancing family and scientific career goals for women graduate students must be a high priority for any academic institution. Women at graduate and postdoctoral level usually are married with family responsibilities. They need financial assistance to cope with routine problems. Universities can arrange special pay package out of projects for female researchers to increase women involvement in science and engineering [2, 5]. Graduate-and postdoctoral-level interventions aid the process whereby individuals form the networks that lead to job opportunities, shared research and, ultimately, a sense of the possibilities, both personal and professional, in their chosen fields of study. The percentage of women enrolled in graduate science and engineering programs is on the rise in all fields except computer science and the social sciences. Of some concern, however, is the lengthening time-to-degree of students pursuing doctorates in science and engineering. In all fields except engineering, women tend to have longer registered time-to-degree and total time-to-degree, which is the total number of years, elapsed

43

ENGINEER

PEC

September 2007
probationary period and that every tenure-review committee has at least one senior female member as youngster colleagues may have personal clashes with one another. Universities may create family-friendly workplace environment by establishing flexible work schedules, job sharing, and subsidized, proximate child care as standard features of campus programs for the faculty. Allow maximum flexibility in working conditions consistent with carrying out responsibilities of teaching or research by female scientists and engineers [2]. A lot many females just abandon jobs due to strict timing requirements such as reaching sharp by bus at 8 am whilst her own children a lot many females just abandon jobs due to strict timing requirements such as reaching sharp by bus at 8 am whilst her own children go to school at 830 am. She just can not come and cruel bosses start explaining without understanding her issue. If a female director is appointed for female staff then she can ask to other heads or deans to consider her issues and give job assignments in accordance to availability. It is non sense to loose a talented female just because she can not reach at 8 am to take a lecture. A mild policy may be to change her timetable as per her convenience to accommodate her other duties as wife or as a mother. The departmental climate also affects women students [5]. Women students at universities tend to believe that lack of departmental attention and caring means they do not deserve to keep going or that they must not be good enough. Most male doctoral students, conversely, are more self-confident and consider themselves entitled to an advanced degree, so the absence of departmental caring does not seem to bother them as much as it does to the women. In fact departmental climate and culture play an important part in the progress of doctoral students, particularly women in science and engineering. To improve this climate and reduce overall attrition rates in graduate school, the Graduate School Office may start institutionalized programs that bring together the faculty, students, and departmental graduate secretaries [2-5]
100
Teaching Quality Score

between earning the baccalaureate and the doctorate, including time not enrolled at a university. However, in most fields these differences are becoming minimal. Experience indicates that successful programs at the graduate level of education are addressed to specifically identified needs, demonstrate multiple linkages between graduate school and other populations, and are characterized by substantial faculty or mentor commitment. The processes by which men and women move through graduate school activities are not necessarily the same; do we know in what ways they are different? Initiatives and efforts that are not interventions in a structural sense but nevertheless affect outcomes, for example, student membership in professional societies, caucuses, associations, support groups, and coalitions. Systemic approach may alter institutions or its hard settings to accommodate women scientists and engineers. A teaching fellowship training program that includes training on sensitivity to gender issues is an intervention that can change the setting in which teaching and research are done and in which the pursuit of careers takes place. Technical Women Faculty Most of the surveys carried out for woman scientists and engineers in all areas of the workplace reveal generally lower salaries for female members of the profession. The discriminatory forces that influence the situation of women in society in general are presumed to influence the careers of faculty women in science and engineering. The talent pools from which faculty are hired is closely related to the number obtaining their doctorate in science and engineering. Relatively low rate of continuation of women into engineering graduate school, compared with that of women in other disciplines, cannot be explained in terms of a simple lack of interest in graduate studies on the part of the women. The attractive job offers available to engineering BE graduates must certainly be a factor, but other factors also appear to be at work. The representation of women in science and engineering seems to be increasing at all academic levels. Efforts must be made to eliminate discrimination, real or perceived and enhance confidence of woman at work place. To promote careers of women in academia the universities need to develop strategies to attract women scientist and engineers in university. Prioritize women participation by relaxing some strict barrier rules such as publications and experience to let them be floating in main stream [2-5]. A university can establish an office on the status of women faculty members, whose director is a senior female professor with line responsibility to the vice chancellor of the campus. Revise the tenure track process on campus to ensure that untenured women faculty members are indeed reviewed by their peers during the

90 80 70 60 50 40 30 20 10 0 1 Woman (04/05) Woman (05/06) 2 3 Subjects 4 Men (04/05) Men (05/06) 5 6

Fig.6 Student teachers evaluation in Engineering at FUUAST (Semester Spring 2006)

44

ENGINEER

PEC

September 2007
the public in general about the capabilities and contributions of women, developing in women strong selfesteem and sense of self-competency and discovering what experiences reinforce these attributes. Whilst considering full participation and access of women one also needs to acknowledge the underlying issues that threaten families, institutions, and communities, so that creative and effective social policies can be developed and sustained. Consider subjective issues, identify and address the fears that will be raised by the proposed interventions, and consider some scenarios about how to handle the consequences and the interconnections. At that point, identify rather specifically what it is that you want to achieve. In fact, it is very important to revisit this particular question in a recurring way throughout one's planning, implementation, and evaluation. Yes, repeatedly concentrate attention on just what is it you are trying to achieve [7-10]. Let us reiterate our encouragement to search very carefully for the important feedback loops in the interventions, to recognize and to come to grips with deeply-rooted beliefs and fears that will affect your success, to be scrupulous in distinguishing myth from reality, and to pay a great deal of attention to the changing external context for we are addressing a moving target as the social, scientific and engineering frontiers advance. As we plan and discuss the interventions to enhance the recruitment and retention of women in science and engineering, we must bear in mind that much of the design of the current work structures and environments were put in place a long time ago by people different from those who will work in them in the future. We need to consider the future society pattern in which the planned woman work force will be functioning [9-11]. Female High-Tech Emancipation Recent developments in attosecond physics have lead to extraordinary expeditious photonic processors [12-15] conceiving perception of infinite bandwidth requiring renewed understanding of the fundamentals of science and engineering [16]. To go beyond the frontiers of science and engineering we need to work with woman patience and a mothers love to unearth the ultimate truth of nature. What we do today will be regarded as a barbarian time by our women of 2050 as we today think of women selling and buying in dark ages. Today woman scientists and engineers are only able to design chemical, biological and nuclear weapons but also capable to detect chemical and radiation signatures to ensure existence of such legal weapons and their integral parts. Sulfur mustard breaks down in the environment into thiodiglycol and two impurities, thioxane and dithiane, which can be identified as signatures of mustard presence. However, most of nerve agents such as sarin, soman, and VX contain a phosphorus-methyl (P-CH3) bond that is difficult to break rendering its hard detection [17]. Woman as military

The universities may start special encouraging programs in a well engineered manner. In general it has been observed that female scientist and engineer lecturers teach more responsibly and well prepared manner compared to male lecturers. Let us see real statistics of the male and female staff in the Department of Electrical and Electronics Engineering at Federal Urdu University of arts Science 7 technology Islamabad-Pakistan. This department has four female and five male teachers. Students lecturer evaluation has shown that female assessment score has increased over one year assessment period whilst men evaluation has gone down as shown in Fig.6. This may partly be attributed to male lecturer trend to teach in multiple universities to earn more money. Over 400 students have intuitively verified that female lectures of electronics engineering, mathematics, computer science and humanities deliver more comprehensive and well prepared lectures compared to male lecturers. Based on student evaluation the head has decided to increase female lecturers and laboratory technician strength to provide more comfortable and flexible environment to the female students in laboratory. Old age heads may request to management to involve female lecturers in department management to configure the environment according to their personal convenience under supervision of senior experienced professors. Future Woman Scientists & Engineers Academe need to intervene in a strategic manner to increase woman population in science and engineering faculties. Undergraduate, graduate and postdoctoral interventions aimed at recruiting and retaining more women in scientific and technical fields serve the interests of education in general as well as the interests of women. Within an individual department to achieving this goal the graduate students in the same or related departments such as electronics and telecom may meet together for discussions on how to get ahead and how to cope with daily problems in the classroom, in the research environment, and with colleagues and supervisors. Academe may start programs of male and female visiting scientists and engineers, who meet with the students and other interested people to discuss and facilitate the careers of these students in science and engineering [1011].Among recurring topics of discussion are the relationship of a female student with her peers and with her research adviser, balancing career and family responsibilities, and strategies to eliminate the "chilly environment" often encountered by women pursuing graduate studies and later employment in the science and engineering. The full access of woman in research goes far beyond just opening the doors of educational institutions and the workplace. It means changing and enhancing the prospects of students, teachers, supervisors, leaders, and

