default search action
FIT 2019: Islamabad, Pakistan
- International Conference on Frontiers of Information Technology, FIT 2019, Islamabad, Pakistan, December 16-18, 2019. IEEE 2019, ISBN 978-1-7281-6625-4
- Abdul Qayum, Abdul Razzaq:
The Impact of Features on Feature Location. 1-6 - Kanwal Batool, Irum Inayat:
An Empirical Investigation on Requirements Change Management Practices in Pakistani Agile Based Industry. 7-12 - Syed Manzar Abbas, Khubaib Amjad Alam, Umer Iqbal, Sahar Ajmal:
Quality Factors Enhancement of Requirement Engineering: A Systematic Literature Review. 13-18 - Muhammad Bilal Khan, Sohaib Manzoor, Hira Manzoor, M. D. Samiul Islam:
A Collaborative Computation Offloading Scheme for 5G Heterogeneous Networks. 19-24 - Muhammad Zeeshan Babar, Syed Ibrar Ali Shah, Yasir Awais Butt:
NMPC Based Trajectory Tracking Control for Nonholonomic Wheeled Mobile Robots. 25-30 - Muhammad Haseeb, Muhammad Usman, Shabbir Majeed Chaudhry:
Design of a Feedback Loop Circuit for Quadrature Error Correction in 90-nm CMOS. 31-335 - Arif Husen, Imran Raza, Syed Asad Hussain:
Erlang Based Server Selection Scheme Using Software Defined Networking in Datacenter for Energy Conservation. 36-41 - Syed Umair Aslam Shah, M. Kashif Manzoor, Rana M. Amir Latif, Muhammad Farhan, M. Imran Ashiq:
A Novel Routing Protocol Based on Congruent Gravity Value for Underwater Wireless Sensor Networks. 42-48 - Rana M. Amir Latif, Laiqa Binte Imran, Muhammad Farhan, Mohamed Jaward Bah, Ghazanfar Ali, Yawar Abbas Abid:
Real-Time Simulation of IoT Based Smart Home Live Mirror using WSN. 49-54 - Talat Nazir:
Comparison of Water Flows between Various Channels Under Different Circumstances. 55-60 - Talat Nazir, Sohail Ahmad Awan, Bahadar Nawab Khattak:
Numerical Modeling of One Dimensional Unsteady Flow in Parabolic Channel. 61-64 - Arslan Ali, Ayesha Hanif, Arsalan Tahir, Hafiz Umar Iftikhar, Huma Shehwana, Mehak Rafiq:
A Machine Learning-Based Comparative Study for the Classification of Septic Shock Using Microarray Gene Expression Data. 65-70 - Hammad Ur-Rehman, Sana Mujeeb, Nadeem Javaid:
DCNN and LDA-RF-RFE Based Short-Term Electricity Load and Price Forecasting. 71-76 - Wajih Ullah Baig, Umar Munir, Adeel Ejaz, Kashif Sardar:
Minutia Texture Cylinder Codes for Fingerprint Matching. 77-82 - Farhana Siddique, Talha Iqbal, Sheryar Mehmood Awan, Zahid Mahmood, Gul Zameen Khan:
A Robust Segmentation of Blood Vessels in Retinal Images. 83-88 - Fareah Tariq, Qudsia Amjad, Areeba Kamran, Arshad Hassan, Rashid Karim:
A Flexible Antenna on Cost-Effective PEN Substrate for Sub-6 GHz 5G Wireless Transceivers. 89-94 - Muhammad Umar Khan, Sumair Aziz, Asra Malik, Muhammad Atif Imtiaz:
Detection of Myocardial Infarction using Pulse Plethysmograph Signals. 95-100 - Muhammad Shafiq, Qinghua Zhang, Muhammad Azeem Akbar:
Software Requirements Engineering Maturity Model (SREMM) in Offshore Software Development Outsourcing. 101-104 - Sadia Ali, Yaser Hafeez:
