Abstract is missing.
- Recurrent Deep Learning for EEG-based Motor Imagination RecognitionSadaqat Ali Rammy, Muhammad Abrar, Sadia Jabbar Anwar, Wu Zhang. 1-6 [doi]
- People Profile Metrics for Improved Classification of Defect Prone Files in Open Source ProjectsHumaira Aslam Chughtai, Zeeshan Ali Rana. 1-8 [doi]
- An Accurate Facial Expression Detector using Multi-Landmarks Selection and Local Transform FeaturesSyeda Amna Rizwan, Ahmad Jalal, Kibum Kim. 1-6 [doi]
- BSMS: A Reliable Interest Forwarding Protocol for NDN based VANETsMuhammad Burhan, Rana Asif Rehman. 1-6 [doi]
- A Review of Security Machanism in internet of Things(IoT)Faizan Khursheeed, M. Sami-Ud-Din, Irshad Ahmed Sumra, Muhammad Safder. 1-9 [doi]
- An Effective Card Scanning Framework for User Authentication SystemHania Arif, Ali Javed. 1-5 [doi]
- Searching for Truth in the Post-Truth AgeAlia Samreen, Adnan Ahmad, Furkh Zeshan. 1-5 [doi]
- Energy Efficient Clustering with Reliable and Load-Balanced Multipath Routing for WSNsAlamgir Naushad, Ghulam Abbas, Shehzad Ali Shah, Ziaul Haq Abbas. 1-9 [doi]
- Wearable Sensors for Activity Analysis using SMO-based Random Forest over Smart home and Sports DatasetsSheikh Badar ud din Tahir, Ahmad Jalal, Mouazma Batool. 1-6 [doi]
- Exploring the Proportion of Content Represented by the Metadata of Research ArticlesShahzad Nazir, Muhammad Asif 0002, Shahbaz Ahmad. 1-7 [doi]
- Preventive Techniques of Phishing Attacks in NetworksMuhammad Adil, Rahim Khan, M. Ahmad Nawaz Ul Ghani. 1-8 [doi]
- Enhanced Non-dominated Sorting Harris's Hawk Multi-objective OptimizerShaymah Akram Yasear, Ku Ruhana Ku-Mahamud. 1-8 [doi]
- Human Actions Tracking and Recognition Based on Body Parts Detection via Artificial Neural NetworkAmir Nadeem, Ahmad Jalal, Kibum Kim. 1-6 [doi]
- Effects of Refactoring upon Efficiency of an NP-Hard Task Assignment Problem: A case studyHuda Tariq, Maliha Arshad, Wafa Basit. 1-9 [doi]
- Integrating Human Panic Factor in Intelligent Driver ModelHifsa Tanveer, Mian Muhammad Mubasher, Syed Waqar Jaffry. 1-6 [doi]
- CBAM: A Controller based Broadcast Storm Avoidance Mechanism in SDN based NDN-IoTsAsadullah Tariq, Rana Asif Rehman. 1-6 [doi]
- Machine and Deep Learning Based Comparative Analysis Using Hybrid Approaches for Intrusion Detection SystemAzam Rashid, Muhammad Jawaid Siddique, Shahid Munir Ahmed. 1-9 [doi]