Abstract is missing.
- Investigation of Latest CASE Tools for Database Engineering: A Systematic Literature ReviewNazish Yousaf, Madeha Arif, Misbah Mehboob Awan, Wasi Haider Butt. 7-12 [doi]
- Determining the Level of Detail of Software RequirementsSyed Absar ul Hasan, Zeeshan Ali Rana. 13-17 [doi]
- Inspecting Mega Solar Plants through Computer Vision and Drone TechnologiesSyed Umaid Ahmed, Mohammad Affan, Muhammad Ilyas Raza, Muhammad Harris Hashmi. 18-23 [doi]
- Tri-model ensemble with Grid Search optimization for Bipolar Disorder DiagnosisSyed Muhammad Zain, Wajid Mumtaz. 24-29 [doi]
- Summarization of Cricket Videos Using Deep Learning TechniqueTabinda Nasir, Muhammad Javed Iqbal, Mehmoon Anwar. 30-35 [doi]
- Experimental Study and Results on Real-Time Communication via Gigabit Ethernet in Underwater Sensor Array SystemsKashif Waqas, Umar Hamid, Shahid Ali. 36-40 [doi]
- TARIQ: Towards Area Adjustment and Rounding of Intermediate Nodes for Quadrilateration in Blockchain Enabled Underwater Beacon Node LocalizationUmar Draz, Tariq Ali, Muhammad Hasanain Chaudary, Abid Sohail, Sana Yasin. 41-46 [doi]
- Measurement-based analysis of characteristics of fast moving underwater acoustic communication channelYang Wang, Honglu Yan, Chenyu Pan, Songzuo Liu. 47-52 [doi]
- Modeling and Optimizing the Integrated Energy-Water Nexus for Hydrogen GenerationMuhammad Babar Rasheed, María D. R.-Moreno. 53-58 [doi]
- Towards Automatic Retinal Blood Vessels Segmentation in Retinal ImagesNoshaba Khurshid, Muhammad Ibrahim Syed, Khurram Khan, Zahid Mahmood. 59-64 [doi]
- Unsupervised Vessel Segmentation Method in Retinal ImagesZanib Qaiser, Waqar Ahmad, Mir Yasir Umair, Zahid Mahmood. 65-70 [doi]
- A Reliable Graph-Based Routing Algorithm in Residential Multi-Microgrid SystemsKhuram Shahzad, Sohail Iqbal 0001. 71-76 [doi]
- A Methodology of Customized Dataset for Cotton Disease Detection Using Deep Learning AlgorithmsMaryam Saba Tahir, Ayesha Yaqoob, Haiqa Hamid, Rana M. Amir Latif. 77-81 [doi]
- Detection of COVID-19 in High Resolution Computed Tomography Using Vision TransformerAroosa Yaqoob, Abdul Basit, Abdul-Rahman, Abdul Hannan, Kaleem Ullah. 82-87 [doi]
- Impact of Demographics on Automated Criminal Tendency Detection from Facial ImagesNegarish Mushtaq, Khizer Ali, Momina Moetesum, Imran Siddiqi. 88-93 [doi]
- Locomotion Classification of Bipedal Humanoid Robot using Fast Fourier TransformSaad Imran, Farrukh Zeeshan Khan, Fazal Subhan. 94-99 [doi]
- A Lecture Centric Automated Distractor Generation for Post-Graduate Software Engineering CoursesRudeema Chughtai, Farooque Azam, Muhammad Waseem Anwar, Wasi Haider Butt, Muhammad Umar Farooq. 100-105 [doi]
- Bankruptcy Prediction using Diverse Machine Learning AlgorithmsAhmad Hassan, Nazish Yousaf. 106-111 [doi]
- Rumor Source Detection on Interconnected Social NetworksAmanullah Khan, M. Farooq Shaikh, F. Sherwani, S. Hamza Hassan, Aymen Kalifa Soluman Ahteewash. 112-117 [doi]
- An Image captioning algorithm based on the Hybrid Deep Learning Technique (CNN+GRU)Rana Adnan Ahmad, Muhammad Azhar, Hina Sattar. 124-129 [doi]
- Churn Prediction of Customers in a Retail Business using Exploratory Data AnalysisWaseem Abbas, Muhammad Usman, Usman Qamar. 130-135 [doi]
- Development of an Embedded Device for Stroke Prediction via Artificial Intelligence-Based AlgorithmsMuhammad Usama Baloch, Mudassar Ahmad 0001, Rehan Ashraf, Muhammad Asif Habib. 136-141 [doi]
- A Machine Learning-Based Approach for Improving TCP Congestion Detection Mechanism in IoTsMadeha Arif, Usman Qamar, Amreen Riaz. 142-146 [doi]
- A Pothole Warning System using Vehicular Ad-hoc Networks (VANETs)Pedro Ivo Siqueira Nepomuceno, Kifayat Ullah 0002, Kelly Rosa Braghetto, Daniel Macêdo Batista. 147-152 [doi]
- Verification and Validation of a VANET-based Formal Model for Online Taxi Service using VDM-SL ToolboxSidra Iqbal, Tariq Ali, Nazir Ahmad Zafar, Tahira Batool. 153-158 [doi]
- Efficient Distance based Response Time Pruning Cache Policy for NDNAhmad Arsalan, Muhammad Burhan, Rana Asif Rehman. 159-164 [doi]
- Contextual Word Embedding based Clustering for Extractive SummarizationShah Faisal, Atif Khan, Suhail Yousaf, Muhammad Umair. 165-170 [doi]
