Abstract is missing.
- Model Identification and Control of a Lab Based Inverted Pendulum System Using Robust Control TechniqueAnila Barkat, Athar Hanif, Mirza Tariq Hamayun. 1-6 [doi]
- Modelling of Graph-Based Smart Parking System Using Internet of ThingsSaba Latif, Hamra Afzaal, Nazir Ahmad Zafar. 7-12 [doi]
- Robust Sliding Mode Speed Control of Vehicle Engine SystemMuhammad Jamshed Abbas, Haris Sheh Zad, Muhammad Awais, Waqar Ali. 13-18 [doi]
- Intelligent Speed Controller Design for Brushless DC MotorAbasin Ulasyar, Haris Sheh Zad, Adil Zohaib. 19-23 [doi]
- Dynamic Testing of C Program Interfaces Based on FSM ModelingMuhammad Sajjad, Muhammad Wasim, Muzammil Shahbaz, Kashif Saghar, Muhammad Usman Ghani Khan. 24-29 [doi]
- An Experimental Tool for Search-Based Mutation TestingMuhammad Bilal Bashir, Aamer Nadeem. 30-34 [doi]
- A Systematic Literature Review: Software Requirements Prioritization TechniquesMuhammad Sufian, Zirak Khan, Saad Rehman, Wasi Haider Butt. 35-40 [doi]
- Integrated Security Model for Managing the Security Non-functional Requirements at Architectural Design of Internet-Based SystemsMuhammad Babar, Shahid Azeem, Fahim Arif, Waseem Iqbal. 41-46 [doi]
- Heuristic Path-Reconfiguration Algorithm Using Multi-hop Opportunistic Routing in WSNsMuhammad Asad, Muhammad Aslam. 47-52 [doi]
- E-HOSA: Extended-Hybrid Optical Switch Architecture for Cloud Computing Data CentersSamina Lone, Muhammad Usman, Muhammad Imran. 53-58 [doi]
- A Fog-Assisted Architecture to Support an Evolving Hospitality Industry in Smart CitiesPrasanna Kansakar, Arslan Munir, Neda Shabani. 59-64 [doi]
- Optimized Pricing & Scheduling Model for Long Range Autonomous Valet ParkingMuhammad Khalid, Yue Cao, Nauman Aslam, Chakkaphong Suthaputchakun, Muhammad Arshad, Waqar Khalid. 65-70 [doi]
- Automated Feature Synthesis from Relational Database for Data Science Related ProblemsAfifa Fatima, Faizan Ali Khan, Aneeq Raza, Abdul Basit Kamran. 71-75 [doi]
- Internet Traffic Analysis of an Educational Network using Bro IDSHafiz Muhammad Shafiq, Muhammad Amir Mehmood. 76-81 [doi]
- Color Image Enhancement Using Multiscale Retinex with Guided FilterHaleema Sadia, Fazal Azeem, Hidayat Ullah, Zahid Mahmood, Shahid Khattak, Gul Zameen Khan. 82-87 [doi]
- Cross Lingual Speech Emotion Recognition: Urdu vs. Western LanguagesSiddique Latif, Adnan Qayyum, Muhammad Usman, Junaid Qadir. 88-93 [doi]
- Enhancement of Visible Light Communication Transceiver using LDPC CodesArslan Khalid, Mehmood Ahmad, Nesruminallah Khan, Assad Ali. 94-98 [doi]
- Mesh of SSVEP-Based BCI and Eye-Tracker for Use of Higher Frequency Stimuli and Lower Number of EEG ChannelsAbdul Saboor, Mihaly Benda, Aya Rezeika, Roland Grichnik, Felix Gembler, Piotr Stawicki, Ivan Volosyak. 99-104 [doi]
- Wearable Sensor-Based Human Behavior Understanding and Recognition in Daily Life for Smart EnvironmentsAhmad Jalal, Majid Ali Khan Quaid, Abdul S. Hasan. 105-110 [doi]
- Design of an Efficient Single-Stage and 2-Stages Class-E Power Amplifier (2.4GHz) for Internet-of-ThingsAyyaz Ali, Syed Waqas Haider Shah, Khalid Iqbal. 111-116 [doi]
