Archived Papers for Journal
International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE) >>
Vol.10, No.3
Publisher: World Academy of Research in Science and Engineering (WARSE)
Publishing Date: 2021-06-11
- Classification of Long Bone X-ray Images using New features and Support Vector MachineAuthors: Amani Al-Ghraibah Mohammad Algharibeh Waseem AlMohtasib Muneera Altayeb
- Identification of HATE speech tweets in Pashto language using Machine Learning techniquesAuthors: Aftab Alam Janisar Hammad Afzal Ganesh Kumar
- Comparison of Machine Learning Algorithms for Induction MotorRotor SingleFault Diagnosis using Stator Current SignalAuthors: Thanh-Huong Tran Hongwei Liang Wei Li Minh-Trien Pham
- Computational Neuro-physiological Model (CNP) to Profile Lower Primary School Students in Inclusive Education: A Concept PaperAuthors: Norzaliza Md Nor Noor Azura Zakaria Muna Azuddin Murni Mahmud Abdul Wahab Abdul Rahman Ruwinah Abdul Karim
- Face Mask DetectionAuthors: Justin Ipe Abraham Celia Mary Augusty Gayathri Devi S Greeshma Gopan Greeshma Sabu Libin M Joseph
- Competency Model of Software Developer in Thailand : A Qualitative ExplorationAuthors: Chutchonook Charutwinyo
- A Review on Fault Tolerance in Distributed DatabaseAuthors: Ahmad Shukri Mohd Noor Auni Fauzi Ainul Azila Che Fauzi
- OTP Based Locking System using IOTAuthors: Deeksha P MangalaGowri M K Sateesh R Yashaswini M Ashika V
- Energy-efficient Dynamic Mobile Sink Path Planning for Data Acquisition for Wireless Sensor NetworksAuthors: Srinivasulu Boyineni Dr.K. Kavitha Dr.Meruva Sreenivasulu
- Securing Academic Record using Blockchain with Hyper ledger FabricAuthors: G. Dhanalakshmi. B. Bhavethra Muppa Keerthi Chowdary S. Keerthana
- Mobile Wireless Sensor Networks: A Framework Based Solution for Physical Security AttacksAuthors: Mumtaz Qabulio Yasir Arafat Malkani Muhammad Suleman Memon Ayaz Keerio
- Minimizing Symptom-based Diagnostic Errors Using Weighted Input Variables and Fuzzy Logic Rules in Clinical Decision Support SystemsAuthors: Anietie Ekong Henry Odikwa Otuekong Ekong
- Indian Sign Language Recognition Using Canny Edge DetectionAuthors: Vipul Brahmankar Nitesh Sharma Saurabh Agrawal Saleem Ansari Priyanka Borse Khalid Alfatmi
- On k-Distance Degree Index of TreesAuthors: Zia Ullah Khan Azhar Iqbal Gohar Ali Marium Sultana Javed Khan
- A Qualitative Approach for Representation of Templates and Portfolios with User Accessible EnvironmentAuthors: Sanaullah Memon Ihsan Habib Memon Noor Hassan Bhangwar Najamuddin Budh
- Filtering unwanted posts from online social networks (OSN)Authors: Ankit Tomer Sachin Jain
- Multi Model Approach to Extract Human Features in Real TimeAuthors: Raj Baldania Barkha Bhavsar
- Object Detection and IdentificationAuthors: Prinsi Patel Barkha Bhavsar
- Classification of Exploring the Mortality Rates of Diseases by Using Machine Learning TechniquesAuthors: Imdad Ali Shah Riaz Ahmed Shaikh Samina Rajper
- Sindhi Handwritten Text Recognition Using SVMAuthors: Shafique Ahmed Awan Fida Hussain Khoso Aijaz Ahmed Arain Abdullah Lakhan Shah Zaman Nizamani Kirshan Kumar Luhana
- Temporal Analysis Of Temperature Variability In Pakistan Using The Method Of Empirical Mode DecompositionAuthors: Mariam Sultana Faheem Zaidi Javed K.Afridi Muhammad Shoaib
- The Development of Interview Protocol to Explore Hybrid Agile Software Development PhasesAuthors: Norzariyah Yahya Siti Sarah Maidin Muhammad Shukri Safari
- The Review of Raspberry Pi Based - Systems to Assist the Disabled PersonsAuthors: Daniel Sekyere – Asiedu Fezile Ozdamli
