ISSN ( ONLINE ) : 2278 - 3091
6 issues per year (February , April, June , August, October, December)
Indian Authors : Rs.1500
Foreign Authors : USD 50
The World Academy of Research in Science and Engineering
Article - 1 | Title | Classification of Long Bone X-ray Images using New features and Support Vector Machine | 1494 – 1500 |
Authors | Amani Al-Ghraibah, Mohammad Algharibeh, Waseem AlMohtasib, Muneera Altayeb |
Article - 2 | Title | Identification of HATE speech tweets in Pashto language using Machine Learning techniques | 1501 – 1508 |
Authors | Aftab Alam Janisar, Hammad Afzal, Ganesh Kumar |
Article - 3 | Title | Comparison of Machine Learning Algorithms for Induction MotorRotor SingleFault Diagnosis using Stator Current Signal | 1509 – 1514 |
Authors | Thanh-Huong Tran,Hongwei Liang, Wei Li, Minh-Trien Pham |
Article - 4 | Title | Computational Neuro-physiological Model (CNP) to Profile Lower Primary School Students in Inclusive Education: A Concept Paper | 1515 – 1519 |
Authors | Norzaliza Md Nor, Noor Azura Zakaria, Muna Azuddin, Murni Mahmud, Abdul Wahab Abdul Rahman, Ruwinah Abdul Karim |
Article - 5 | Title | Face Mask Detection | 1520 – 1523 |
Authors | Justin Ipe Abraham, Celia Mary Augusty, Gayathri Devi S, Greeshma Gopan, Greeshma Sabu, Libin M Joseph |
Article - 6 | Title | Competency Model of Software Developer in Thailand : A Qualitative Exploration | 1524 – 1532 |
Authors | Chutchonook Charutwinyo |
Article - 7 | Title | A Review on Fault Tolerance in Distributed Database | 1533 – 1536 |
Authors | Ahmad Shukri Mohd Noor, Auni Fauzi , Ainul Azila Che Fauzi |
Article - 8 | Title | OTP Based Locking System using IOT | 1537 – 1542 |
Authors | Deeksha P, MangalaGowri M K, Sateesh R, Yashaswini M, Ashika V |
Article - 9 | Title | Energy-efficient Dynamic Mobile Sink Path Planning for Data Acquisition for Wireless Sensor Networks | 1543 – 1551 |
Authors | Srinivasulu Boyineni, Dr.K. Kavitha, Dr.Meruva Sreenivasulu |
Article - 10 | Title | Securing Academic Record using Blockchain with Hyper ledger Fabric | 1552 – 1556 |
Authors | G. Dhanalakshmi. B. Bhavethra, Muppa Keerthi Chowdary, S. Keerthana |
Article - 11 | Title | Mobile Wireless Sensor Networks: A Framework Based Solution for Physical Security Attacks | 1557 – 1566 |
Authors | Mumtaz Qabulio, Yasir Arafat Malkani, Muhammad Suleman Memon, Ayaz Keerio |
Article - 12 | Title | Minimizing Symptom-based Diagnostic Errors Using Weighted Input Variables and Fuzzy Logic Rules in Clinical Decision Support Systems | 1567 – 1575 |
Authors | Anietie Ekong, Henry Odikwa, Otuekong Ekong |
Article - 13 | Title | Indian Sign Language Recognition Using Canny Edge Detection | 1576 – 1583 |
Authors | Vipul Brahmankar, Nitesh Sharma, Saurabh Agrawal, Saleem Ansari, Priyanka Borse, Khalid Alfatmi |
Article - 14 | Title | On k-Distance Degree Index of Trees | 1584– 1588 |
Authors | Zia Ullah Khan, Azhar Iqbal, Gohar Ali, Marium Sultana, Javed Khan |
Article - 15 | Title | A Qualitative Approach for Representation of Templates and Portfolios with User Accessible Environment | 1589 – 1598 |
Authors | Sanaullah Memon, Ihsan Habib Memon, Noor Hassan Bhangwar, Najamuddin Budh |
Article - 16 | Title | Filtering unwanted posts from online social networks (OSN) | 1599 – 1602 |
Authors | Ankit Tomer, Sachin Jain |
Article - 17 | Title | Multi Model Approach to Extract Human Features in Real Time | 1603 – 1610 |
Authors | Raj Baldania, Barkha Bhavsar |
Article - 18 | Title | Object Detection and Identification | 1611 – 1618 |
Authors | Prinsi Patel, Barkha Bhavsar |
Article - 19 | Title | Classification of Exploring the Mortality Rates of Diseases by Using Machine Learning Techniques | 1619 – 1626 |
Authors | Imdad Ali Shah, Dr. Riaz Ahmed Shaikh,Dr. Samina Rajper |
Article - 20 | Title | Sindhi Handwritten Text Recognition Using SVM | 1627 – 1631 |
Authors | Shafique Ahmed Awan, Fida Hussain Khoso, Aijaz Ahmed Arain, Abdullah Lakhan, Shah Zaman Nizamani, Kirshan Kumar Luhana |