45

ENGINEER

PEC

September 2007
especially medicines, women are much more suited than men due to their natural sympathetic and loving temperament that is actually needed to the patient. It is not possible today to allow 50% population to stay home without any to do. Looking primitive village life the men and women work in fields together without any sensitivity to gender at all. Middle class people care the culture and build walls on the way of women development. It is duty of state to provide equal job opportunities to women and develop working environment to build confidence at workplace. Of course new entrant woman will bring new questions and different experiences. Identifying and understanding the barriers to women's progress in academic and professional careers so that these can be removed or overcome and addressing the communication challenges women and men face together in the classroom, in the home, in the workplace, and in volunteer activities so that they can be more effective partners in their endeavors. References World Nobel Prize Records, British Library, London UK, 2006. Educating the Engineer of 2020, Committee of Engineer 2020: National Academy of Engineering, 2005. Science and Engineering Programs: On Target for Women, edited by M. Lakes and L. Skidmore Dix, Committee on Women in Science and Engineering, NRC, National Academies Press, 1992. N. Z. Khan, Unprepared, unwilling and unfit: The Moslems in the age of IT, FJWU and HEC Int. Conf. Social Sciences: endangered and engendered, Dec10-12, 2004, PP. 323. Frontiers of Engineering: Reports on leading edge technologies, National Academy of Engineering. National Academy of Engineering, 2006. H. Salerno, Though unsung and ignored women have pushed technology frontiers, Mothers of Invention, Washington Post Writer, July 12, 1997, PP. H01. Female Ingenuity: Women and Invention in America by Anne L. Macdonald Ballantine Books: NY, 1992. Mothers and Daughters of Invention: Notes for revised history of technology by Autumn Stanley: The Scarecrow Press Inc: New Jersey, 1993. Woman, Technology and innovation, edited by Joan Rothschild, Pergamon Press Ltd: New York, 1992. Sex Segregation in the Workplace: Trends, Explanations,

scientists and engineers have full comprehension of the significance of high energy lasers, bio materials, nanotechnology, electro-optic sensors, potential techniques and algorithms critical for their national defense, command and control [18]. Woman scientists and engineers have most significant role as sales engineers, research scientists and product developers [19]. Sadartha [20] defined word love as a passion that a mother has for her baby and ascribed all the other definitions of love as its subsequent derivatives. An old time vision needs to be created in modern society where woman despite emancipation feels deprived. Woman among men should have the level of confidence about gender interaction the way a man after eating has no feel for appetite. Once his/her eating desire is over after dining he/she actually conquers his desire for hunger. A similar feel and conquer is needed to woman whilst working among men. How to achieve is an uphill task that needs research. We may define civilization as an era when women and men will have no depression of being that gender regarding implementation of their aims and ideas. According to Emma [21] peace or harmony between the sexes and individuals does not necessarily depend on a superficial equalization of human beings; nor does it calls for the elimination of individual traits and peculiarities. The problem that women confront today, and which the nearest future is to solve, is how to be one's self and yet in oneness with others, to feel deeply with all human beings and still retain one's own characteristic qualities. Our motto should not be: forgive one another; rather, understand one another. To understand everything means to forgive everything does not appeal many of modern women; it has the odor of the confessional; to forgive one's fellow being conveys the idea of pharisaical superiority. The demand for equal rights in every vocation of life is just and fair; but, after all, the most vital right is the right to love and be loved. Indeed, if partial emancipation is to become a complete and true emancipation of woman, it will have to do away with the ridiculous notion that to be loved, to be sweetheart and mother, is synonymous with being slave or subordinate. To me the position of the working village girl is far more natural and human than that of her seemingly more fortunate sister in the more cultured professional walks of life i.e. lecturers, doctors, engineers or layers who have to make a dignified, proper appearance, while the inner life is growing empty and dead. Islam gave the first ultimate emancipation to woman by declaring the close proximity of God with fathers of daughters on the doomsday. Conclusions Women need a central recognition with full access in all fields of life. Some fields of science and engineering,

46

ENGINEER

PEC

September 2007
Critical Military Technologies, Washington Government Printing Office, 2006. T. Anglaew, IEEE Woman in Engineering, IEEE Region 10 Section Meeting, July, 2006, Thailand. Sadartha: History of Sadartha Spiritual Life Concepts, edited by Indian Press, 1950. Emma Goldman, The tragedy of womans emancipation, Blackmask online 2001: http://www.blackmask.com. About the Author Registration No. PEC (Elect/4685) Dr. Nasrullah Khan (59); Senior Member IEEE (00625749); Presidents Award of Pride of Performance (2006); Member IEP; Registered with PEC (Elect/4685); acquired his BSC Electrical Engineering Degree (84) from UET Lahore, MSC (87) from Reading University (UK) and PhD (92) from Essex University UK. He has 23 years work and teaching experience with 5 books and 130 research publications. Currently, he is working as a Professor in the Department of Electrical Engineering, FUUAST Islamabad. His areas of research include Electro-Optics and Lasers, Optoelectronics, Protective Relaying and Electric Power Quality.

Remedies: Committee on Women's Employment and Related Social Issues, National Research Council, National Academic Press, 1984.. Adviser, Teacher, Role Model, Friend: On Being a Mentor to Students in Science and Engineering, National Research Council, National Academic Press, 1997. T. Juhasz, R. Kurtz, C. Horvath, C. Suarez, F. Raksi and G. Spooner, The femtosecond blade, Optics & Photonics News, PP.24-28, January 2002. T. Krupa, Optical technologies in fight against bioterrorism, Optics & Photonics News, PP.23-26, July 2002. M. Xiao, H. Wang, D. Goorskey, Light controlling light, Optics & Photonics News, PP.45-48, Sep, 2002. G. A. Mourou and V. Yanovsky, Relativistic optics: A gate way to attosecond physics, Optics & Photonics News, PP.40-45, May 2004. Schrdinger's Rabbits: The Many Worlds of Quantum, edited by C. Bruce, NAP, 2004. Technologies Underlying Weapons of Mass Destruction, Washington Government Printing Office, December 1993.

47

ENGINEER

PEC

September 2007
[2]. We as engineers and scientists have marked lines to divide the land and airs into borders else the matter is barely opposite. We do propose, amend, modify and optimize things over time to configure the policies to divide knowledge and wisdom into known professions, as a result of common human nature, we are likely to place new wisdoms in disciplines that are usually correct but likely to be incorrect due to lack of understanding or knowledge of its further developments, investigations or major future applications. Authorized engineering education accrediting and recognizing practices are very strict in Pakistan but in some cases accreditation bodies do declare the pure engineering education either science or technology. Sporadically good engineers are mistakenly classified as scientists or technologists and vice versa. My major impetus is to reorient the thinking of engineering councils, boards or bodies regarding recognition of technical skills earned by youngsters that professional recognition bodies do not recognize and the skilled manpower is eventually wasted after spending time, money and efforts. It is a havoc loss of available resources in many countries, especially Pakistan. Recognition of applied science, technology and engineering although very late but still just in time to consider it. In this case the affected people are innocent youngsters and miserable parents - neither the concerned degree awarding institutes nor the accrediting body with its so obvious policy. Graduates from the QuadeAzam University Islamabad, Government College Lahore or Peshawer University have perfectly learnt all major subjects on electronics, logic design, digital signal processing, communication, semiconductor devices, a n a l o g u e c i r c u i t s , e l e c t r o m a g n e t i c t h e o r y, microcontrollers and microprocessors but no one accepts their education equivalent to graduate electronics engineers. Either such programs may be discontinued by the order of Higher Education Commission Islamabad or be accepted with suitable upgrade courses. We can not export this manpower to Middle East as they do not have a professional engineer license. If the same students with same knowledge and contents of study come from any other country out of any engineering degree awarding institutes then the same will be accepted without counting the square feet of their classrooms. It is wastage of manpower and resources that need to be seriously viewed by the authorities in the greater interest of Pakistan. According to the PEC advice to the universities, in order to be considered for accreditation, engineering programs must be designed to prepare graduates for the practice of engineering at a professional level. Programs designed to prepare graduates for supporting roles in engineering i.e. engineering technology are not eligible, nor are the programs which do not provide an adequate base for the application of fundamental concepts to the practice of engineering. In fact PEC violates its above mentioned

