ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE) >>

Vol.10, No.3

Publisher: World Academy of Research in Science and Engineering (WARSE)

Publishing Date: 2021-06-11

  1. Classification of Long Bone X-ray Images using New features and Support Vector Machine

    Authors: Amani Al-Ghraibah Mohammad Algharibeh Waseem AlMohtasib Muneera Altayeb

  2. Identification of HATE speech tweets in Pashto language using Machine Learning techniques

    Authors: Aftab Alam Janisar Hammad Afzal Ganesh Kumar

  3. Comparison of Machine Learning Algorithms for Induction MotorRotor SingleFault Diagnosis using Stator Current Signal

    Authors: Thanh-Huong Tran Hongwei Liang Wei Li Minh-Trien Pham

  4. Computational Neuro-physiological Model (CNP) to Profile Lower Primary School Students in Inclusive Education: A Concept Paper

    Authors: Norzaliza Md Nor Noor Azura Zakaria Muna Azuddin Murni Mahmud Abdul Wahab Abdul Rahman Ruwinah Abdul Karim

  5. Face Mask Detection

    Authors: Justin Ipe Abraham Celia Mary Augusty Gayathri Devi S Greeshma Gopan Greeshma Sabu Libin M Joseph

  6. Competency Model of Software Developer in Thailand : A Qualitative Exploration

    Authors: Chutchonook Charutwinyo

  7. A Review on Fault Tolerance in Distributed Database

    Authors: Ahmad Shukri Mohd Noor Auni Fauzi Ainul Azila Che Fauzi

  8. OTP Based Locking System using IOT

    Authors: Deeksha P MangalaGowri M K Sateesh R Yashaswini M Ashika V

  9. Energy-efficient Dynamic Mobile Sink Path Planning for Data Acquisition for Wireless Sensor Networks

    Authors: Srinivasulu Boyineni Dr.K. Kavitha Dr.Meruva Sreenivasulu

  10. Securing Academic Record using Blockchain with Hyper ledger Fabric

    Authors: G. Dhanalakshmi. B. Bhavethra Muppa Keerthi Chowdary S. Keerthana

  11. Mobile Wireless Sensor Networks: A Framework Based Solution for Physical Security Attacks

    Authors: Mumtaz Qabulio Yasir Arafat Malkani Muhammad Suleman Memon Ayaz Keerio

  12. Minimizing Symptom-based Diagnostic Errors Using Weighted Input Variables and Fuzzy Logic Rules in Clinical Decision Support Systems

    Authors: Anietie Ekong Henry Odikwa Otuekong Ekong

  13. Indian Sign Language Recognition Using Canny Edge Detection

    Authors: Vipul Brahmankar Nitesh Sharma Saurabh Agrawal Saleem Ansari Priyanka Borse Khalid Alfatmi

  14. On k-Distance Degree Index of Trees

    Authors: Zia Ullah Khan Azhar Iqbal Gohar Ali Marium Sultana Javed Khan

  15. A Qualitative Approach for Representation of Templates and Portfolios with User Accessible Environment

    Authors: Sanaullah Memon Ihsan Habib Memon Noor Hassan Bhangwar Najamuddin Budh

  16. Filtering unwanted posts from online social networks (OSN)

    Authors: Ankit Tomer Sachin Jain

  17. Multi Model Approach to Extract Human Features in Real Time

    Authors: Raj Baldania Barkha Bhavsar

  18. Object Detection and Identification

    Authors: Prinsi Patel Barkha Bhavsar

  19. Classification of Exploring the Mortality Rates of Diseases by Using Machine Learning Techniques

    Authors: Imdad Ali Shah Riaz Ahmed Shaikh Samina Rajper

  20. Sindhi Handwritten Text Recognition Using SVM

    Authors: Shafique Ahmed Awan Fida Hussain Khoso Aijaz Ahmed Arain Abdullah Lakhan Shah Zaman Nizamani Kirshan Kumar Luhana