Article - 21 | Title | Temporal Analysis Of Temperature Variability In Pakistan Using The Method Of Empirical Mode Decomposition | 1632 – 1638 |
Authors | Mariam Sultana, Faheem Zaidi, Javed K.Afridi, Muhammad Shoaib |
Article - 22 | Title | The Development of Interview Protocol to Explore Hybrid Agile Software Development Phases | 1639 – 1645 |
Authors | Norzariyah Yahya, Siti Sarah Maidin, Muhammad Shukri Safari |
Article - 23 | Title | The Review of Raspberry Pi Based - Systems to Assist the Disabled Persons | 1646 – 1655 |
Authors | Daniel Sekyere – Asiedu , Fezile Ozdamli |
Article - 24 | Title | Deriving Heart Rate and Respiratory Rate from Pulse Oximetry Data | 1656 – 1662 |
Authors | Jennifer C. Dela Cruz, John Paul D. Alolor, Rouella Christine L. Panganiban, Rhianna Marielle G. Victorio, Jonathan Ibera |
Article - 25 | Title | Smart Grid Local Energy Trading Based Crypto Token Using Blockchain | 1663 – 1670 |
Authors | THARUN P, SHAHRUKH PARVEZ R |
Article - 26 | Title | Restaurant Recommendation System using Machine Learning | 1671 – 1675 |
Authors | Ketan Mahajan, Varsha Joshi, Mohini Khedkar, Jacky Galani, Mayuri Kulkarni |
Article - 27 | Title | Performance Evaluation of Slotted Aloha Anti-Collision Protocol for Mobile RFID Tags Identification using NHPP | 1676 – 1682 |
Authors | Dr. Shachi Sharma, Abdul Shakoor |
Article - 28 | Title | Covid Tracker for Medical Front-Liners- A Survey | 1683 – 1689 |
Authors | Aman Shinde, Rajeev Ramesh, Siddhant Singh, Vikramjit Banerjee, Prof. Prashant Gadakh, Dr. Sandeep Patil |
Article - 29 | Title | An Improved Methodology for Data Hiding In Images Using Haar Transformed, LSB Replacement Method and Modified PVDMF 1 | 1690 – 1699 |
Authors | Laraib Naz, Qamar Nawaz, Isma Hamid, Ahmad Mateen, Salman Afsar,MushhadMustuhzar Gilani |
Article - 30 | Title | Recognition of Human Face Emotions Detection Using Computer Vision Based Smart Images | 1700 – 1704 |
Authors | Sanaullah Memon, Noor Hassan Bhangwar, Dr. Abdul Hanan Sheikh, Najamuddin Budh |
Article - 31 | Title | Domain Specific Model Driven Approach for Adaptive Systems | 1705 – 1710 |
Authors | Magagi Ali Bachir, Jellouli Ismail, El Garouani Said, Amjad Souad |
Article - 32 | Title | Code Smell Identification As The Basis For Code Refactoring in The Agricultural Information System Portal Case Study at: Gilangharjo Village, Bantul Regency, Indonesia | 1711 – 1719 |
Authors | Argo Wibowo, Lukas Chrisantyo, Maria Nila Anggia Rini |
Article - 33 | Title | Skin Lesions Detection and Classification Using Deep Learning | 1720 – 1728 |
Authors | Waqas Rizwan, Syed Muhammad Adnan, Wakeel Ahmed, Muhammad Imran Faizi |
Article - 34 | Title | Smart Learning Tools for Enhancing Basic Education System | 1729 – 1734 |
Authors | Saima Siraj, Ammar Oad, Khalida Khan, Sajida Raz Bhutto, Pinial Khan Butt, Akhtar Hussain Jalbani, Rafia Naz1, Xin Liu |
Article - 35 | Title | THIRD EYE 360° Object Detection and Assistance for Visually Impaired People | 1735 – 1742 |
Authors | Rohan Jain, Yukta Bhattad, Tejal Patil, Rohit Patil, Khalid Alfatmi |
Article - 36 | Title | Automatic Segmentation of Hippocampus and Classification of brain MRI for Alzheimer’s Detection | 1743 – 1750 |
Authors | Dulumani Das, Sanjib Kumar Kalita |
Article - 37 | Title | Universal Dependencies for Urdu Noisy Text | 1751 – 1757 |
Authors | Amber Baig, Mutee U Rahman, Abdul Salam Shah, Suhni Abbasi |
Article - 38 | Title | Comparative Analysis of Sn–Pb–Sb Babbitt bearing alloys material with and without copper | 1758 – 1764 |
Authors | Jitendra Parte, Prof A.K. Jain |
Article - 39 | Title | A Data Analytic Approach in the Thematic Classification of the Reasons and Perspectives of Adolescents’ Social Media Engagement | 1765 – 1770 |
Authors | Elaine Marie Aranda, Roy Francis Navea |
Article - 40 | Title | Design and Analysis of a Microstrip Patch Antenna for TV White Space Data Applications | 1771 – 1775 |
