Keywords List for jictra.com.pk


[image] Current Archives About About the Journal Announcements Contact Editorial Team Guidelines for Authors Aims and Scope Preparation of Manuscript Authorship & Contributorship Manuscript Retraction,Withdrawal & Deletion Policy Manuscript Review Plagiarism Policy Publication Ethics Open Access & Copy Right Policy Source of Funding Publication Fee and Waiver Policy Abstracting & Indexing Search Register Login A Novel Morphological Rule-based Approach for Urdu Text Sentiment Analysis PDF Assessing the Usability of Real-Time Urdu Braille Applications: A Comprehensive Evaluation Text-Based Sentiment Analysis Using CNN-GRU Deep Learning Model Adaptive Non-Crashing Functional Bugs in Android Applications An Adaptive E-Assessment for Self-Learning: A Sustainable Education Model in the Post COVID-19 ERA of Digital Media View All Issues Make a Submission For Readers For Authors For Librarians [image]HomeHome January-December Vol.12, No.2 (2021): July-December Vol.12, No.1 (2021): January-June Vol.11, No.2 (2020): July-December Vol.11, No.1(2020): January-June Vol.10, No.2(2019): July-December Vol.10, No.1(2019): January-June Vol.9 No.2 (2018): July-December Vol.9 No.1(2018): January-June Vol.8 No.02 (2017): July-December Vol.8 No.1(2017): January-June Vol.7 No.1(2016): January-December Vol.6 No.1(2015):January-December Vol.4 No.1(2013): January-December Vol.5 No.1(2014): January-December Vol.3 No.1(2012): January-December Vol.2 No.1(2011): January-DecemberHomeHomeHomeHome Dr.Irum NoreenHomeHome privacy statementHome Vol. 14 No. 1 (2023): January-December https://doi.org/10.51239/jictra.v14i1.316 10.51239/jictra.v14i1.316 ACM ACS APA ABNT Chicago Harvard IEEE MLA Turabian Vancouver Endnote/Zotero/Mendeley (RIS) Enhanced Biometric-Based User Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction and Elliptic Curve Cryptography Journal of Information Communication Technologies and Robotic Applications: Vol.11, No.1(2020): January-June Randomized Dynamic Quantum CPU Scheduling Algorithm Journal of Information Communication Technologies and Robotic Applications: Vol.9 No.2 (2018): July-December Analysis and Evaluation of Privacy Issues in Online Social Networks Journal of Information Communication Technologies and Robotic Applications: Vol.10, No.2(2019): July-December Journal of Information Communication Technologies and Robotic Applications: Vol. 14 No. 1 (2023): January-DecemberReturn to Article Details Download Download PDFHome https://doi.org/10.51239/jictra.v14i1.318 10.51239/jictra.v14i1.318 IoT Environment Security and Privacy for Smart Homes Journal of Information Communication Technologies and Robotic Applications: Vol. 13 No. 1 (2022): January-December https://doi.org/10.51239/jictra.v14i1.319 10.51239/jictra.v14i1.319 https://doi.org/10.51239/jictra.v14i1.320 10.51239/jictra.v14i1.320 OLIVE Framework for E-Learning Development at AIOU, Pakistan Journal of Information Communication Technologies and Robotic Applications: Vol.6 No.1(2015):January-December A Novel-Based Deep Learning Approach for Early Diagnosis of Cotton Crop Disease Prioritizing Critical Challenges for the Quality of Crowdsource Software Products Journal of Information Communication Technologies and Robotic Applications: Vol.8 No.02 (2017): July-DecemberReturn to Article Details Download Download PDFHomeHome Privacy StatementHome Forgot your password?Return to Article Details learn more about the software contact the journalHomeHome Bi-LSTM Deep Learning Approach for Employee Churn Prediction Predictive Text Summarization: Improving Efficiency and Effectiveness Yield Estimation of Citrus Fruit Using Color Based Segmentation and Circular Hough Transformation COVID-19 Genomic Sequences Analysis using Google Variant Transformation Detecting social bots activity in Twitter using deep learning approach Detecting social bots activity in Twitter using deep learning approachHome A Measurement Study of Cooperative Network on WiMAX Technology using BICM LDPC with iterative Decoding Technique Detection and Minimization of Jamming Attacks to Enhance String Stability in VANETs Classification and Evaluation of Land Cover Variations Using Landsat Data A Novel Method for Face Recognition Based on Features and Gestures Integrated Wristband using an Inertial Measurement Unit and Electromyography Sensors to Control Robotic Car Urdu Handwritten Character Recognition using Deep Learning Comparative Performance Analysis of Levenberg-Marquardt, Bayesian Regularization and Scaled Conjugate Gradient for the Prediction of flash FloodsHome A Quality Assessment Model Based on Usability Metrics for M-Health Applications User Interfaces Design of Energy Efficient 3GPP Turbo Encoder v5.0 Using High Range IO Standard Using Ultra Scale FPGA Z Notation Formalization of Blockchain Healthcare Document Sharing Based on CRBAC Sound Recognition Aimed towards Hearing Impaired Individuals in Urban Environment using Ensemble Methods Artificial Intelligence Based Multi-modal Sensing for Flash Flood Investigation QoS in Vehicular Ad Hoc Networks – A Survey A survey on Trust and Reputation-Based Clustering Algorithms in Mobile Ad-hoc Networks A Computational Power Allocation Scheme for Fair NOMA Downlink System Formal Verification of Safety and Liveness Properties using Coloured Petri-Nets: A Flood Monitoring, Warning, and Rescue System The Progress of E-Government across the Globe: The Role of Technology as a Pushing FactorHome Shortest Path Energy Efficient Hierarchal Clustering Protocol for Wireless Sensor Networks Survey on Operating Systems for the Applications of the Internet of Things Surveillance System Concept Due to the Uses of Face Recognition Application Requirements Prioritization Techniques for Global Software Engineering Routing Protocols Security Issues in Mobile Ad Hoc Network Implementation of Water Distribution Monitoring Framework Using PLC Sunspots Activity Cycles Using Linear and Non-Linear Technique Heavy School Bags and Their Effect on the Growth of Children in Karachi Restraining Terrorism: A UWB Based Communications Infrastructure for Preventing Terrorist Activities in Pakistan Model for Laptop Theft Tracking and Data RetrievingHome

Explore More

Dive deeper into jictra.com.pk

Search Another Domain