  21. Temporal Analysis Of Temperature Variability In Pakistan Using The Method Of Empirical Mode Decomposition

    Authors: Mariam Sultana Faheem Zaidi Javed K.Afridi Muhammad Shoaib

  22. The Development of Interview Protocol to Explore Hybrid Agile Software Development Phases

    Authors: Norzariyah Yahya Siti Sarah Maidin Muhammad Shukri Safari

  23. The Review of Raspberry Pi Based - Systems to Assist the Disabled Persons

    Authors: Daniel Sekyere – Asiedu Fezile Ozdamli

  24. Deriving Heart Rate and Respiratory Rate from Pulse Oximetry Data

    Authors: Jennifer C. Dela Cruz John Paul D. Alolor Rouella Christine L. Panganiban Rhianna Marielle G. Victorio Jonathan Ibera

  25. Smart Grid Local Energy Trading Based Crypto Token Using Blockchain

    Authors: THARUN P SHAHRUKH PARVEZ R

  26. Restaurant Recommendation System using Machine Learning

    Authors: Ketan Mahajan Varsha Joshi Mohini Khedkar Jacky Galani Mayuri Kulkarni

  27. Performance Evaluation of Slotted Aloha Anti-Collision Protocol for Mobile RFID Tags Identification using NHPP

    Authors: Shachi Sharma AbdulShakoor

  28. Covid Tracker for Medical Front-Liners- A Survey

    Authors: Aman Shinde Rajeev Ramesh Siddhant Singh Vikramjit Banerjee Prashant Gadakh Sandeep Patil

  29. An Improved Methodology for Data Hiding In Images Using Haar Transformed, LSB Replacement Method and Modified PVDMF 1

    Authors: Laraib Naz Qamar Nawaz Isma Hamid Ahmad Mateen Salman Afsar MushhadMustuhzar Gilani

  30. Recognition of Human Face Emotions Detection Using Computer Vision Based Smart Images

    Authors: Sanaullah Memon Noor Hassan Bhangwar Abdul Hanan Sheikh Najamuddin Budh

  31. Domain Specific Model Driven Approach for Adaptive Systems

    Authors: Magagi Ali Bachir Jellouli Ismail El Garouani Said Amjad Souad

  32. Code Smell Identification As The Basis For Code Refactoring in The Agricultural Information System Portal Case Study at: Gilangharjo Village, Bantul Regency, Indonesia

    Authors: Argo Wibowo Lukas Chrisantyo Maria Nila Anggia Rini

  33. Skin Lesions Detection and Classification Using Deep Learning

    Authors: Waqas Rizwan Syed Muhammad Adnan Wakeel Ahmed Muhammad Imran Faizi

  34. Smart Learning Tools for Enhancing Basic Education System

    Authors: Saima Siraj Ammar Oad Khalida Khan Sajida Raz Bhutto Pinial Khan Butt Akhtar Hussain Jalbani Rafia Naz Xin Liu

  35. THIRD EYE 360° Object Detection and Assistance for Visually Impaired People

    Authors: Rohan Jain Yukta Bhattad Tejal Patil Rohit Patil Khalid Alfatmi

  36. Automatic Segmentation of Hippocampus and Classification of brain MRI for Alzheimer’s Detection

    Authors: Dulumani Das Sanjib Kumar Kalita

  37. Universal Dependencies for Urdu Noisy Text

    Authors: Amber Baig Mutee U Rahman Abdul Salam Shah Suhni Abbasi

  38. Comparative Analysis of Sn–Pb–Sb Babbitt bearing alloys material with and without copper

    Authors: Jitendra Parte Prof A.K. Jain

  39. A Data Analytic Approach in the Thematic Classification of the Reasons and Perspectives of Adolescents’ Social Media Engagement