- Support Vector Machine and Gaussian Process Regression Based Modeling for Photovoltaic Power PredictionSidra Kanwal, Bilal Khan, Sahibzada Muhammad Ali, Chaudhary Arshad Mehmood, Muhammad Qasim Rauf. 117-122 [doi]
- Unsupervised Event Detection and On-Off Pairing Approach Applied to NILMArfa Yasin, Shoab Ahmed Khan. 123-128 [doi]
- A Supervised Machine Learning Based Approach for Automatically Extracting High-Level Threat Intelligence from Unstructured SourcesYumna Ghazi, Zahid Anwar, Rafia Mumtaz, Shahzad Saleem, Ali Tahir. 129-134 [doi]
- Enhanced Secure Mechanism for Virtual Machine Migration in CloudsKanwal Janjua, Waris Ali. 135-140 [doi]
- Smart Phone Based Early Intervention Framework for Intellectually Disable Children of PakistanTahreem Yasir. 146-151 [doi]
- Comparing Spectrum Based Fault Localisation Against Test-to-Code Traceability LinksGulsher Laghari, Kamran Dahri, Serge Demeyer. 152-157 [doi]
- Integrating Risk Management in Scrum FrameworkMuhammad Hammad, Irum Inayat. 158-163 [doi]
- From Traditional to Technologically Influenced Audit: A Compliance PerspectiveFaiza Allah Bukhsh, PatrĂcio de Alencar Silva, Bilal Allah Bukhsh, Sumaiya Syed. 164-169 [doi]
- Functionality, Performance, and Compatibility Testing: A Model Based ApproachNajam us Saqib, Sara Shahzad. 170-175 [doi]
- Congestion Control Through Dynamic Access Class Barring for Bursty MTC Traffic in Future Cellular NetworksSyed Waqas Haider Shah, Ahmad Talal Riaz, Khalid Iqbal. 176-181 [doi]
- Real Time Fixed Point Adaptive Chaotic System Generator for Deep Brain Stimulation Using FPGASyed Aamir Ali Shah, Lei Zhang, Abdul Bais. 182-187 [doi]
- Efficient Resource Utilization in Cloud-Fog Environment Integrated with Smart GridsJunaid Akram, Zeeshan Najam, Arslan Rafi. 188-193 [doi]
- Elective Learning Objects Group Recommendation Using Non-Cooperative Game TheoryAsad Zia, Muhammad Usman. 194-199 [doi]
- State of Art Techniques for Social Influence Analysis: A Systematic Literature ReviewSadia Majeed, Usman Qamar, Aftab Farooq. 200-205 [doi]
- Analyzing Excessive user Feedback: A Big Data ChallengeFaiza Allah Bukhsh, Jeewanie Jayasinghe Arachchige, Furqan Malik. 206-211 [doi]
- Generating Abstractive Summaries Using Sequence to Sequence Attention ModelTooba Siddiqui, Jawwad Ahmed Shamsi. 212-217 [doi]
- Robust Spatio-Temporal Features for Human Interaction Recognition Via Artificial Neural NetworkMaria Mahmood, Ahmad Jalal, M. A. Sidduqi. 218-223 [doi]
- Integration of Speech/ Music Discrimination and Mood Classification with Audio Feature ExtractionMohsin Ashraf, Guohua Geng, Xiaofeng Wang, Farooq Ahmad. 224-229 [doi]
- A Recommendation System using Interviewers Preferences for Ranked Candidate SelectionShiza Hammad, Shabbir Ahmed, Muhammad Azeem Abbas, Iqra Abbasi, Taha Jillani. 230-234 [doi]
- Historical Manuscript Dating using Textural MeasuresAnmol Hamid, Maryam Bibi, Imran Siddiqi, Momina Moetesum. 235-240 [doi]
- STIXGEN - A Novel Framework for Automatic Generation of Structured Cyber Threat Informationzafar iqbal, Zahid Anwar, Rafia Mumtaz. 241-246 [doi]