- Deriving Heart Rate and Respiratory Rate from Pulse Oximetry DataAuthors: Jennifer C. Dela Cruz John Paul D. Alolor Rouella Christine L. Panganiban Rhianna Marielle G. Victorio Jonathan Ibera
- Smart Grid Local Energy Trading Based Crypto Token Using BlockchainAuthors: THARUN P SHAHRUKH PARVEZ R
- Restaurant Recommendation System using Machine LearningAuthors: Ketan Mahajan Varsha Joshi Mohini Khedkar Jacky Galani Mayuri Kulkarni
- Performance Evaluation of Slotted Aloha Anti-Collision Protocol for Mobile RFID Tags Identification using NHPPAuthors: Shachi Sharma AbdulShakoor
- Covid Tracker for Medical Front-Liners- A SurveyAuthors: Aman Shinde Rajeev Ramesh Siddhant Singh Vikramjit Banerjee Prashant Gadakh Sandeep Patil
- An Improved Methodology for Data Hiding In Images Using Haar Transformed, LSB Replacement Method and Modified PVDMF 1Authors: Laraib Naz Qamar Nawaz Isma Hamid Ahmad Mateen Salman Afsar MushhadMustuhzar Gilani
- Recognition of Human Face Emotions Detection Using Computer Vision Based Smart ImagesAuthors: Sanaullah Memon Noor Hassan Bhangwar Abdul Hanan Sheikh Najamuddin Budh
- Domain Specific Model Driven Approach for Adaptive SystemsAuthors: Magagi Ali Bachir Jellouli Ismail El Garouani Said Amjad Souad
- Code Smell Identification As The Basis For Code Refactoring in The Agricultural Information System Portal Case Study at: Gilangharjo Village, Bantul Regency, IndonesiaAuthors: Argo Wibowo Lukas Chrisantyo Maria Nila Anggia Rini
- Skin Lesions Detection and Classification Using Deep LearningAuthors: Waqas Rizwan Syed Muhammad Adnan Wakeel Ahmed Muhammad Imran Faizi
- Smart Learning Tools for Enhancing Basic Education SystemAuthors: Saima Siraj Ammar Oad Khalida Khan Sajida Raz Bhutto Pinial Khan Butt Akhtar Hussain Jalbani Rafia Naz Xin Liu
- THIRD EYE 360° Object Detection and Assistance for Visually Impaired PeopleAuthors: Rohan Jain Yukta Bhattad Tejal Patil Rohit Patil Khalid Alfatmi
- Automatic Segmentation of Hippocampus and Classification of brain MRI for Alzheimer’s DetectionAuthors: Dulumani Das Sanjib Kumar Kalita
- Universal Dependencies for Urdu Noisy TextAuthors: Amber Baig Mutee U Rahman Abdul Salam Shah Suhni Abbasi
- Comparative Analysis of Sn–Pb–Sb Babbitt bearing alloys material with and without copperAuthors: Jitendra Parte Prof A.K. Jain
- A Data Analytic Approach in the Thematic Classification of the Reasons and Perspectives of Adolescents’ Social Media EngagementAuthors: Elaine Marie Aranda Roy Francis Navea
- Design and Analysis of a Microstrip Patch Antenna for TV White Space Data ApplicationsAuthors: Roy Francis Navea Emmanuel Trinidad
- Faster Big Data Encryption Technique Using Key GenerationAuthors: Galal A. Al-Rummana Abdulrazzaq H. A. Al-Ahdal G. N. Shinde
- Moving Target Defense for SDN-Based Cloud Datacenter Network ProtectionAuthors: Tamesgen Bekele Senthil Kumar A Sisay Muleta Bekele Worku
- A Review on the Security of the Internet of Things (IoT)Authors: Hafiz MusabIqbal Hashim Ali Khokhar Usman Ahmed Raza
- Gender Estimation on Social Media Using Recurrent Neural NetworkAuthors: Aamina Atta Khalid Masood Afrozah Nadeem Sundus Munir
- A Unified Framework for Encryption and Decryption of Images Based on Autoencoder (UFED)Authors: Muhammad Azeem Shazia Saqib Farrukh Sadiq
- Impact of Postgraduate Students Dropout and Delay in University: Analysis Using Machine Learning AlgorithmsAuthors: Muhammad Nadeem Sellapan Palaniappan Waleej Haider
- Multi-Modal Biometrics Systems: Concepts, Strengths, Challenges and SolutionsAuthors: Achimba Terfa Alaaga James Kwaghbee Sever