Enabling Test Case Prioritization For Component Based Software Development. 105-109 - Mir Muneeb Ullah, Uzair Hafeez, Muhammad Naeem Shehzad, Muhammad Naeem Awais, Haroon Elahi:
A Soft Robotic Glove for Assistance and Rehabilitation of Stroke Affected Patients. 110-115 - Sheraz Aslam, Herodotos Herodotou, Nasir Ayub, Syed Muhammad Mohsin:
Deep Learning Based Techniques to Enhance the Performance of Microgrids: A Review. 116-121 - T. Mohanarajah, Jamal Rizk, Ali Hellany, Mahmood Nagrial:
Design of Permanent Magnet Assisted Synchronous Reluctance Machines with Rare-Earth Magnets. 122-126 - Asif Khan, Nadeem Javaid:
Optimum Sizing of PV-WT-FC-DG Hybrid Energy System using Teaching Learning-Based Optimization. 127-132 - Noman Islam:
A Secure Service Discovery Scheme for Mobile ad hoc Network using Artificial Deep Neural Network. 133-138 - Hassan Jalil Hadi, Syed Muhammad Sajjad, Khaleeq un Nisa:
BoDMitM: Botnet Detection and Mitigation System for Home Router Base on MUD. 139-143 - Suneela Pasha, Shahzad Saleem:
Forensics Analysis of Wish-Shopping Made Fun Application on Android. 144-149 - Mukhtar Hussain, Ernest Foo, Suriadi Suriadi:
An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection. 150-155 - Ghulam Rasool, Hassan Akhtar:
Towards A Catalog of Design Patterns Variants. 156-161 - Muhammad Hammad, Irum Inayat, Maryam Zahid:
Risk Management in Agile Software Development: A Survey. 162-166 - Muhammad Zeeshan Asghar, Khubaib Amjad Alam, Shahzeb Javed:
Software Design Patterns Recommendation : A Systematic Literature Review. 167-172 - Nauman H. Khan, Khurram S. Khattak, Shaukat Ullah, Zawar H. Khan:
A Low-Cost IoT Based System for Environmental Monitoring. 173-178 - Waqas Ali, Ghulam Abbas, Ziaul Haq Abbas:
Joint Sybil Attack Prevention and Energy Conservation in Wireless Sensor Networks. 179-184 - Sayed Shahid Hussain, Khurram S. Khattak, Ali Khan, Zawar H. Khan:
Cyber Physical System for Solar Energy Monitoring. 185-190 - Asra Rafi, Sana Mujeeb, Nadeem Javaid:
ERBFNN Based Electricity Load and Price Forecasting. 191-196 - Kumail Abbas, Sajjad Haider:
Duckworth-Lewis-Stern Method Comparison with Machine Learning Approach. 197-202 - Tania Iram, Jawwad Shamsi, Usama Alvi, Saif Ur Rahman, Muhammad Maaz:
Controlling Smart-City Traffic using Machine Learning. 203-208 - Abrar Ahmed, Ahmad Jalal, Kibum Kim:
Region and Decision Tree-Based Segmentations for Multi-Objects Detection and Classification in Outdoor Scenes. 209-214 - Syyam Noor, Muhammad Hasham, Zulfiqar Habib, Allah Bux Sargano:
Real-Time Rehabilitation and Fitness System using Depth Sensor. 215-220 - Saira Jabeen, AbdulGhaffar Malkana, Ali Farooq, Muhammad Usman Ghani Khan:
Weather Classification on Roads for Drivers Assistance using Deep Transferred Features. 221-226 - Shiza Andleeb, Rashid Ahmed, Zaheer Ahmed, Maira Kanwal:
Identification and Classification of Cybercrimes using Text Mining Technique. 227-232 - Muhammad Waheed Akram, Muhammad Zaid, Naveed Ahmed, Shahzad Saleem:
Security Against Compromised Servers: Verifiable DB Queries. 233-238 - Muhammad Zaid, Muhammad Waheed Akram, Naveed Ahmed, Shahzad Saleem:
Web Server Integrity Protection Using Blockchain. 239-244 - Muhammad Umar Sattar, Rana Asif Rehman:
Interest Flooding Attack Mitigation in Named Data Networking Based VANETs. 245-249 - Shahid Abbas, Nadeem Javaid:
Blockchain Based Vehicular Trust Management and Less Dense Area Optimization. 250-261 - Ali Irfan, Arif Ur Rahman:
Tracking the Ripple Impact of Code Changes through Version Control Systems. 262-265 - Tehreem Ashfaq, Nadeem Javaid:
Short-Term Electricity Load and Price Forecasting using Enhanced KNN. 266-271 - Sumair Aziz, Muhammad Umar Khan, Foha Aamir, Muhammad Arshad Javid:
Electromyography (EMG) Data-Driven Load Classification using Empirical Mode Decomposition and Feature Analysis. 272-277 - Hira Imtiaz, Muhammad Haroon Yousaf, Hassan Sajjad Malik, Muhammad Ali Akhtar:
Design and Implementation of Receiver Autonomous Integrity Monitoring Algorithm on DSP for Small UAV Applications. 278-283 - Imran Ali, Huo Yingge, Muhammad Riaz ur Rehman, Muhammad Asif, Kang-Yoon Lee:
Design of Configurable Digital Spike Filtering Circuits in 130 nm CMOS Process. 284-286 - Naseer Aslam, Bilal Tahir, Hafiz Muhammad Shafiq, Muhammad Amir Mehmood:
Web-AM: An Efficient Boilerplate Removal Algorithm for Web Articles. 287-292 - Sara Rehmat, Usman Ali Shah, Suhail Yousaf:
Heterogeneous 2-Phase Method for Strongly Connected Components Detection and Classification of Graphs. 293-298 - Khan Farhan Rafat:
K-Anonymity without the Prior Value of the Threshold k: Revisited. 299-303 - Saba Latif, Aniqa Rehman, Nazir Ahmad Zafar:
Blockchain and IoT Based Formal Model of Smart Waste Management System Using TLA+. 304-309 - Umar Draz, Tariq Ali, Sana Yasin:
Comparative Analysis of Different Light Intensities for Implementation Idea of Li-Fi for CPEC. 310-315 - Zeyad A. Al-Odat, Assad Abbas, Samee U. Khan:
Randomness Analyses of the Secure Hash Algorithms, SHA-1, SHA-2 and Modified SHA. 316-321 - Syed Aftab Rashid:
Server Based Task Allocation to Reduce Inter-Task Memory Interference in Multicore Systems. 322-327 - Shah Khusro, Badam Niazi, Akif Khan, Iftikhar Alam:
Evaluating Smartphone Screen Divisions for Designing Blind-Friendly Touch-Based Interfaces. 328-333 - Iftikhar Alam, Shah Khusro, Mumtaz Khan:
Usability Barriers in Smart TV User Interfaces: A Review and Recommendations. 334-338 - Sehrish Rafiq, Shah Khusro, Nosheen Fayyaz:
Discovering Semantic Relationships Among PDF Book Figures Using Contextual and Visual Similarity. 339-344 - Awais Azam, Khubaib Amjad Alam, Areeba Umair:
Spreadsheet Smells: A Systematic Mapping Study. 345-350 - Muhammad Umar Javed, Nadeem Javaid:
Scheduling Charging of Electric Vehicles in a Secured Manner using Blockchain Technology. 351-356 - Haad Ali, Tamim Ahmed Khan:
On Fault Localization Using Machine Learning Techniques. 357-362 - Tehseen Afzal, Aamer Nadeem, Muddassar A. Sindhu, Qamar uz Zaman:
Test Case Prioritization Based on Path Complexity. 363-369
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.