


default search action
FIT 2019: Islamabad, Pakistan
- International Conference on Frontiers of Information Technology, FIT 2019, Islamabad, Pakistan, December 16-18, 2019. IEEE 2019, ISBN 978-1-7281-6625-4

- Abdul Qayum

, Abdul Razzaq:
The Impact of Features on Feature Location. 1-6 - Kanwal Batool, Irum Inayat:

An Empirical Investigation on Requirements Change Management Practices in Pakistani Agile Based Industry. 7-12 - Syed Manzar Abbas, Khubaib Amjad Alam

, Umer Iqbal, Sahar Ajmal:
Quality Factors Enhancement of Requirement Engineering: A Systematic Literature Review. 13-18 - Muhammad Bilal Khan, Sohaib Manzoor, Hira Manzoor, M. D. Samiul Islam:

A Collaborative Computation Offloading Scheme for 5G Heterogeneous Networks. 19-24 - Muhammad Zeeshan Babar

, Syed Ibrar Ali Shah, Yasir Awais Butt:
NMPC Based Trajectory Tracking Control for Nonholonomic Wheeled Mobile Robots. 25-30 - Muhammad Haseeb, Muhammad Usman

, Shabbir Majeed Chaudhry:
Design of a Feedback Loop Circuit for Quadrature Error Correction in 90-nm CMOS. 31-335 - Arif Husen

, Imran Raza, Syed Asad Hussain:
Erlang Based Server Selection Scheme Using Software Defined Networking in Datacenter for Energy Conservation. 36-41 - Syed Umair Aslam Shah, M. Kashif Manzoor, Rana M. Amir Latif

, Muhammad Farhan
, M. Imran Ashiq:
A Novel Routing Protocol Based on Congruent Gravity Value for Underwater Wireless Sensor Networks. 42-48 - Rana M. Amir Latif

, Laiqa Binte Imran, Muhammad Farhan
, Mohamed Jaward Bah, Ghazanfar Ali, Yawar Abbas Abid
:
Real-Time Simulation of IoT Based Smart Home Live Mirror using WSN. 49-54 - Talat Nazir

:
Comparison of Water Flows between Various Channels Under Different Circumstances. 55-60 - Talat Nazir

, Sohail Ahmad Awan, Bahadar Nawab Khattak:
Numerical Modeling of One Dimensional Unsteady Flow in Parabolic Channel. 61-64 - Arslan Ali, Ayesha Hanif, Arsalan Tahir, Hafiz Umar Iftikhar, Huma Shehwana, Mehak Rafiq

:
A Machine Learning-Based Comparative Study for the Classification of Septic Shock Using Microarray Gene Expression Data. 65-70 - Hammad Ur-Rehman, Sana Mujeeb

, Nadeem Javaid
:
DCNN and LDA-RF-RFE Based Short-Term Electricity Load and Price Forecasting. 71-76 - Wajih Ullah Baig, Umar Munir, Adeel Ejaz, Kashif Sardar:

Minutia Texture Cylinder Codes for Fingerprint Matching. 77-82 - Farhana Siddique, Talha Iqbal, Sheryar Mehmood Awan, Zahid Mahmood

, Gul Zameen Khan:
A Robust Segmentation of Blood Vessels in Retinal Images. 83-88 - Fareah Tariq, Qudsia Amjad, Areeba Kamran, Arshad Hassan, Rashid Karim:

A Flexible Antenna on Cost-Effective PEN Substrate for Sub-6 GHz 5G Wireless Transceivers. 89-94 - Muhammad Umar Khan

, Sumair Aziz
, Asra Malik, Muhammad Atif Imtiaz
:
Detection of Myocardial Infarction using Pulse Plethysmograph Signals. 95-100 - Muhammad Shafiq

, Qinghua Zhang, Muhammad Azeem Akbar
:
Software Requirements Engineering Maturity Model (SREMM) in Offshore Software Development Outsourcing. 101-104 - Sadia Ali, Yaser Hafeez:

Enabling Test Case Prioritization For Component Based Software Development. 105-109 - Mir Muneeb Ullah, Uzair Hafeez, Muhammad Naeem Shehzad, Muhammad Naeem Awais, Haroon Elahi:

A Soft Robotic Glove for Assistance and Rehabilitation of Stroke Affected Patients. 110-115 - Sheraz Aslam, Herodotos Herodotou, Nasir Ayub

, Syed Muhammad Mohsin
:
Deep Learning Based Techniques to Enhance the Performance of Microgrids: A Review. 116-121 - T. Mohanarajah, Jamal Rizk, Ali Hellany, Mahmood Nagrial:

Design of Permanent Magnet Assisted Synchronous Reluctance Machines with Rare-Earth Magnets. 122-126 - Asif Khan

, Nadeem Javaid
:
Optimum Sizing of PV-WT-FC-DG Hybrid Energy System using Teaching Learning-Based Optimization. 127-132 - Noman Islam

:
A Secure Service Discovery Scheme for Mobile ad hoc Network using Artificial Deep Neural Network. 133-138 - Hassan Jalil Hadi, Syed Muhammad Sajjad

, Khaleeq un Nisa:
BoDMitM: Botnet Detection and Mitigation System for Home Router Base on MUD. 139-143 - Suneela Pasha, Shahzad Saleem

:
Forensics Analysis of Wish-Shopping Made Fun Application on Android. 144-149 - Mukhtar Hussain

, Ernest Foo
, Suriadi Suriadi:
An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection. 150-155 - Ghulam Rasool, Hassan Akhtar:

Towards A Catalog of Design Patterns Variants. 156-161 - Muhammad Hammad, Irum Inayat, Maryam Zahid:

Risk Management in Agile Software Development: A Survey. 162-166 - Muhammad Zeeshan Asghar, Khubaib Amjad Alam

, Shahzeb Javed
:
Software Design Patterns Recommendation : A Systematic Literature Review. 167-172 - Nauman H. Khan, Khurram S. Khattak

, Shaukat Ullah, Zawar H. Khan
:
A Low-Cost IoT Based System for Environmental Monitoring. 173-178 - Waqas Ali, Ghulam Abbas, Ziaul Haq Abbas:

Joint Sybil Attack Prevention and Energy Conservation in Wireless Sensor Networks. 179-184 - Sayed Shahid Hussain, Khurram S. Khattak

, Ali Khan, Zawar H. Khan
:
Cyber Physical System for Solar Energy Monitoring. 185-190 - Asra Rafi, Sana Mujeeb

, Nadeem Javaid
:
ERBFNN Based Electricity Load and Price Forecasting. 191-196 - Kumail Abbas, Sajjad Haider

:
Duckworth-Lewis-Stern Method Comparison with Machine Learning Approach. 197-202 - Tania Iram, Jawwad Shamsi, Usama Alvi, Saif Ur Rahman, Muhammad Maaz:

Controlling Smart-City Traffic using Machine Learning. 203-208 - Abrar Ahmed

, Ahmad Jalal, Kibum Kim
:
Region and Decision Tree-Based Segmentations for Multi-Objects Detection and Classification in Outdoor Scenes. 209-214 - Syyam Noor, Muhammad Hasham, Zulfiqar Habib, Allah Bux Sargano:

Real-Time Rehabilitation and Fitness System using Depth Sensor. 215-220 - Saira Jabeen, AbdulGhaffar Malkana, Ali Farooq, Muhammad Usman Ghani Khan:

Weather Classification on Roads for Drivers Assistance using Deep Transferred Features. 221-226 - Shiza Andleeb, Rashid Ahmed, Zaheer Ahmed

, Maira Kanwal:
Identification and Classification of Cybercrimes using Text Mining Technique. 227-232 - Muhammad Waheed Akram, Muhammad Zaid, Naveed Ahmed, Shahzad Saleem