Authors | Roy Francis Navea, Emmanuel Trinidad |
Article - 41 | Title | Faster Big Data Encryption Technique Using Key Generation | 1776 – 1783 |
Authors | Galal A. Al-Rummana, Abdulrazzaq H. A. Al-Ahdal, G. N. Shinde |
Article - 42 | Title | Moving Target Defense for SDN-Based Cloud Datacenter Network Protection | 1784 – 1794 |
Authors | Tamesgen Bekele, Senthil Kumar A, Sisay Muleta, Bekele Worku |
Article - 43 | Title | A Review on the Security of the Internet of Things (IoT) | 1795 – 1801 |
Authors | Hafiz MusabIqbal, Hashim Ali Khokhar, Usman Ahmed Raza |
Article - 44 | Title | Gender Estimation on Social Media Using Recurrent Neural Network | 1802 – 1812 |
Authors | Aamina Atta, Dr. Khalid Masood, Afrozah Nadeem, Sundus Munir |
Article - 45 | Title | A Unified Framework for Encryption and Decryption of Images Based on Autoencoder (UFED) | 1813 – 1820 |
Authors | Muhammad Azeem, Dr. Shazia Saqib, Farrukh Sadiq |
Article - 46 | Title | Impact of Postgraduate Students Dropout and Delay in University: Analysis Using Machine Learning Algorithms | 1821 – 1826 |
Authors | Muhammad Nadeem, Sellapan Palaniappan, Waleej Haider |
Article - 47 | Title | Multi-Modal Biometrics Systems: Concepts, Strengths, Challenges and Solutions | 1827 – 1831 |
Authors | Achimba Terfa, Alaaga James, Kwaghbee Sever |
Article - 48 | Title | Link Scheduling Algorithm to Mitigate Worst-Case Interference Problems for LTE-A | 1832 – 1836 |
Authors | Shivanandaswamy V. Mahapurush, Prathima Mahapurush, Priyatam Kumar |
Article - 49 | Title | Design, Usage and Impact of Virtual University Mobile LMS Application on Students Learning of Virtual University of Pakistan | 1837 – 1843 |
Authors | Masroor Ahmed, Dr. Shahid Minhas |
Article - 50 | Title | Agrobot in field of Machine Learning | 1844 – 1850 |
Authors | Putul Siddharth, B V A N S S Prabhakar Rao |
Article - 51 | Title | Screening of COVID-19 using Cough Audio Frequencies | 1851 – 1861 |
Authors | Farrukh Sadiq, Dr. Khalid Masood, Muhammad Azeem, Anas Riaz Khan |
Article - 52 | Title | Stop gap removal using spectral parameters for stuttered speech signal | 1862 – 1866 |
Authors | K B Drakshayini, Dr Anusuya M A |
Article - 53 | Title | Survey on IOT Based Medical Box for Elderly People | 1867 – 1871 |
Authors | Pampapathi B M , Chandana Murthy, Supritha Kumar, Pooja M, Supriya K |
Article - 54 | Title | Automated Diabetic Retinopathy Identification Using Convolutional Neural Network | 1872 – 1882 |
Authors | Vidya Manjunath Purushan, Dr. Manja Naik.N |
Article - 55 | Title | Project Selection through a Simulation Model of the Painting Robots | 1883 – 1888 |
Authors | T. Kriangkrai, B. Surapong, C. Kijcha, S. Khongsak, A.H. Ismail |
Article - 56 | Title | Execution Assessment of Machine Learning Algorithms for Spam Profile Detection on Instagram | 1889 – 1894 |
Authors | Usman Rasheed, Akmal Rehan, Salman Afsar, Ahmed Mateen, Tayyaba Raza, Ayesha Khalid, Hira Naeem,Javeria Jameel |
Article - 57 | Title | A Review on Anomaly Detection in Time Series | 1895 – 1900 |
Authors | Syed Hassan Ali Shah , Muhammad Junaid Akbar, Usman Ahmed Raza |
Article - 58 | Title | A Smart Deforestation Monitoring and Control System Model | 1901 – 1913 |
Authors | Ibam E. O., Olowokere V |
Article - 59 | Title | VANET routing Protocols :Implementation and Analysis Using NS3 and SUMO | 1914 – 1919 |
Authors | Maria Jan, Salman Afsar, Ahmed Mateen, Muhammad Qasim Yasin, Bilal Safdar,Abdul Rehman |
Article - 60 | Title | Systematic Approach to Perform Task Centric Exploratory Data Analysis with Case study | 1920 – 1927 |
Authors | Parvatham Niranjan Kumar, Kambhampati Vijay Kumar |
Article - 61 | Title | An Analysis on Object Recognition Using Convolutional Neural Networks | 1928 – 1935 |
Authors | Mamoona Saleem, Salman Afsar, Ahmed Mateen, Arslan Zaheer, Muhammad Tariq, Muhammad Asim Raza |
