Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
FIT
FIT 2018
Generate Citations
2018 International Conference on Frontiers of Information Technology (FIT)
Dec. 17 2018 to Dec. 19 2018
Islamabad, Pakistan
Table of Contents
[Title page i]
Freely available from IEEE.
pp. 1-1
[Title page iii]
Freely available from IEEE.
pp. 3-3
[Copyright notice]
Freely available from IEEE.
pp. 4-4
Table of contents
Freely available from IEEE.
pp. 5-12
Foreword
Freely available from IEEE.
pp. 13-14
Conference Organization
Freely available from IEEE.
pp. 15-16
Reviewers
Freely available from IEEE.
pp. 17-25
Model Identification and Control of a Lab Based Inverted Pendulum System Using Robust Control Technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Anila Barkat
,
Athar Hanif
,
Mirza Tariq Hamayun
Modelling of Graph-Based Smart Parking System Using Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-12
by
Saba Latif
,
Hamra Afzaal
,
Nazir Ahmad Zafar
Robust Sliding Mode Speed Control of Vehicle Engine System
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-18
by
Muhammad Jamshed Abbas
,
Haris Sheh Zad
,
Muhammad Awais
,
Ali Waqar
Intelligent Speed Controller Design for Brushless DC Motor
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-23
by
Abasin Ulasyar
,
Haris Sheh Zad
,
Adil Zohaib
Dynamic Testing of C Program Interfaces Based on FSM Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-29
by
Muhammad Sajjad
,
Muhammad Wasim
,
Muzammil Shahbaz
,
Kashif Saghar
,
Usman Ghani Khan
An Experimental Tool for Search-Based Mutation Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-34
by
Muhammad Bilal Bashir
,
Aamer Nadeem
A Systematic Literature Review: Software Requirements Prioritization Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-40
by
Muhammad Sufian
,
Zirak Khan
,
Saad Rehman
,
Wasi Haider Butt
Integrated Security Model for Managing the Security Non-functional Requirements at Architectural Design of Internet-Based Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-46
by
Muhammad Babar
,
Shahid Azeem
,
Fahim Arif
,
Waseem Iqbal
Heuristic Path-Reconfiguration Algorithm Using Multi-hop Opportunistic Routing in WSNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-52
by
Muhammad Asad
,
Muhammad Aslam
E-HOSA: Extended-Hybrid Optical Switch Architecture for Cloud Computing Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-58
by
Samina Lone
,
Muhammad Usman
,
Muhammad Imran
A Fog-Assisted Architecture to Support an Evolving Hospitality Industry in Smart Cities
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-64
by
Prasanna Kansakar
,
Arslan Munir
,
Neda Shabani
Optimized Pricing & Scheduling Model for Long Range Autonomous Valet Parking
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-70
by
Muhammad Khalid
,
Yue Cao
,
Nauman Aslam
,
Chakkaphong Suthaputchakun
,
Muhammad Arshad
,
Waqar Khalid
Automated Feature Synthesis from Relational Database for Data Science Related Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-75
by
Afifa Fatima
,
Faizan Ali Khan
,
Aneeq Raza
,
Abdul Basit Kamran
Internet Traffic Analysis of an Educational Network using Bro IDS
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-81
by
Hafiz Muhammad Shafiq
,
Muhammad Amir Mehmood
Color Image Enhancement Using Multiscale Retinex with Guided Filter
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-87
by
Haleema Sadia
,
Fazal Azeem
,
Hidayat Ullah
,
Zahid Mahmood
,
Shahid Khattak
,
Gul Zameen Khan
Cross Lingual Speech Emotion Recognition: Urdu vs. Western Languages
Full-text access may be available. Sign in or learn about subscription options.
