Proceedings
Table Of Contents |
|||
1 | Investigating the Usability of Java by Mining the GitHub Repositories | Page no 1-4 | View |
2 | A Fuzzy Inferencing System for Stress Management of University Students in COVID-19 for Pakistan | Page no 5-10 | View |
3 | Survey on Text to Text Machine Translation | Page no 11-15 | View |
4 | Performance Measurement of Online Quiz/Assesment/Testing Tools | Page no 16-20 | View |
5 | Computer Assisted Solution for bone Anomaly detection in X- Ray images | Page no 21-26 | View |
6 | Performance Comparison of Machine Learning Classifiers For The Detection Of Potato Leaf Diseases | Page no 27-31 | View |
7 | Internal boundary based Image Steganography | Page no 32-37 | View |
8 | PIA Accidents Analysis Using Naïve Bayes Classifier | Page no 38-43 | View |
9 | Analysis of Key Success Factors for Successful ERP Implementation | Page no 44-51 | View |
10 | Matrix Geometric Analysis of Congestion System using Phase-Type Distribution | Page no 52-55 | View |
11 | Bitcoin Price Prediction App Using Deep Learning Algorithm | Page no 56-60 | View |
12 | No Hunger: An Application for Collection of Leftover Food Items of Restaurants | Page no 61-64 | View |
13 | Heart Disease Prediction using Machine Learning Algorithms | Page no 65-70 | View |
14 | Machine Learning based Intrusion Detection System using Feature Engineering and Data Mining Techniques | Page no 71-74 | View |
15 | Malaria Disease Detection Using Machine Learning | Page no 1-4 | View |
16 | An Efficient Approach Towards Delineation of Lungs and Pulmonary Nodule Detection | Page no 79-86 | View |
17 | CT based framework for Early detection of Lung Cancer | Page no 87-89 | View |
18 | Error Estimation for Magnetic Field based Localization | Page no 90-94 | View |
19 | Malware Detection in Android in different application Categories | Page no 95-100 | View |
20 | Wheel Authentication based Multi-level Scalable Color-Textual Graphical Password System | Page no 101-108 | View |
21 | Area and Feature Based Image Registration Using Template Matching and SURF Algorithm | Page no 109-103 | View |
22 | Case Study: Intranet Penetration Testing of MUET | Page no 114-123 | View |
23 | Activation Functions: Comparison of Trends in Practice and Research for Deep Learning | Page no 124-133 | View |