    Authors: Elaine Marie Aranda Roy Francis Navea

  40. Design and Analysis of a Microstrip Patch Antenna for TV White Space Data Applications

    Authors: Roy Francis Navea Emmanuel Trinidad

  41. Faster Big Data Encryption Technique Using Key Generation

    Authors: Galal A. Al-Rummana Abdulrazzaq H. A. Al-Ahdal G. N. Shinde

  42. Moving Target Defense for SDN-Based Cloud Datacenter Network Protection

    Authors: Tamesgen Bekele Senthil Kumar A Sisay Muleta Bekele Worku

  43. A Review on the Security of the Internet of Things (IoT)

    Authors: Hafiz MusabIqbal Hashim Ali Khokhar Usman Ahmed Raza

  44. Gender Estimation on Social Media Using Recurrent Neural Network

    Authors: Aamina Atta Khalid Masood Afrozah Nadeem Sundus Munir

  45. A Unified Framework for Encryption and Decryption of Images Based on Autoencoder (UFED)

    Authors: Muhammad Azeem Shazia Saqib Farrukh Sadiq

  46. Impact of Postgraduate Students Dropout and Delay in University: Analysis Using Machine Learning Algorithms

    Authors: Muhammad Nadeem Sellapan Palaniappan Waleej Haider

  47. Multi-Modal Biometrics Systems: Concepts, Strengths, Challenges and Solutions

    Authors: Achimba Terfa Alaaga James Kwaghbee Sever

  48. Link Scheduling Algorithm to Mitigate Worst-Case Interference Problems for LTE-A

    Authors: Shivanandaswamy V. Mahapurush Prathima Mahapurush Priyatam Kumar

  49. Design, Usage and Impact of Virtual University Mobile LMS Application on Students Learning of Virtual University of Pakistan

    Authors: Masroor Ahmed Shahid Minhas

  50. Agrobot in field of Machine Learning

    Authors: Putul Siddharth B V A N S S Prabhakar Rao

  51. Screening of COVID-19 using Cough Audio Frequencies

    Authors: Farrukh Sadiq Khalid Masood Muhammad Azeem Anas Riaz Khan

  52. Stop gap removal using spectral parameters for stuttered speech signal

    Authors: K B Drakshayini Dr Anusuya M A

  53. Survey on IOT Based Medical Box for Elderly People

    Authors: Pampapathi B M Chandana Murthy Supritha Kumar Pooja M Supriya K

  54. Automated Diabetic Retinopathy Identification Using Convolutional Neural Network

    Authors: Vidya Manjunath Purushan Manja Naik.N

  55. Project Selection through a Simulation Model of the Painting Robots

    Authors: T. Kriangkrai B. Surapong C. Kijcha S. Khongsak A.H. Ismail

  56. Execution Assessment of Machine Learning Algorithms for Spam Profile Detection on Instagram

    Authors: Tayyaba Raza Salman Afsar Javeria Jameel Ahmed Mateen Ayesha Khalid Hira Naeem

  57. A Review on Anomaly Detection in Time Series

    Authors: Syed Hassan Ali Shah Muhammad Junaid Akbar Usman Ahmed Raza

  58. A Smart Deforestation Monitoring and Control System Model

    Authors: Ibam E. O. Olowokere V

  59. VANET routing Protocols :Implementation and Analysis Using NS3 and SUMO

    Authors: Maria Jan Salman Afsar Ahmed Mateen Muhammad Qasim Yasin Bilal Safdar Abdul Rehman

  60. Systematic Approach to Perform Task Centric Exploratory Data Analysis with Case study

    Authors: Parvatham Niranjan Kumar Kambhampati Vijay Kumar

  61. An Analysis on Object Recognition Using Convolutional Neural Networks

    Authors: Mamoona Saleem Salman Afsar Ahmed Mateen Arslan Zaheer Muhammad Tariq Muhammad Asim Raza

  62. On Topological Indices of Dual Graph of Benzene Ring Embedded in P-Type Surface in 2D Network

    Authors: Azhar Iqbal Gohar Ali Javed Khan Gul Rahmat Muhammad Numan Andleeb Kausar

