Keywords List for jictra.com.pk


[image] Current Archives About About the Journal Announcements Contact Editorial Team Guidelines for Authors Aims and Scope Preparation of Manuscript Authorship & Contributorship Manuscript Retraction,Withdrawal & Deletion Policy Manuscript Review Plagiarism Policy Publication Ethics Open Access & Copy Right Policy Source of Funding Publication Fee and Waiver Policy Abstracting & Indexing Search Register Login A Novel Morphological Rule-based Approach for Urdu Text Sentiment Analysis PDF Assessing the Usability of Real-Time Urdu Braille Applications: A Comprehensive Evaluation Text-Based Sentiment Analysis Using CNN-GRU Deep Learning Model Adaptive Non-Crashing Functional Bugs in Android Applications An Adaptive E-Assessment for Self-Learning: A Sustainable Education Model in the Post COVID-19 ERA of Digital Media View All Issues Make a Submission For Readers For Authors For Librarians [image]HomeHome January-December Vol.12, No.2 (2021): July-December Vol.12, No.1 (2021): January-June Vol.11, No.2 (2020): July-December Vol.11, No.1(2020): January-June Vol.10, No.2(2019): July-December Vol.10, No.1(2019): January-June Vol.9 No.2 (2018): July-December Vol.9 No.1(2018): January-June Vol.8 No.02 (2017): July-December Vol.8 No.1(2017): January-June Vol.7 No.1(2016): January-December Vol.6 No.1(2015):January-December Vol.4 No.1(2013): January-December Vol.5 No.1(2014): January-December Vol.3 No.1(2012): January-December Vol.2 No.1(2011): January-DecemberHomeHomeHomeHome Dr.Irum NoreenHomeHome privacy statementHome Vol. 14 No. 1 (2023): January-December https://doi.org/10.51239/jictra.v14i1.316 10.51239/jictra.v14i1.316 ACM ACS APA ABNT Chicago Harvard IEEE MLA Turabian Vancouver Endnote/Zotero/Mendeley (RIS) Enhanced Biometric-Based User Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction and Elliptic Curve Cryptography Journal of Information Communication Technologies and Robotic Applications: Vol.11, No.1(2020): January-June Randomized Dynamic Quantum CPU Scheduling Algorithm Journal of Information Communication Technologies and Robotic Applications: Vol.9 No.2 (2018): July-December Analysis and Evaluation of Privacy Issues in Online Social Networks Journal of Information Communication Technologies and Robotic Applications: Vol.10, No.2(2019): July-December Journal of Information Communication Technologies and Robotic Applications: Vol. 14 No. 1 (2023): January-DecemberReturn to Article Details Download Download PDFHome https://doi.org/10.51239/jictra.v14i1.318 10.51239/jictra.v14i1.318 IoT Environment Security and Privacy for Smart Homes Journal of Information Communication Technologies and Robotic Applications: Vol. 13 No. 1 (2022): January-December https://doi.org/10.51239/jictra.v14i1.319 10.51239/jictra.v14i1.319 https://doi.org/10.51239/jictra.v14i1.320 10.51239/jictra.v14i1.320 OLIVE Framework for E-Learning Development at AIOU, Pakistan Journal of Information Communication Technologies and Robotic Applications: Vol.6 No.1(2015):January-December A Novel-Based Deep Learning Approach for Early Diagnosis of Cotton Crop Disease Prioritizing Critical Challenges for the Quality of Crowdsource Software Products Journal of Information Communication Technologies and Robotic Applications: Vol.8 No.02 (2017): July-DecemberReturn to Article Details Download Download PDFHomeHome Privacy StatementHome Forgot your password?Return to Article Details learn more about the software contact the journalHomeHome Bi-LSTM Deep Learning Approach for Employee Churn Prediction Predictive Text Summarization: Improving Efficiency and Effectiveness Yield Estimation of Citrus Fruit Using Color Based Segmentation and Circular Hough Transformation COVID-19 Genomic Sequences Analysis using Google Variant Transformation Detecting social bots activity in Twitter using deep learning approach Detecting social bots activity in Twitter using deep learning approachHome A Measurement Study of Cooperative Network on WiMAX Technology using BICM LDPC with iterative Decoding Technique Detection and Minimization of Jamming Attacks to Enhance String Stability in VANETs Classification and Evaluation of Land Cover Variations Using Landsat Data A Novel Method for Face Recognition Based on Features and Gestures Integrated Wristband using an Inertial Measurement Unit and Electromyography Sensors to Control Robotic Car Urdu Handwritten Character Recognition using Deep Learning Comparative Performance Analysis of Levenberg-Marquardt, Bayesian Regularization and Scaled Conjugate Gradient for the Prediction of flash