Article - 62 | Title | On Topological Indices of Dual Graph of Benzene Ring Embedded in P-Type Surface in 2D Network | 1936 – 1941 |
Authors | Azhar Iqbal, Gohar Ali, Javed Khan, Gul Rahmat, Muhammad Numan, Andleeb Kausar |
Article - 63 | Title | Algorithmic Approaches For Image Edge Detection | 1942 – 1948 |
Authors | Afrozah Nadeem, SyedaBinish Zahra, Sundus Munir, Sadia Kousar, Arfa Hassan, Abdul Rehman |
Article - 64 | Title | Music Genre Classification using Optimized Sequential Neural Network | 1949 – 1958 |
Authors | Anahitaa R, Roopikha Ganesh, R Shivani, Pattabiraman V |
Article - 65 | Title | Sign Language and Common Gesture Using CNN | 1959 – 1965 |
Authors | Piyush Kapoor, Hema N |
Article - 66 | Title | IoT Based Accident Detection and Life Guard System | 1966 – 1971 |
Authors | Saranya S, Karthika G, Gayathri U, Ramya B, Avinashilingam N |
Article - 67 | Title | Artificial Intelligence for Cervical Cancer Analysis | 1972 – 1979 |
Authors | Ruth Reátegui, Priscila Valdiviezo-Diaz, Luis Barba-Guamán |
Article - 68 | Title | Improved Numerical Computation to Solve Lane-Emden type Equations | 1980 – 1984 |
Authors | Amir Qamar, Sh. M. Zeeshan Iqbal, Fida Hussain Khoso, Zaheer Uddin,Aijaz Ahmed Arain |
Article - 69 | Title | ECG Arrhythmia Time Series Classification Using 1D Convolution –LSTM Neural Networks | 1985 – 1990 |
Authors | Yousra MjAlqaisi, Muhammad Aziz Muslim , Rahmadwati |
Article - 70 | Title | Key Benefits of Cloud-Based Internet of Vehicle (IoV)-Enabled Fleet Weight Management System | 1991 – 1995 |
Authors | Muhammad Shakeel Faridi, Dr. Saqib Ali, Dr. Salman Afsar, Zahid Javed |
Article - 71 | Title | A systematic Approach to Human Motion Recognition using Deep Learning | 1996 – 2005 |
Authors | Shaashwat Agrawal, Anish Jamedar, Mangamudi Yashwanth, Dr. Swarnalatha P |
Article -72 | Title | Machine Learning Implementation for Health insurance | 2006 – 2008 |
Authors | Sujith Thota, Kotha Vishnu Sai, P Swarnalatha |
Article - 73 | Title | Blockchain Based Voting System | 2015 – 2018 |
Authors | Charan Reddy, K Sriraj, C Gangadhar, P Swarnalatha |
Article - 74 | Title | Deep Learning Chatbot using Python | 2019 – 2023 |
Authors | Sai Kiran S, Srinivas Likhith R , P Swarna Latha |
Article - 75 | Title | Fog Networks: A Prospective Technology for IoT | 2024 – 2028 |
Authors | Urooj Yousuf Khan, Tariq Rahim Soomro |
Article - 76 | Title | The role of social media during COVID–19 pandemic situation and Domestic violence: Its impacts on Pakistan Society | 2029 – 2035 |
Authors | Qamar Ayaz Mirani, Azeem Ayaz Mirani, Muhammad Suleman Memon, Rozina Chohan, Mumtaz Qabulio |
Article - 77 | Title | IOT Framework for Heart Diseases Prediction Using Machine Learning | 2036 – 2041 |
Authors | BALJINDER KAUR |
Article - 78 | Title | The Importance of Ethical Hacking Tools and Techniques in Software Development Life Cycle | 2042 – 2049 |
Authors | Syed Zain ul Hassan, Saleem Zubair Ahmad |
Article - 79 | Title | Lung Cancer Detection Using Chi-Square Feature Selection and Support Vector Machine Algorithm | 2050 – 2060 |
Authors | Vikas, Dr. Prabhpreet Kaur |
Article - 80 | Title | Credit Card Fraud Detection using Imbalance Resampling Method with Feature Selection | 2061 – 2071 |
Authors | Kajal, Dr. Kamaljit Kaur |
Article - 81 | Title | Detection of Abnormalities in Real-Time Computer Network Traffic Empowered by Machine Learning | 2072 – 2079 |
Authors | Javairya Nadeem, Arfan Ali Nagra, Muhammad Asif, Aqsa Iftikhar |
Article - 82 | Title | Optimization of Factorial Design with the type of Plackett-Burman Design to Study the Effects of Organic Rice Production Process: First Step Experiment | 2080 – 2084 |
Authors | B. Surapong, P. Suwattanarwong |
Article - 83 | Title | Optimization of Factorial Design with the type of Plackett-Burman Design to Study the Effects of Organic Rice Production Process: Second Step Experiment | 2085 – 2089 |
Authors | P. Suwattanarwong, B. Surapong |