- Link Scheduling Algorithm to Mitigate Worst-Case Interference Problems for LTE-AAuthors: Shivanandaswamy V. Mahapurush Prathima Mahapurush Priyatam Kumar
- Design, Usage and Impact of Virtual University Mobile LMS Application on Students Learning of Virtual University of PakistanAuthors: Masroor Ahmed Shahid Minhas
- Agrobot in field of Machine LearningAuthors: Putul Siddharth B V A N S S Prabhakar Rao
- Screening of COVID-19 using Cough Audio FrequenciesAuthors: Farrukh Sadiq Khalid Masood Muhammad Azeem Anas Riaz Khan
- Stop gap removal using spectral parameters for stuttered speech signalAuthors: K B Drakshayini Dr Anusuya M A
- Survey on IOT Based Medical Box for Elderly PeopleAuthors: Pampapathi B M Chandana Murthy Supritha Kumar Pooja M Supriya K
- Automated Diabetic Retinopathy Identification Using Convolutional Neural NetworkAuthors: Vidya Manjunath Purushan Manja Naik.N
- Project Selection through a Simulation Model of the Painting RobotsAuthors: T. Kriangkrai B. Surapong C. Kijcha S. Khongsak A.H. Ismail
- Execution Assessment of Machine Learning Algorithms for Spam Profile Detection on InstagramAuthors: Tayyaba Raza Salman Afsar Javeria Jameel Ahmed Mateen Ayesha Khalid Hira Naeem
- A Review on Anomaly Detection in Time SeriesAuthors: Syed Hassan Ali Shah Muhammad Junaid Akbar Usman Ahmed Raza
- A Smart Deforestation Monitoring and Control System ModelAuthors: Ibam E. O. Olowokere V
- VANET routing Protocols :Implementation and Analysis Using NS3 and SUMOAuthors: Maria Jan Salman Afsar Ahmed Mateen Muhammad Qasim Yasin Bilal Safdar Abdul Rehman
- Systematic Approach to Perform Task Centric Exploratory Data Analysis with Case studyAuthors: Parvatham Niranjan Kumar Kambhampati Vijay Kumar
- An Analysis on Object Recognition Using Convolutional Neural NetworksAuthors: Mamoona Saleem Salman Afsar Ahmed Mateen Arslan Zaheer Muhammad Tariq Muhammad Asim Raza
- On Topological Indices of Dual Graph of Benzene Ring Embedded in P-Type Surface in 2D NetworkAuthors: Azhar Iqbal Gohar Ali Javed Khan Gul Rahmat Muhammad Numan Andleeb Kausar
- Algorithmic Approaches For Image Edge DetectionAuthors: Afrozah Nadeem SyedaBinish Zahra Sundus Munir Sadia Kousar Arfa Hassan Abdul Rehman
- Music Genre Classification using Optimized Sequential Neural NetworkAuthors: Anahitaa R Roopikha Ganesh R Shivani Pattabiraman V
- Sign Language and Common Gesture Using CNNAuthors: Piyush Kapoor Hema N
- IoT Based Accident Detection and Life Guard SystemAuthors: Saranya S Karthika G Gayathri U Ramya B Avinashilingam N
- Artificial Intelligence for Cervical Cancer AnalysisAuthors: Ruth Reátegui Priscila Valdiviezo-Diaz Luis Barba-Guamán
- Improved Numerical Computation to Solve Lane-Emden type EquationsAuthors: Amir Qamar Sh. M. Zeeshan Iqbal Fida Hussain Khoso Zaheer Uddin Aijaz Ahmed Arain
- ECG Arrhythmia Time Series Classification Using 1D Convolution –LSTM Neural NetworksAuthors: Yousra MjAlqaisi Muhammad Aziz Muslim Rahmadwati
- Key Benefits of Cloud-Based Internet of Vehicle (IoV)-Enabled Fleet Weight Management SystemAuthors: Muhammad Shakeel Faridi Saqib Ali Salman Afsar Zahid Javed
- A systematic Approach to Human Motion Recognition using Deep LearningAuthors: Shaashwat Agrawal Anish Jamedar Mangamudi Yashwanth Swarnalatha P
- Machine Learning Implementation for Health insuranceAuthors: Sujith Thota Kotha Vishnu Sai P Swarnalatha
- Blockchain Based Voting SystemAuthors: Charan Reddy K Sriraj C Gangadhar P Swarnalatha