  63. Algorithmic Approaches For Image Edge Detection

    Authors: Afrozah Nadeem SyedaBinish Zahra Sundus Munir Sadia Kousar Arfa Hassan Abdul Rehman

  64. Music Genre Classification using Optimized Sequential Neural Network

    Authors: Anahitaa R Roopikha Ganesh R Shivani Pattabiraman V

  65. Sign Language and Common Gesture Using CNN

    Authors: Piyush Kapoor Hema N

  66. IoT Based Accident Detection and Life Guard System

    Authors: Saranya S Karthika G Gayathri U Ramya B Avinashilingam N

  67. Artificial Intelligence for Cervical Cancer Analysis

    Authors: Ruth Reátegui Priscila Valdiviezo-Diaz Luis Barba-Guamán

  68. Improved Numerical Computation to Solve Lane-Emden type Equations

    Authors: Amir Qamar Sh. M. Zeeshan Iqbal Fida Hussain Khoso Zaheer Uddin Aijaz Ahmed Arain

  69. ECG Arrhythmia Time Series Classification Using 1D Convolution –LSTM Neural Networks

    Authors: Yousra MjAlqaisi Muhammad Aziz Muslim Rahmadwati

  70. Key Benefits of Cloud-Based Internet of Vehicle (IoV)-Enabled Fleet Weight Management System

    Authors: Muhammad Shakeel Faridi Saqib Ali Salman Afsar Zahid Javed

  71. A systematic Approach to Human Motion Recognition using Deep Learning

    Authors: Shaashwat Agrawal Anish Jamedar Mangamudi Yashwanth Swarnalatha P

  72. Machine Learning Implementation for Health insurance

    Authors: Sujith Thota Kotha Vishnu Sai P Swarnalatha

  73. Blockchain Based Voting System

    Authors: Charan Reddy K Sriraj C Gangadhar P Swarnalatha

  74. Deep Learning Chatbot using Python

    Authors: Sai Kiran S Srinivas Likhith R P Swarna Latha

  75. Fog Networks: A Prospective Technology for IoT

    Authors: Urooj Yousuf Khan Tariq Rahim Soomro

  76. He role of social media during COVID–19 pandemic situation and Domestic violence: Its impacts on Pakistan Society

    Authors: Qamar Ayaz Mirani Azeem Ayaz Mirani Muhammad Suleman Memon Rozina Chohan Mumtaz Qabulio

  77. IOT Framework for Heart Diseases Prediction Using Machine Learning

    Authors: BALJINDER KAUR

  78. The Importance of Ethical Hacking Tools and Techniques in Software Development Life Cycle

    Authors: Syed Zain ul Hassan Saleem Zubair Ahmad

  79. Lung Cancer Detection Using Chi-Square Feature Selection and Support Vector Machine Algorithm

    Authors: Vikas Prabhpreet Kaur

  80. Credit Card Fraud Detection using Imbalance Resampling Method with Feature Selection

    Authors: Kajal Kamaljit Kaur

  81. Credit Card Fraud Detection using Imbalance Resampling Method with Feature Selection

    Authors: Javairya Nadeem Arfan Ali Nagra Muhammad Asif Aqsa Iftikhar

  82. Optimization of Factorial Design with the type of Plackett-Burman Design to Study the Effects of Organic Rice Production Process: First Step Experiment

    Authors: B. Surapong P. Suwattanarwong

  83. Optimization of Factorial Design with the type of Plackett-Burman Design to Study the Effects of Organic Rice Production Process: Second Step Experiment

    Authors: P. Suwattanawong B. Surapong

  84. Deep Learning Network Anomaly-Based Intrusion Detection Ensemble For Predictive Intelligence To Curb Malicious Connections: An Empirical Evidence

    Authors: Arnold Adimabua Ojugo Elohor Ekurume

  85. Empirical Evidence of Socially-Engineered Attack Menace Among Undergraduate Smartphone Users in Selected Universities in Nigeria

