Default Cover Image

2017 International Conference on Frontiers of Information Technology (FIT)

Dec. 18 2017 to Dec. 20 2017

Islamabad, Pakistan

Table of Contents

[Title page i]Freely available from IEEE.pp. 1-1
[Title page iii]Freely available from IEEE.pp. 2-2
Copyright PageFreely available from IEEE.pp. 3-3
Table of contentsFreely available from IEEE.pp. 4-11
ForewordFreely available from IEEE.pp. 12-13
Conference OrganizersFreely available from IEEE.pp. 14-15
ReviewersFreely available from IEEE.pp. 16-21
Performance Evaluation of CoDel Queue Mechanism and TFRC Transport Protocol when Using VoIP FlowsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Performance Analysis of PID and State-Feedback Controller on the Depth Control of a Robotic FishFull-text access may be available. Sign in or learn about subscription options.pp. 7-11
User Association Techniques in Future Heterogeneous NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 18-22
Multi-feature Enterprise Traffic Characterization in OpenFlow-based Software Defined NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 23-28
Bluetooth Low Energy based Communication Framework for Intra Vehicle Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 29-34
On Physical Layer Security of Two Way Energy Harvesting RelaysFull-text access may be available. Sign in or learn about subscription options.pp. 35-40
Modeling of Sewerage System Using Internet of Things for Smart CityFull-text access may be available. Sign in or learn about subscription options.pp. 46-51
A Fault Based Approach to Test Case PrioritizationFull-text access may be available. Sign in or learn about subscription options.pp. 52-57
Evaluation of Team Expertise in Software Development OrganizationsFull-text access may be available. Sign in or learn about subscription options.pp. 58-63
Automatic Topic Modeling for Single Document Short TextsFull-text access may be available. Sign in or learn about subscription options.pp. 70-75
GPS based Public Transport Arrival Time PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 76-81
Resolving Class Imbalance and Feature Selection in Customer Churn DatasetFull-text access may be available. Sign in or learn about subscription options.pp. 82-86
Ligature Analysis-based Urdu OCR FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 87-92
Classification of Urdu Ligatures Using Convolutional Neural Networks - A Novel ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 93-97
EEG Brain Connectivity Analysis to Detect Driver Drowsiness Using CoherenceFull-text access may be available. Sign in or learn about subscription options.pp. 110-114
Various Meterological Parameters Effect on GSM Radio Signal Propagation for a Moderate AreaFull-text access may be available. Sign in or learn about subscription options.pp. 115-120
Sum-of-the-Parts Valuation-Based Scheduling of Parallel Applications over Global GridFull-text access may be available. Sign in or learn about subscription options.pp. 133-138
State and Disturbance Observer Based Control for a Class of Linear Uncertain SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 139-143
Real Time Translator for Sign LanguagesFull-text access may be available. Sign in or learn about subscription options.pp. 144-148
Evaluating Effect of Block Size in Compressed Sensing for Grayscale ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 149-154
A Holistic Approach for Recognition of Complete Urdu Ligatures Using Hidden Markov ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 155-160
Optimized Software Product Line Architecture and Feature Modeling in Improvement of SPLFull-text access may be available. Sign in or learn about subscription options.pp. 167-172
FIG based Quality Assurance in Software Product LinesFull-text access may be available. Sign in or learn about subscription options.pp. 173-177
Addressing Ambiguities in Software Team's Roles and Responsibilities: Minimizing Accountability ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 178-182
Towards Moisture Sensing Using Dual-Polarized Printable Chipless RFID TagFull-text access may be available. Sign in or learn about subscription options.pp. 189-193
Achieving Load Balancing in High-Density Software Defined WiFi NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 206-211
Regression Analysis for ATM Cash Flow PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 212-217
Combining Co-citation and Metadata for Recommending More Related PapersFull-text access may be available. Sign in or learn about subscription options.pp. 218-222
Adding Temporal Dimension in Social Network by Using Link AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 223-228
Eliciting Theory for Software Maintenance SLA Management FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 241-246
Features Selection and Optimized Neural Network Architecture for Modelling Flows in Solar CollectorsFull-text access may be available. Sign in or learn about subscription options.pp. 247-252
Sketch-based Facial Expression Recognition for Human Figure Drawing Psychological TestFull-text access may be available. Sign in or learn about subscription options.pp. 258-263
Deep and Self-Taught Learning for Protein Accessible Surface Area PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 264-269
Energy Management Model for Energy District Prosumers and Utility: A Case Study of Texas StateFull-text access may be available. Sign in or learn about subscription options.pp. 282-287
An Efficient Security Method Based on Exploiting Channel State Information (CSI)Full-text access may be available. Sign in or learn about subscription options.pp. 288-293
Enhancing the Security Performance of OSTBC Using Pre-EqualicodizationFull-text access may be available. Sign in or learn about subscription options.pp. 294-298
Proposing Optimal ARMA Based Model for Measurement Compensation in the State EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 299-304
Efficient Routing Strategy for Congestion Avoidance in MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 305-309
Shadow Encoding Scheme: A Smart line Coding Scheme for Network CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 321-326
Towards a Process Model for Service-Oriented Development of Embedded Software SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 339-344
Secrecy Analysis of Relay Assisted Device-to-Device Systems under Channel UncertaintyFull-text access may be available. Sign in or learn about subscription options.pp. 345-349
Gaussian Cellular Automata Model for the Classification of Points Inside 2D Grid PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 350-355
Machine Learning with Abstention for Automated Liver Disease DiagnosisFull-text access may be available. Sign in or learn about subscription options.pp. 356-361
Sparsity of Magnetic Resonance Imaging Using Slant TransformFull-text access may be available. Sign in or learn about subscription options.pp. 368-372
Author IndexFreely available from IEEE.pp. 373-375
Publisher's InformationFreely available from IEEE.pp. 376-376
Showing 71 out of 71