Article - 84 | Title | Deep Learning Network Anomaly-Based Intrusion Detection Ensemble For Predictive Intelligence To Curb Malicious Connections: An Empirical Evidence | 2090 – 2102 |
Authors | Arnold Adimabua Ojugo, Elohor Ekurume |
Article - 85 | Title | Empirical Evidence of Socially-Engineered Attack Menace Among Undergraduate Smartphone Users in Selected Universities in Nigeria | 2103 – 2108 |
Authors | Arnold Adimabua Ojugo, Andrew Okonji Eboka |
Article - 86 | Title | Using ML and Data-Mining Techniques in Automatic Vulnerability Software Discovery | 2109 – 2126 |
Authors | Imdad Ali Shah, Samina Rajper, Noor ZamanJhanjhi |
Article - 87 | Title | Virtualization Security in Cloud Computing- A Survey | 2127 – 2137 |
Authors | A. Rafique, Usman Nawaz, Namra Waheed, Muhammad Sama Yousaf |
Article - 88 | Title | Guidance and Counseling Record Management System | 2138 – 2144 |
Authors | Rachel T. Alegado, Almon M. Alegado, Gloria M. Alcantara |
Article - 89 | Title | CAPTCHA Design: A Novel Security Method using Sindhi Language | 2145 – 2149 |
Authors | Abdullah Maitlo, Riaz Ahmed Shaikh, Haque Nawaz, Asad Hameed Soomro, Samar Abbas Mangi, Inayatullah Soomro |
Article - 90 | Title | Analysis of authorship attribution technique on Urdu tweets empowered by machine learning | 2150 – 2157 |
Authors | Zain Ali, Arfan Ali Nagra, Zufishan Hameed, Muhammad Asif |
Article - 91 | Title | False Intel Detection In Crowd Source Knowledge Base | 2158 – 2164 |
Authors | Amal Antony, Surya T, Elma Mariya, Vismaya M Winnes, Treesa Joseph |
Article - 92 | Title | Einblick- A Sentimental Analysis And Opinion Mining System For Mobile Networks | 2165 – 2170 |
Authors | Milan Varghese, Darwin DCruz, Aiswarya S, Mary Minnu James, Renjini H |
Article - 93 | Title | Medical Chatbot (Medibot) | 2171 – 2174 |
Authors | Aadhil Biju, Nikhil.S.Menon, Sharon Lijo Joseph, Darrel Lopez, Sinijoy PJ |
Article - 94 | Title | Rayquaza Centralized Billing Application | 2175 – 2177 |
Authors | Adith Rajesh, Akshay Kumar, John J Loui , Kiran Antony, Lima Sebastian |
Article - 95 | Title | Smart Electronic Bin Using IoT | 2178 – 2182 |
Authors | Chris Antony Correya, Dixon Sebastian , Stevin Felix , Vishnu Dhanapal , Renjini H |
Article - 96 | Title | Social Distance Monitoring Using Drone | 2183 – 2187 |
Authors | Adithya E Ajith,Elizabeth Joseph, Santhra Martin, Sebatinie Cyril , Sebin Jose |
Article - 97 | Title | Home Security | 2188 – 2191 |
Authors | Shanty Thomas, Ansil H, Seethu George |
Article - 98 | Title | Hybrid Optimization of Multiple Intelligent Recommendation Engines for Software Development Cycles | 2192 – 2198 |
Authors | Ali Jaafar Meera Al-arkawazi, Abdullahi Abdu Ibrahim |
Article - 99 | Title | A Comparative Analysis of Semantic Web Databases Based on Scalability and Performance | 2199 – 2205 |
Authors | Naveed Ahmed, Ghulam Nabi, Rahmat Ali, Samiullah Bhatti , Dr. Riaz Ahmed Shaik , Mujeeb-Ur-Rehman Jamali, Dr. Samina Rajper, Dr. Shaista Khan |
Article - 100 | Title | Fraud Detection in E-Commerce Using Machine Learning | 2206 – 2211 |
Authors | Muhammad Ahsan Saeed, Farrukh Yousaf, Osama Bin Khalid, Mushhad Gilani, Qamar Nawaz, Isma Hamid |
Article - 101 | Title | Lane Detection and Lane Departure Warning System | 2212 – 2218 |
Authors | Sathyajith S, Allwin Antony, Jeevan C Paul, Dinu Johnson, Treesa Joseph |
Article - 102 | Title | Enhancement of Network Lifetime for Wireless Sensor Networks with Mobile Sink Node | 2219 – 2225 |
Authors | Mohammad Khalaf Rahim Aljuaifari |
Article - 103 | Title | Operating Systems for Ethical Hackers - A Platform Comparison of Kali Linux and Parrot OS | 2226 – 2233 |
Authors | Syed Zain ul Hassan, Zainab Muzaffar, Saleem Zubair Ahmad |
Article - 104 | Title | Study on Anxiety and Depression in Students Performance due to Excessive Usage of Smartphones | 2234 – 2240 |
Authors | Salman Mahmood, Muhammad Waseem Iqbal, Muhammad Raza Naqvi, Rahat Bano, Bilal Mustafa |