    Authors: Arnold Adimabua Ojugo Andrew Okonji Eboka

  86. Using ML and Data-Mining Techniques in Automatic Vulnerability Software Discovery

    Authors: Imdad Ali Shah Samina Rajper Noor ZamanJhanjhi

  87. Virtualization Security in Cloud Computing- A Survey

    Authors: A. Rafique Usman Nawaz Namra Waheed Muhammad Sama Yousaf

  88. Guidance and Counseling Record Management System

    Authors: Rachel T. Alegado Almon M. Alegado Gloria M. Alcantara

  89. CAPTCHA Design: A Novel Security Method using Sindhi Language

    Authors: Abdullah Maitlo Riaz Ahmed Shaikh Haque Nawaz Asad Hameed Soomro Samar Abbas Mangi Inayatullah Soomro

  90. Analysis of authorship attribution technique on Urdu tweets empowered by machine learning

    Authors: Zain Ali Arfan Ali Nagra Zufishan Hameed Muhammad Asif

  91. Understanding the Agricultural Systems Modeling: A Review

    Authors: Adeel Ahmad Memoona Shehzadi Syed Aftab Wajid Rana Muhammad Javed Ghafoor Naveed Akhtar Muhammad Shafqat Nida Mahreen Rashad-Ul-Sher

  92. Implementation of Selection Sort Algorithm in Various Programming Languages

    Authors: Arisha Naz Haque Nawaz Abdullah Maitlo Syed Muhammad Hassan

  93. An Approach on MCSA-Based Fault Detection Using Discrete Wavelet Transform and Fault Classification Based on Deep Neural Networks

    Authors: Muhammad Zuhaib Faraz Ahmed Shaikh Usman Ahmed Shaikh Asadullah Soomro

  94. A Methodology for Incorporating Quality Assurance Practices during Software Development Life Cycle

    Authors: Eraj Laaraib Zulfikar Ahmed Maher Zulfiqar Ali Solangi Muhammad Yaqoob Koondhar Mukhtiar Memon MansoorHyder Depar Asadullah Shah

  95. Adaptive Auditory Feedback Mechanism of Visual Impaired

    Authors: Waqas Saeed Hafiz M Mudassar Khan Sajid Rehman Babar Akbar Ali

  96. APSSR: Adaptive Packet Size Selection Based Routing Protocol for Underwater Acoustic Sensor Networks

    Authors: Sajid Rehman Babar Waqas Saeed Hafiz M Mudassar Khan Akbar Ali

  97. Implementation Based Approach to analyze MPLS and Segment Routing Traffic by Using ODL SDN Controller

    Authors: Waqas Saeed Davide Adami Sajid Rehman Babar Akbar Ali

  98. FPGA Seven-Segment-Display by Using Altera DE2-115 Board with Practice and Implementation

    Authors: Waqas Saeed Luca Valcarenghi Hafiz M Mudassar Khan Maria Zuriaz Sajid Rehman Babar Akbar Ali

  99. Survey on Transaction Verification Model based on Blockchain Architecture

    Authors: Waqas Saeed Dr Majid Husain Hafiz M Mudassar Khan Akbar Ali Sajid Rehman Babar

  100. Impact of Excessive Usage of Smartphone in Kids

    Authors:

  101. State of the Art Robotics for Combating with COVID-19 Pandemic

    Authors: Muhammad Ibrar Muhammad Asif Muhammad Kashif Naveed Imran Sana Hameed Mubashir Ali

  102. Speech Recognition System (Home Appliances Controller of Local & Remote System) using LPC & HMMs Methodologies

    Authors: Nadeem Ahmed Kanasro Shazia Samoon Mujeeb-U-Rehman Jamali Fiaz Ahmed Memon Shahmurad Chandio

  103. Implementation of Selection Sort Algorithm in Various Programming Languages

    Authors: Arisha Naz Haque Nawaz Abdullah Maitlo Syed Muhammad Hassan

  104. The Impact of Information and Communication Technology and Social Mediain HEIs: A Review

    Authors: Nimra Afzal Zaira Hassan Hina Bhanbhro Momina Ali Kinza Bisharat Ali Neelam Baloch

