default search action
8. ICDIM 2013: Islamabad, Pakistan
- Imran Sarwar Bajwa, M. Asif Naeem, Pit Pichappan:
Eighth International Conference on Digital Information Management (ICDIM 2013), Islamabad, Pakistan, September 10-12, 2013. IEEE 2013, ISBN 978-1-4799-0613-0 - Sofia Aftab, Waseem Abbas, Muhammad Musa Bilal, Tauqir Hussain, Muhammad Shoaib, Syed Hamza Mehmood:
Data mining in insurance claims (DMICS) two-way mining for extreme values. 1-6 - Gerald Schaefer:
Pixel domain and compressed domain image retrieval features. 1-3 - Gerald Schaefer:
An introduction to content-based image retrieval. 4-6 - M. Asif Naeem:
Efficient processing of semi-stream data. 7-10 - Iftikhar Rasheed, Asjad Amin, Mahwish Chaudhary, Sadaf Bukhari, Muhammad Rizwan, Kashif Ali:
Analyzing the security techniques used in LTE Advanced and their evaluation. 11-13 - Sufian Hameed, Tobias Kloht, Xiaoming Fu:
Identity based email sender authentication for spam mitigation. 14-19 - Uzma Sattar, Talha Naqash, Muhammad Raheel Zafar, Kashif Razzaq, Faisal bin Ubaid:
Secure DNS from amplification attack by using modified bloom filters. 20-23 - Sadiq Shah, Hameed Hussain, Muhammad Shoaib:
Minimizing non-coordinated interference in multi-radio multi-channel Wireless Mesh Networks (MRMC-WMNs). 24-28 - Muhammad Shoaib, Nasru Minallah, Sadiq Shah, Shahzad Rizwan, Hameed Hussain:
Investigating the impact of group mobility models over the on-demand routing protocol in MANETs. 29-34 - Shahabuddin Muhammad:
Applying authentication tests to discover Man-In-The-Middle attack in security protocols. 35-40 - Nouman M. Durrani, Nadeem Kafi Khan, Jawwad Shamsi, Waleej Haider, Asad M. Abbsi:
Secure multi-hop routing protocols in Wireless Sensor Networks: Requirements, challenges and solutions. 41-48 - Muhammad Adeel, Zulfiqar Ali, Muhammad Saqib, Muhammad Tauseef, Muhammad Muaz:
Exploiting cross-over distance to optimize energy in wireless sensor networks. 49-54 - Hizbullah Khattak, Nizamuddin:
A hybrid approach for preventing Black and Gray hole attacks in MANET. 55-57 - Abdul Rehman, Asad Ali, Riaz ul Amin, Syed Attique Shah:
VANET thread based message trust model. 58-60 - Muhammad Asif Khan, Sahibzada Zakiuddin:
Research review of development of novel routing algorithms for mobile Ad-hoc networks. 61-66 - M. Mubeen, S. A. M. Gilani, K. Zafar:
Robust image watermarking in contourlet domain using multi objective genetic algorithm. 67-72 - Amna Joyia, Abdul Ghafoor Abbasi, Maryam Sajjad, Muhammad Qaisar Choudhary:
Secure and privacy enhanced email system as a cloud service. 73-78 - Humaira Farid, Sharifullah Khan, Muhammad Younus Javed:
Publishing institutional repositories metadata on the semantic web. 79-84 - Aqeel Haider, Arif Raza:
Keyword and form based semantic search tools and their usability. 85-89 - Neelam Mukhtar, Sara Shahzad, Mohammad Abid Khan, Shah Nazir:
Ontology for feature based selection of web development tools. 90-95 - Mohsen Rouached:
A declarative Web services composition framework. 96-101 - Sana Baccar, Mohsen Rouached, Mohamed Abid:
A goal oriented approach for Web services selection and composition. 102-107 - Maqbool Ali, Ali Mustafa Qamar:
Data analysis, quality indexing and prediction of water quality for the management of rawal watershed in Pakistan. 108-113 - Sergey Kokin, Tienan Wang:
The tecnological business intelligence capabilities and business intelligence system flexibility - The underlying relationship. 114-118 - M. Asif Naeem:
A robust join operator to process streaming data in real-time data warehousing. 119-124 - Saad Ahmed Qureshi, Ammar Saleem Rehman, Ali Mustafa Qamar, Aatif Kamal, Ahsan Rehman:
Telecommunication subscribers' churn prediction model using machine learning. 131-136 - Salar Masood, Moaz Ali, Faryal Arshad, Ali Mustafa Qamar, Aatif Kamal, Ahsan Rehman:
Customer segmentation and analysis of a mobile telecommunication company of Pakistan using two phase clustering algorithm. 137-142 - Muhammad Suhail Akhtar, Hammad Qureshi:
Handwritten digit recognition through wavelet decomposition and wavelet packet decomposition. 143-148 - Umar Farooq, Muhammad Usman Asad, Faiqa Rafiq, Ghulam Abbas, Athar Hanif:
Application of machine vision for performance enhancement of footing machine used in leather industry of Pakistan. 149-154 - Sajjad Ahmad Bhatti, Asim Riaz Mohammad Ali, Khawaja Muhammad Saqib, Awais Adnan:
Assessment of capacity and performance of decentralized EMIS activities in developing countries. 155-160 - Sadia Jabeen Siddiqi, Ammara Humayun, Humaira Rehman, Imran Khan, Sadaqat Jan:
Adaptive relay selection technique for cooperative network over Nakagami fading channels. 161-65 - Ansar Ul-Haq, Mian Bilal Ayub, Junaid Iqbal, Nagina Zarin, Sajjad Ali, Imran Khan:
Performance of double threshold energy detection in cooperative-cognitive networks over Nakagami fading channels. 166-169 - Yasir Malik, Stefan D. Bruda, Bessam Abdulrazak, Usman Tariq:
Reliable communication protocol for inter-vehicular network. 170-174 - Muhammad Shah, Syed Attique Shah, Aftab Ahmed, Abdul Rehman:
User support approche for "Global Users Support Standardization and Establishment Organization (GUSSEO)". 175-181 - Afaq Iqbal, Fahim Arif, Nasru Minallah:
Analyzing impact of video codec, encapsulation methods and streaming protocols on the quality of video streaming. 182-186 - Ammar Wasif, Danish Raza, Waqas Rasheed, Zubair Farooq, Syed Qaseem Ali:
Design and implementation of a two wheel self balancing robot with a two level adaptive control. 187-193 - Rafaqut Kazmi, Rao Muhammad Afzal, Imran Sarwar Bajwa:
Teeter-totter in testing. 194-198 - Umar Farooq, Faiqa Rafiq, Muhammad Amar, Ghulam Abbas, Muhammad Usman Asad:
A neural network controller for Cartesian Plotter. 199-205 - Mahboobeh Parsapoor, Urban Bilstrup:
Brain emotional learning based fuzzy inference system (Modified using radial basis function). 206-211 - Sofia Tahir, Imran Sarwar Bajwa:
Automatic event recognition and annotation in business requirement specifications. 212-216 - Shahzad Akbar, Imran Sarwar Bajwa, Saleem Malik:
Scope resolution of logical connectives in NL constraints. 217-222 - Saima Jabeen, Sajid Shah, Asma Latif:
Named entity recognition and normalization in tweets towards text summarization. 223-227 - Arnaud Castelltort, Anne Laurent:
Representing history in graph-oriented NoSQL databases: A versioning system. 228-234 - Iftekhar Azam, Saniat Javid Sohrawardi, Himadree Shekhar Das, Md. Samsul Alam, Md. Saffan Alvy, Rashedur M. Rahman:
Bibliomining on North South University library data. 235-240 - Zaheer Babar, Muhammad Waqas, Zahid Halim, Muhammad Arshad Islam:
Genetic programming based degree constrained spanning tree extraction. 241-246 - Jehangir Ashraf Awan, Deg-hyo Bae:
Application of Adaptive Neuro-Fuzzy Inference System for dam inflow prediction using long-range weather forecast. 247-251 - Anoti Deyala, Putul Saha, Rashedur M. Rahman:
Bangla printed word recognition using histogram based approach and fuzzy logic. 252-255 - Omer Ajmal, Malik Muhammad Saad Missen, Tazeen Hashmat, M. Moosa, Tenvir Ali:
EPlag: A two layer source code plagiarism detection system. 256-261 - Imran Jattala, Shakeel Durrani, Junaid Farooqi, Ghalib Junjua, Ambreen Shafique, Faisal Hussian, Hassan Mahmood, Nassar Ikram:
Secure automotive telematics system (SATS). 262-267 - Noreen Jamil, Johannes Müller, Christof Lutteroth, Gerald Weber:
Speeding up SOR solvers for constraint-based GUIs with a warm-start strategy. 268-273 - Mir Muhammad Suleman Sarwar, Sara Shahzad, Ibrar Ahmad:
Cyclomatic complexity: The nesting problem. 274-279 - Noreen Jamil:
Quadratic optimization for user interface layout. 280-285 - Umar Farooq, Jason Gu, Muhammad Amar, Muhammad Usman Asad, Faiqa Rafiq:
A weighted matrix algorithm for vision based lane following in autonomous navigation. 286-293 - Mizna Rehman Mizna, Mamta Bachani, Sundas Memon:
Blue eyes technology. 294-298 - Waqqas ur Rehman Butt, Luca Lombardi:
A survey of automatic lip reading approaches. 299-302 - Abdul Nadeem, Yangyu Fan:
Subband configuration of adaptive synthesis filter banks for image compression. 303-307 - Waleej Haider, Aqeel-ur Rehman, Nouman M. Durrani:
Towards decision support model for ubiquitous agriculture. 308-313 - Juvaria Tahseen, Imran Sarwar Bajwa, M. Asghar Hashmi:
Prediction of minerals in rock images using Markov logic. 314-319 - Mehedi Masud, Mohsen Rouached:
A Web service based integration model of data-providing sources. 320-325 - Waqar Ul-Hasnain Khokhar:
Personal integrated process based software architecture design and evalutation. 326-331 - Mohib Ullah, Arif Iqbal Umar, Noor Ul Amin, Nizamuddin:
An efficient and secure mobile phone voting system. 332-336 - Syed Zagham Naseem, Fiaz Majeed:
Extending HTML5 local storage to save more data; efficiently and in more structured way. 337-340 - Hina Habib, Muhammad Ateeq, Imran Sarwar Bajwa:
A study on trends of mobile application usage and their distribution methods in Pakistan. 341-345 - Muhammad Shoaib, Muhammad Ilyas, Malik Sikandar Hayat Khiyal:
Official digital currency. 346-352 - Toshihiko Yamakami:
Mood-based e-commerce: A new approach for sub-personality-based marketing. 353-357 - Toshihiko Yamakami:
Servicenics approach: A social service engineering framework. 358-362 - Ghulam Mustafa, Abdul Ghaffar, Mehwish Bari:
(2n-1)-point binary approximating scheme. 363-368 - Sajid Ullah Khan:
Data warehouse enhancement manipulating materialized view hierarchy. 369-372 - Rashid Chowdury, Md. Nuruddin Monsur Adnan, G. A. N. Mahmud, Rashedur M. Rahman:
A data mining based spam detection system for YouTube. 373-378 - Imran Zahoor, Onaiza Maqbool, Rashid Naseem:
Web Application fact extractor (WAFE). 379-384 - Hameed Hussain, Muhammad Shoaib, Muhammad Bilal Qureshi, Sadiq Shah:
Load balancing through task shifting and task splitting strategies in multi-core environment. 385-390 - Arif Raza, Luiz Fernando Capretz, Faheem Ahmed:
Maintenance support in open source software projects. 391-395 - Matthias Birkle, Heiko Gewald:
Open innovation - A phased adoption model and its application to German SMEs. 396-401
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.