Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
FIT
FIT 2017
Generate Citations
2017 International Conference on Frontiers of Information Technology (FIT)
Dec. 18 2017 to Dec. 20 2017
Islamabad, Pakistan
Table of Contents
[Title page i]
Freely available from IEEE.
pp. 1-1
[Title page iii]
Freely available from IEEE.
pp. 2-2
Copyright Page
Freely available from IEEE.
pp. 3-3
Table of contents
Freely available from IEEE.
pp. 4-11
Foreword
Freely available from IEEE.
pp. 12-13
Conference Organizers
Freely available from IEEE.
pp. 14-15
Reviewers
Freely available from IEEE.
pp. 16-21
Performance Evaluation of CoDel Queue Mechanism and TFRC Transport Protocol when Using VoIP Flows
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Touseef Javed Chaudhery
Performance Analysis of PID and State-Feedback Controller on the Depth Control of a Robotic Fish
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-11
by
Subhan Khan
,
Salman Javed
,
Noman Naeem
,
Irfan Ali
Modelling and Simulation of Resource constrained Vaccination Strategies and Epidemic Outbreaks
Freely available from IEEE.
pp. 12-17
by
Bushra Zafar
,
Rehan Ashraf
,
Mudassar Ahmad
,
Muhammad Asif Habib
User Association Techniques in Future Heterogeneous Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-22
by
Khush Bakht
,
Haji M. Furqan
,
Zain Ali
,
Guftaar Ahmad Sardar Sidhu
Multi-feature Enterprise Traffic Characterization in OpenFlow-based Software Defined Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-28
by
Taimur Bakhshi
Bluetooth Low Energy based Communication Framework for Intra Vehicle Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-34
by
Naeem Mirza
,
Ali Nawaz Khan
On Physical Layer Security of Two Way Energy Harvesting Relays
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-40
by
Furqan Jameel
,
Faisal Khan
,
M. Asif Ali Haider
,
Asim Ul Haq
Creating Domain Non-functional Requirements Software Product Line Engineering Using Model Transformations
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-45
by
Fatima Khalique
,
Wasi Haider Butt
,
Shoab Ahmad Khan
Modeling of Sewerage System Using Internet of Things for Smart City
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-51
by
Saba Latif Latif
,
Hamra Afzaal Afzaal
,
Nazir Ahmad Zafar
A Fault Based Approach to Test Case Prioritization
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-57
by
Faiza Farooq
,
Aamer Nadeem
Evaluation of Team Expertise in Software Development Organizations
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-63
by
Muhammad Qasim Riaz
,
Muhammad Abbas
,
Sufian Irshad
Implementation and Analysis of Novel Clustering Algorithm Without Initial Value Selection for Software Architectural Styles Data Set
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-69
by
Qadeem Khan
,
Usman Qamar
,
Wasi Haider Butt
,
Saad Rehman
Automatic Topic Modeling for Single Document Short Texts
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-75
by
Anamta Sajid
,
Sadaqat Jan
,
Ibrar A. Shah
GPS based Public Transport Arrival Time Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-81
by
Muhammad Umar Farooq
,
Aamna Shakoor
,
Abu Bakar Siddique
Resolving Class Imbalance and Feature Selection in Customer Churn Dataset
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-86
by
Aamer Hanif
,
Noor Azhar
Ligature Analysis-based Urdu OCR Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-92
by
Zaheer Ahmed
,
Khalid Iqbal
,
Irfan Mehmood
,
Muhammad Adnan Ayub
Classification of Urdu Ligatures Using Convolutional Neural Networks - A Novel Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-97
by
Nizwa Javed
,
Safia Shabbir
,
Imran Siddiqi
,
Khurram Khurshid
Human, Object and Scene Centric Image Retrieval Engine to Enhance Image Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-103
by
Humza Naveed
,
Gulraiz Khan
,
Saira Jabeen
,
Zeeshan Khan
,
Muhammad Usman Ghani Khan
An Ultra Low Power, 3-Wire Serial Interface Design for Data Converters in Pin-Constrainted Applications with 180 nm CMOS Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-109
by
Imran Ali
,
Muhammad Riaz Ur Rehman
,
Sang-Yun Kim
,
Nabeel Ahmad
,
Kang-Yoon Lee
EEG Brain Connectivity Analysis to Detect Driver Drowsiness Using Coherence
Full-text access may be available. Sign in or learn about subscription options.