Lets Affiliate PEC with ABET & FEANI


it is just in time to apply now...
Dr. Nasrullah Khan Abstract Globalization through emerging revolutionary enabling and numerical communication technologies with increased interdisciplinary merger of disciplines such as electronics, photonics, bioelectricity, neuroscience, artificial intelligence, integrated optics, nanotechnology, polymer sciences and information technologies in science and engineering has caused sheer collapse of orthodox consensus on concepts of engineering education. It has become too difficult to recognize what is science or engineering. As a matter of fact the many of the subject specialists carrying science degrees are very good engineers whilst many other subject specialists carrying engineering degrees are basically engineering scientists. This paper explores the major differences in science, technology and engineering to enable Pakistan Engineering Council (PEC) to focus on the need of recognizing our engineering education accreditation standard in the light of international practices of ABET (USA) and FEANI (Europe). In present paper the PEC is emphasized to accommodate across discipline technically matured engineering sciences as an integral part of engineering education to demark the narrowing blue line between pure and applied engineering. Finally it will be accentuated why it is important for PEC to seek the membership of transnational engineering education regulatory bodies to emerge as a globally recognized engineering education accrediting authority of Pakistan. Keywords Science, Technology, Engineering, Education, Accrediting and Recognition. 1. Science, Engineering and Technology

By the end of twentieth century the science and engineering knowledge has become too embedded within each other from molecular to complex system level due to emergence of the enabling, communication and information technologies; that it has, unbelievably, become impossible to minutely classify or draw a narrow line to segregate the frontiers of science and engineering education and research [1]. It is so unremitting in terms of realizable borders at all frontiers of science, technology and engineering. As a matter of fact it is nature that by definition is so articulated and organized in a complex nonlinear manner that no science or engineering rule is able to segregate it from one another. In decades turnover ever amazing developments have further expanded its frontiers and the more we discover the more we are lost in it

48

ENGINEER

PEC

September 2007
details on PEC are available on its website [3]. Engineering qualifications awarded by the following foreign universities and institutions are acceptable to PEC as recognized engineering qualifications. American Universities/Institutions: Accredited by the Accreditation Board of engineering & Technology. (ABET). New York, USA [4]. U.K. Universities/Institutions: Accredited engineering degree programs in the list issued by Engg Council of UK in 1993 and their subsequent updated versions [5]. European Universities/Institutions: Accredited engineering degree programs as per index published by the European Federation of National Engineering Association (FEANI) Paris, France in the year 1992 and their subsequent updated versions [6]. Canadian Universities/Institutions: Accredited engineering degree programs in the list issued by the Canadian Engineering Accreditation Board (CEAB) in the year 1995 and their subsequent updated versions [7] Australian Engineering Universities/Institutions: Accredited engineering degree programs as per Australian engineering courses recognized by the Institutions of Engineers, Australia in the year 1994 and their subsequent updated versions [8]. Pakistan Engineering Council (PEC) did not mention of its own compliance to above four bodies and many other international professional bodies such as BCS, UK [9], CEE, Europe [10], ECA, Europe [11], ENIC, Europe [12], ENQA, Europe [13], IPENZ, New Zealand [14], USCIEP, USA [15], ECSA, South Africa [16], HKIE, Hong Kong [17], and most importantly the Washington Accord [18], Dublin Accord [19] and Sydney Accord [20], and lately EMF [21] regarding the accreditation and recognition or vice versa. Even the LC of any Pakistani bank is acceptable globally but the PEC certificate is not considered as a valid document by ABET (USA), FEANI (France), CEAB (Canada) and IEA (Australia). PEC should explain to the member engineers and engineering degree awarding institutes, why the PEC has not registered itself or sought membership of any transnational engineering degree recognizing and engineering program accrediting body such as ABET (USA) and FEANI (Europe) in last five decades. The PEC is pleased to say that she accepts degrees accredited by such and such without any vice versa acceptance. It is all useless if they do not accept yours accredited engineering degree in return. At this moment most of the foreign bodies do look at the degree granting university and not on the PEC certificate. ABET, FEANI and CEAB ask for clearing their own six months professional engineers test. I personally honor to the establishment of the PEC and its role but literally how a

guidelines by accepting British 3 Yrs BE Engineering Program. It is in fact hard to assess who actually knows practice of engineering at intellectual and professional level. PEC needs to define clear instrumental definitions measuring the desired entry level practice qualification. Now the PEC has a digital library and access to 70-80% science and some 20-30% engineering journals that are a good sign of development. PEC activities such as start of this Engineer pec magazine, paper prizes, newsletters and seminar series shows its live involvement and warm wishes to be functional and progressive. A few years ago the PEC had neither any professional refreshing course plans for old engineers. However, it is a point of concern for all engineers including PEC why it has filed to register itself to any international engineering board or forum that can update its accrediting and recognizing policies. I certainly beg pardon of the PEC if any of my suggestions is not in the interest of PEC or its members or Pakistan at the end of the day. Our neighbor country is exporting such manpower to Middle East and earning lot of foreign revenue and we in the form of PEC are sticking to so called dead English rules and trying to push the elephant in the mouse hole. I can to PEC examples of several foreign universities degrees that are accredited by PEC and the students have same level of wisdom as our QAU BSC electronics graduates. Either electronics degree holders may be granted accreditation as engineering scientists (B-Tech) or engineers. Legal status of B-Techs and BE may be ascribed under a uniform consensus of PEC and HEC experts. 2. Pakistan Engineering Council

Pakistan Engineering Council (PEC) is a statutory body constituted under the PEC Act No.V of 1976 enacted by the Parliament. Some of its statutory functions relate to recognition of engineering qualifications for the purpose of registration of professional engineers and consulting engineers and promotion of engineering education, safeguarding the interests of its members and fostering of high professional standards in the country. PEC interacts with the Government, both at the Federal and Provincial level by participation in Commissions, Committees and Advisory Bodies and acts as a think tank to Government of Pakistan. The PEC is a fully representative body of the engineering community in the country and works transparently. PEC forms an effective bridge between Government, industry and education. Over the past quarter century PEC has grown into a mature professional regulatory body with an unblemished record. It is not too difficult to conceive the scenario in the country, had there been no PEC on the landscape. Not only the international recognition of our engineering degrees would have been perilously set aside, our own market would have been flooded with under and sub-qualified engineers. Maintenance of a register of persons qualified to practice as professional engineers and consulting engineers. More

49

ENGINEER

PEC

September 2007
women engineers to meet the upcoming challenges? As a think tank the PEC must start thinking now and leave no stone unturned to seek the membership of Washington Accord that India has already done last year in 2005. Almost 95% engineers in Pakistani Universities are specializing in electronics and telecommunication under all the PEC accredited and recognized programs. Nearly 90% of the real industry demand is electrical and automation engineers (not the electronics or telecom engineers); has the PEC ever thought of forcing the universities for proportional intakes? Hardly 5% engineers are studying electrical engineering and all the rest registered in BE telecom or BE electronics programs [22]. It is sole responsibility of the PEC and HEC to maintain reasonable proportion of manpower in all disciplines. Who is going to take care of WAPDA utility networks spread across the country? Has PEC or HEC or MOST ever thought of it? No! All of our neighboring countries have joined or joining international accreditation and recognizing bodies to internationalize the competency of their graduate engineers but regretted to say that nothing is being done at an adequate level by the PEC for the betterment of its graduate engineers in global era. Many bilateral and multilateral agreements can be established between countries and organizations worldwide but PEC has no time for it, still claiming taking care of its member engineers. Young engineers are not aware of it but the PEC should recognize the problem ahead being a dedicated professional body with a mandate that supposes PEC to do it. Simple agreements do not give free mobility facility, but still can be important, especially on a regional level they are likely to be preempted by large-scale, multinational, mutual agreements. If transnational mobility facility is granted to our engineers then they can freely move and even work or participate in international professional activities. 3. Accreditation of Accrediting Bodies