- Prevention of Timing Attack in Software Defined Named Data Network with VANETsAhmed Arsalan, Rana Asif Rehman. 247-252 [doi]
- Detection and Resolving WSN Issues with the use of Data Mining & Intelligent AlgorithmsMohsin Ashraf, Guohua Geng, Xiaofeng Wang, Farooq Ahmad. 253-258 [doi]
- APEnergy: Application Profile-Based Energy-Efficient Framework for SaaS CloudsBasit Qureshi, Anis Koubaa. 265-270 [doi]
- UWB Circular Monopole Antenna with Fractal Slots for Triple Band-Notch CharacteristicsKiran Nadeem, Zeeshan Ahmed, Iram Nadeem, Ferdows B. Zarrabi, Khurram Alimgeer. 271-274 [doi]
- Techno-Economic Study of Electricity Generation from Wind at Kallar-Kahar Region in PakistanTanvir Ahmed, Mazhar Ali, Dawar Awan. 275-280 [doi]
- Tuning Free DPC for ETO-Based MMC-HVDC System with Unbalance Fault-Ride-Through CapabilityAhmad Kamal, Abdul Basit. 281-286 [doi]
- A Framework for Cardboard Based Augmented RealityRameez Rehman Syed, Shahzad Rasool. 287-292 [doi]
- Lexicon and Heuristics Based Approach for Identification of Emotion in TextJunaid Akram, Arsalan Tahir. 293-297 [doi]
- Object Size Measurement through Images: An Application to Measuring Human Foot SizeMuhammad Ahmad Shahid, Muhammad Aksam Iftikhar, Zaheer Ahmad Gondal, Muhammad Adnan, Saima Rathore. 298-302 [doi]
- CUIF: Control of Useless Interests Flooding in Vehicular Named Data NetworksMuhammad Usman Tahir, Rana Asif Rehman. 303-308 [doi]
- Power Management Techniques in Popular Operating Systems for IoT DevicesRizwan Hamid Randhawa, Adeel Ahmed, Muhammad Ibrahim Siddiqui. 309-314 [doi]
- Security Requirements Engineering: A Framework for Cyber-Physical SystemsShafiq-Ur Rehman, Christopher Allgaier, Volker Gruhn. 315-320 [doi]
- Towards Formal Modeling of Hotspot Issue by Watch-Man Nodes in Wireless Sensor and Actor NetworkMuhammad Umar Draz, Tariq Ali, Sana Yasin, Umair Waqas. 321-326 [doi]
- Security for Machine Learning-Based Systems: Attacks and Challenges During Training and InferenceFaiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Muhammad Shafique 0001. 327-332 [doi]
- Mitigation and Improving SHA-1 Standard Using Collision Detection ApproachZeyad Al-Odat, Mazhar Ali, Samee U. Khan. 333-338 [doi]
- The Control of Various Channels Water FlowsTalat Nazir. 339-344 [doi]
- AquaEye: A Low Cost Flood Early Warning System for Developing CountriesRizwan Hamid Randhawa, Rashid Mahmood, Tahir Ahmad. 345-349 [doi]
- Wastewater Treatment Method Selection for Pulp and Paper IndustryTanzila Younas, Nasreen Bano, Warisha Zafar, Usama Qadir. 350-354 [doi]
- Fitness-Based Acceleration Coefficients to Enhance the Convergence Speed of Novel Binary Particle Swarm OptimizationYasir Mehmood, Marium Sadiq, Waseem Shahzad, Faryal Amin. 355-360 [doi]
- Performance Comparison of Chunk and Peer Scheduling Algorithms of Peer-to-Peer Streaming SystemsSyed Saddam Hussain Shah, Naina Said, Aysha Nayab, Waleed Khan, Zaryab Ali Shinwari, Muhammad Jawwad, Nasru Minallah. 361-366 [doi]
- Enhanced Adaptive Geographic Opportunistic Routing with Interference Avoidance Assisted with Mobile Sinks for Underwater Wireless Sensor NetworkTalha Naeem Qureshi, Nadeem Javaid. 367-372 [doi]