- Deep Learning Chatbot using PythonAuthors: Sai Kiran S Srinivas Likhith R P Swarna Latha
- Fog Networks: A Prospective Technology for IoTAuthors: Urooj Yousuf Khan Tariq Rahim Soomro
- He role of social media during COVID–19 pandemic situation and Domestic violence: Its impacts on Pakistan SocietyAuthors: Qamar Ayaz Mirani Azeem Ayaz Mirani Muhammad Suleman Memon Rozina Chohan Mumtaz Qabulio
- IOT Framework for Heart Diseases Prediction Using Machine LearningAuthors: BALJINDER KAUR
- The Importance of Ethical Hacking Tools and Techniques in Software Development Life CycleAuthors: Syed Zain ul Hassan Saleem Zubair Ahmad
- Lung Cancer Detection Using Chi-Square Feature Selection and Support Vector Machine AlgorithmAuthors: Vikas Prabhpreet Kaur
- Credit Card Fraud Detection using Imbalance Resampling Method with Feature SelectionAuthors: Kajal Kamaljit Kaur
- Credit Card Fraud Detection using Imbalance Resampling Method with Feature SelectionAuthors: Javairya Nadeem Arfan Ali Nagra Muhammad Asif Aqsa Iftikhar
- Optimization of Factorial Design with the type of Plackett-Burman Design to Study the Effects of Organic Rice Production Process: First Step ExperimentAuthors: B. Surapong P. Suwattanarwong
- Optimization of Factorial Design with the type of Plackett-Burman Design to Study the Effects of Organic Rice Production Process: Second Step ExperimentAuthors: P. Suwattanawong B. Surapong
- Deep Learning Network Anomaly-Based Intrusion Detection Ensemble For Predictive Intelligence To Curb Malicious Connections: An Empirical EvidenceAuthors: Arnold Adimabua Ojugo Elohor Ekurume
- Empirical Evidence of Socially-Engineered Attack Menace Among Undergraduate Smartphone Users in Selected Universities in NigeriaAuthors: Arnold Adimabua Ojugo Andrew Okonji Eboka
- Using ML and Data-Mining Techniques in Automatic Vulnerability Software DiscoveryAuthors: Imdad Ali Shah Samina Rajper Noor ZamanJhanjhi
- Virtualization Security in Cloud Computing- A SurveyAuthors: A. Rafique Usman Nawaz Namra Waheed Muhammad Sama Yousaf
- Guidance and Counseling Record Management SystemAuthors: Rachel T. Alegado Almon M. Alegado Gloria M. Alcantara
- CAPTCHA Design: A Novel Security Method using Sindhi LanguageAuthors: Abdullah Maitlo Riaz Ahmed Shaikh Haque Nawaz Asad Hameed Soomro Samar Abbas Mangi Inayatullah Soomro
- Analysis of authorship attribution technique on Urdu tweets empowered by machine learningAuthors: Zain Ali Arfan Ali Nagra Zufishan Hameed Muhammad Asif
- Understanding the Agricultural Systems Modeling: A ReviewAuthors: Adeel Ahmad Memoona Shehzadi Syed Aftab Wajid Rana Muhammad Javed Ghafoor Naveed Akhtar Muhammad Shafqat Nida Mahreen Rashad-Ul-Sher
- Implementation of Selection Sort Algorithm in Various Programming LanguagesAuthors: Arisha Naz Haque Nawaz Abdullah Maitlo Syed Muhammad Hassan
- An Approach on MCSA-Based Fault Detection Using Discrete Wavelet Transform and Fault Classification Based on Deep Neural NetworksAuthors: Muhammad Zuhaib Faraz Ahmed Shaikh Usman Ahmed Shaikh Asadullah Soomro
- A Methodology for Incorporating Quality Assurance Practices during Software Development Life CycleAuthors: Eraj Laaraib Zulfikar Ahmed Maher Zulfiqar Ali Solangi Muhammad Yaqoob Koondhar Mukhtiar Memon MansoorHyder Depar Asadullah Shah
- Adaptive Auditory Feedback Mechanism of Visual ImpairedAuthors: Waqas Saeed Hafiz M Mudassar Khan Sajid Rehman Babar Akbar Ali
- APSSR: Adaptive Packet Size Selection Based Routing Protocol for Underwater Acoustic Sensor NetworksAuthors: Sajid Rehman Babar Waqas Saeed Hafiz M Mudassar Khan Akbar Ali