Article - 105 | Title | Understanding the Agricultural Systems Modeling: A Review | 2241 – 2248 |
Authors | Adeel Ahmad, Memoona Shehzadi, Syed Aftab Wajid, Rana Muhammad Javed Ghafoor, Naveed Akhtar, Muhammad Shafqat, Nida Mahreen, Rashad-Ul-Sher |
Article - 106 | Title | Implementation of Selection Sort Algorithm in Various Programming Languages | 2249 – 2255 |
Authors | Arisha Naz, Haque Nawaz, Abdullah Maitlo, Syed Muhammad Hassan |
Article - 107 | Title | An Approach on MCSA-Based Fault Detection Using Discrete Wavelet Transform and Fault Classification Based on Deep Neural Networks | 2256 – 2259 |
Authors | Muhammad Zuhaib, Faraz Ahmed Shaikh, Usman Ahmed Shaikh, Asadullah Soomro |
Article - 108 | Title | Framework for Location Based Attendance System by Using Fourth Industrial Revolution (4IR) Technologies | 2260 – 2266 |
Authors | Azhar Ali, Muhammad Yaqoob Koondhar, Mansoor Hyder Depar, Zulfikar Ahmed Maher, Muhammad Malook Rind, Asadullah Shah |
Article - 109 | Title | Acceptance of IoT Learning Among University Students at Pakistan | 2267 – 2271 |
Authors | Humaiz Shaikh, Zulfikar Ahmed Maher, Ali Raza, Muhammad Yaqoob Koondhar, Saajid Hussain, Asadullah Shah |
Article - 110 | Title | Pervasive Learning Environment for Educational Makerspaces with Emerging Technologies and Teaching and Learning Transformation | 2272– 2277 |
Authors | M. Yaqoob Koondhar, Muniba Memon, Ali Raza Rang, Asadullah Shah |
Article - 111 | Title | AI Based Motor Vehicles Detection and Tracking System Using Smartphone Application | 2278 – 2282 |
Authors | Saqib Ali Khaskheli, Mubina Pathan, Barkatullah Qureshi, Azhar Ali Khaskheli, Toufique Ahmed Nizamani, Noor Nabi Dahri, Faiza Dahri |
Article - 112 | Title | Volume-Adaptive Big Data Model for Relational Databases | 2283 – 2295 |
Authors | Patrick O. Obilikwu, Kenneth D. Kwaghtyo, Edward N. Udo |
Article - 113 | Title | A Methodology for Incorporating Quality Assurance Practices during Software Development Life Cycle | 2296 – 2301 |
Authors | Eraj Laaraib, Zulfikar Ahmed Maher, Zulfiqar Ali Solangi,Muhammad Yaqoob Koondhar, Mukhtiar Memon, MansoorHyder Depar, Asadullah Shah |
Article - 114 | Title | Adaptive Auditory Feedback Mechanism of Visual Impaired | 2302 – 2312 |
Authors | Waqas Saeed , Hafiz M Mudassar Khan , Sajid Rehman Babar , Akbar Ali |
Article - 115 | Title | APSSR: Adaptive Packet Size Selection Based Routing Protocol for Underwater Acoustic Sensor Networks | 2313– 2323 |
Authors | Sajid Rehman Babar, Waqas Saeed , Hafiz M Mudassar Khan, Akbar Ali |
Article - 116 | Title | Implementation Based Approach to analyze MPLS and Segment Routing Traffic by Using ODL SDN Controller | 2324 – 2336 |
Authors | Waqas Saeed, Davide Adami , Sajid Rehman Babar, Akbar Ali |
Article - 117 | Title | FPGA Seven-Segment-Display by Using Altera DE2-115 Board with Practice and Implementation | 2337 – 2340 |
Authors | Waqas Saeed , Luca Valcarenghi , Hafiz M Mudassar Khan , Maria Zuriaz , Sajid Rehman Babar , Akbar Ali |
Article - 118 | Title | Survey on Transaction Verification Model based on Blockchain Architecture | 2341 – 2349 |
Authors | Waqas Saeed , Dr Majid Husain , Hafiz M Mudassar Khan , Akbar Ali , Sajid Rehman Babar |
Article - 119 | Title | Impact of Excessive Usage of Smartphone in Kids | 2350 – 2359 |
Authors | Hafiz Rabeet Ahmad, Muhammad Waseem Iqbal, Tayyaba Farhat, Muhammad Latif , Syed Khuram Shahzad, Muhammad Adeel, Muhammad Raza Naqvi |
Article - 120 | Title | State of the Art Robotics for Combating with COVID-19 Pandemic | 2360 – 2364 |
Authors | Muhammad Ibrar, Muhammad Asif, Muhammad Kashif, Naveed Imran, Sana Hameed, Mubashir Ali |
Article - 121 | Title | Speech Recognition System (Home Appliances Controller of Local & Remote System) using LPC & HMMs Methodologies | 2365 – 2370 |
Authors | Nadeem Ahmed Kanasro, Shazia Samoon, Mujeeb-U-Rehman Jamali, Fiaz Ahmed Memon, Shahmurad Chandio |
