Abstract is missing.
- The Impact of Features on Feature LocationAbdul Qayum, Abdul Razzaq. 1-6 [doi]
- An Empirical Investigation on Requirements Change Management Practices in Pakistani Agile Based IndustryKanwal Batool, Irum Inayat. 7-12 [doi]
- Quality Factors Enhancement of Requirement Engineering: A Systematic Literature ReviewSyed Manzar Abbas, Khubaib Amjad Alam, Umer Iqbal, Sahar Ajmal. 13-18 [doi]
- A Collaborative Computation Offloading Scheme for 5G Heterogeneous NetworksMuhammad Bilal Khan, Sohaib Manzoor, Hira Manzoor, M. D. Samiul Islam. 19-24 [doi]
- NMPC Based Trajectory Tracking Control for Nonholonomic Wheeled Mobile RobotsMuhammad Zeeshan Babar, Syed Ibrar Ali Shah, Yasir Awais Butt. 25-30 [doi]
- Design of a Feedback Loop Circuit for Quadrature Error Correction in 90-nm CMOSMuhammad Haseeb, Muhammad Usman, Shabbir Majeed Chaudhry. 31-335 [doi]
- Erlang Based Server Selection Scheme Using Software Defined Networking in Datacenter for Energy ConservationArif Husen, Imran Raza, Syed Asad Hussain. 36-41 [doi]
- A Novel Routing Protocol Based on Congruent Gravity Value for Underwater Wireless Sensor NetworksSyed Umair Aslam Shah, M. Kashif Manzoor, Rana M. Amir Latif, Muhammad Farhan, M. Imran Ashiq. 42-48 [doi]
- Real-Time Simulation of IoT Based Smart Home Live Mirror using WSNRana M. Amir Latif, Laiqa Binte Imran, Muhammad Farhan, Mohamed Jaward Bah, Ghazanfar Ali, Yawar Abbas Abid. 49-54 [doi]
- Comparison of Water Flows between Various Channels Under Different CircumstancesTalat Nazir. 55-60 [doi]
- Numerical Modeling of One Dimensional Unsteady Flow in Parabolic ChannelTalat Nazir, Sohail Ahmad Awan, Bahadar Nawab Khattak. 61-64 [doi]
- A Machine Learning-Based Comparative Study for the Classification of Septic Shock Using Microarray Gene Expression DataArslan Ali, Ayesha Hanif, Arsalan Tahir, Hafiz Umar Iftikhar, Huma Shehwana, Mehak Rafiq. 65-70 [doi]
- DCNN and LDA-RF-RFE Based Short-Term Electricity Load and Price ForecastingHammad Ur-Rehman, Sana Mujeeb, Nadeem Javaid. 71-76 [doi]
- Minutia Texture Cylinder Codes for Fingerprint MatchingWajih Ullah Baig, Umar Munir, Adeel Ejaz, Kashif Sardar. 77-82 [doi]
- A Robust Segmentation of Blood Vessels in Retinal ImagesFarhana Siddique, Talha Iqbal, Sheryar Mehmood Awan, Zahid Mahmood, Gul Zameen Khan. 83-88 [doi]
- A Flexible Antenna on Cost-Effective PEN Substrate for Sub-6 GHz 5G Wireless TransceiversFareah Tariq, Qudsia Amjad, Areeba Kamran, Arshad Hassan, Rashid Karim. 89-94 [doi]
- Detection of Myocardial Infarction using Pulse Plethysmograph SignalsMuhammad Umar Khan, Sumair Aziz, Asra Malik, Muhammad Atif Imtiaz. 95-100 [doi]
- Software Requirements Engineering Maturity Model (SREMM) in Offshore Software Development OutsourcingMuhammad Shafiq, Qinghua Zhang, Muhammad Azeem Akbar. 101-104 [doi]
- Enabling Test Case Prioritization For Component Based Software DevelopmentSadia Ali, Yaser Hafeez. 105-109 [doi]
