[image]CurrentArchivesAboutAbout the JournalAnnouncementsContactEditorial TeamGuidelines for AuthorsAims and ScopePreparation of ManuscriptAuthorship & ContributorshipManuscript Retraction,Withdrawal & Deletion PolicyManuscript ReviewPlagiarism PolicyPublication EthicsOpen Access & Copy Right PolicySource of FundingPublication Fee and Waiver PolicyAbstracting & IndexingSearchRegisterLoginA Novel Morphological Rule-based Approach for Urdu Text Sentiment AnalysisPDFAssessing the Usability of Real-Time Urdu Braille Applications: A Comprehensive EvaluationText-Based Sentiment Analysis Using CNN-GRU Deep Learning ModelAdaptive Non-Crashing Functional Bugs in Android ApplicationsAn Adaptive E-Assessment for Self-Learning: A Sustainable Education Model in the Post COVID-19 ERA of Digital MediaView All IssuesMake a SubmissionFor ReadersFor AuthorsFor Librarians[image]HomeHomeJanuary-DecemberVol.12, No.2 (2021): July-DecemberVol.12, No.1 (2021): January-JuneVol.11, No.2 (2020): July-DecemberVol.11, No.1(2020): January-JuneVol.10, No.2(2019): July-DecemberVol.10, No.1(2019): January-JuneVol.9 No.2 (2018): July-DecemberVol.9 No.1(2018): January-JuneVol.8 No.02 (2017): July-DecemberVol.8 No.1(2017): January-JuneVol.7 No.1(2016): January-DecemberVol.6 No.1(2015):January-DecemberVol.4 No.1(2013): January-DecemberVol.5 No.1(2014): January-DecemberVol.3 No.1(2012): January-DecemberVol.2 No.1(2011): January-DecemberHomeHomeHomeHomeDr.Irum NoreenHomeHomeprivacy statementHomeVol. 14 No. 1 (2023): January-Decemberhttps://doi.org/10.51239/jictra.v14i1.31610.51239/jictra.v14i1.316ACMACSAPAABNTChicagoHarvardIEEEMLATurabianVancouverEndnote/Zotero/Mendeley (RIS)Enhanced Biometric-Based User Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction and Elliptic Curve CryptographyJournal of Information Communication Technologies and Robotic Applications: Vol.11, No.1(2020): January-JuneRandomized Dynamic Quantum CPU Scheduling AlgorithmJournal of Information Communication Technologies and Robotic Applications: Vol.9 No.2 (2018): July-DecemberAnalysis and Evaluation of Privacy Issues in Online Social NetworksJournal of Information Communication Technologies and Robotic Applications: Vol.10, No.2(2019): July-DecemberJournal of Information Communication Technologies and Robotic Applications: Vol. 14 No. 1 (2023): January-DecemberReturn to Article DetailsDownload
Download PDFHomehttps://doi.org/10.51239/jictra.v14i1.31810.51239/jictra.v14i1.318IoT Environment Security and Privacy for Smart HomesJournal of Information Communication Technologies and Robotic Applications: Vol. 13 No. 1 (2022): January-Decemberhttps://doi.org/10.51239/jictra.v14i1.31910.51239/jictra.v14i1.319https://doi.org/10.51239/jictra.v14i1.32010.51239/jictra.v14i1.320OLIVE Framework for E-Learning Development at AIOU, PakistanJournal of Information Communication Technologies and Robotic Applications: Vol.6 No.1(2015):January-DecemberA Novel-Based Deep Learning Approach for Early Diagnosis of Cotton Crop DiseasePrioritizing Critical Challenges for the Quality of Crowdsource Software ProductsJournal of Information Communication Technologies and Robotic Applications: Vol.8 No.02 (2017): July-DecemberReturn to Article DetailsDownload
Download PDFHomeHomePrivacy StatementHomeForgot your password?Return to Article Detailslearn more about the softwarecontact the journalHomeHomeBi-LSTM Deep Learning Approach for Employee Churn PredictionPredictive Text Summarization: Improving Efficiency and EffectivenessYield Estimation of Citrus Fruit Using Color Based Segmentation and Circular Hough TransformationCOVID-19 Genomic Sequences Analysis using Google Variant TransformationDetecting social bots activity in Twitter using deep learning approach
Detecting social bots activity in Twitter using deep learning approachHomeA Measurement Study of Cooperative Network on WiMAX Technology using BICM LDPC with iterative Decoding TechniqueDetection and Minimization of Jamming Attacks to Enhance String Stability in VANETsClassification and Evaluation of Land Cover Variations Using Landsat DataA Novel Method for Face Recognition Based on Features and GesturesIntegrated Wristband using an Inertial Measurement Unit and Electromyography Sensors to Control Robotic CarUrdu Handwritten Character Recognition using Deep LearningComparative Performance Analysis of Levenberg-Marquardt, Bayesian Regularization and Scaled Conjugate Gradient for the Prediction of flash FloodsHomeA Quality Assessment Model Based on Usability Metrics for M-Health Applications User InterfacesDesign of Energy Efficient 3GPP Turbo Encoder v5.0 Using High Range IO Standard Using Ultra Scale FPGAZ Notation Formalization of Blockchain Healthcare Document Sharing Based on CRBACSound Recognition Aimed towards Hearing Impaired Individuals in Urban Environment using Ensemble MethodsArtificial Intelligence Based Multi-modal Sensing for Flash Flood InvestigationQoS in Vehicular Ad Hoc Networks – A SurveyA survey on Trust and Reputation-Based Clustering Algorithms in Mobile Ad-hoc NetworksA Computational Power Allocation Scheme for Fair NOMA Downlink SystemFormal Verification of Safety and Liveness Properties using Coloured Petri-Nets: A Flood Monitoring, Warning, and Rescue SystemThe Progress of E-Government across the Globe: The Role of Technology as a Pushing FactorHomeShortest Path Energy Efficient Hierarchal Clustering Protocol for Wireless Sensor NetworksSurvey on Operating Systems for the Applications of the Internet of ThingsSurveillance System Concept Due to the Uses of Face Recognition ApplicationRequirements Prioritization Techniques for Global Software EngineeringRouting Protocols Security Issues in Mobile Ad Hoc NetworkImplementation of Water Distribution Monitoring Framework Using PLCSunspots Activity Cycles Using Linear and Non-Linear TechniqueHeavy School Bags and Their Effect on the Growth of Children in KarachiRestraining Terrorism: A UWB Based Communications Infrastructure for Preventing Terrorist Activities in PakistanModel for Laptop Theft Tracking and Data RetrievingHome