Abstract is missing.
- Enhanced Medical Image De-noising Using Auto Encoders and MLPSeshadri Sastry Kunapuli, Praveen Chakravarthy Bh, Upasana Singh. 3-15 [doi]
- E-BRACE: A Secure Electronic Health Record Access Method in Medical EmergencyShraddha Nayak, Md. Akbar Hossain, Farhaan Mirza, M. Asif Naeem, Noreen Jamil. 16-27 [doi]
- Enhanced Fuzzy Resolution Appliance for Identification of Heart Disease in TeenagersArfa Hassan, H. M. Bilal, M. Adnan Khan, M. Farhan Khan, Rubina Hassan, M. Sajid Farooq. 28-37 [doi]
- Similarity Measuring for Clustering Patient's Reports in TelemedicineAteya Iram, Sajid Habib Gill. 38-49 [doi]
- A Review of Machine Learning for Healthcare Informatics Specifically Tuberculosis Disease DiagnosticsPriyanka Karmani, Aftab Ahmed Chandio, Imtiaz Ali Korejo, Muhammad Saleem Chandio. 50-61 [doi]
- Long-Term Trends in Public Sentiment in Indian Demonetisation PolicyAdi Darliansyah, Herman Masindano Wandabwa, M. Asif Naeem, Farhaan Mirza, Russel Pears. 65-75 [doi]
- Sentiment Analysis on Automobile Brands Using Twitter DataZain Asghar, Tahir Ali, Imran Ahmad, Sridevi Tharanidharan, Shamim Kamal Abdul Nazar, Shahid Kamal. 76-85 [doi]
- Sentiment Analysis of Student's Facebook PostsAteya Iram. 86-97 [doi]
- Opinion and Emotion Mining for Pakistan General Election 2018 on Twitter DataSuleman khan, Syed Atif Moqurrab, Rotaba Sehar, Umair Ayub. 98-109 [doi]
- Sentimental Analysis of Social Media to Find Out Customer OpinionHaq Nawaz, Tahir Ali, Ali Al-Laith, Imran Ahmad, Sridevi Tharanidharan, Shamim Kamal Abdul Nazar. 110-115 [doi]
- Parsing RDFs to Extract Object Oriented Model Using Apache JenaUmar Farooq Shafi, Hina Sattar, Imran Sarwar Bajwa, Amna Ikram. 119-129 [doi]
- Principle Features of Beamforming and Phase Shift of Phased Array AntennasMuhammad Saleem, Sidra Naz, Anila Kauser. 130-141 [doi]
- Generating Linked Data Repositories Using UML ArtifactsAqsa Khan, Saleem Malik. 142-152 [doi]
- Containers vs Virtual Machines for Auto-scaling Multi-tier Applications Under Dynamically Increasing WorkloadsMuhammad Abdullah 0004, Waheed Iqbal, Faisal Bukhari. 153-167 [doi]
- Anti-phishing Models for Mobile Application Development: A Review PaperJavaria Khalid, Rabiya Jalil, Myda Khalid, Maliha Maryam, Muhammad Aatif Shafique, Wajid Rasheed. 168-181 [doi]
- Sensing Time Optimization Using Genetic Algorithm in Cognitive Radio NetworksMuhammad Nadeem Ali, Iqra Naveed, Muhammad Adnan Khan, Ayesha Nasir, M. Tahir Mushtaq. 182-187 [doi]
- A Bio-Inspired Rooted Tree Algorithm for Optimal Coordination of Overcurrent RelaysAbdul Wadood, Tahir Khurshaid, Saeid Gholami Farkoush, Chang Hwan Kim, Sang-Bong Rhee. 188-201 [doi]
- Social Media Competitive Analysis of Shoe Brands on Customer ExperiencesImran Ahmad, Tahir Ali, Asad Nazir, Shahid Kamal. 205-215 [doi]
- A Fuzzy Logic Model for Evaluating Customer Loyalty in e-CommerceAiman Ashfaq, Mobeen Kausar. 216-227 [doi]
- Tweets Competitive Sentimental Analysis of Android Mobile Brands to Understand Customer ExperienceUmair Liaquat Ali, Tahir Ali, Imran Ahmad, Shahid Kamal. 228-239 [doi]
- Counter Terrorism on Online Social Networks Using Web Mining TechniquesFawad Ali, Farhan Hassan Khan, Saba Bashir, Uzair Ahmad. 240-250 [doi]
- Analysis of Twitter Usage in Educational Institutions of PakistanGul Mina, Bakhtiar Kasi, Abdul-Samad, Riaz ul Amin. 251-261 [doi]
- Detecting Suspicious Discussion on Online Forums Using Data MiningHaroon-ur-Rasheed, Farhan Hassan Khan, Saba Bashir, Irsa Fatima. 262-273 [doi]
- Process Model Abstraction: Identifying Business Significant ActivitiesBasharat Fatima, Khurram Shahzad. 277-288 [doi]