- A Soft Robotic Glove for Assistance and Rehabilitation of Stroke Affected PatientsMir Muneeb Ullah, Uzair Hafeez, Muhammad Naeem Shehzad, Muhammad Naeem Awais, Haroon Elahi. 110-115 [doi]
- Deep Learning Based Techniques to Enhance the Performance of Microgrids: A ReviewSheraz Aslam, Herodotos Herodotou, Nasir Ayub, Syed Muhammad Mohsin. 116-121 [doi]
- Design of Permanent Magnet Assisted Synchronous Reluctance Machines with Rare-Earth MagnetsT. Mohanarajah, J. Rizk, A. Hellany, M. Nagrial. 122-126 [doi]
- Optimum Sizing of PV-WT-FC-DG Hybrid Energy System using Teaching Learning-Based OptimizationAsif Khan, Nadeem Javaid. 127-132 [doi]
- A Secure Service Discovery Scheme for Mobile ad hoc Network using Artificial Deep Neural NetworkNoman Islam. 133-138 [doi]
- BoDMitM: Botnet Detection and Mitigation System for Home Router Base on MUDHassan Jalil Hadi, Syed Muhammad Sajjad, Khaleeq un Nisa. 139-143 [doi]
- Forensics Analysis of Wish-Shopping Made Fun Application on AndroidSuneela Pasha, Shahzad Saleem. 144-149 [doi]
- An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly DetectionMukhtar Hussain, Ernest Foo, Suriadi Suriadi. 150-155 [doi]
- Towards A Catalog of Design Patterns VariantsGhulam Rasool, Hassan Akhtar. 156-161 [doi]
- Risk Management in Agile Software Development: A SurveyMuhammad Hammad 0003, Irum Inayat, Maryam Zahid. 162-166 [doi]
- Software Design Patterns Recommendation : A Systematic Literature ReviewMuhammad Zeeshan Asghar, Khubaib Amjad Alam, Shahzeb Javed. 167-172 [doi]
- A Low-Cost IoT Based System for Environmental MonitoringNauman H. Khan, Khurram S. Khattak, Shaukat Ullah, Zawar Khan. 173-178 [doi]
- Joint Sybil Attack Prevention and Energy Conservation in Wireless Sensor NetworksWaqas Ali, Ghulam Abbas, Ziaul Haq Abbas. 179-184 [doi]
- Cyber Physical System for Solar Energy MonitoringSayed Shahid Hussain, Khurram S. Khattak, Ali Khan, Zawar H. Khan. 185-190 [doi]
- ERBFNN Based Electricity Load and Price ForecastingAsra Rafi, Sana Mujeeb, Nadeem Javaid. 191-196 [doi]
- Duckworth-Lewis-Stern Method Comparison with Machine Learning ApproachKumail Abbas, Sajjad Haider. 197-202 [doi]
- Controlling Smart-City Traffic using Machine LearningTania Iram, Jawwad Shamsi, Usama Alvi, Saif Ur Rahman, Muhammad Maaz. 203-208 [doi]
- Region and Decision Tree-Based Segmentations for Multi-Objects Detection and Classification in Outdoor ScenesAbrar Ahmed, Ahmad Jalal, Kibum Kim. 209-214 [doi]
- Real-Time Rehabilitation and Fitness System using Depth SensorSyyam Noor, Muhammad Hasham, Zulfiqar Habib, Allah Bux Sargano. 215-220 [doi]
- Weather Classification on Roads for Drivers Assistance using Deep Transferred FeaturesSaira Jabeen, AbdulGhaffar Malkana, Ali Farooq, Muhammad Usman Ghani Khan. 221-226 [doi]
- Identification and Classification of Cybercrimes using Text Mining TechniqueShiza Andleeb, Rashid Ahmed, Zaheer Ahmed, Maira Kanwal. 227-232 [doi]
- Security Against Compromised Servers: Verifiable DB QueriesMuhammad Waheed Akram, Muhammad Zaid, Naveed Ahmed, Shahzad Saleem. 233-238 [doi]