pp. 110-114
by
Muhammad Awais
,
Nasreen Badruddin
,
Micheal Drieberg
Various Meterological Parameters Effect on GSM Radio Signal Propagation for a Moderate Area
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-120
by
Luqman Ali
,
Imtiaz Alam
,
Syed Asim Ali Shah
,
Muneeb Yaqoob
A Novel High Gain Bidirectional Multiport DC-DC Converter to Interface PV, Battery, and Ultracapacitor with Microgrid System
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-126
by
Muhammad Arif
,
Abdul Majid
,
Jawad Saleem
,
Fahad Khan
,
Qamar Abbass
,
Naseer Khan
,
Zahid Mahmood
Joint Power Management of Telecom Exchanges and Electric Vehicles Using Hybrid AC-DC Microgrid
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-132
by
Ahsan Nadeem
,
Muhammad Nadeem Rafiq
,
Muhammad Bilal Qureshi
,
Muhammad Jawad
Sum-of-the-Parts Valuation-Based Scheduling of Parallel Applications over Global Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-138
by
Aroosa Hameed
,
Muhammad Usman
State and Disturbance Observer Based Control for a Class of Linear Uncertain Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-143
by
Nihad Ali
,
Waqar Alam
,
Ateeq Ur Rehman
,
Mahmood Pervaiz
Real Time Translator for Sign Languages
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-148
by
Zulfiqar Ali Memon
,
Muhammad Uzair Ahmed
,
S. Talha Hussain
,
Zahid Abbas Baig
,
Umer Aziz
Evaluating Effect of Block Size in Compressed Sensing for Grayscale Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-154
by
Muhammad Abdur Rehman Hashmi
,
Rana Hammad Raza
A Holistic Approach for Recognition of Complete Urdu Ligatures Using Hidden Markov Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-160
by
Israr Uddin
,
Imran Siddiqi
,
Shehzad Khalid
Optimized Software Product Line Architecture and Feature Modeling in Improvement of SPL
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-172
by
Atif Zahoor Chohan
,
Abida Bibi
,
Yaser Hafeez Motla
FIG based Quality Assurance in Software Product Lines
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-177
by
Nazish Yousaf
,
Rida Sheikh
,
Muhammad Abbas
Addressing Ambiguities in Software Team's Roles and Responsibilities: Minimizing Accountability Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-182
by
Abdul Jabbar
,
Ali Afzal Malik
A Methodology for Impact Evaluation of Refactoring on External Quality Attributes of a Software Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-188
by
Raja Sehrab Bashir
,
Sai Peck Lee
,
Chong Chun Yung
,
Khubaib Amjad Alam
,
Raja Wasim Ahmad
Towards Moisture Sensing Using Dual-Polarized Printable Chipless RFID Tag
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-193
by
Nimra Javed
,
Ayesha Habib
,
Yasar Amin
,
Hannu Tenhunen
Provision of Security in Vehicular Ad Hoc Networks through an Intelligent Secure Routing Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-205
by
Kashif Naseer Qureshi
,
Faisal Bashir
,
Abdul Hanan Abdullah
Achieving Load Balancing in High-Density Software Defined WiFi Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-211
by
Ze Chen
,
Sohaib Manzoor
,
Yayu Gao
,
Xiaojun Hei
Regression Analysis for ATM Cash Flow Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-217
by
Akber Rajwani
,
Tahir Syed
,
Behraj Khan
,
Sadaf Behlim
Combining Co-citation and Metadata for Recommending More Related Papers
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-222
by
Shahbaz Ahmad
,
Muhammad Tanveer Afzal
Adding Temporal Dimension in Social Network by Using Link Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-228
by
Farhad Muhammad Riaz
,
Rashid Abbasi
,
Zahid Mahmood
Multivariate Covariance using Principal Component Analysis for Reconstruction of Bidirected Gene Regulatory Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-234
by
Mehrosh Khalid
,
Sharifullah Khan
,
Jamil Ahmad
,
Muhammad Shaheryar
Compliance Checking of Shipment Request by Utilizing Process Mining Concepts: An Evaluation of Smart Auditing Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-240
by
Faiza Allah Bukhsh
,
Hans Weigand
Eliciting Theory for Software Maintenance SLA Management Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-246
by
Syed Irtiza Hassan
,
Ahmad Salman Khan
Features Selection and Optimized Neural Network Architecture for Modelling Flows in Solar Collectors
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-252
by
Shahzad Yousaf
,
Imran Shafi
,
Jamil Ahmad
Sketch-based Facial Expression Recognition for Human Figure Drawing Psychological Test
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-263
by
Momina Moetesum
,
Tasneem Aslam
,
Hassan Saeed
,
Imran Siddiqi
,
Uzma Masroor
Deep and Self-Taught Learning for Protein Accessible Surface Area Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-269
by
Fahad ul Hassan
,
Fayyaz ul Amir Afsar Minhas
An Improved Control Scheme for Power Sharing between Distributed Power Converters in Islanded AC Microgrids
Full-text access may be available. Sign in or learn about subscription options.