body can talk or refer to international standards to force the institutions when she herself is not regarded as an engineering degree recognizing or accrediting authority by other international bodies. Let us say PEC was initially not registered by the international bodies [4-8] then why the PEC did not struggle to develop links with such well known bodies to seek guidelines how to improve the engineering education in Pakistan with so many perks. The PEC is itself not well performing its functions like looking after the interests of people of this country and engineering practices within international standards on public safety and reliability. Repeated collapse of bridges, building and networks is self speaking proof of the norms and engineering standards maintained in the country. This nation has suffered the most in history due to the PEC deaf ears towards follies committed by the construction industry ever since in Pakistan? Why PEC did not introduce the building codes earlier before occurrence of repeated earthquakes around Islamabad? Which road does not need repair within few months of its construction? Which factory is observing safety rules and safety standards in the common electric products for public use? Over 80% metallic casing products such as washing machines and refrigerators have no safety grounding green/yellow wire and in 85% house and industrial wirings the test reports are issued without even actual visit of the test inspector to the installation site. How many engineers have been blacklisted due to their poor performance of work or misconduct or corruption charges? Many engineers have been terminated on corruption charges in past in multiple departments in Pakistan; did the PEC remove their names from the register? I do not know in what sense the PEC is safeguarding the interests of this country or its members. When our engineers go to Canada they need to spend several months to qualify the CEAB tests to seek professional license. They do not accept PEC registration certificate. If the PEC member engineers have no acceptance outside the Pakistani borders then how the PEC can talk of compliance to international engineering standards and statutes [3]. In fact the PEC reflects a symbol of horrible police instead of its kind role as adviser to the engineering degree awarding institutes. As a member of Washington Accord [18] our engineers can have facilities to work here or abroad and claim many mobility facilities across the borders. At present it makes no sense why to bother about PEC if the engineers have to work abroad or in private industry. PEC also points on the private engineering degree awarding institutes without mentioning the plight of government institutes, which reflects quite a bit of bias that needs to be reworded and equal caring attitude need to be meted out to all engineering degree awarding institutes within our country. By year 2050 some 88% of world population will be residing in South East Asian region [21]. Is PEC planning how to cope with situation and preparing

For international recognition of engineering degree programs the international accreditation boards and bodies need to cooperate with one another to reach a consensus that may eliminate the need to again test the capabilities of engineering professionals from sister countries. As the economic globalization increases [2324], we must bring down artificial barriers that limit workforce mobility and related issues. One way to increase mobility is through the mutual recognition of degrees, degree programs, and accreditation systems. Now international community has a strong desire to work towards global harmonization that needs workforce mobility. This has provoked a great deal of activity, especially in countries that do not have recognized accreditation systems in place, or even a tradition of accreditation like Germany [23]. The United States, which has a strong tradition of engineering accreditation, it is also working toward global recognition of accreditation

50

ENGINEER

PEC

September 2007
applicant accrediting body has demonstrated that the accreditation system for which it has responsibility appears to be conceptually similar to those of the other signatories of the Washington Accord. By conferring provisional status, the signatories have indicated that they consider that the provisional signatory has the potential capability to reach full signatory status. Award of provisional status in no way implies any guarantee of the granting of full signatory status. Equivalence of the engineering programs concerned shall normally become effective from the date on which the new signatory was admitted to full signatory status. For the admission of new signatories to the Washington Accord requires an application for provisional status to the Washington Accord supported by nominations from two of the existing signatories. A positive vote by at least two-thirds of the existing signatories, a prescribed period of provisional status (minimum period of two years), during which the accreditation criteria and processes established by the applicant, and the manner in which those procedures and criteria are implemented, will be subject to comprehensive examination by a Washington Accord review team. Unanimous approval of the existing signatories for transition of the provisional signatory to the regular signatory is prerequisite. The application for Provisional Signatory status must be submitted by PEC to the Secretariat of the Washington Accord in both printed and electronic form at least 120 days prior to the next meeting of signatories, and in the format given in Washington Accord [18]. A decision to admit to Provisional status shall require the affirmative vote of two-thirds of existing signatories, and a decision to admit to full signatory status shall require the unanimous vote of existing signatories. Such votes shall normally be taken at general meetings of signatories. The Accord has also approached to an international funding agency to explore the possibility of funding support for developmental assistance to countries applying to become members of the Accord. Accreditation Board of Engineering & Technology (ABET) is recognized by the American Council for Higher Education Accreditation. In general, ABET does not accredit foreign programs outside USA. However, it issues substantial equivalency certificates for similar oversees programs if they qualify in educational outcome. ABET has signed a number of mutual recognition agreements with accrediting organizations of other countries. PEC may apply for it like India, and Bangladesh and others. Signatories agree to recommend that graduates from recognized programs be afforded the same rights and privileges as those graduates in the home country. ABET recognizes through agreements such as the Washington Accord, and offers educational credentials evaluation services. It is to point out that ABET accredits the engineering programs through its Engineering Accreditation Commission (EAC) not the institutes. PEC may apply for membership of Washington Accord the way as normal universities apply to PEC for accreditation and

methods. Mutual recognition and accreditation will not only benefit graduates in a particular country, but will also promote quality control and attract students to national degree programs. It is generally accepted that a competent practicing engineer must have a strong education that teaches analytical and theoretical thinking that enables problem solving, innovation, and invention. If not invention then at least instant modifications; training in working with people from diverse backgrounds and solving technical problems to maintain the existing engineering infrastructures on place; and work experience, including responsibility for making decisions on time to deal with emergencies and long term planning to predict calamities and failures. Let us review the existing internationally established engineering accords, boards and councils for initial membership or affiliation of PEC. 3.1 Washington Accord Washington Accord [18] was signed in 1989 by the groups in Australia, Canada, Ireland, New Zealand, the United Kingdom, and the United States responsible for accrediting professional engineering degree programs in their countries. The accord recognizes substantial equivalency of the programs accredited by the signatories and satisfaction of the academic requirements for the practice of engineering at the professional level. The accord states that the processes, policies and procedures used in the accreditation of academic programs are comparable and recommends that graduates of accredited programs in any of the signatory countries be recognized by the other member countries as having met the academic requirements for entry to the practice of engineering as per WA. However, the Washington Accord has several limitations. First, it covers professional engineering undergraduate programs but not engineering technology or postgraduate programs. Second, it does not apply to degree programs accredited before signing by the accrediting body. Third, it does not apply to degree programs declared or recognized as substantially equivalent by the signatories. Finally, it covers only the academic requirements of licensing, but not the actual licensing, which still varies from country to country. Interest in the Washington Accord has increased significantly since it was signed in 1989. Two more countries have signed on since then and are now full signatories: Hong Kong in 1995 and South Africa in 1999. Four countries have been added as provisional signatories: Japan in 2001 and Germany, Malaysia, and Singapore in 2003. In addition, the accreditation bodies of India and Bangladesh have recently expressed their intent to submit applications for provisional membership, and Russia has sent representative to the meetings of the Washington Accord signatories. To seek membership of the Accord the accrediting organization needs to apply for provisional signatory status. The provisional signatory status means that the

51

ENGINEER

PEC

September 2007
http://www.feani.org/. 3.3 Engineers Mobility Forum The Engineers Mobility Forum (EMF) [21], established in October 1997, was initially formed as a subcommittee of the Washington Accord signatories to facilitate the mobility of experienced professional engineers. Unlike the Washington Accord, which focuses on mutual recognition of accredited academic programs, EMF is developing a system of mutual recognition of the full professional level to facilitate cross border mobility of registered practitioners. This is especially important for currently practicing engineers whose qualifications are not recognized through the Washington Accord (EMF, 2003). EMF maintains a decentralized Register of International Engineers that includes the names of professional engineers in member countries who meet very specific educational and experiential guidelines. The purpose of the registry is to streamline the process of obtaining practice privileges in EMF-member countries. The registry is decentralized in the sense that each country operates its own section and writes its own assessment statement describing the admission requirements for that country. A monitoring committee in each country develops the assessment statement, reviews applications for admission to the registry, and functions as the point of contact for all matters relating to the registry. EMF members include the national engineering organizations of Ireland, the United Kingdom, United States, Canada, South Africa, Hong Kong, Australia, Japan, Malaysia, Korea, and New Zealand. FEANI has observer status, and India and Bangladesh have expressed an interest in joining EMF. With the signing of the EMF Agreement in June 2001, the International Register of Professional Engineers (IRoPE) was established (IPENZ, 2000). 3.4. Vision of Global Engineering Registrar Global Engineering Registrar (GER) would be the authorized body responsible for accrediting professional engineering degree programs and registering professional degrees through its representative offices through out the world. The member countries will have equal representation in global office and all of them will be bound to guidelines and rules framed by the GER. Universities and colleges lacking compliance to the proposed GER regulations may be notified to make necessary corrections in their procedures if not caring they may be ousted from the GER list. It could be even more useful to design common courses and experiments for all the universities to minimize the overall differences. GER may refuse license extension to engineers found involved in corrupt practices, bankruptcy and cheating. This will isolate the bad professionals and incompetent engineers throughout the world. The people who do malpractices in one country and hide in others will have no safe heaven for second chance. Certainly, in this information era, the engineering ethics