- Web Server Integrity Protection Using BlockchainMuhammad Zaid, Muhammad Waheed Akram, Naveed Ahmed, Shahzad Saleem. 239-244 [doi]
- Interest Flooding Attack Mitigation in Named Data Networking Based VANETsMuhammad Umar Sattar, Rana Asif Rehman. 245-249 [doi]
- Blockchain Based Vehicular Trust Management and Less Dense Area OptimizationShahid Abbas, Nadeem Javaid. 250-261 [doi]
- Tracking the Ripple Impact of Code Changes through Version Control SystemsAli Irfan, Arif Ur Rahman. 262-265 [doi]
- Short-Term Electricity Load and Price Forecasting using Enhanced KNNTehreem Ashfaq, Nadeem Javaid. 266-271 [doi]
- Electromyography (EMG) Data-Driven Load Classification using Empirical Mode Decomposition and Feature AnalysisSumair Aziz, Muhammad Umar Khan, Foha Aamir, Muhammad Arshad Javid. 272-277 [doi]
- Design and Implementation of Receiver Autonomous Integrity Monitoring Algorithm on DSP for Small UAV ApplicationsHira Imtiaz, Muhammad Haroon Yousaf, Hassan Sajjad Malik, Muhammad Ali Akhtar. 278-283 [doi]
- Design of Configurable Digital Spike Filtering Circuits in 130 nm CMOS ProcessImran Ali, Huo Yingge, Muhamamd Riaz ur Rehman, Muhammad Asif, Kang-Yoon Lee. 284-286 [doi]
- Web-AM: An Efficient Boilerplate Removal Algorithm for Web ArticlesNaseer Aslam, Bilal Tahir, Hafiz Muhammad Shafiq, Muhammad Amir Mehmood. 287-292 [doi]
- Heterogeneous 2-Phase Method for Strongly Connected Components Detection and Classification of GraphsSara Rehmat, Usman A. Shah, Suhail Yousaf. 293-298 [doi]
- K-Anonymity without the Prior Value of the Threshold k: RevisitedKhan Farhan Rafat. 299-303 [doi]
- Blockchain and IoT Based Formal Model of Smart Waste Management System Using TLA+Saba Latif, Aniqa Rehman, Nazir Ahmad Zafar. 304-309 [doi]
- Comparative Analysis of Different Light Intensities for Implementation Idea of Li-Fi for CPECUmar Draz, Tariq Ali, Sana Yasin. 310-315 [doi]
- Randomness Analyses of the Secure Hash Algorithms, SHA-1, SHA-2 and Modified SHAZeyad A. Al-Odat, Assad Abbas, Samee U. Khan. 316-321 [doi]
- Server Based Task Allocation to Reduce Inter-Task Memory Interference in Multicore SystemsSyed Aftab Rashid. 322-327 [doi]
- Evaluating Smartphone Screen Divisions for Designing Blind-Friendly Touch-Based InterfacesShah Khusro, Badam Niazi, Akif Khan, Iftikhar Alam. 328-333 [doi]
- Usability Barriers in Smart TV User Interfaces: A Review and RecommendationsIftikhar Alam, Shah Khusro, Mumtaz Khan. 334-338 [doi]
- Discovering Semantic Relationships Among PDF Book Figures Using Contextual and Visual SimilaritySehrish Rafiq, Shah Khusro, Nosheen Fayyaz. 339-344 [doi]
- Spreadsheet Smells: A Systematic Mapping StudyAwais Azam, Khubaib Amjad Alam, Areeba Umair. 345-350 [doi]
- Scheduling Charging of Electric Vehicles in a Secured Manner using Blockchain TechnologyMuhammad Umar Javed, Nadeem Javaid. 351-356 [doi]
- On Fault Localization Using Machine Learning TechniquesHaad Ali, Tamim Ahmed Khan. 357-362 [doi]
- Test Case Prioritization Based on Path ComplexityTehseen Afzal, Aamer Nadeem, Muddassar A. Sindhu, Qamar uz Zaman. 363-369 [doi]