Article - 122 | Title | Implementation of Selection Sort Algorithm in Various Programming Languages | 2371 – 2377 |
Authors | Arisha Naz, Haque Nawaz, Abdullah Maitlo, Syed Muhammad Hassan |
Article - 123 | Title | The Impact of Information and Communication Technology and Social Mediain HEIs: A Review | 2378 – 2383 |
Authors | Nimra Afzal, Zaira Hassan, Hina Bhanbhro, Momina Ali, Kinza Bisharat Ali, Neelam Baloch |
Article - 124 | Title | Adaptive Educational Hypermedia Systems: A Systematic Review | 2384 – 2389 |
Authors | Saima Shoro, Riaz Ahmed Shaikh, Sadia Anwar, Aisha Anwar. Sajid Hussain Danwar |
Article - 125 | Title | Analysis Of Session Initiation Protocol With VoIP In Multimedia Conferencing System | 2390 – 2394 |
Authors | Muhammad Adnan Kaim Khani, Malook Rind, Asif Ali Wagan, Abdul Hafeez Shaikh, Mansoor Hyder Depar, Raheel Sarwar,Abida Luhrani, Humair Nawaz, Zeeshan Ahmed |
Article - 126 | Title | IoT Based Smart Home Automation using Wireless Power Transfer | 2395 – 2400 |
Authors | Areeb Anis Khan, Chandar Kumar , Dr Zahid Ali, Asad Ali, Vengas Memon,Syed Yasir Shah |
Article - 127 | Title | Designing Threat Detection Model for Emerging Software Platform | 2401 – 2407 |
Authors | Saima Shoro, Samina Rajper, Aisha Anwar, Sadia Anwar, Abdul Basit Shaikh |
Article - 128 | Title | Assessment of Default Risk Factors in the Disbursement of Home Loans | 2408 – 2420 |
Authors | Zafar Nasir, Zeeshan Ahmed, Chaman Lal |
Article - 129 | Title | Cyber Attacks Impacting on Communication Using Social Media: Systematic Review Using Data Cluster Ball | 2421 – 2429 |
Authors | Saima Shoro, Abdullah Maitlo,Haque Nawaz, Inayatullah Soomro, Allah Dino Seelro |
Article - 130 | Title | Pizza Dough Service Provider at Various Area Followed by Depth-First Search Algorithm | 2430 – 2434 |
Authors | Ambreen, Dr Kausar Qureshi, Dure Shahwar |
Article - 131 | Title | An Analysis on Measuring Graph patterns in Social Networks | 2435 – 2440 |
Authors | Riaz Ahmed Shaikh , Noor Ahmed Shaikh, Muhammad Hanif Tunio, Yumna Magsi, Sajid Ahmed Ghangro, Saima Shoro |
Article - 132 | Title | Impact of Ultra-Wideband Antenna Application on Underground Object Detection | 2441 – 2446 |
Authors | Dr. Zahid Ali, Ghulam Abid, Chandar Kumar, Vengas Memon, Aysha Siddiqui |
Article - 133 | Title | Sindhi Stemmer using Affix Removal Method | 2447 – 2451 |
Authors | Ambreen A. Sattar, Suhni Abbasi, Mutee U Rahman, Amber Baig, Masroor Nizamani |
Article - 134 | Title | New Models for Estimation of Solar Radiation for Five Cities of Pakistan | 2452 – 2458 |
Authors | Atteeq Razzak, Zaheer Uddin, M. Jawed Iqbal |
Article - 135 | Title | Impact of COVID-19 on publics Internet and TV Watching behavior: A cross-national Study | 2459 – 2468 |
Authors | Hamza Rehman Butt,Dr Shahid Minhas,Aysha Anwar,Kiran Sajid |
Article - 136 | Title | Iot Based Smart Kit For Coal Miners Safety Purpose | 2469 – 2472 |
Authors | Syed Faiz Ul Huda, Chandar Kumar , Muhammad Ali Noman , Syed Yasir Shah , Muhammad Mubashir Iqbal |
Article - 137 | Title | Implementation of Wireless Sensor Technologies using virtual wire library for controlling alternative current appliances | 2473 – 2478 |
Authors | Mujeeb-ur-Rehman Jamali,ShaziaSamoon, Nadeem A. Kanasro, Farhan Bashir Shaikh, Fiaz Ahmed Memon, Ghulam Nabi Rajper |
Article - 138 | Title | Intelligent Hybrid Fraud Detection Using Biometric and Face Recognition | 2479 – 2494 |
Authors | Hafiz Muhammad Tayyab Khushi, Tehreem Masood, Arfan Jaffar |
Article - 139 | Title | Machine Learning Empowered Urdu Characters Recognition Mechanism | 2495 – 2500 |
Authors | Ayima Zahra, Maneeba Ashrafl, Muhammad Sohaib |
Article - 140 | Title | Towards Covid-19 Detection in X-ray images using Convolutional Neural Network | , 2501 – 2507 |
Authors | Marium Malik, Tehreem Masood, Maira Kamran |
Article - 141 | Title | Predictive modeling to Study Lung Cancer Metastasis | 2508 – 2512 |
Authors | Muhammad Junaid Iqbal, Abid Ali, Usman Ahmed Raza, Usman Nawaz, Yawar Ahmed, Sana Mujahid |