the ABET will process the case. For more information PEC may contact ABET, Inc.111 Market Pl., Suite 1050Baltimore, MD 21202 ; Abet website: http://www.abet.org/contact.shtml, USA. 3.2 The EUR ING Professional Title The Fdration Europenne dAssociations Nationales dIngnieurs (FEANI) [6] (translated as the European Federation of National Engineering Associations) is a federation of national engineering associations from the EU, European Free Trade Association, and countries considered eligible for accession into the EU at a future time. Currently, FEANI, which has 26 member countries representing more than two million professional engineers, considers itself the single voice for the engineering profession in Europe and is working to affirm and develop the professional identity of engineers. The European Commission recognizes FEANI as the official representative of the engineering profession in Europe. One of the services provided by FEANI, the granting of the EUR ING professional title, is intended to facilitate the mutual recognition of engineering qualifications in Europe and facilitate mobility by assigning a guarantee of competence to engineers who wish to practice outside their own countries, provide information to employers about educational and training systems in Europe, and encourage continuous improvements in the quality of engineers by monitoring and reviewing standards. Currently, slightly fewer than 30,000 registered engineers have been granted the EUR ING title. FEANI maintains an index of universities and other institutions of higher education and their engineering degree programs recognized as fulfilling the mandatory educational requirements for the EUR ING title. Member countries submit descriptions of schools and degree programs for inclusion in the FEANI Index upon approval by the European Monitoring Committee. The FEANI Index is intended to be the authoritative source of information about national engineering education systems and educational institutions. Basically, FEANI takes care of its member European countries only but International Engineering Institutes and organizations may seek membership of FEANI regarding accreditation or equivalency of their programs. Engineering organizations of several countries like Association for Engineering Education in South and Central Asia (AEESCA) and The Institution of Engineers, India, Federation of Engineering Institutions of South and Central Asia (FEISCA) Nepal, Union of Chambers of Turkish Engineers and Architects (UCTEATMMOB) Turkey, Association for Engineering Education in Southeast Asia and the Pacific (AEESEAP) and The Institution of Engineers, Indonesia, The Institution of Engineers, Malaysia (IEM) Malaysia and The Institution of Engineers Singapore (IES) Singapore, have already sought membership of FEANI for the possible intuitive recognition purposes. PEC may also apply to FEANI at Av. Roger Vandendriessche 18, B-1150 Brussels, Belgium

52

ENGINEER

PEC

September 2007
http://www.nap.edu/catalog/11220.html http://www.pec.org.pk http://www.abet.org/ http://www.engc.org.uk/ http://www.feani.org/FEANIindex.htm http://www.ccpe.ca/e/ccpe_boards_2.cfm http://www.ieaust.org.au/ http://www.bcs.org/BCS/MembersArea/ http://www.ceenetwork.hu/a_about.html. http://www.ecaconsortium.net. http://www.enic-naric.net. http://www.enqa.net. h t t p : / / w w w. i p e n z . o r g . n z / i p e n z / f o r m s / p d f s / EMF_Agreement.pdf. 15. http://www.usciep.org/what_is.shtml. 16. http://www.ecsa.co.za/ 17. http://www.hkie.org.hk/ 18. h t t p : / / w w w. w a s h i n g t o n a c c o r d . o r g / w a s h _ accord_faq.html. 19. http://www.iei.ie/WebPages/PageDetails.pasp? pageid=1 20. http://www.ecsa.co.za/International/4Sydney Accord/Thornybush_report.htm 21. EMF (Engineers Mobility Forum). 2003. A Review of Recognition Systems for Professional Engineers. In Global Challenges in Engineering Education: Proceedings of the 2003. 22. N. Khan, Z. Saleem and A. A. Mirza, Power Engineering Education Scenario, PES Annual Meeting, Poster paper, Montreal, Canada, 18-22 June 2006. 23. Erwin Educating the Engineer of 2020, Committee of Engineer 2020: National Academy of Engineering, 2005. 24. Kevin Sweeney, International Recognition of Engineering Degrees, Programs, and Accreditation Systems, Educating the Engineer of 2020: Adapting Engineering Education to the New Century Committee on the Engineer of 2020, Phase II, Committee on Engineering Education, National Academy of Engineering, PP. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. About Author Registration No. PEC (Elect/4685) Dr. Nasrullah Khan (59); Senior Member IEEE (00625749); Presidents Award of Pride of Performance (2006); Member IEP; Registered with PEC (Elect/4685); acquired his BSC Electrical Engineering Degree (84) from UET Lahore, MSC (87) from Reading University (UK) and PhD (92) from Essex University UK. He has 23 years work and teaching experience with 5 books and 130 research publications. Currently, he is working as a Professor in the Department of Electrical Engineering, FUUAST Islamabad. His areas of research include Electro-Optics and Lasers, Optoelectronics, Protective Relaying and Electric Power Quality.

and codes of conducts can be implemented through GER in a far more controlled manner than the on going practices. It is like the international credit card system. Any bank defaulter can not hide anywhere in the member countries. All the engineers will have record in international database and the fudge degrees and degree programs will be identified. Today fake degree holders have access to even HEC database as members of curriculum and coordination committees to decide engineering course for the PEC accredited and recognized programs. Private sector will have better chance of conducting business in education sector without focal attention of the PEC. The idea has already progressed well towards the concept of GER in different continents [21-24]. 4. Conclusions

Existing police man role of PEC is appreciated in the context of geographical traditions but it needs to extend its role towards ultimate global authority by increasing linkages between other intercontinental engineering profession regulatory bodies in East and West to standardize international recognition of our professional qualification practicing licenses in the form of PEC registration certificate. Individual universities can also approach to ABET, FEANI or CEAB for accrediting their engineering education programs but that will drain lot of national revenue abroad. Our neighbor countries like Malaysia and Singapore have sought but Bangladesh and India have applied for the membership of Washington Accord. PEC on behalf of Pakistan can also apply for the ultimate betterment of the PEC members and the country. Although, it is all skepticism but still we have to live with the same neighbors therefore it is advisable to consider it as an issue that needs solution. As long as PEC does not accredit itself to world accrediting authorities it should seek benefit of accrediting policy for the electronics programs producing lot many graduates that can be suitable export quality products. General PEC role is reasonably acceptable but it should focus on integration of emerging technologies and engineering branches such as photonics engineering to increase spectral bandwidth of engineering profile in the country. Enabling technologies such as neural network, adaptive control, fuzzy logic, photonics, integrated optics, micro-machined sensors, nanotechnology, laser engineering and biomedical engineering need to be encouraged to enhance initiation of above programs. Orthodox approach to seek job opportunities before starting programs needs to be discouraged to develop space of new era technologies. 5. References

1. Frontiers of Engineering: Reports on leading edge technologies, National Academy of Engineering. National Academy of Engineering, 2006. 2. Tenth Annual Symposium on Frontiers of Engineering, National Academy of Engineering, 2005:

53

ENGINEER

PEC

September 2007
assessment mechanism to judge the level of quality achieved. Recognized national and international bodies have standardized and published such criteria sets of quality concepts and principles for assurance and accreditation. A few quality criteria and systems for assurance and accreditations discussed here are;
t Institutional Quality Assurance System. t National and International Quality Assurance

Quality Assurance and Accreditation of Higher Learning


Dr. Nawar Khan ABSTRACT Quality and management of processes and functions in educational institutions of higher learning in the developing countries are facing a lot of challenges in terms of establishment and improvement. The challenges have root causes embedded in their societies that have become impediments for social, industrial and financial development. Assurance and accreditation of quality management system of education are the means available for improvement, recognition and stakeholders satisfaction. Institutional, national as well as international quality criteria set, management system and assessment mechanism are available for quality improvements which can be adopted by educational institutions to become world class. Key words: Higher Learning, Quality Management System, Developing Countries, Quality Challenges, Quality Assurance and Accreditation, Institutional, National and International Criteria. 1. INTRODUCTION