FloodsHome A Quality Assessment Model Based on Usability Metrics for M-Health Applications User Interfaces Design of Energy Efficient 3GPP Turbo Encoder v5.0 Using High Range IO Standard Using Ultra Scale FPGA Z Notation Formalization of Blockchain Healthcare Document Sharing Based on CRBAC Sound Recognition Aimed towards Hearing Impaired Individuals in Urban Environment using Ensemble Methods Artificial Intelligence Based Multi-modal Sensing for Flash Flood Investigation QoS in Vehicular Ad Hoc Networks – A Survey A survey on Trust and Reputation-Based Clustering Algorithms in Mobile Ad-hoc Networks A Computational Power Allocation Scheme for Fair NOMA Downlink System Formal Verification of Safety and Liveness Properties using Coloured Petri-Nets: A Flood Monitoring, Warning, and Rescue System The Progress of E-Government across the Globe: The Role of Technology as a Pushing FactorHome Shortest Path Energy Efficient Hierarchal Clustering Protocol for Wireless Sensor Networks Survey on Operating Systems for the Applications of the Internet of Things Surveillance System Concept Due to the Uses of Face Recognition Application Requirements Prioritization Techniques for Global Software Engineering Routing Protocols Security Issues in Mobile Ad Hoc Network Implementation of Water Distribution Monitoring Framework Using PLC Sunspots Activity Cycles Using Linear and Non-Linear Technique Heavy School Bags and Their Effect on the Growth of Children in Karachi Restraining Terrorism: A UWB Based Communications Infrastructure for Preventing Terrorist Activities in Pakistan Model for Laptop Theft Tracking and Data RetrievingHome Home privacy statement Forgot your password? Return to Article Details Download Download PDF Open Journal Systems contact the journal Author Guidelines register log in Dr.Irum Noreen Vol.2 No.1(2011): January-December Journal of Information Communication Technologies and Robotic Applications: Vol. 14 No. 1 (2023): January-December https://doi.org/10.51239/jictra.v14i1.315 10.51239/jictra.v14i1.315 Journal of Information Communication Technologies and Robotic Applications: Vol.8 No.02 (2017): July-December Privacy Statement Machine Learning Techniques for Early Classification of COVID-19 Disease in Patients Potato plant leaf disease classification using an Enhanced Deep Learning Model Rice Disease Classification using Deep Learning Plant Disease Detection using Convolutional Neural Network An Analysis of Edge Detection Methodologies in Spatial and Morphological Perspective Continual Deep Learning through Unforgettable Past Practical Convolution Sentiment Analysis on Twitter Data using Machine Learning Techniques A Text Tracking Method using Maximally Stable Extremal Regions and Speeded up Robust Features Automated Vulnerability detection for software using NLP techniques Detecting social bots activity in Twitter using deep learning approach Detecting social bots activity in Twitter using deep learning approach Iterative Non-Rigid Image Registration in Brain MRI Images SMOTEMultiBoost: Leveraging the SMOTE with MultiBoost to Confront the Class Imbalance in Supervised Learning AI-Enabled Elderly Care Robot Design of Half Circular Disc Printed Monopole Antenna for Ultra Wide Band and Super Wide Band Applications Managing Internet of Things based traffic using Software Defined Networking Radiation Pattern Reconfigurable Antenna for 5G Applications Design and Implementation of Solar Tracker on Solar Panel Context-Aware and Sequential Pattern Mining based recommendations for Research Papers: A Hybrid Approach Mitigating the Knock-on-Effect of DDoS Attacks on Application Layer using Deep Learning Multi-Layer Perception Consensus Based Formation Control of Multiple UAVs PRODUCT-PAIR RECOMMENDATION FOR CUSTOMERS USING MACHINE LEARNING TECHNIQUE Identification of Discourse Boundaries Using Anaphorically Annotated Text Fuzzy Logic-based Expert System for Assessing Programming Course Performance of E-Learning Students Investigating the Use of 3D Mobile Games for Teaching Ethics & Basics to Children Opinion Mining and Summarization: A Comprehensive Review Comparative Performance Analysis of Levenberg-Marquardt, Bayesian Regularization and Scaled Conjugate Gradient for the Prediction of flash Floods Land Cover Classification and Change-Detection Analysis Using Remote Sensing Performance Comparison of Structured Based Data Aggregation Schemes in Wireless Sensor Networks Design of an Improved Energy Efficient Cluster-based Routing Protocol backed by Wireless Energy Transfer for Wireless Sensor Networks Image