  105. Adaptive Educational Hypermedia Systems: A Systematic Review

    Authors: Saima Shoro Riaz Ahmed Shaikh Sadia Anwar Aisha Anwar Sajid Hussain Danwar

  106. Analysis Of Session Initiation Protocol With VoIP In Multimedia Conferencing System

    Authors: Muhammad Adnan Kaim Khani Malook Rind Asif Ali Wagan Abdul Hafeez Shaikh Mansoor Hyder Depar Raheel Sarwar Abida Luhrani Humair Nawaz Zeeshan Ahmed

  107. IoT Based Smart Home Automation using Wireless Power Transfer

    Authors: Anis Khan Chandar Kumar Dr Zahid Ali Asad Ali Vengas Memon Syed Yasir Shah

  108. Designing Threat Detection Model for Emerging Software Platform

    Authors: Saima Shoro Samina Rajper Aisha Anwar Sadia Anwar Abdul Basit Shaikh

  109. Assessment of Default Risk Factors in the Disbursement of Home Loans

    Authors: Zafar Nasir Zeeshan Ahmed Chaman Lal

  110. Cyber Attacks Impacting on Communication Using Social Media: Systematic Review Using Data Cluster Ball

    Authors: Saima Shoro Abdullah Maitlo Haque Nawaz Inayatullah Soomro Allah Dino

  111. Pizza Dough Service Provider at Various Area Followed by Depth-First Search Algorithm

    Authors: Ambreen Dr Kausar Qureshi Dure Shahwar

  112. An Analysis on Measuring Graph patterns in Social Networks

    Authors: Riaz Ahmed Shaikh Noor Ahmed Shaikh Muhammad Hanif Tunio Yumna Magsi Sajid Ahmed Ghangro Saima Shoro

  113. Impact of Ultra-Wideband Antenna Application on Underground Object Detection

    Authors: Zahid Ali Ghulam Abid Chandar Kumar Vengas Memon Aysha Siddiqui

  114. Sindhi Stemmer using Affix Removal Method

    Authors: Ambreen A. Sattar Suhni Abbasi Mutee U Rahman Amber Baig Masroor Nizamani

  115. New Models for Estimation of Solar Radiation for Five Cities of Pakistan

    Authors: Atteeq Razzak Zaheer Uddin M. Jawed Iqbal

  116. Impact of COVID-19 on publics Internet and TV Watching behavior: A cross-national Study

    Authors: Hamza Rehman Butt Dr Shahid Minhas Aysha Anwar Kiran Sajid

  117. Iot Based Smart Kit For Coal Miners Safety Purpose

    Authors: Syed Faiz Ul Huda Chandar Kumar Muhammad Ali Noman Syed Yasir Shah Muhammad Mubashir Iqbal

  118. Implementation of Wireless Sensor Technologies using virtual wire library for controlling alternative current appliances

    Authors: Mujeeb-ur-Rehman Jamali ShaziaSamoon Nadeem A. Kanasro Farhan Bashir Shaikh Fiaz Ahmed Memon Ghulam Nabi Rajper

  119. Intelligent Hybrid Fraud Detection Using Biometric and Face Recognition

    Authors: Hafiz Muhammad Tayyab Khushi Tehreem Masood Arfan Jaffar

  120. Machine Learning Empowered Urdu Characters Recognition Mechanism

    Authors: Ayima Zahra Maneeba Ashrafl; Muhammad Sohaib

  121. Towards Covid-19 Detection in X-ray images using Convolutional Neural Network

    Authors: Marium Malik Tehreem Masood Maira Kamran

  122. Predictive modeling to Study Lung Cancer Metastasis

    Authors: Muhammad Junaid Iqbal Abid Ali Usman Ahmed Raza Usman Nawaz Yawar Ahmed Sana Mujahid

