Face Recognition using an HD PTZ Camera in a Virtual Classroom Assessing Component based ERP Architecture for Developing Organizations Tug of Perspectives: Mobile App Users vs Developers How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ransomware Attacks Perspective Development of System Usability Scale (SUS) for the Urdu Language Data-Driven Hydrocarbon Production Forecasting Using Machine Learning Techniques Dynamic Three Stages Task Scheduling Algorithm on Cloud Computing Predicting Football Match Results with Data Mining Techniques Information Security Risk Analysis Using Analytic Hierarchy Process and Fuzzy Comprehensive Evaluation A Cancelable Biometric Based Security Protocol for Online Banking System A Cancelable Biometric Based Security Protocol for Online Banking System CryptoQR System based on RSA Birds of a Feather Flock Together? A Study of Developers’ Flocking and Migration Behavior in GitHub and Stack Overflow A Secure Governmental Supported Service Distribution Model Using Identity-based Cryptography ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detection System Long Term Evolution Coexistence with Wireless Fidelity in Unlicensed Spectrum Using Modified Blank Subframe Allocation Technique