- Implementation Based Approach to analyze MPLS and Segment Routing Traffic by Using ODL SDN ControllerAuthors: Waqas Saeed Davide Adami Sajid Rehman Babar Akbar Ali
- FPGA Seven-Segment-Display by Using Altera DE2-115 Board with Practice and ImplementationAuthors: Waqas Saeed Luca Valcarenghi Hafiz M Mudassar Khan Maria Zuriaz Sajid Rehman Babar Akbar Ali
- Survey on Transaction Verification Model based on Blockchain ArchitectureAuthors: Waqas Saeed Dr Majid Husain Hafiz M Mudassar Khan Akbar Ali Sajid Rehman Babar
- Impact of Excessive Usage of Smartphone in KidsAuthors: –
- State of the Art Robotics for Combating with COVID-19 PandemicAuthors: Muhammad Ibrar Muhammad Asif Muhammad Kashif Naveed Imran Sana Hameed Mubashir Ali
- Speech Recognition System (Home Appliances Controller of Local & Remote System) using LPC & HMMs MethodologiesAuthors: Nadeem Ahmed Kanasro Shazia Samoon Mujeeb-U-Rehman Jamali Fiaz Ahmed Memon Shahmurad Chandio
- Implementation of Selection Sort Algorithm in Various Programming LanguagesAuthors: Arisha Naz Haque Nawaz Abdullah Maitlo Syed Muhammad Hassan
- The Impact of Information and Communication Technology and Social Mediain HEIs: A ReviewAuthors: Nimra Afzal Zaira Hassan Hina Bhanbhro Momina Ali Kinza Bisharat Ali Neelam Baloch
- Adaptive Educational Hypermedia Systems: A Systematic ReviewAuthors: Saima Shoro Riaz Ahmed Shaikh Sadia Anwar Aisha Anwar Sajid Hussain Danwar
- Analysis Of Session Initiation Protocol With VoIP In Multimedia Conferencing SystemAuthors: Muhammad Adnan Kaim Khani Malook Rind Asif Ali Wagan Abdul Hafeez Shaikh Mansoor Hyder Depar Raheel Sarwar Abida Luhrani Humair Nawaz Zeeshan Ahmed
- IoT Based Smart Home Automation using Wireless Power TransferAuthors: Anis Khan Chandar Kumar Dr Zahid Ali Asad Ali Vengas Memon Syed Yasir Shah
- Designing Threat Detection Model for Emerging Software PlatformAuthors: Saima Shoro Samina Rajper Aisha Anwar Sadia Anwar Abdul Basit Shaikh
- Assessment of Default Risk Factors in the Disbursement of Home LoansAuthors: Zafar Nasir Zeeshan Ahmed Chaman Lal
- Cyber Attacks Impacting on Communication Using Social Media: Systematic Review Using Data Cluster BallAuthors: Saima Shoro Abdullah Maitlo Haque Nawaz Inayatullah Soomro Allah Dino
- Pizza Dough Service Provider at Various Area Followed by Depth-First Search AlgorithmAuthors: Ambreen Dr Kausar Qureshi Dure Shahwar
- An Analysis on Measuring Graph patterns in Social NetworksAuthors: Riaz Ahmed Shaikh Noor Ahmed Shaikh Muhammad Hanif Tunio Yumna Magsi Sajid Ahmed Ghangro Saima Shoro
- Impact of Ultra-Wideband Antenna Application on Underground Object DetectionAuthors: Zahid Ali Ghulam Abid Chandar Kumar Vengas Memon Aysha Siddiqui
- Sindhi Stemmer using Affix Removal MethodAuthors: Ambreen A. Sattar Suhni Abbasi Mutee U Rahman Amber Baig Masroor Nizamani
- New Models for Estimation of Solar Radiation for Five Cities of PakistanAuthors: Atteeq Razzak Zaheer Uddin M. Jawed Iqbal
- Impact of COVID-19 on publics Internet and TV Watching behavior: A cross-national StudyAuthors: Hamza Rehman Butt Dr Shahid Minhas Aysha Anwar Kiran Sajid
- Iot Based Smart Kit For Coal Miners Safety PurposeAuthors: Syed Faiz Ul Huda Chandar Kumar Muhammad Ali Noman Syed Yasir Shah Muhammad Mubashir Iqbal
- Implementation of Wireless Sensor Technologies using virtual wire library for controlling alternative current appliancesAuthors: Mujeeb-ur-Rehman Jamali ShaziaSamoon Nadeem A. Kanasro Farhan Bashir Shaikh Fiaz Ahmed Memon Ghulam Nabi Rajper