pp. 88-93
by
Siddique Latif
,
Adnan Qayyum
,
Muhammad Usman
,
Junaid Qadir
Enhancement of Visible Light Communication Transceiver using LDPC Codes
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-98
by
Arslan Khalid
,
Mehmood Ahmad
,
Nesruminallah Khan
,
Assad Ali
Mesh of SSVEP-Based BCI and Eye-Tracker for Use of Higher Frequency Stimuli and Lower Number of EEG Channels
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-104
by
Abdul Saboor
,
Mihaly Benda
,
Aya Rezeika
,
Roland Grichnik
,
Felix Gembler
,
Piotr Stawicki
,
Ivan Volosyak
Wearable Sensor-Based Human Behavior Understanding and Recognition in Daily Life for Smart Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-110
by
Ahmad Jalal
,
Majid Ali Khan Quaid
,
Abdul S. Hasan
Design of an Efficient Single-Stage and 2-Stages Class-E Power Amplifier (2.4GHz) for Internet-of-Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-116
by
Ayyaz Ali
,
Syed Waqas Haider Shah
,
Khalid Iqbal
Support Vector Machine and Gaussian Process Regression Based Modeling for Photovoltaic Power Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-122
by
Sidra Kanwal
,
Bilal Khan
,
Sahibzada Muhammad Ali
,
Chaudhry Arshad Mehmood
,
Muhammad Qasim Rauf
Unsupervised Event Detection and On-Off Pairing Approach Applied to NILM
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-128
by
Arfa Yasin
,
Shoab Ahmed Khan
A Supervised Machine Learning Based Approach for Automatically Extracting High-Level Threat Intelligence from Unstructured Sources
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-134
by
Yumna Ghazi
,
Zahid Anwar
,
Rafia Mumtaz
,
Shahzad Saleem
,
Ali Tahir
Enhanced Secure Mechanism for Virtual Machine Migration in Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-140
by
Kanwal Janjua
,
Waris Ali
Efficient Lightweight Encryption Algorithm for Smart Video Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-145
by
Amna Shifa
,
Mamoona Naveed Asghar
,
Naila Batool
,
Martin Fluery
Smart Phone Based Early Intervention Framework for Intellectually Disable Children of Pakistan
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-151
by
Tahreem Yasir
Comparing Spectrum Based Fault Localisation Against Test-to-Code Traceability Links
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-157
by
Gulsher Laghari
,
Kamran Dahri
,
Serge Demeyer
Integrating Risk Management in Scrum Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-163
by
Muhammad Hammad
,
Irum Inayat
From Traditional to Technologically Influenced Audit: A Compliance Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-169
by
Faiza Allah Bukhsh
,
Patricio de Alencar Silva
,
Bilal Allah Bukhsh
,
Sumaiya Syed
Functionality, Performance, and Compatibility Testing: A Model Based Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-175
by
Najam us Saqib
,
Sara Shahzad
Congestion Control Through Dynamic Access Class Barring for Bursty MTC Traffic in Future Cellular Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-181
by
Syed Waqas Haider Shah
,
Ahmad Talal Riaz
,
Khalid Iqbal
Real Time Fixed Point Adaptive Chaotic System Generator for Deep Brain Stimulation Using FPGA
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-187
by
Syed Aamir Ali Shah
,
Lei Zhang
,
Abdul Bais
Efficient Resource Utilization in Cloud-Fog Environment Integrated with Smart Grids
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-193
by
Junaid Akram
,
Zeeshan Najam
,
Arslan Rafi
Elective Learning Objects Group Recommendation Using Non-Cooperative Game Theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-199
by
Asad Zia
,
Muhammad Usman
State of Art Techniques for Social Influence Analysis: A Systematic Literature Review
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-205
by
Sadia Majeed
,
Usman Qamar
,
Aftab Farooq
Analyzing Excessive user Feedback: A Big Data Challenge
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-211
by
Faiza Allah Bukhsh
,
Jeewanie Jayasinghe Arachchige
,
Furqan Malik
Generating Abstractive Summaries Using Sequence to Sequence Attention Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-217
by
Tooba Siddiqui
,
Jawwad Ahmed Shamsi
Robust Spatio-Temporal Features for Human Interaction Recognition Via Artificial Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-223
by
Maria Mahmood
,
Ahmad Jalal
,
M. A. Sidduqi
Integration of Speech/ Music Discrimination and Mood Classification with Audio Feature Extraction
Full-text access may be available. Sign in or learn about subscription options.