:
Security Against Compromised Servers: Verifiable DB Queries. 233-238 - Muhammad Zaid, Muhammad Waheed Akram, Naveed Ahmed, Shahzad Saleem

:
Web Server Integrity Protection Using Blockchain. 239-244 - Muhammad Umar Sattar

, Rana Asif Rehman
:
Interest Flooding Attack Mitigation in Named Data Networking Based VANETs. 245-249 - Shahid Abbas

, Nadeem Javaid
:
Blockchain Based Vehicular Trust Management and Less Dense Area Optimization. 250-261 - Ali Irfan, Arif Ur Rahman

:
Tracking the Ripple Impact of Code Changes through Version Control Systems. 262-265 - Tehreem Ashfaq, Nadeem Javaid

:
Short-Term Electricity Load and Price Forecasting using Enhanced KNN. 266-271 - Sumair Aziz

, Muhammad Umar Khan
, Foha Aamir
, Muhammad Arshad Javid:
Electromyography (EMG) Data-Driven Load Classification using Empirical Mode Decomposition and Feature Analysis. 272-277 - Hira Imtiaz, Muhammad Haroon Yousaf, Hassan Sajjad Malik, Muhammad Ali Akhtar:

Design and Implementation of Receiver Autonomous Integrity Monitoring Algorithm on DSP for Small UAV Applications. 278-283 - Imran Ali, Huo Yingge, Muhammad Riaz ur Rehman, Muhammad Asif, Kang-Yoon Lee:

Design of Configurable Digital Spike Filtering Circuits in 130 nm CMOS Process. 284-286 - Naseer Aslam, Bilal Tahir, Hafiz Muhammad Shafiq, Muhammad Amir Mehmood:

Web-AM: An Efficient Boilerplate Removal Algorithm for Web Articles. 287-292 - Sara Rehmat, Usman Ali Shah

, Suhail Yousaf
:
Heterogeneous 2-Phase Method for Strongly Connected Components Detection and Classification of Graphs. 293-298 - Khan Farhan Rafat:

K-Anonymity without the Prior Value of the Threshold k: Revisited. 299-303 - Saba Latif, Aniqa Rehman, Nazir Ahmad Zafar:

Blockchain and IoT Based Formal Model of Smart Waste Management System Using TLA+. 304-309 - Umar Draz, Tariq Ali, Sana Yasin:

Comparative Analysis of Different Light Intensities for Implementation Idea of Li-Fi for CPEC. 310-315 - Zeyad A. Al-Odat

, Assad Abbas
, Samee U. Khan
:
Randomness Analyses of the Secure Hash Algorithms, SHA-1, SHA-2 and Modified SHA. 316-321 - Syed Aftab Rashid:

Server Based Task Allocation to Reduce Inter-Task Memory Interference in Multicore Systems. 322-327 - Shah Khusro, Badam Niazi, Akif Khan, Iftikhar Alam:

Evaluating Smartphone Screen Divisions for Designing Blind-Friendly Touch-Based Interfaces. 328-333 - Iftikhar Alam, Shah Khusro, Mumtaz Khan

:
Usability Barriers in Smart TV User Interfaces: A Review and Recommendations. 334-338 - Sehrish Rafiq, Shah Khusro, Nosheen Fayyaz:

Discovering Semantic Relationships Among PDF Book Figures Using Contextual and Visual Similarity. 339-344 - Awais Azam, Khubaib Amjad Alam

, Areeba Umair:
Spreadsheet Smells: A Systematic Mapping Study. 345-350 - Muhammad Umar Javed

, Nadeem Javaid
:
Scheduling Charging of Electric Vehicles in a Secured Manner using Blockchain Technology. 351-356 - Haad Ali, Tamim Ahmed Khan:

On Fault Localization Using Machine Learning Techniques. 357-362 - Tehseen Afzal, Aamer Nadeem

, Muddassar A. Sindhu, Qamar uz Zaman:
Test Case Prioritization Based on Path Complexity. 363-369

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














