default search action
ICACS 2020: Lahore, Pakistan
- 3rd International Conference on Advancements in Computational Sciences, ICACS 2020, Lahore, Pakistan, February 17-19, 2020. IEEE 2020, ISBN 978-1-7281-4235-7
- Faizan Khursheeed, M. Sami-Ud-Din, Irshad Ahmed Sumra, Muhammad Safder:
A Review of Security Machanism in internet of Things(IoT). 1-9 - Azam Rashid, Muhammad Jawaid Siddique, Shahid Munir Ahmed:
Machine and Deep Learning Based Comparative Analysis Using Hybrid Approaches for Intrusion Detection System. 1-9 - Shaymah Akram Yasear, Ku Ruhana Ku-Mahamud:
Enhanced Non-dominated Sorting Harris's Hawk Multi-objective Optimizer. 1-8 - Alamgir Naushad, Ghulam Abbas, Shehzad Ali Shah, Ziaul Haq Abbas:
Energy Efficient Clustering with Reliable and Load-Balanced Multipath Routing for WSNs. 1-9 - Humaira Aslam Chughtai, Zeeshan Ali Rana:
People Profile Metrics for Improved Classification of Defect Prone Files in Open Source Projects. 1-8 - Sheikh Badar ud din Tahir, Ahmad Jalal, Mouazma Batool:
Wearable Sensors for Activity Analysis using SMO-based Random Forest over Smart home and Sports Datasets. 1-6 - Shahzad Nazir, Muhammad Asif, Shahbaz Ahmad:
Exploring the Proportion of Content Represented by the Metadata of Research Articles. 1-7 - Hifsa Tanveer, Mian Muhammad Mubasher, Syed Waqar Jaffry:
Integrating Human Panic Factor in Intelligent Driver Model. 1-6 - Asadullah Tariq, Rana Asif Rehman:
CBAM: A Controller based Broadcast Storm Avoidance Mechanism in SDN based NDN-IoTs. 1-6 - Alia Samreen, Adnan Ahmad, Furkh Zeshan:
Searching for Truth in the Post-Truth Age. 1-5 - Hania Arif, Ali Javed:
An Effective Card Scanning Framework for User Authentication System. 1-5 - Sadaqat Ali Rammy, Muhammad Abrar, Sadia Jabbar Anwar, Wu Zhang:
Recurrent Deep Learning for EEG-based Motor Imagination Recognition. 1-6 - Muhammad Adil, Rahim Khan, M. Ahmad Nawaz Ul Ghani:
Preventive Techniques of Phishing Attacks in Networks. 1-8 - Amir Nadeem, Ahmad Jalal, Kibum Kim:
Human Actions Tracking and Recognition Based on Body Parts Detection via Artificial Neural Network. 1-6 - Huda Tariq, Maliha Arshad, Wafa Basit:
Effects of Refactoring upon Efficiency of an NP-Hard Task Assignment Problem: A case study. 1-9 - Muhammad Burhan, Rana Asif Rehman:
BSMS: A Reliable Interest Forwarding Protocol for NDN based VANETs. 1-6 - Syeda Amna Rizwan, Ahmad Jalal, Kibum Kim:
An Accurate Facial Expression Detector using Multi-Landmarks Selection and Local Transform Features. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.