pp. 224-229
by
Mohsin Ashraf
,
Geng Guohua
,
Xiaofeng Wang
,
Farooq Ahmad
A Recommendation System using Interviewers Preferences for Ranked Candidate Selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-234
by
Shiza Hammad
,
Shabbir Ahmed
,
Muhammad Azeem Abbas
,
Iqra Abbasi
,
Muhammad Taha Jilani
Historical Manuscript Dating using Textural Measures
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-240
by
Anmol Hamid
,
Maryam Bibi
,
Imran Siddiqi
,
Momina Moetesum
STIXGEN - A Novel Framework for Automatic Generation of Structured Cyber Threat Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-246
by
Zafar Iqbal
,
Zahid Anwar
,
Rafia Mumtaz
Prevention of Timing Attack in Software Defined Named Data Network with VANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-252
by
Ahmed Arsalan
,
Rana Asif Rehman
Detection and Resolving WSN Issues with the use of Data Mining & Intelligent Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-258
by
Mohsin Ashraf
,
Geng Guohua
,
Xiaofeng Wang
,
Farooq Ahmad
Nonlinear Autoregressive with Exogenous Input Controller for Semi Active Suspension of Heavy Truck
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-264
by
Salman Zafar
,
Imran Shafi
,
Raja Amir Azim
APEnergy: Application Profile-Based Energy-Efficient Framework for SaaS Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-270
by
Basit Qureshi
,
Anis Koubaa
UWB Circular Monopole Antenna with Fractal Slots for Triple Band-Notch Characteristics
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-274
by
Kiran Nadeem
,
Zeeshan Ahmed
,
Iram Nadeem
,
Ferdows B. Zarrabi
,
Khurram Alimgeer
Techno-Economic Study of Electricity Generation from Wind at Kallar-Kahar Region in Pakistan
Full-text access may be available. Sign in or learn about subscription options.
pp. 275-280
by
Tanvir Ahmed
,
Mazhar Ali
,
Dawar Awan
Tuning Free DPC for ETO-Based MMC-HVDC System with Unbalance Fault-Ride-Through Capability
Full-text access may be available. Sign in or learn about subscription options.
pp. 281-286
by
Ahmad Kamal
,
Abdul Basit
A Framework for Cardboard Based Augmented Reality
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-292
by
Rameez Rehman Syed
,
Shahzad Rasool
Lexicon and Heuristics Based Approach for Identification of Emotion in Text
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-297
by
Junaid Akram
,
Arsalan Tahir
Object Size Measurement through Images: An Application to Measuring Human Foot Size
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-302
by
Muhammad Ahmad Shahid
,
Muhammad Aksam Iftikhar
,
Zaheer Ahmad Gondal
,
Muhammad Adnan
,
Saima Rathore
CUIF: Control of Useless Interests Flooding in Vehicular Named Data Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-308
by
Muhammad Usman Tahir
,
Rana Asif Rehman
Power Management Techniques in Popular Operating Systems for IoT Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-314
by
Rizwan Hamid Randhawa
,
Adeel Ahmed
,
Muhammad Ibrahim Siddiqui
Security Requirements Engineering: A Framework for Cyber-Physical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-320
by
Shafiq ur Rehman
,
Christopher Allgaier
,
Volker Gruhn
Towards Formal Modeling of Hotspot Issue by Watch-Man Nodes in Wireless Sensor and Actor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-326
by
Umar Draz
,
Tariq Ali
,
Sana Yasin
,
Umair Waqas
Security for Machine Learning-Based Systems: Attacks and Challenges During Training and Inference
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-332
by
Faiq Khalid
,
Muhammad Abdullah Hanif
,
Semeen Rehman
,
Muhammad Shafique
Mitigation and Improving SHA-1 Standard Using Collision Detection Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-338
by
Zeyad Al-Odat
,
Mazhar Ali
,
Samee U. Khan
The Control of Various Channels Water Flows
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-344
by
Talat Nazir
AquaEye: A Low Cost Flood Early Warning System for Developing Countries
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-349
by
Rizwan Hamid Randhawa
,
Rashid Mahmood
,
Tahir Ahmad
Wastewater Treatment Method Selection for Pulp and Paper Industry
Full-text access may be available. Sign in or learn about subscription options.
pp. 350-354
by
Tanzila Younas
,
Nasreen Bano
,
Warisha Zafar
,
Usama Qadir
Fitness-Based Acceleration Coefficients to Enhance the Convergence Speed of Novel Binary Particle Swarm Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-360
by
Yasir Mehmood
,
Marium Sadiq
,
Waseem Shahzad
,
Faryal Amin
Performance Comparison of Chunk and Peer Scheduling Algorithms of Peer-to-Peer Streaming Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-366
by
Syed Saddam Hussain Shah
,
Naina Said
,
Aysha Nayab
,
Waleed Khan
,
Zaryab Ali Shinwari
,
Muhammad Jawwad
,
Nasru Minallah
Enhanced Adaptive Geographic Opportunistic Routing with Interference Avoidance Assisted with Mobile Sinks for Underwater Wireless Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 367-372
by
Talha Naeem Qureshi
,
Nadeem Javaid
Author Index
Freely available from IEEE.
pp. 373-375
[Publisher's information]
Freely available from IEEE.
pp. 376-376
Showing 73 out of 73