- Automated Consistency Management in BPMN Based Business Process ModelsMamoona Ishaq, M. Abbas Choudhary. 289-300 [doi]
- The Use of Fuzzy Logic in Creating a Visual Data Summary of a Telecom Operator's Customer BaseJulia Sidorova, Lars Sköld, Håkan Lennerstad, Lars Lundberg. 301-312 [doi]
- Social Media Competitive Analysis - A Case Study in the Pizza Industry of PakistanMuhammad Usama Nazir, Sridevi Tharanidharan, M. Saleem Mian, Imran Ahmad, Khizer Hayat, Shamim Kamal Abdul Nazar, Shanza Zaman, Sohail Mustafa, Muhammad Rehan Ghumman. 313-325 [doi]
- Diffusion of Big Open Data Policy Innovation in Government and Public Bodies in PakistanMuhammad Mahboob Khurshid, Nor Hidayati Zakaria, Ammar Rashid, Rafaqat Kazmi, Muhammad Nouman Shafique. 326-337 [doi]
- Transaction and Identity Authentication Security Model for E-Banking: Confluence of Quantum Cryptography and AITayyabah Hassan, Fahad Ahmed. 338-347 [doi]
- Tagging Assistant for Scientific ArticlesZara Nasar, Syed Waqar Jaffry, Muhammad Kamran Malik. 351-362 [doi]
- A Natural Language Based Approach to Generate Document StoresTayyaba Sana, Omair Shafiq 0001. 363-368 [doi]
- Parallel String Matching for Urdu Language TextMirza Baber Baig, Taoshen S. Li. 369-378 [doi]
- Generating SBVR-XML Representation of a Controlled Natural LanguageShafaq Arshad, Imran Sarwar Bajwa, Rafaqut Kazmi. 379-390 [doi]
- Natural Language Based SQL Query Verification Against Relational SchemaShoaib Saleem Khan, Abid Saeed, Yasir Majeed, Muhammad Kamran. 391-400 [doi]
- Information Extraction of Ecological Canal System Based on UAV Remote Sensing Data for Precision IrrigationZichao Zhang, Yu Han, Jian Chen 0013, Shubo Wang, Nannan Du, Guangqi Wang, Yongjun Zheng. 403-413 [doi]
- Vehicle Detection, Tracking and Counting on M4 Motorway PakistanAyesha Ansari, Khan Bahadar Khan, Muhammad Moin Akhtar, Hammad Younis. 414-425 [doi]
- Legal Data Mining from Civil JudgmentsShahmin Sharafat, Zara Nasar, Syed Waqar Jaffry. 426-436 [doi]
- A Graph Theory Based Method to Extract Social Structure in the SocietyWajid Rafique, Maqbool Khan, Nadeem Sarwar, Muhammad Sohail, Asma Irshad. 437-448 [doi]
- A Deep-Learning-Based Low-Altitude Remote Sensing Algorithm for Weed Classification in Ecological Irrigation AreaShubo Wang, Yu Han, Jian Chen, Yue Pan, Yi Cao, Hao Meng, Yongjun Zheng. 451-460 [doi]
- Repairing Broken Links Using Naive Bayes ClassifierFaheem Nawaz Khan, Adnan Ali, Imtiaz Hussain, Nadeem Sarwar, Hamaad Rafique. 461-472 [doi]
- Predicting Web Vulnerabilities in Web Applications Based on Machine LearningMuhammad Noman Khalid, Humera Farooq, Muhammad Iqbal, Muhammad Talha Alam, Kamran Rasheed. 473-484 [doi]
- Malwares Detection for Android and Windows System by Using Machine Learning and Data MiningSyed Fakhar Bilal, Saba Bashir, Farhan Hassan Khan, Haroon Rasheed. 485-495 [doi]
- Machine Learning Based Fault Diagnosis in HVDC Transmission LinesRaheel Muzzammel. 496-510 [doi]
- Plant Irrigation and Recommender System-IoT Based Digital Solution for Home GardenSehrish Munawar Cheema, Museb Khalid, Abdur Rehman, Nadeem Sarwar. 513-525 [doi]
- Smart Road-Lights and Auto Traffic-Signal Controller with Emergency OverrideMohammad Faisal Naseer, Khan Bahadar Khan, Muhammad Sannan Khaliq, Muhammad Raheel. 526-537 [doi]
- An Ecological Irrigation Canal Extraction Algorithm Based on Airborne Lidar Point Cloud DataGuangqi Wang, Yu Han, Jian Chen, Yue Pan, Yi Cao, Hao Meng, Nannan Du, Yongjun Zheng. 538-547 [doi]
- Machine Learning for Analyzing Gait in Parkinson's Patients Using Wearable Force SensorsAsma Channa, Rahime Ceylan, Attiya Baqai. 548-559 [doi]
- Microchip with Advance Human Monitoring Technique and RFTSNadeem Sarwar, Faheem Nawaz Khan, Adnan Ali, Hamaad Rafique, Imtiaz Hussain, Asma Irshad. 560-570 [doi]
