[image]CurrentArchivesAboutAbout the JournalAnnouncementsContactEditorial TeamGuidelines for AuthorsAims and ScopePreparation of ManuscriptAuthorship & ContributorshipManuscript Retraction,Withdrawal & Deletion PolicyManuscript ReviewPlagiarism PolicyPublication EthicsOpen Access & Copy Right PolicySource of FundingPublication Fee and Waiver PolicyAbstracting & IndexingSearchRegisterLoginA Novel Morphological Rule-based Approach for Urdu Text Sentiment AnalysisPDFAssessing the Usability of Real-Time Urdu Braille Applications: A Comprehensive EvaluationText-Based Sentiment Analysis Using CNN-GRU Deep Learning ModelAdaptive Non-Crashing Functional Bugs in Android ApplicationsAn Adaptive E-Assessment for Self-Learning: A Sustainable Education Model in the Post COVID-19 ERA of Digital MediaView All IssuesMake a SubmissionFor ReadersFor AuthorsFor Librarians[image]HomeHomeJanuary-DecemberVol.12, No.2 (2021): July-DecemberVol.12, No.1 (2021): January-JuneVol.11, No.2 (2020): July-DecemberVol.11, No.1(2020): January-JuneVol.10, No.2(2019): July-DecemberVol.10, No.1(2019): January-JuneVol.9 No.2 (2018): July-DecemberVol.9 No.1(2018): January-JuneVol.8 No.02 (2017): July-DecemberVol.8 No.1(2017): January-JuneVol.7 No.1(2016): January-DecemberVol.6 No.1(2015):January-DecemberVol.4 No.1(2013): January-DecemberVol.5 No.1(2014): January-DecemberVol.3 No.1(2012): January-DecemberVol.2 No.1(2011): January-DecemberHomeHomeHomeHomeDr.Irum NoreenHomeHomeprivacy statementHomeVol. 14 No. 1 (2023): January-Decemberhttps://doi.org/10.51239/jictra.v14i1.31610.51239/jictra.v14i1.316ACMACSAPAABNTChicagoHarvardIEEEMLATurabianVancouverEndnote/Zotero/Mendeley (RIS)Enhanced Biometric-Based User Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction and Elliptic Curve CryptographyJournal of Information Communication Technologies and Robotic Applications: Vol.11, No.1(2020): January-JuneRandomized Dynamic Quantum CPU Scheduling AlgorithmJournal of Information Communication Technologies and Robotic Applications: Vol.9 No.2 (2018): July-DecemberAnalysis and Evaluation of Privacy Issues in Online Social NetworksJournal of Information Communication Technologies and Robotic Applications: Vol.10, No.2(2019): July-DecemberJournal of Information Communication Technologies and Robotic Applications: Vol. 14 No. 1 (2023): January-DecemberReturn to Article DetailsDownload
Download PDFHomehttps://doi.org/10.51239/jictra.v14i1.31810.51239/jictra.v14i1.318IoT Environment Security and Privacy for Smart HomesJournal of Information Communication Technologies and Robotic Applications: Vol. 13 No. 1 (2022): January-Decemberhttps://doi.org/10.51239/jictra.v14i1.31910.51239/jictra.v14i1.319https://doi.org/10.51239/jictra.v14i1.32010.51239/jictra.v14i1.320OLIVE Framework for E-Learning Development at AIOU, PakistanJournal of Information Communication Technologies and Robotic Applications: Vol.6 No.1(2015):January-DecemberA Novel-Based Deep Learning Approach for Early Diagnosis of Cotton Crop DiseasePrioritizing Critical Challenges for the Quality of Crowdsource Software ProductsJournal of Information Communication Technologies and Robotic Applications: Vol.8 No.02 (2017): July-DecemberReturn to Article DetailsDownload
Download PDFHomeHomePrivacy StatementHomeForgot your password?Return to Article Detailslearn more about the softwarecontact the journalHomeHomeBi-LSTM Deep Learning Approach for Employee Churn PredictionPredictive Text Summarization: Improving Efficiency and EffectivenessYield Estimation of Citrus Fruit Using Color Based Segmentation and Circular Hough TransformationCOVID-19 Genomic Sequences Analysis using Google Variant TransformationDetecting social bots activity in Twitter using deep learning approach
Detecting social bots activity in Twitter using deep learning approachHomeA Measurement Study of Cooperative Network on WiMAX Technology using BICM LDPC with iterative Decoding TechniqueDetection and Minimization of Jamming Attacks to Enhance String Stability in VANETsClassification and Evaluation of Land Cover Variations Using Landsat DataA Novel Method for Face Recognition Based on Features and GesturesIntegrated Wristband using an Inertial Measurement Unit and Electromyography Sensors to Control Robotic CarUrdu Handwritten Character Recognition using Deep LearningComparative Performance Analysis of Levenberg-Marquardt, Bayesian Regularization and Scaled Conjugate Gradient for the Prediction of flash FloodsHomeA Quality Assessment