Article - 142 | Title | Python program to generate spherical harmonic | 2513 – 2523 |
Authors | Kousar Shaheen, Roohi Zafar, Saba Javaid |
Article - 143 | Title | BBVPL: A Block-Based Visual Programming Language Built on Google’s Blockly | 2524 – 2532 |
Authors | Ashfaq Ahmad, Muhammad Idrees, Muhammad Arif Butt, Hafiz Muhammad Danish |
Article - 144 | Title | Comparative Analysis: Intrusion Detection in Multi-Cloud Environment to Identify Way Forward | 2533 – 2539 |
Authors | Hafiz Hasan Naqvi, Tahir Alyas, Nadia Tabassum, Umer Farooq, Abdallah Namoun, Syed Aun M. Naqvi |
Article - 145 | Title | Photovoltaic Integrated Distributed Energy Generation System for Sustainable Energy Development Considering Reliability Indices and Levelized Cost of Energy | 2540 – 2549 |
Authors | Muhammad Tamoor , Muhammad Abu Bakar Tahir, Muhammad Ans Zaka |
Article - 146 | Title | The Role of Machine Learning to Mitigate the Malicious Crime | 2550 – 2557 |
Authors | Imdad Ali Shah, Dr.Noor Ahmed Shaikh, SqnLdr ( R ) Aneela Kiran,Shahid Hussain Danwar |
Article - 147 | Title | IOT Based Smart System for Servival Detection in Disasters Zones | 2558 – 2568 |
Authors | Muhammad Hammad-u-Salam,Zahoor Hussain, Shunaila Jabeen |
Article - 148 | Title | Energy-Efficient Routing Protocols for WSN: A Systematic Literature Review | 2569– 2579 |
Authors | Muhammad Shahzeb Ali, Dr. Ansar Munir Shah, Mubashir Hussain Malik,Ahmed Raza Mohsin, Maira Khalid |
Article - 149 | Title | Towards Silver Standard Dependency Treebank of Urdu Tweets | 2580– 2587 |
Authors | Amber Baig, Mutee U Rahman, Sirajuddin Qureshi, Saima Tunio, Sehrish Abrejo, Shadia S. Baloch |
Article - 150 | Title | Software Development and Modelling for Churn Prediction Using Logistic Regression in Telecommunication Industry | 2588– 2592 |
Authors | Syed Zain Mir, Azfar Ghani, Sajid Yasin, AzeemAftab, Ikram e Khuda |
Article - 151 | Title | Comparative Analysis of Software Process Models in Software Development | 2593– 2599 |
Authors | Sajid Ahmed Ghanghro, Dr. Muhammad Ajmal Sawand, Wajid Ahmed Channa, Ubaidulla alias Kashif, Muhammad Hanif Tunio, Kishor Kumar, Nooruddin |
Article - 152 | Title | Performance Analysis of Internet Streams using Remote Desktop Tools | 2600– 2606 |
Authors | Vengas Memon, Dr Zahid Ali , Chandar Kumar , Rafay Rushail, Areeb Anis Khan, Asad Ali Siyal |
Article - 153 | Title | A Study on Use of WhatsApp Messenger among Students for their Academic Achievements: A Case Study | 2607– 2610 |
Authors | Zeeshan Ali Rahu , Hina Bhanbhro ,Rozina Chohan , Hosh Muhammad |
Article - 154 | Title | A Comparative Study of Various Machine Learning Algorithms in Fog Computing | 2611– 2622 |
Authors | Urooj Yousuf Khan, Muhammad Mansoor Alam |
Article - 155 | Title | An Evolutionary Approach of Machine Learning for Monitoring Churn Prediction of Broadband Customer | 2623– 2629 |
Authors | Imran Pathan, Nadeem Ahmed Kanasro, Farhan Bashir Shaikh, Mujeeb U Rehman Maree, Aftab A. Chandio |
Article - 156 | Title | Post Pandemic World and Challenges for E-Governance Framework | 2630 – 2636 |
Authors | Syed Aun M. Naqvi, Tahir Alyas, Nadia Tabassum, Abdallah Namoun,Hafiz Hasan Naqvi |
Article - 157 | Title | Categorization of CVE Based on Vulnerability Software By Using Machine Learning Techniques | 2637 – 2644 |
Authors | SqnLdr (R) Aneela Kiran, Dr.Samina Rajper, Dr. Riaz Ahmed Shaikh, Imdad Ali Shah, Shahid Hussain Danwar |
Article - 158 | Title | Performance Optimization of network using load balancer Techniques | 2645 – 2650 |
Authors | Waleed Khalid, Muhammad Waseem Iqbal, Tahir Alyas, Nadia Tabassum, Nida Anwar, Muhammad Asif Saleem |
Article - 159 | Title | The Promises of Blockchain and Cryptocurrencies Technology for Architecture and Interaction Design | 2651 – 2657 |
Authors | Hafiz M Mudassar Khan , Waqas Saeed , M Waseem Iqbal , Akbar Ali , Maria Zuraiz, M Naveed Shahzad , M Ahmed |