Systems.
t National and International Quality Accreditation

Systems. An educational program of higher learning is usually accredited nationally for its quality management and assurance system. For example, Pakistan Engineering Council (PEC) is performing such role of accreditation for engineering education in the country. I order to be recognized internationally for quality, management and its assurance, national education systems can be accredited from reputed international accreditation bodies, for example, Accreditation Board of Engineering and Technology (ABET) accredittion system for engineering education. All these quality improvement, management, assurance and accreditation activities are complementary to each other in progression. None of them can be claimed better or superior to others in terms of scope and objectives. 2. MAJOR QUALITY ATTRIBUTES OF HIGHER LEARNING

Quality and management of processes and functions in service industry, particularly in educational institutions of higher learning, in the developing countries of the world are facing a lot of challenges for quality improvement, assurance and accreditation. These include; poor business management, unguided research and development, poor quality management system, limited financial resources, low education and training, poor quality awareness, lack of corporate quality culture and old vintage technology and equipment etc (Nawar and Sheikh, 1997;) Sandholm, 2000; Eicher and Mikil, 1993; Hewitt and Wield, 1995 and Prokopenko, 1995). These challenges have root causes embedded in their societies that have become impediments for social, industrial and financial development. Assurance and accreditation of quality management system of education are the ways forward for its improvement, recognition and stakeholders satisfaction. There are a few major quality attributes of higher learning which require assurance and accreditation. Institutional, national as well as international criteria and systems are available for quality enhancement and assessment which can be easily adopted to become world class. A quality assurance system usually provides a criteria set of quality principles and concept for implementation and

This section only lists down the major quality attributes of higher learning which require assurance and accreditation Blooms Taxonomy 1956). Fundamentals of Teaching, Learning and Quality in Education and Management of Processes The Education Processes include the following quality attributes:
t of Teacher Quality t of Curriculum Quality t of Examination and Assessment Quality t of Research and Development Quality t of Communication Quality t of Student Support Services Quality

2.1

The Management System which support all these education processes include the followings factors:t Leadership t Administration t Assurance Program Quality t Academic Culture

54

ENGINEER
2.2

PEC

September 2007
t Economic Condition Sociot Learning Attitude t Resource Person As a

Quality of a Graduate (outcome)

The quality of a graduate (which is the outcome of an education and its management processes) contains three basic learning domains as follows:
t Cognitive Domain (mental ability of the graduate) t Affective Domain (emotionally moved by learning

2.7 Dimensions of a Researcher There are a few main dimensions of a student as a good quality researcher as follows:
t Academic Competence t Competence on Research Methods t Resources (Information/Others) t Commitment & Motivational Skills

process)
t Psychomotor Domain (skills learned)

All the above mentioned domains are further divided into a number of levels and stages. Quality improvement and assurance are of great importance in all these domains. 2.3 Cognitive Domain

2.8 There are six important levels of learning in the cognitive domain as follows, depending on their level of difficulty:t Knowledge Level t Comprehension Level t Application Level t Analysis Level t Synthesis Level t Evaluation Level

Dimensions of a Teacher

Major attributes of a quality teacher as follows:


t Academic Competence t Teaching Skills in Relevant Field (Pedagogy) t Student Psychology t Commitment and Motivational Skills

3. INSTITUTIONAL QUALITY ASSURANCE SYSTEM This is the first level of quality enhancement where some quality conscious institutions develop their own quality management and assurance system for academic and Research and Development (R&D) activities and take full advantage of it in delivering quality education. However, such systems vary from institution to institutions and are not known to or shared with other institutions to gain advantages out of it. For example, National University of Sciences and Technology (NUST) carries out its academic and R&D assessment of all its constituent colleges, centers and institutions. The top management of the university wants to make sure that all the quality policies, principles and regulations issued through its statute are followed to improve the quality of education. The assessment criteria set used for this purpose is placed at Annex A. Normally, a composite team of academia and R&D is used to carry out a detail check of all quality aspects of academics, R&D facility and administrative aspects of an institution for the purpose of improvements. 4. NATIONAL AND INTERNATIONAL QUALITY ASSURANCE SYSTEM ISO 9000 Quality Management Systems (QMS) standard was first aired in 1987 by the ISO Headquarters. ISO 9000 QMS is a world wide standard that establishes the requirements for quality and management system of any institution. The standard was revised in the year 1994 and now the latest version in use is ISO 9000:2000. Next revision of the standard is expected in year 2008.

2.4

Affective Domain

There are five critical levels of learning in the affective domain as follows:
t Receive Level t Respond Level (interactive) t Level Value t Conceptualize Value Level t Internalize Value Level

2.5

Psychomotor Domain

There are five main levels of learning in the psychomotor domain as follows:
t Imitation Level t Manipulation Level t Precision Level t Articulation Level t Naturalization Level

2.6 Dimensions of a Student There are a few important dimensions of a good quality student as follows:
t Maturity t Norms Social t Physical Condition

55

ENGINEER

PEC

September 2007
t College of Electrical and Mechanical Engineering t Pakistan Naval Engineering College t College of Aeronautical Engineering

ISO 9000 QMS is a certification, third party audit and documentation based standard. It is applicable to all sizes and types of institutions. It has comprehensive quality criteria set based on quality principles for management and assurance of education services. It can bring consistency in documentations, procedures, processes and quality of services in the educational institutions. ISO 9000 QMS standard provides opportunities for quality improvement through periodic audits and reviews. Pakistan has adopted ISO 9000 QMS standard as Pakistan Standard (PS 3000) in 1990. ISO 9000 standard is generic in nature that can be applied to all functions, types and sizes of organizations, from manufacturing to banking to education to chemical industry etc. ISO 9001:2000 QMS standard has a number of clauses and sub clauses which are listed in Annex B. However, their detailed descriptions are available on website www.iso.google or can be obtained either from national standard body of respective country or ISO Headquarters. There are a total of eight clauses in the ISO 9001:2000 QMS standard QMS. 5. QUALITY PRINCIPLES OF ISO 9000 QUALITY MANAGEMENT SYSTEM A number of quality principles provide the base for achievements of continuous improvement objectives of any institution. (Vincent, & Joel, 2004 and Yung, 1997):t Customer Focused t Leadership t Involvement of People t Process Approach t Approach of Management System t Continual Improvement t Approach to Decision Making Factual t Mutually Beneficial Supplier Relationship

7.

NATIONAL QUALITY ENHANCEMENT AND ASSURANCE SYSTEM


Continual Improvement of the Quality Management System
Management Responsibility

R e C q U u S i T r O e M m e E n R t s

Resource Management

Performance Measurement Analysis and Improvement

Education Process Control

Graduate

C U S T O M E R

Fig. 1: ISO 9000 Continuous Quality Improvement Model

S a t i s f a c t i o n

Higher Education Commission (HEC) has recently published its quality enhancement and assurance criteria for self assessment in higher learning bodies as shown in Annex C(ww.hec.edu.org.pk. The aim of this system is to improve and enhance the standard of quality in higher education to the world class. 8. QUALITY ACCREDITETION BODIES AND SYSTEMS

here are a number of accreditation institutions in the country and abroad that accredit the QMS of learning bodies. These are as follows
t PMDC for Accrediting Engineering and Medical

6. CONTINUOUS QUALITY IMPROVEMENT MODEL FOR EDUCATION An ISO 9000 Process Approach Model for continuous quality improvement and assurance is shown in Figure 1. Here, the customer requirements are converted through education process into outcome (quality graduate) for customer satisfaction. However, continuous quality improvements of all aspects of education processes is the essence of this quality excellence process model. NUST is one of the public sector universities which took the initiative to adopt ISO 9000 QMS standard for quality assurance of education system being followed in its different constituent colleges, centers and institutions as follows:-

Education in Pakistan (PEC Form AC-1) t Accreditation Board of Engineering & Technology (ABET) t Association of Advance Collegiate Schools of Business (AACSB) t Computer Science Accreditation Board (CSAB) PEC has its own criteria set for accreditation of engineering education in the country as shown in Annex D (www.pec.org.pk). 9. INTERNATIONAL QUALITY ACCREDITETION SYSTEM

ABET is a well known accreditation body for education in engineering. Its accreditation criteria set is shown in nnex E(ww.abet.org.