- Sequence-driven Neural Network models for NER Tagging in Roman UrduMaaz Ali Nadeem, Khadija Irfan, Khaula Atiq, Mirza Omer Beg, Muhammad Umair Arshad. 171-176 [doi]
- Stroke Sequence Identification in Handwritten Urdu Alphabets Using Convolutional Neural NetworksAwais Qarni, Muhammad Shoaib, Muhammad Abdullah, Saba Khalid, Ayesha Aslam, Noreen Kausar, Ayesha Khan, Mohammad Naveed Tariq, Fizza Jameel, Tayyab Gull Khan. 177-182 [doi]
- Multi-Encoder Convolution Block Attention Model for Binary SegmentationKeita Mamadou, Mohib Ullah, Øyvind Nordbø, Faouzi Alaya Cheikh. 183-188 [doi]
- Automatic Detection of Leukemia through Convolutional Neural NetworkRida Arif, Shahzad Akbar, Ahmad Bilal Farooq, Syed Ale Hassan, Sahar Gull. 195-200 [doi]
- On evaluation of dereverberation algorithms for expectation-maximization based binaural source separation in varying echoic conditionsMuhammad Sheryar Fulaly, Sania Gul, Muhammad Salman Khan 0001, Ata ur-Rehman, Syed Waqar Shah. 201-206 [doi]
- A Simulation Study on the Downlink Performance of Non-Uniform Dense Cellular NetworksMuhammad Masood, Muhammad Hanaan, Khurram Shehzad. 207-212 [doi]
- Cyber Attacks and Vulnerabilities Assessment for Unmanned Aerial Vehicles Communication SystemsHassan Jalil Hadi, Yue Cao. 213-218 [doi]
- Covid severity prediction: Who cares about the data quality?Teodora Nae, Johannes Krabbe, Faiza Allah Bukhsh, Jeewanie Jayasinghe Arachchige, Faizan Ahmed. 225-230 [doi]
- A Systematic Literature Review on Block-chain AttacksMuhammad Azeem, Jabar Mahmood, Tayyaba Aslam, Kiran Shahzadi. 231-236 [doi]
- Cyber Automated Network Resilience Defensive Approach against Malware ImagesKainat Rizwan, Mudassar Ahmad 0001, Muhammad Asif Habib. 237-242 [doi]
- Let's Prevent Spectre Attacks in the Docker Containers TooHumdah Shakir Khan, Farooque Hassan Kumbhar, Jawwad Ahmed Shamsi. 243-248 [doi]
- Network Forensic Analysis of Twitter Application on Android OSAlia Umrani, Yousra Javed, Muhammad Iftikhar. 249-254 [doi]
- Defeating Modern Day Anti-Viruses for Defense EvaluationAbdul Basit Ajmal, Shawal Khan, Farhana Jabeen. 255-260 [doi]
- An Improved Deep Learning Approach for Heart Attack Detection from Digital ImagesZaheer Ahmed, Aun Irtaza, Awais Mehmood, Muhammad Faheem Saleem. 261-266 [doi]
- EHG Signal Analysis for Prediction of Term and Preterm using Variational Mode Decomposition and Artificial Neural NetworksMuhammad Umar Khan, Sumair Aziz, Khushbakht Iqtidar, Raul Fernandez Rojas. 267-272 [doi]
- Hybrid Deep Learning model for ECG-based Arrhythmia DetectionAmina Ashfaq, Nadeem Anjum, Salman Ahmed, Nayyer Masood. 278-283 [doi]
- Emotional States Detection Model from Handwriting by using Machine LearningKhadija Nadeem, Mudassar Ahmad 0001, Muhammad Asif Habib. 284-289 [doi]
- CoviFake: A Framework to Detect and Analyze Fake COVID19 TweetsTooba Asif, Bilal Tahir, Yasir Saleem, Muhammad Amir Mehmood. 290-295 [doi]
- Development of a Machine Learning Model for Prediction of Colour Trends in Fashion IndustryKhadija Nadeem, Mudassar Ahmad 0001, Zafar Javed, Muhammad Asif Habib. 296-301 [doi]
- Application of NLP on student's Discord messages for automatic Belbin role identificationKonstantine Dichev, Faiza Bukhsh, Yeray Barrios-Fleitas. 302-307 [doi]
- Brain Tumor Augmentation using the U-NET ArchitectureMohsin Jabbar, Maria Siddiqui, Farhan Hussain, Sultan Daud. 308-313 [doi]
- Impact of Serious Game Design Factors and Problem based Pedagogy on Learning outcomeFatima Gillani, Irum Inayat, Carlos Val de Carvalho. 314-319 [doi]
- A Project Manager's Personality is a Treasure Trove of InformationNeelum Qasimi, Ali Afzal Malik. 320-325 [doi]
- Impact Of Code Smells On Software Fault Prediction At Class Level And Method LevelUm-E.-Safia, Tamim Ahmed Khan. 326-331 [doi]
- Template-based Automatic code generation for Web application and APIs Using Class DiagramIrfan Ullah, Irum Inayat. 332-337 [doi]
- Traffic Classification based on Incremental Learning Algorithms for the Software-Defined NetworksArwa Mohamed, Mosab Hamdan, Suleman Khan 0001, Muzaffar Hamzah, Muhammad N. Marsono. 338-343 [doi]