Model Based on Usability Metrics for M-Health Applications User InterfacesDesign of Energy Efficient 3GPP Turbo Encoder v5.0 Using High Range IO Standard Using Ultra Scale FPGAZ Notation Formalization of Blockchain Healthcare Document Sharing Based on CRBACSound Recognition Aimed towards Hearing Impaired Individuals in Urban Environment using Ensemble MethodsArtificial Intelligence Based Multi-modal Sensing for Flash Flood InvestigationQoS in Vehicular Ad Hoc Networks – A SurveyA survey on Trust and Reputation-Based Clustering Algorithms in Mobile Ad-hoc NetworksA Computational Power Allocation Scheme for Fair NOMA Downlink SystemFormal Verification of Safety and Liveness Properties using Coloured Petri-Nets: A Flood Monitoring, Warning, and Rescue SystemThe Progress of E-Government across the Globe: The Role of Technology as a Pushing FactorHomeShortest Path Energy Efficient Hierarchal Clustering Protocol for Wireless Sensor NetworksSurvey on Operating Systems for the Applications of the Internet of ThingsSurveillance System Concept Due to the Uses of Face Recognition ApplicationRequirements Prioritization Techniques for Global Software EngineeringRouting Protocols Security Issues in Mobile Ad Hoc NetworkImplementation of Water Distribution Monitoring Framework Using PLCSunspots Activity Cycles Using Linear and Non-Linear TechniqueHeavy School Bags and Their Effect on the Growth of Children in KarachiRestraining Terrorism: A UWB Based Communications Infrastructure for Preventing Terrorist Activities in PakistanModel for Laptop Theft Tracking and Data RetrievingHomeHomeprivacy statementForgot your password?Return to Article DetailsDownload
Download PDFOpen Journal Systemscontact the journalAuthor Guidelinesregisterlog inDr.Irum NoreenVol.2 No.1(2011): January-DecemberJournal of Information Communication Technologies and Robotic Applications: Vol. 14 No. 1 (2023): January-Decemberhttps://doi.org/10.51239/jictra.v14i1.31510.51239/jictra.v14i1.315Journal of Information Communication Technologies and Robotic Applications: Vol.8 No.02 (2017): July-DecemberPrivacy StatementMachine Learning Techniques for Early Classification of COVID-19 Disease in PatientsPotato plant leaf disease classification using an Enhanced Deep Learning ModelRice Disease Classification using Deep LearningPlant Disease Detection using Convolutional Neural NetworkAn Analysis of Edge Detection Methodologies in Spatial and Morphological PerspectiveContinual Deep Learning through Unforgettable Past Practical ConvolutionSentiment Analysis on Twitter Data using Machine Learning TechniquesA Text Tracking Method using Maximally Stable Extremal Regions and Speeded up Robust FeaturesAutomated Vulnerability detection for software using NLP techniquesDetecting social bots activity in Twitter using deep learning approach
Detecting social bots activity in Twitter using deep learning approachIterative Non-Rigid Image Registration in Brain MRI ImagesSMOTEMultiBoost: Leveraging the SMOTE with MultiBoost to Confront the Class Imbalance in Supervised LearningAI-Enabled Elderly Care RobotDesign of Half Circular Disc Printed Monopole Antenna for Ultra Wide Band and Super Wide Band ApplicationsManaging Internet of Things based traffic using Software Defined NetworkingRadiation Pattern Reconfigurable Antenna for 5G ApplicationsDesign and Implementation of Solar Tracker on Solar PanelContext-Aware and Sequential Pattern Mining based recommendations for Research Papers: A Hybrid ApproachMitigating the Knock-on-Effect of DDoS Attacks on Application Layer using Deep Learning Multi-Layer PerceptionConsensus Based Formation Control of Multiple UAVsPRODUCT-PAIR RECOMMENDATION FOR CUSTOMERS USING MACHINE LEARNING TECHNIQUEIdentification of Discourse Boundaries Using Anaphorically Annotated TextFuzzy Logic-based Expert System for Assessing Programming Course Performance of E-Learning StudentsInvestigating the Use of 3D Mobile Games for Teaching Ethics & Basics to ChildrenOpinion Mining and Summarization: A Comprehensive ReviewComparative Performance Analysis of Levenberg-Marquardt, Bayesian Regularization and Scaled Conjugate Gradient for the Prediction of flash FloodsLand Cover Classification and Change-Detection Analysis Using Remote SensingPerformance Comparison of Structured Based Data Aggregation Schemes in Wireless Sensor NetworksDesign of an Improved Energy Efficient Cluster-based Routing Protocol backed by Wireless Energy Transfer for Wireless Sensor