|
Issue |
Title |
|
Vol 2, No 2 (2008): Journal of Information, Communication and Technology |
A Coding Approach to Reduce Peak-to-Average Power Ratio in Coded OFDM |
Abstract
PDF
|
Zafar Q. Taha |
|
Vol 14, No 1 (2020): Journal of Information & Communication Technology (JICT) |
A Comparative Analysis of Block Chain Technology Applications |
Abstract
PDF
|
Imran - Ali |
|
Vol 14, No 1 (2020): Journal of Information & Communication Technology (JICT) |
A Comparative Study of Contemporary Programming Langauges in Implementation of Classical Algorithms |
Abstract
PDF
|
Muhammad Shoaib, Muhammad Shumail Naveed, Anwar Ali Sanjrani, Atiq Ahmed Ahmed |
|
Vol 15, No 2 (2021): Journal of Information & Communication Technology (JICT) |
A Context-Aware IoT based Fraught Model for COVID-19 Patient Self-Monitoring |
Abstract
PDF
|
Muhammad Jamil, Shafiq Hussain, Muhammad Farhan, Muhammad Rehan Naeem |
|
Vol 15, No 1 (2021): Journal of Information & Communication Technology (JICT) |
A DYNAMIC THRESHOLD AND MAC ADDRESS BASED TECHNIQUE TO DETECT BLACK HOLE NODES IN MANETS |
Abstract
PDF
|
Zulfiqar Ali Zardari, Imtiaz Ali Brohi, Yasir Ali Panhwar, Murk Chohan, Najma Imtiaz Ali |
|
Vol 1, No 1 (2007): Journal of Information, Communication and Technology |
A logarithmic time hybrid solution of Fibonacci numbers using dynamic programming technique |
Abstract
PDF
|
H Mehta, D Abhyankar, S Tanwani, A. K Raman |
|
Vol 12, No 1 (2018): Journal of Information, Communication and Technology |
A MOBILE FIRE AND SMOKE DETECTING TELEMETRY SYSTEM BASED ON UAV MODEL |
Abstract
PDF
|
Ali Akbar Siddiqui, M. Umar Khan, M. Tahir Qadri |
|
Vol 12, No 1 (2018): Journal of Information, Communication and Technology |
A MOBILE FIRE AND SMOKE DETECTING TELEMETRY SYSTEM BASED ON UAV MODEL |
Abstract
PDF
|
Ali Akbar Siddiqui |
|
Vol 10, No 1 (2016): Journal of Information, Communication and Technology |
A QUALITATIVE STUDY OF MAJOR PROGRAMMING LANGUAGES: TEACHING PROGRAMMING LANGUAGES TO COMPUTER SCIENCE STUDENTS |
Abstract
PDF
|
Ghazala Shafi Sheikh |
|
Vol 9, No 2 (2015): Journal of Information, Communication and Technology |
A REVIEW OF TECHNIQUES FOR ONTOLOGY EDITOR EVALUATION |
Abstract
PDF
|
Noman Islam |
|
Vol 7, No 2 (2013): Journal of Information, Communication and Technology |
A review on computational economics and financing Teaching |
Details
PDF
|
Muhammad Arif Hussain |
|
Vol 5, No 1 (2011): Journal of Information, Communication and Technology |
A Robust Local Model for Segmentation Based on Coefficient of Variation |
Abstract
PDF
|
Ghulam Murtaza |
|
Vol 10, No 2 (2016): Journal of Information, Communication and Technology |
A Survey on Optical Character Recognition System |
Abstract
PDF
|
Noman Islam |
|
Vol 5, No 2 (2011): Journal of Information, Communication and Technology |
A Theoretical Framework for Modulation Based Adaptive Jamming Technology |
Abstract
PDF
|
Ehtesham Khan |
|
Vol 9, No 2 (2015): Journal of Information, Communication and Technology |
A WEB-BASED GIS APPLICATION FOR GULSHAN-E-IQBAL UNDERGROUND WATER PIPELINES NETWORK |
Abstract
PDF
|
Amber Naz |
|
Vol 9, No 1 (2015): Journal of Information, Communication and Technology |
Absolute Median Deviation Based a Robust Image Segmentation Model |
Abstract
PDF
|
Tahir Ullah |
|
Vol 11, No 1 (2017): Journal of Information, Communication and Technology |
ACognitive Radio Ad Hoc Network’s Based Disaster Management Scheme with Efficient Spectrum Management, Collaboration and Interoperability |
Abstract
PDF
|
Noman Islam |
|
Vol 12, No 2 (2018): Journal of Information, Communication and Technology |
Aggressive Behavior and Exposure to Violent Video Games in Children |
Abstract
PDF
|
Nasreen Jawaid |
|
Vol 5, No 2 (2011): Journal of Information, Communication and Technology |
Agile Software Engineering, a proposed extension for in-house software development |
Abstract
PDF
|
Muhammad Misbahuddin |
|
Vol 15, No 1 (2021): Journal of Information & Communication Technology (JICT) |
Amazon Web Service EC2 and its Features: A Systematic Literature Review |
Abstract
PDF
|
Shahid Ali, Saleem Zubair, Hafsa Riasat |
|
Vol 1, No 2 (2007): Journal of Information, Communication and Technology |
An Approach for Surveillance Using Wireless Sensor Networks (WSN |
Abstract
PDF
|
Bilal Ahmad Khan, Muhammad Sharif, Mudassar Raza, Tariq Umer, Khalid Hussain, Aman Ullah Khan |
|
Vol 9, No 1 (2015): Journal of Information, Communication and Technology |
Analysis of RFID Based Vulnerable Authentication& Entrance System |
Abstract
PDF
|
Sumair Masood Khan |
|
Vol 12, No 2 (2018): Journal of Information, Communication and Technology |
Analytical Approach for Security of Sensitive Business Cloud |
Abstract
PDF
|
Osama Ahmed |
|
Vol 16, No 1 (2022): JOURNAL OF INFORMATION & COMMUNICATION TECHNOLOGY (JICT) |
Application of Machine Learning Algorithm for Breast Cancer Detection: A Thematic Analysis |
Abstract
PDF
|
Shazma Tahseen, Muhammad Ali Memon, Kamran Taj Pathan, Shah Muhammad Kamran |
|
Vol 13, No 1 (2019): Journal of Information & Comunication Technology |
Arduino Controlled Spy Robo Car using Wireless Camera With live Streaming |
Abstract
PDF
|
Nasir karim |
|
1 - 25 of 174 Items |
1 2 3 4 5 6 7 > >> |