From post

Implementation and Adoption of E-HRM in Small and Medium Enterprises of Pakistan.

, , , , и . ITITS, том 296 из Frontiers in Artificial Intelligence and Applications, стр. 573-582. IOS Press, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches., , , , , , , и . Future Internet, 15 (6): 193 (июня 2023)Technical Analysis of Contact Tracing Platform Developed by Google-Apple for Constraining the Spread of COVID-19.. ISPRS Int. J. Geo Inf., 11 (11): 539 (2022)Area-Optimized Constant-Time Hardware Implementation for Polynomial Multiplication., , , , и . IEEE Embed. Syst. Lett., 15 (1): 5-8 (марта 2023)Energy efficiency in big data complex systems: a comprehensive survey of modern energy saving techniques., и . Complex Adapt. Syst. Model., (2015)Implementation and Adoption of E-HRM in Small and Medium Enterprises of Pakistan., , , , и . ITITS, том 296 из Frontiers in Artificial Intelligence and Applications, стр. 573-582. IOS Press, (2017)NURBS curves with the application of multiple bones fracture reconstruction., , , , и . Appl. Math. Comput., (2017)The Changing Landscape of Privacy- Countermeasures in the Era of the COVID-19 Pandemic., и . IT Prof., 25 (4): 52-60 (июля 2023)A Comprehensive Analysis of Privacy Protection Techniques Developed for COVID-19 Pandemic., и . IEEE Access, (2021)A Privacy-Assured Data Lifecycle for Epidemic-Handling Systems., и . Computer, 55 (8): 57-69 (2022)Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: A Systematic Review.. J. Cybersecur. Priv., 3 (3): 638-661 (сентября 2023)