All Stories

  1. Risk Assessment and Mitigation With Generative AI Models
  2. Security Considerations in Generative AI for Web Applications
  3. Design of federated learning-based resource management algorithm in fog computing for zero-touch network
  4. FedFog - A federated learning based resource management framework in fog computing for zero touch networks
  5. Social Media: An Exploratory Study of Information, Misinformation, Disinformation, and Malinformation
  6. A Review and Analysis of Localization Techniques in Underwater Wireless Sensor Networks
  7. Aircraft Turnaround Manager (ATM): A Solution to Airport Operations
  8. DDoS Intrusion Detection with Ensemble Stream Mining for IoT Smart Sensing Devices
  9. NoSQL: Future of BigData Analytics Characteristics and Comparison with RDBMS
  10. Perspectives of Online Education in Pakistan: Post-covid Scenario
  11. An Improved Particle Swarm Optimization Algorithm for Data Classification
  12. A Survey on Blockchain Technology Supported Approaches for Healthcare System, Open Issues and Challenges
  13. IoT Networks: Security Vulnerabilities of Application Layer Protocols
  14. Overview of iFogSim: A Tool for Simulating Fog Networks of the Future
  15. Prototype Model of an IoT-based Digital and Smart Door Locking System with Enhanced Security
  16. iFogSim: A Tool for Simulating Cloud and Fog Applications
  17. Machine Learning for Internet of Things-Based Smart Transportation Networks
  18. Urdu Sentiment Analysis
  19. Mapping of Agile Processes into Project Management Knowledge Areas and Processes
  20. Using Blockchain to Ensure Trust between Donor Agencies and NGOs in Under-Developed Countries
  21. Fog Networks: A Prospective Technology for IoT
  22. Risk Prediction with Regression in Global Software Development using Machine Learning Approach: A Comparison of Linear and Decision Tree Regression
  23. Hep-Pred: Hepatitis C Staging Prediction Using Fine Gaussian SVM
  24. Software Defect Prediction Using Ensemble Learning: A Systematic Literature Review
  25. Visibility and Ethical Considerations of Pakistani Universities Researchers on Google Scholar
  26. Block-ED: The Proposed Blockchain Solution for Effectively Utilising Educational Resources
  27. Proposed Framework for HEC Pakistan Data Warehouse
  28. Application of Image Processing in Detection of Bone Diseases Using X-rays
  29. What Is Cloud Computing?
  30. Data Mining for Forecasting OGDCL Share Prices Using WEKA
  31. Comparative Study of API Management Solutions
  32. Social Media-Related Cybercrimes and Techniques for Their Prevention
  33. STEM Education
  34. Current Status of Urdu on Twitter
  35. Achieving Software Release Management and Continuous Integration using Maven, Jenkins and Artifactory
  36. Which frameworks give an efficient result while working with Spatiotemporal big data.
  37. Applications of IoT: Mobile Edge Computing Perspectives
  38. Spatiotemporal Applications of Big Data
  39. Implementation of Microsoft SQL Server using ‘AlwaysOn’ for High Availability and Disaster Recovery without Shared Storage
  40. CYBER SECURITY AND INTERNET OF THINGS
  41. Twitter and Urdu
  42. An Efficient Mining Based Approach Using PSO Selection Technique For Analysis and Detection of Obfuscated Malware
  43. Envisioning Internet of Things using Fog Computing
  44. Compression Algorithms: Brotli, Gzip and Zopfli Perspective
  45. Mobile Gaming Trends and Revenue Models
  46. Big Data Analysis: Apache Storm Perspective
  47. Bridging Gape between ITSM, IT-governance and Information Security to Meet Business Needs
  48. Faculty Retention in Higher Education
  49. Role of Oracle Active Data Guard in High Availability Database Operations
  50. Current Trends, Characteristics, Challenges and Future of P2P
  51. Quality in Higher Education: United Arab Emirates Perspective
  52. Role of Information Technology Infrastructure Library in E-Government
  53. Supporting Best Practices and Standards for Information Technology Infrastructure Library
  54. Role of Information Technology Infrastructure Library in Data Warehouses
  55. The use of Fourier Descriptors to recognize particle profile
  56. Voice over Internet Protocol (VoIP): UAE Perspective
  57. Web GIS: Implementation issues
  58. Capabilities of multimedia gis
  59. Designing issues of component-based ZGisObjects
  60. HTML and multimedia Web GIS