Classification using AlexNet with SVM Classifier and Transfer Learning IMPROVING THE USABILITY TESTING: FUZZY BASED EXPERT SYSTEM FOR TEST CASE GENERATION ON WEB GRAPHICAL USER INTERFACE Formal Modeling of a Mail Transport System based on Multi-Agent System-of-Systems Load Balancing of SDN-enabled Wireless Network: Challenges, Technique and Evaluation DNA Computing: A Review of Promises and Potential Systematic Review of Stable Election Protocols Variants Modeling and Analysis of 5G Antenna Radiation Effect on Human Head by Calculating Specific Absorption Rate (SAR) using Adult Brain Model Implementation of Periodic Boundary Conditions in FDTD Algorithm Comparison of Neural Networks and Support Vector Machines for the Mass Balance Ablation Observation of Glaciers in Baltoro Region Design and Development of 60 Gb/s DPSK Transceiver System for Renewal of Optical Signal A NEW ENERGY-EFFICIENT CLUSTER-HEAD SELECTION (NEETCH) TECHNIQUE TO INCREASE WIRELESS SENSOR NETWORK’s LIFETIME Two Fold Image Forgery Detection System Using Combined Key point based method and Block based method Bio-inspired Hybrid Locomotion in Mobile Robots: A Comprehensive Survey The Progress of E-Government across the Globe: The Role of Technology as a Pushing Factor E – Governance Model for Universities Internet of Things in Telemedicine: a Discussion Regarding to Several Implementation Spectrum Sensing by Using Energy Detector Implementation of Advanced Encryption Standard (AES) 192 Bit on FPGA Implementation of Data Encryption Standard (DES) on FPGA Extended Scrum Process Model Using Software Reliability Engineering Concerns Ensuring Quality of Service Using Multi-Criteria Quadrant Based Clustering (MCQC) Protocol for Wireless Sensor Networks ChallengesVehicular Lifelogging: Issues, ChallengesVehicular Lifelogging: Issues, ChallengesVehicular Lifelogging: Issues, ChallengesVehicular Lifelogging: Issues, ChallengesVehicular Lifelogging: Issues, ChallengesVehicular Lifelogging: Issues, Challenge ANALYSIS OF QUALITY OF SERVICE FOR VIDEO STREAMING USING USERS EXPERIENCE Design of a Robot for Environmental Monitoring to Help in Search and Rescue Formal Validation of an Agent-based Location Guidance System (LGS) Wireless Robotic Search & Rescue Operation for Calamities Identifying Cognitive Weaknesses in Students Learning through Bloom’s Taxonomy On Twisted Soft Ideal of Soft Ordered Semigroups Model for Laptop Theft Tracking and Data Retrieving Impact of Network Traffic Load on Performance of Queue Controllers BUILDING AUTOMATION (IOT) BY WSN Modern Learning Method Using Augmented Reality in Education System Advance Procedure Of Encryption And Decryption Using Transposition And Substitution Visualization of Dual Feasible Bases in Primal Space Population Density Pattern Using Spatial Interaction Models and its Simulation 95 Structure Investigation, Economics and Stratigraphy of the Paleozoic, Mesozoic and Cenozoic Sequence in the Vicinity Eastern and Western side of the Salt Range, Punjab Pakistan Geographical Information System (GIS) Analysis of Earthquake Destruction Pattern in Pakistan A Comparative Study of 3G, 4G Cellular Networks & Beyond and their Future Prospects in Pakistan Evaluation of Unusual Damage Caused by Amplified Seismic Waves Passing Through Around Quetta Basin Using Aftershock System Analysis System Development Life Cycle (SDLC) of Human Body to Reduce Risks of Obesity and Type 2 Diabetes Research and Implementation of Mobile Based J2ME Survey Study of Alternate Delivery Channels for Financial Transactionsand its Reasons Automatic Telephone Answering Machine Minimization of Security Issues in Cloud Computing Study of Efficient and Reliable Trust Model for Wireless Sensor Nodes Internet Protocol Security in Virtual Private Networks Connectivity Mathematical Model for the Comparison of Boys and Girls Schooling/Dropouts for Class - I in Public Sector Schools of Sindh, Pakistan Comparative Study of 5G Mobile System Impact of Physical Exercise on functions of Human CPU - the Brain Seeking of an Optimal Path Study of Human Speculations Android Robot Interaction in Future World STATUS OF PETROLEUM SECTOR IN PAKISTAN - A REVIEW Issues and Security of Plastic Currency Evaluation of Potential Effectiveness of Desktop Remote Video Conferencing for Interactive Seminars Potential of Wind Power in Pakistan A STUDY OF MOBILE NETWORK SWITCHING IN PIA ACCOUNTING SYSTEM Analysis of Business Process Outsourcing in Pakistan The Hospital Network - A New Approach Towards Networking

Explore More

Dive deeper into jictra.com.pk

Search Another Domain