  123. Python program to generate spherical harmonic

    Authors: Kousar Shaheen Roohi Zafar Saba Javaid

  124. BBVPL: A Block-Based Visual Programming Language Built on Google’s Blockly

    Authors: Ashfaq Ahmad Muhammad Idrees Muhammad Arif Butt Hafiz Muhammad Danish

  125. Comparative Analysis: Intrusion Detection in Multi-Cloud Environment to Identify Way Forward

    Authors: Hafiz Hasan Naqvi Tahir Alyas Nadia Tabassum Umer Farooq Abdallah Namoun Syed Aun M. Naqvi

  126. Photovoltaic Integrated Distributed Energy Generation System for Sustainable Energy Development Considering Reliability Indices and Levelized Cost of Energy

    Authors: Muhammad Tamoor Muhammad Abu Bakar Tahir Muhammad Ans Zaka

  127. The Role of Machine Learning to Mitigate the Malicious Crime

    Authors: Imdad Ali Shah Dr.Noor Ahmed Shaikh SqnLdr R Aneela Kiran Shahid Hussain Danwar Raja Majid Ali Ujjan

  128. IOT Based Smart System for Servival Detection in Disasters Zones

    Authors: Muhammad Hammad-u-Salam Zahoor Hussain Shunaila Jabeen

  129. Energy-Efficient Routing Protocols for WSN: A Systematic Literature Review

    Authors: Muhammad Shahzeb Ali Ansar Munir Shah Mubashir Hussain Malik Ahmed Raza Mohsin Maira Khalid

  130. Towards Silver Standard Dependency Treebank of Urdu Tweets

    Authors: Amber Baig Mutee U Rahman Sirajuddin Qureshi Saima Tunio Sehrish Abrejo Shadia S. Baloch

  131. Software Development and Modelling for Churn Prediction Using Logistic Regression in Telecommunication Industry

    Authors: Syed Zain Mir Azfar Ghani Sajid Yasin AzeemAftab Ikram e Khuda

  132. Comparative Analysis of Software Process Models in Software Development

    Authors: Sajid Ahmed Ghanghro Muhammad Ajmal Sawand Wajid Ahmed Channa Ubaidulla alias Kashif Muhammad Hanif Tunio Kishor Kumar Nooruddin

  133. Performance Analysis of Internet Streams using Remote Desktop Tools

    Authors: Vengas Memon Dr Zahid Ali Chandar Kumar Rafay Rushail Areeb Anis Khan Asad Ali Siyal

  134. A Study on Use of WhatsApp Messenger among Students for their Academic Achievements: A Case Study

    Authors: Zeeshan Ali Rahu Hina Bhanbhro Rozina Chohan Hosh Muhammad

  135. A Comparative Study of Various Machine Learning Algorithms in Fog Computing

    Authors: Urooj Yousuf Khan Muhammad Mansoor Alam

  136. An Evolutionary Approach of Machine Learning for Monitoring Churn Prediction of Broadband Customer

    Authors: Imran Pathan Nadeem Ahmed Kanasro Farhan Bashir Shaikh Mujeeb U Rehman Maree Aftab A. Chandio

  137. Post Pandemic World and Challenges for E-Governance Framework

    Authors: Syed Aun M. Naqvi Tahir Alyas Nadia Tabassum Abdallah Namoun Hafiz Hasan Naqvi

  138. Categorization of CVE Based on Vulnerability Software By Using Machine Learning Techniques

    Authors: SqnLdr R Aneela Kiran Dr.Samina Rajper Riaz Ahmed Shaikh Imdad Ali Shah Shahid Hussain Danwar

  139. Performance Optimization of network using load balancer Techniques

    Authors: Waleed Khalid Muhammad Waseem Iqbal Tahir Alyas Nadia Tabassum Nida Anwar Muhammad Asif Saleem

  140. The Promises of Blockchain and Cryptocurrencies Technology for Architecture and Interaction Design

    Authors: Hafiz M Mudassar Khan Waqas Saeed M Waseem Iqbal Akbar Ali Maria Zuraiz M Naveed Shahzad M Ahmed