56

ENGINEER
10.

PEC

September 2007

THE EVALUATION MODEL FOR QUALITY EXCELLENCE

An ever evolving quality improvement, assurance and accreditation model is shown in Figure 2. Different levels of evaluation of quality excellence are depicted here. The continuous quality improvement philosophy can provide process for excellence in highereducation to bring it to the international level.

Vision Standards Framework Infrastructure Institutional QMS

IQA NQA QA

National & International QMS


QC

National & International Accreditation


EXAMS
Figure 3: Quality Model of Excellence for Higher Education
t Academic Framework, like Degree, Awards and

Legalities etc
t Infrastructure, like Human, Capital, Information and

Physical entities
t Institutional QMS, Local Quality Criteria t National and International QMS (ISO 9000 & PS 3000

QMS)
t National and International Accreditation of QMS ( say

PEC and ABET for Engineering) Figure 2. Evaluation Model for Quality Excellence in Education Legend: Exams Entrance, quiz, term, oral and final examinations Quality Control (QC) Process Control (SPC and SQC) 12. RECOMMENDATIONS Following are a few major points for consideration;
t Institutional quality enhancement and assurance

Quality Assurance (QA) System Control (Operation Management) National Quality Accreditation (NQA) National Recognition International Quality Accreditation (IQA) International Recognition 11. QUALITY EXCELLENCE MODEL FOR HIGHER EDUCATION Followings are the main factors of support for a proposed quality model of higher education as shown in Figure 3. Quality t Vision, Goals and Mission t Academic Standards, which include curricula and duration etc.

system be replaced with either national or international system. t9000 QMS standard certification should be made ISO mandatory for all learning bodies of higher and lower echelons of education system of both public and private sectors. t should establish an ISO 9000 QMS cell to HEC centrally plan, control and fund the complete implementation program of ISO 9000 QMS standard t should conduct seminars in major engineering PEC institutions of the country for awareness and promotion of accreditation criteria and its assessment mechanism. t should encourage its accredited institutions for PEC ABET accreditation. t Duplication and overlapping in assurance standards and accreditation criteria be removed to reduce the work load on academia.
t

13. CONCLUSIONS Quality of processes and functions in educational

57

ENGINEER

PEC

September 2007
Part-II Curricular Objectives 1. Course descriptions of all academic programs Part-III Institutional Facilities 1. Office and Class Rooms Space 2. Laboratories 3. Library & Teaching Aids/Facilities a. Approximate number of acquisitions in the last two years, and the total number of b. Books and bound periodicals. c. Library expenditure for the past two years d. Reference services available to students and faculty e. Database computer search facilities available to students and faculty f. Library Timings g. Professional lib staff h. Seating capacity of the library i. Other learning resources (e.g maps, microfiche, audio and video tapes, discs etc. j. Reproduction facilities k. Teaching aids 4. Computer Facilities a List the computer facilities available, including their primary purpose and utilization of the equipment. Describe plans for expanding, updating related facilities b. Describe service available to assist students and faculty (e.g., consultants program libraries etc). c. Describe the accessibility of the computer facilities and services to students and faculty in terms of numbers and location of terminals and/or individual computers, and hours of operation. Describe how student access to these facilities is provided and monitored. d. Describe availability of internet facilities to students and faculty e. Describe how use by students and faculty is measured. Discuss levels and trends in computer usage over the last two-year Part-IV Exam System 1. Describe how the college/institute ensures the depth and breadth of papers set by examiners 2. a. Describe the process of marking of papers and awarding of grades under the relative grading system. b. How transparency and neutrality is ensured? 3. What is the procedure for students to ask re-evaluation if not satisfied 4. Describe how exam records are maintained and how the security of the records is maintained 5. Does the college/institute have exam halls with appropriate seating capacity and facilities (e.g. lighting, air conditioning/fans/heaters, wash rooms, desks etc)? 6. Does the college have a system of training the newly inducted faculty on the semester system and relative

institutions of higher learning of the developing countries are facing a lot of challenges for its establishment and improvement. These challenges are having root causes embedded in their society that have become impediments for social, industrial and financial development. Assurance and accreditation of QMS of education are the ways forward for its improvement, recognition and stakeholders satisfaction. Institutional, national as well as international quality criteria set, management system and assessment mechanism are available for quality improvements which can be adopted to gain the desired benefits. The attributes of quality require assurance and accreditation. Models for continuous quality improvement, excellence and higher education have also been presented for implementation. A sample of major attributes of higher learning have been listed down from its quality perspective. ISO 9000 QMS standard can fulfill to a large extend the basic requirements of documentation and consistency of higher education management system. HEC of Pakistan can play a vital role in promotion of ISO 9000 QMS standard. PEC can help in understanding of accreditation philosophy in the higher learning bodies of engineering in the country to bring its quality standard to the international level. It should also encourage its accreditors for ABET accreditation as well. Annexure A INSTITUTIONAL QUALITY ASSURANCE CRITERIA SET (Academic Questionnaire) Section-1 General Information 1. Name of the College/Institute 2. Name of College/Institute Head 3. Name of Dean (A/Dean) 4. Names of HsOD 5. Departments and their brief functions 6. Department-wise list of academic and research programmes being conducted presently Section-2 Academic Part-1 - Faculty 1. Qualifications and Experience of Full time Part time faculty 2. Faculty Student ratio 3. Average stay of faculty in the institution 4. Average faculty load (Hours/faculty member/week) 5. F a c u l t y C o m p e t e n c e . D e s c r i b e h o w t h e College/Institute assures continued teaching competence and professional growth of the faculty. Describe the process of faculty performance review. 6. Supervision of Part Time Faculty. Describe how part time faculty personnel are supervised and evaluated to competence in teaching, course conduct and availability to students

58

ENGINEER

PEC

September 2007
R&D Questionnaire 1. Name of the College/Institute 2. Name of College/Institute Head 3. Departments and their brief functions 4. Details of Areas/Fields of Research Interest 5. Details of PhD and MS Qualified Faculty 6. Details of PhD Students at College/Institute 7. Number of PG students at College/Institute 8. Number of UG students at College/Institute 9. Details of research papers published during last three years 10. Details of research projects undertaken during last three years 11. Total no of projects commercialized during the period along with R&D fund generated 12. Total no of invention and patents achieved during the period along with R&D fund generated 13. Total no of awards/recognition for research work received during the period 14. Percentage of PhD faculty actively involved in R&D activity 15. Percentage of MSc faculty actively involved in R&D activity 16. Ratio of research papers published at national/ international levels to the number of PhD faculty during last three years 17. Ratio of research papers published at national/ international levels to the number of MS faculty during last three years 18. Ratio of research papers published at national/ international to the UG and PG students during last three year 19. Ratio of R&D/consultancy revenue earning to the funds spent on R&D projects during last three years 20. Names and details of faculty members/students who have attended the national/international seminars/ workshops/conferences 21. Names and details of faculty members/students who have the source persons at national/ international seminars/ workshops/ conferences 22. What are the major R&D facilities developed in the campus during the period 23. What is the total number of publications of the college/institute, how many of them were presented in national/international Journals/Conferences 24. Details of Faculty members who have received national/international recognition for R&D/ consultancy 25. List of linkages/JVs with industry/firms 26. How do the faculty keep abreast with the recent developments in S&T 27. Details of methodology/mechanism adopted by the colleges/institutes to evaluate/analyze the R&D activities interest of faculty 28. How well endowed are the libraries materials for R&D activities 29. How well endowed is the laboratories equipment for

grading system being followed by NUST? Part-V Administration 1. Describe how good working communication is ensured between faculty and administrators 2. Procedures for selection and supervision of administrators. 3. Qualification and experience of administrators 4. Describe how performance evaluation of administrators is carried out. 5. List the academic activities organized by the administration during last two years and improvements made by it compared to previous years. Part-VI Student Body 1. Describe the opportunities on campus that is available to students for participation and membership in the technical and professional societies most closely associated with their programs. Indicate support to these activities provided by the college/institute, department and faculty. 2. Describe the ways in which interaction is enhanced between the students and practitioner in industry, government and private practice. 3. Describe the general criteria and procedure for admitting students. 4. Provide employment data of last two years of students who graduated from the college/institute. 5. List the number of students along with various awards/prizes won by them during last two years. 6. List the details of students participation in conferences, exhibitions, scholarly, competitions etc during last two years. 7. List the details of industrial visits conducted for students during last two years. 8. List details of internship provided to the students through liaison/coordination with the industries. 9. List the papers published by students especially in refereed journals and conference proceedings of international repute. Part-VII Misc 1. Have the academic wings/departments written down procedure/SOPs? List and describe how they are followed. Are there exceptions/violations of procedures? How oversights are detected /handled? 2. Describe performance of various committees (e.g. Department faculty meetings, FBS meetings, Disciple committee meeting, PhD committee meetings etc). Describe frequency of meetings, monitoring and follow up actions.