- Enrich Exiting UML Class Model Using OntologyMaria Iqbal, Abdur Rehman. 573-578 [doi]
- OntoGen Based Ontology Concepts Generation from GraphAbid Saeed, Muhammad Shahzad Kamran, Shoaib Saleem Khan, Rao Muhammad Kamran. 579-590 [doi]
- An Automatable Approach for Triples to PROV-O MappingAyesha Mehmood, Amna Mehmood, Bakhtawer Akhtar. 591-603 [doi]
- Relational Database to Resource Description Framework and Its SchemaMuhammad Faheem, Hina Sattar, Imran Sarwar Bajwa, Wasif Akbar. 604-617 [doi]
- Generating RDFS Based Knowledge Graph from SBVRBakhtawer Akhtar, Ayesha Mehmood, Amna Mehmood, Waheed Noor. 618-629 [doi]
- Enrich Existing Ontologies with New Knowledge from Existing ArtifactsAmna Mehmood, Ayesha Mehmood, Bakhtawer Akhtar. 630-641 [doi]
- Decision Support System for Visualization of Tree Plantation in Upper SindhJamil Ahmed Chandio, Ghulam Ali Malah, Ubaidullah Alias Kashif, Yasir Ali Solangi, Aadil Jameel. 645-655 [doi]
- A Novel Approach to Generate OWL2 Models Using Case Based ReasoningFaiza Ali, M. Abbas Choudhary. 656-667 [doi]
- Emergency Feedback System Based on SSVEP Brain Computing InterfaceTarwan Kumar Khatri, Humera Farooq, Muhammad Talha Alam, Muhammad Noman Khalid, Kamran Rasheed. 668-678 [doi]
- Connection Time for Routing Decisions in Vehicular Delay Tolerant NetworkAdnan Ali, Nadeem Sarwar, Hamaad Rafique, Imtiaz Hussain, Faheem Nawaz Khan. 679-690 [doi]
- Fire Controller System Using Fuzzy Logic for SafetyMobeen Kausar, Barera Sarwar, Aimen Ashfaq. 691-697 [doi]
- An Efficient Clustering of Wireless Sensor Network by Spectral Graph PartitioningSonia Salman, Husnain Mansoor Ali. 698-710 [doi]
- Digital Image Steganography by Using a Hash Based LSB (3-2-3) TechniqueImra Aqeel, Muhammad Raheel. 713-724 [doi]
- An Enhancement Method of Obstacle Information Obtaining Accuracy in Binocular VisionZichao Zhang, Yu Han, Jian Chen 0013, Wenhao Dou, Shubo Wang, Nannan Du, Guangqi Wang, Yongjun Zheng. 725-734 [doi]
- Comparative Analysis of Pigment Network as a Feature for Melanoma DetectionM. Umair Shafiq, Uzma Jamil, Nafees Ayub. 735-744 [doi]
- A Performance Assessment of Rose Plant Classification Using Machine LearningMuzamil Malik, Amna Ikram, Syeda Naila Batool, Waqar Aslam. 745-756 [doi]
- Artefacts Removal from EEG Recordings in Urban EnvironmentMuhammad Talha Alam, Humera Farooq, Muhammad Noman Khalid, Tarwan Kumar, Kamran Rasheed. 757-768 [doi]
- A Survey on Digital Image Steganography ApproachesImra Aqeel, Muhammad Babar Suleman. 769-778 [doi]
- A Deep Neural Network Approach for Classification of Watermarked and Non-watermarked ImagesSreenivas Sremath Tirumala, Noreen Jamil, M. G. Abbas Malik. 779-784 [doi]
- Multi-agent System Using Scrum Methodology for Software Process ManagementShanawar Ali, Hafiz Hassan Ali, Sakha Qayyum, Fatima Sohail, Faiza Tahir, Sahar Maqsood, Mahum Adil. 787-792 [doi]
- Generating a Referent Graph from Semantics of Business Vocabulary and Business RulesMuhammad Shahzad Kamran, Abid Saeed, Abdul Hameed. 793-804 [doi]
- Requirement Elicitation for Bespoke Software Development: A Review PaperRabiya Jalil, Javaria Khalid, Maliha Maryam, Myda Khalid, Sadaf Nawaz Cheema, Iqra Iqbal. 805-821 [doi]
- Quantitative Based Mechanism for Resolving Goals Conflicts in Goal Oriented Requirement EngineeringTaimoor Hassan, Muhammad Zunnurain Hussain, Muhammad Zulkifl Hasan, Zaka Ullah, Noor-ul Qamar. 822-831 [doi]
- Automated Verification of Software Constraints Using Business RulesSidra Sabir, Munsub Ali. 832-837 [doi]
- Process Model Matching with Word EmbeddingsKhurram Shahzad 0002, Safia Kanwal, Muhammad Kamran Malik. 838-849 [doi]