All Stories

  1. AI-Powered Cybercrime: A Survey on Emerging Threats, Tools & Techniques for Countermeasures
  2. The Avalanche of Artificial Intelligence and its Ethical Implications on Multicultural Diverse Global Village
  3. Risk Assessment and Mitigation With Generative AI Models
  4. Security Considerations in Generative AI for Web Applications
  5. Design of federated learning-based resource management algorithm in fog computing for zero-touch network
  6. FedFog - A federated learning based resource management framework in fog computing for zero touch networks
  7. Social Media: An Exploratory Study of Information, Misinformation, Disinformation, and Malinformation
  8. A Review and Analysis of Localization Techniques in Underwater Wireless Sensor Networks
  9. Aircraft Turnaround Manager (ATM): A Solution to Airport Operations
  10. DDoS Intrusion Detection with Ensemble Stream Mining for IoT Smart Sensing Devices
  11. NoSQL: Future of BigData Analytics Characteristics and Comparison with RDBMS
  12. Perspectives of Online Education in Pakistan: Post-covid Scenario
  13. An Improved Particle Swarm Optimization Algorithm for Data Classification
  14. A Survey on Blockchain Technology Supported Approaches for Healthcare System, Open Issues and Challenges
  15. IoT Networks: Security Vulnerabilities of Application Layer Protocols
  16. Overview of iFogSim: A Tool for Simulating Fog Networks of the Future
  17. Prototype Model of an IoT-based Digital and Smart Door Locking System with Enhanced Security
  18. iFogSim: A Tool for Simulating Cloud and Fog Applications
  19. Machine Learning for Internet of Things-Based Smart Transportation Networks
  20. Urdu Sentiment Analysis
  21. Mapping of Agile Processes into Project Management Knowledge Areas and Processes
  22. Using Blockchain to Ensure Trust between Donor Agencies and NGOs in Under-Developed Countries
  23. Fog Networks: A Prospective Technology for IoT
  24. Risk Prediction with Regression in Global Software Development using Machine Learning Approach: A Comparison of Linear and Decision Tree Regression
  25. Hep-Pred: Hepatitis C Staging Prediction Using Fine Gaussian SVM
  26. Software Defect Prediction Using Ensemble Learning: A Systematic Literature Review
  27. Visibility and Ethical Considerations of Pakistani Universities Researchers on Google Scholar
  28. Block-ED: The Proposed Blockchain Solution for Effectively Utilising Educational Resources
  29. Proposed Framework for HEC Pakistan Data Warehouse
  30. Application of Image Processing in Detection of Bone Diseases Using X-rays
  31. What Is Cloud Computing?
  32. Data Mining for Forecasting OGDCL Share Prices Using WEKA
  33. Comparative Study of API Management Solutions
  34. Social Media-Related Cybercrimes and Techniques for Their Prevention
  35. STEM Education
  36. Current Status of Urdu on Twitter
  37. Achieving Software Release Management and Continuous Integration using Maven, Jenkins and Artifactory
  38. Which frameworks give an efficient result while working with Spatiotemporal big data.
  39. Applications of IoT: Mobile Edge Computing Perspectives
  40. Spatiotemporal Applications of Big Data
  41. Implementation of Microsoft SQL Server using ‘AlwaysOn’ for High Availability and Disaster Recovery without Shared Storage
  42. CYBER SECURITY AND INTERNET OF THINGS
  43. Twitter and Urdu
  44. An Efficient Mining Based Approach Using PSO Selection Technique For Analysis and Detection of Obfuscated Malware
  45. Envisioning Internet of Things using Fog Computing
  46. Compression Algorithms: Brotli, Gzip and Zopfli Perspective
  47. Mobile Gaming Trends and Revenue Models
  48. Big Data Analysis: Apache Storm Perspective
  49. Bridging Gape between ITSM, IT-governance and Information Security to Meet Business Needs
  50. Faculty Retention in Higher Education
  51. Role of Oracle Active Data Guard in High Availability Database Operations
  52. Current Trends, Characteristics, Challenges and Future of P2P
  53. Quality in Higher Education: United Arab Emirates Perspective
  54. Role of Information Technology Infrastructure Library in E-Government
  55. Supporting Best Practices and Standards for Information Technology Infrastructure Library
  56. Role of Information Technology Infrastructure Library in Data Warehouses
  57. The use of Fourier Descriptors to recognize particle profile
  58. Voice over Internet Protocol (VoIP): UAE Perspective
  59. Web GIS: Implementation issues
  60. Capabilities of multimedia gis
  61. Designing issues of component-based ZGisObjects
  62. HTML and multimedia Web GIS