- Intelligent Hybrid Fraud Detection Using Biometric and Face RecognitionAuthors: Hafiz Muhammad Tayyab Khushi Tehreem Masood Arfan Jaffar
- Machine Learning Empowered Urdu Characters Recognition MechanismAuthors: Ayima Zahra Maneeba Ashrafl; Muhammad Sohaib
- Towards Covid-19 Detection in X-ray images using Convolutional Neural NetworkAuthors: Marium Malik Tehreem Masood Maira Kamran
- Predictive modeling to Study Lung Cancer MetastasisAuthors: Muhammad Junaid Iqbal Abid Ali Usman Ahmed Raza Usman Nawaz Yawar Ahmed Sana Mujahid
- Python program to generate spherical harmonicAuthors: Kousar Shaheen Roohi Zafar Saba Javaid
- BBVPL: A Block-Based Visual Programming Language Built on Google’s BlocklyAuthors: Ashfaq Ahmad Muhammad Idrees Muhammad Arif Butt Hafiz Muhammad Danish
- Comparative Analysis: Intrusion Detection in Multi-Cloud Environment to Identify Way ForwardAuthors: Hafiz Hasan Naqvi Tahir Alyas Nadia Tabassum Umer Farooq Abdallah Namoun Syed Aun M. Naqvi
- Photovoltaic Integrated Distributed Energy Generation System for Sustainable Energy Development Considering Reliability Indices and Levelized Cost of EnergyAuthors: Muhammad Tamoor Muhammad Abu Bakar Tahir Muhammad Ans Zaka
- The Role of Machine Learning to Mitigate the Malicious CrimeAuthors: Imdad Ali Shah Dr.Noor Ahmed Shaikh SqnLdr R Aneela Kiran Shahid Hussain Danwar Raja Majid Ali Ujjan
- IOT Based Smart System for Servival Detection in Disasters ZonesAuthors: Muhammad Hammad-u-Salam Zahoor Hussain Shunaila Jabeen
- Energy-Efficient Routing Protocols for WSN: A Systematic Literature ReviewAuthors: Muhammad Shahzeb Ali Ansar Munir Shah Mubashir Hussain Malik Ahmed Raza Mohsin Maira Khalid
- Towards Silver Standard Dependency Treebank of Urdu TweetsAuthors: Amber Baig Mutee U Rahman Sirajuddin Qureshi Saima Tunio Sehrish Abrejo Shadia S. Baloch
- Software Development and Modelling for Churn Prediction Using Logistic Regression in Telecommunication IndustryAuthors: Syed Zain Mir Azfar Ghani Sajid Yasin AzeemAftab Ikram e Khuda
- Comparative Analysis of Software Process Models in Software DevelopmentAuthors: Sajid Ahmed Ghanghro Muhammad Ajmal Sawand Wajid Ahmed Channa Ubaidulla alias Kashif Muhammad Hanif Tunio Kishor Kumar Nooruddin
- Performance Analysis of Internet Streams using Remote Desktop ToolsAuthors: Vengas Memon Dr Zahid Ali Chandar Kumar Rafay Rushail Areeb Anis Khan Asad Ali Siyal
- A Study on Use of WhatsApp Messenger among Students for their Academic Achievements: A Case StudyAuthors: Zeeshan Ali Rahu Hina Bhanbhro Rozina Chohan Hosh Muhammad
- A Comparative Study of Various Machine Learning Algorithms in Fog ComputingAuthors: Urooj Yousuf Khan Muhammad Mansoor Alam
- An Evolutionary Approach of Machine Learning for Monitoring Churn Prediction of Broadband CustomerAuthors: Imran Pathan Nadeem Ahmed Kanasro Farhan Bashir Shaikh Mujeeb U Rehman Maree Aftab A. Chandio
- Post Pandemic World and Challenges for E-Governance FrameworkAuthors: Syed Aun M. Naqvi Tahir Alyas Nadia Tabassum Abdallah Namoun Hafiz Hasan Naqvi
- Categorization of CVE Based on Vulnerability Software By Using Machine Learning TechniquesAuthors: SqnLdr R Aneela Kiran Dr.Samina Rajper Riaz Ahmed Shaikh Imdad Ali Shah Shahid Hussain Danwar
- Performance Optimization of network using load balancer TechniquesAuthors: Waleed Khalid Muhammad Waseem Iqbal Tahir Alyas Nadia Tabassum Nida Anwar Muhammad Asif Saleem
- The Promises of Blockchain and Cryptocurrencies Technology for Architecture and Interaction DesignAuthors: Hafiz M Mudassar Khan Waqas Saeed M Waseem Iqbal Akbar Ali Maria Zuraiz M Naveed Shahzad M Ahmed