NetworksImage Classification using AlexNet with SVM Classifier and Transfer LearningIMPROVING THE USABILITY TESTING: FUZZY BASED EXPERT SYSTEM FOR TEST CASE GENERATION ON WEB GRAPHICAL USER INTERFACEFormal Modeling of a Mail Transport System based on Multi-Agent System-of-SystemsLoad Balancing of SDN-enabled Wireless Network: Challenges, Technique and EvaluationDNA Computing: A Review of Promises and PotentialSystematic Review of Stable Election Protocols VariantsModeling and Analysis of 5G Antenna Radiation Effect on Human Head by Calculating Specific Absorption Rate (SAR) using Adult Brain ModelImplementation of Periodic Boundary Conditions in FDTD AlgorithmComparison of Neural Networks and Support Vector Machines for the Mass Balance Ablation Observation of Glaciers in Baltoro RegionDesign and Development of 60 Gb/s DPSK Transceiver System for Renewal of Optical SignalA NEW ENERGY-EFFICIENT CLUSTER-HEAD SELECTION (NEETCH) TECHNIQUE TO INCREASE WIRELESS SENSOR NETWORK’s LIFETIMETwo Fold Image Forgery Detection System Using Combined Key point based method and Block based methodBio-inspired Hybrid Locomotion in Mobile Robots: A Comprehensive SurveyThe Progress of E-Government across the Globe: The Role of Technology as a Pushing FactorE – Governance Model for UniversitiesInternet of Things in Telemedicine: a Discussion Regarding to Several ImplementationSpectrum Sensing by Using Energy DetectorImplementation of Advanced Encryption Standard (AES) 192 Bit on FPGAImplementation of Data Encryption Standard (DES) on FPGAExtended Scrum Process Model Using Software Reliability Engineering ConcernsEnsuring Quality of Service Using Multi-Criteria Quadrant Based Clustering (MCQC) Protocol for Wireless Sensor NetworksChallengesVehicular Lifelogging: Issues, ChallengesVehicular Lifelogging: Issues, ChallengesVehicular Lifelogging: Issues, ChallengesVehicular Lifelogging: Issues, ChallengesVehicular Lifelogging: Issues, ChallengesVehicular Lifelogging: Issues, ChallengeANALYSIS OF QUALITY OF SERVICE FOR VIDEO STREAMING USING USERS EXPERIENCEDesign of a Robot for Environmental Monitoring to Help in Search and RescueFormal Validation of an Agent-based Location Guidance System (LGS)Wireless Robotic Search & Rescue Operation for CalamitiesIdentifying Cognitive Weaknesses in Students Learning through Bloom’s TaxonomyOn Twisted Soft Ideal of Soft Ordered SemigroupsModel for Laptop Theft Tracking and Data RetrievingImpact of Network Traffic Load on Performance of Queue ControllersBUILDING AUTOMATION (IOT) BY WSNModern Learning Method Using Augmented Reality in Education SystemAdvance Procedure Of Encryption And Decryption Using Transposition And SubstitutionVisualization of Dual Feasible Bases in Primal SpacePopulation Density Pattern Using Spatial Interaction Models and its Simulation95 Structure Investigation, Economics and Stratigraphy of the Paleozoic, Mesozoic and Cenozoic Sequence in the Vicinity Eastern and Western side of the Salt Range, Punjab PakistanGeographical Information System (GIS) Analysis of Earthquake Destruction Pattern in PakistanA Comparative Study of 3G, 4G Cellular Networks & Beyond and their Future Prospects in PakistanEvaluation of Unusual Damage Caused by Amplified Seismic Waves Passing Through Around Quetta Basin Using Aftershock System AnalysisSystem Development Life Cycle (SDLC) of Human Body to Reduce Risks of Obesity and Type 2 DiabetesResearch and Implementation of Mobile Based J2MESurvey Study of Alternate Delivery Channels for Financial Transactionsand its ReasonsAutomatic Telephone Answering MachineMinimization of Security Issues in Cloud ComputingStudy of Efficient and Reliable Trust Model for Wireless Sensor NodesInternet Protocol Security in Virtual Private Networks ConnectivityMathematical Model for the Comparison of Boys and Girls Schooling/Dropouts for Class - I in Public Sector Schools of Sindh, PakistanComparative Study of 5G Mobile SystemImpact of Physical Exercise on functions of Human CPU - the BrainSeeking of an Optimal PathStudy of Human Speculations Android Robot Interaction in Future WorldSTATUS OF PETROLEUM SECTOR IN PAKISTAN - A REVIEWIssues and Security of Plastic CurrencyEvaluation of Potential Effectiveness of Desktop Remote Video Conferencing for Interactive SeminarsPotential of Wind Power in PakistanA STUDY OF MOBILE NETWORK SWITCHING INPIA ACCOUNTING SYSTEMAnalysis of Business Process Outsourcing in PakistanThe Hospital Network - A New Approach Towards Networking