pp. 270-275
by
Khurram Hashmi
,
Muhammad Mansoor Khan
,
Salman Habib
,
Houjun Tang
An Optimal Approach to Manage Responsive Residential Appliances in Smart Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-281
by
Zunaib Maqsood Haider
,
Khawaja Khalid Mehmood
,
Saad Ullah Khan
,
Muhammad Kashif Rafique
,
Faheem Ashraf
,
Chul-Hwan Kim
Energy Management Model for Energy District Prosumers and Utility: A Case Study of Texas State
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-287
by
I. Hussain
,
Z. Ullah
,
S. M. Ali
,
B. Khan
,
M. F. Qureshi
,
C. A. Mehmood
An Efficient Security Method Based on Exploiting Channel State Information (CSI)
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-293
by
Jehad M. Hamamreh
,
Haji M. Furqan
,
Zain Ali
,
Guftaar Ahmad Sardar Sidhu
Enhancing the Security Performance of OSTBC Using Pre-Equalicodization
Full-text access may be available. Sign in or learn about subscription options.
pp. 294-298
by
Jehad M. Hamamreh
,
Haji M. Furqan
,
Zain Ali
,
Guftaar Ahmad Sardar Sidhu
Proposing Optimal ARMA Based Model for Measurement Compensation in the State Estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 299-304
by
Naeem Khan
,
Syed Abuzar Bacha
Efficient Routing Strategy for Congestion Avoidance in MANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 305-309
by
Nousheen Akhtar
,
Muazzam A. Khan Khattak
,
Ata Ullah
,
Muhammad Younus Javed
Reconfigurable Cluster Head Selection Protocol for Heterogeneous Wireless Sensors
Full-text access may be available. Sign in or learn about subscription options.
pp. 310-314
by
Qazi Ali
,
Malika Bakhtawar
,
Omama Sohail
,
Daim Hussain
,
Sadia Siddiqi
,
Ibrar Shah
,
Shakeel Waqas
AAGV: A Cluster Based Multicast Routing Protocol for Autonomous Aerial and Ground Vehicles Communication in VANET
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-320
by
Waqar Farooq
,
Muazzam A. Khan
,
Saad Rehman
,
Nazar Abbas Saqib
,
Muhammad Abbas
Shadow Encoding Scheme: A Smart line Coding Scheme for Network Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-326
by
Abdul Rasheed Rizwan
,
Tariq Ali
A Comparative Study of Electric Vehicles Concerning Charging Infrastructure and Power Levels
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-332
by
Salman Habib
,
Muhammad Mansoor Khan
,
Khurram Hashmi
,
Muhammad Ali
,
Houjun Tang
Design and Analysis of 15-level Asymmetric Multilevel Inverter with Reduced Switch Count using Different PWM Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-338
by
Malik Qamar Abbas
,
Abdul Majid
,
Jawad Saleem
,
Muhammad Arif
Towards a Process Model for Service-Oriented Development of Embedded Software Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-344
by
Muhammad Waqar Aziz
Secrecy Analysis of Relay Assisted Device-to-Device Systems under Channel Uncertainty
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-349
by
Furqan Jameel
,
Faisal Khan
,
M. Asif Ali Haider
,
Asim Ul Haq
Gaussian Cellular Automata Model for the Classification of Points Inside 2D Grid Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 350-355
by
Mammona Qudsia
,
Mehreen Saeed
Machine Learning with Abstention for Automated Liver Disease Diagnosis
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-361
by
Kanza Hamid
,
Amina Asif
,
Wajid Abbasi
,
Durre Sabih
,
Fayyaz-ul-Amir Afsar Minhas
Performance Evaluation of Advanced Deep Learning Architectures for Offline Handwritten Character Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 362-367
by
Moazam Soomro
,
Muhammad Ali Farooq
,
Rana Hammad Raza
Sparsity of Magnetic Resonance Imaging Using Slant Transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 368-372
by
Usama Riaz
,
Fuleah A. Razzaq
,
Amna Khan
,
M. Talha Gul
Author Index
Freely available from IEEE.
pp. 373-375
Publisher's Information
Freely available from IEEE.
pp. 376-376
Showing 71 out of 71