_________________________ (Signature) Dean COUNTERSIGNED

59

ENGINEER

PEC

September 2007
Annexure C NATIONAL QUALITY ENHANCEMENT AND ASSURANCE CRITERIA SET (HEC Quality Enhancement and Self Assessment Criteria Set) Criteria No Description No. of Standards * 7. Standard and Quality of Instructions 7.1 Completion of Courses 7.1.1 Theory 7.1.2 Practical 7.2 Perception of Students 7.2.1 Theory 7.2.2 Practical 7.3 Course File 7.4 Student's Feedback Students 8.1 Admission 8.2 Admission Response and %Age Admitted 8.3 Intake Academic Buildings and other Allied Facilities 9.1 Buildings (hired or owned) 9.2 Other Allied Facilities Annual Cost Per Student Financial Support to Students Class Size 12.1 Theory 12.2 Practical Office Hours for Academic Counseling Other Facilities for Students 14.1 Hostel (S) Accommodation 14.2 Convocation Hall / Auditorium 14.3 Sports Facilities (including Swimming Pool, Gymnasium etc) 14.4 Student Transport 14.5 Other Facilities Yield Dropouts Average Duration Internship / Practical Training Quality of Product 19.1 Placement Bureau 19.2 Alumnis Satisfaction 19.3 Employers' Feedback 19.4 Acceptance for Admissions in Foreign Universities 19.5 Average Starting Salary of Graduates 19.6 Average Time Taken to Find a Job Operational Budget Development Budget Investment and Internal Resource Generation 22.1 Investment

R&D activities 30. Details of the books/journals published by the college/institute 31. List the details of project proposals/PC-Is submitted to HQ NUST/sponsoring/donor agencies 32. Details of R&D work/consultancy services and availability of expertise publicized by the college/institute to the public/private sectors. Other prospective sectors informed about these resources for commercialization 33. How much R&D funding has been generated by college/institutes from other agencies 34. Details of Future R&D Plans of the college/institute ______________________ Signature (Dean) COUNTERSIGNED Annexure B LIST OF CLAUSES AND SUB CLAUSES OF ISO 9000 QMS

8.

9. Clause 1. Scope 1.1 General 1.2 Application Clause 2. Normative Reference Clause 3. Terms and Definitions Clause 4. Quality Management System 4.1 General Requirements 4.2 Documentation Requirements Clause 5. Management Responsibility 5.1 Management Commitment 5.2 Customer focus 5.3 Quality Policy 5.4 Quality Planning 5.5 Responsibility, Authority and Communication 5.6 Management Review Clause 6. Resource Management 6.1 Provision of Resources 6.2 Human Resources 6.3 Infrastructure 6.4 Work Environment Clause 7. Product Realization 7.1 Planning of Product Realization 7.2 Customer-Related Processes 7.3 Design and Development 7.4 Purchasing 7.5 Production and Service Provision 7.6 Control of Monitoring and Measuring Devices Clause 8. Measurement, Analysis and Improvement 8.1 General 8.2 Monitor and Measurement 8.3 Control of Non-Conforming Product 8.4 Analysis of Data 8.5 Improvement

10. 11. 12.

13. 14.

15. 16. 17. 18. 19.

20. 21. 22.

60

ENGINEER

PEC

September 2007
Development: The Response to Change, In: United Nations Industrial Development Organization 30 years of industrial development 1966-1996, Ed: Brennan P.J. and Weston G. Published by ISC in association with UNIDO London UK pp. 380-389 5. Sandholm, Lennart, (2000). Quality In Developing Countries In: Jurans quality control Hand book 4th edition ed. Juran J.M. and Gryna F.M. McGraw Hill inc. 6. Wilson, Steven R. (1995). The Quest for Recognizable Standard: New path in Quality, Standardization and Metrology, In: United Nations Industrial Development Organization 30 years of industrial development 1966-1996, Ed: Brennan P.J. and Weston G. Published by ISC in association with UNIDO London UK pp. 362-371 7. Vincent, K.O. and Joel E.R. (2004). Principles of Total Quality, London Kogan Pages Ltd 8. www.abet.org 9. www.iso.google 10. www.pec.org.pk 11. Yung, Winco K. C. (1997). The Value of TQM in the Revised ISO 9000 Quality System, International Journal of Operation & Production Management volume 17 issue 2 pp. 221-230 About Author PEC Registration. No: ME3640 Dr. Nawar Khan is a professional Mechanical Engineer. He graduated from the University of Engineering and Technology Peshawar in 1981 and later did his MSc Mechanical Engineering (Specialized in Production Engineering) from the University of Engineering and Technology Lahore in 1995. Dr Nawar Khan completed his Ph.D under a split Ph.D program of MoST from the University of Engineering and Technology Lahore and De Montfort University, Leicester UK in August 1999. His field of specialization is Total Quality Management (TQM), particularly the Quality Awards. He has got his MBA degree, specialized in HRM, in January 2005 from Allama Iqbal Open University Islamabad. He is also a Certified Quality Assurance Lead Auditor for ISO 9000:2000. He is author of a number of national and international research publications. Dr Nawar Khan is also the Principal Investigator of Pakistan National Quality Award (PNQA) project for Higher Education Commission (HEC) of Pakistan. He is a member of Institute of Engineers, Pakistan and lifetime member of Pakistan Engineering Council. Presently, he is serving as Professor at the College of Electrical and Mechanical Engineering, Peshawar Road Rawalpindi, a constituent College of the National University of Sciences and Technology (NUST), Pakistan.

22.2 Internal Resource Generation 23. Research and Publications 23.1 Faculty Research Grant 23.2 Effective Utilization of Research Grant and its Net Outcome 23.3 Faculty Publications in HEC Approved Journals 23.4 Continuity of Faculty Research 23.5 Academic Collaboration 23.6 Textbooks Written by Faculty Members 23.7 Budgetary Allocation for Conferences, Seminars, Colloquium etc. 23.8 Computer and Internet Facilities 23.9 A c c e s s i b i l i t y o f F a c u l t y / S t u d e n t s t o Computers/Internet Facilities and International Databases 24. Industrial Linkage 24.1 Industrial Liaison Office 24.2 Commercialization of Research Findings 25. Website Annexure E INTERNATIONAL ACCREDITETION CRITERIA SET FOR ENGINEERING (ABET Criteria set) General for Criteria for Basic Level Programs 1. Criterion 1. Student 2. Criterion 2. Program Educational Objectives 3. Criterion 3. Program Outcomes and Assessment 4. Criterion 4. Professional Component 5. Criterion 5. Faculty 6. Criterion 6. Facilities 7. Criterion 7 Institutional Support and Financial Resources 8. Criterion 8. Program Criteria 14. REFERENCES 1. Eicher L. D. and Mikil R. (1993). Perception Of Quality In The Developing Countries In: ISO 9000 Quality Management System, UNCTAD/GATT and ISO joint publication Geneva Switzerland 2. Hewitt, Tom and Wield David (1995). Technological Capabilities and Competitiveness. Two Needs That Defy Measurement In: United Nations Industrial Development Organization 30 years of industrial development 1966-1996, Ed: Brennan P.J. and Weston G. Published by ISC in association with UNIDO London UK pp. 330-337 3. Nawar, Khan and Sheikh, M.A. R. (October 1997). ISO 9000 - The Core of TQM for A Developing Country. In: Proceedings of Pakistans Third International Convention on Quality Control. Lahore: Ibrahim Publisher pp.333 - 347 4. Prokopenko, Joseph (1995). Human Resources

61

You might also like