147 | -- | 0 | László Göcs, Zsolt Csaba Johanyák. Feature Selection with Weighted Ensemble Ranking for Improved Classification Performance on the CSE-CIC-IDS2018 Dataset |
148 | -- | 0 | Sarah Alkadi, Saad Al-Ahmadi 0002, Mohamed Maher Ben Ismail. Toward Improved Machine Learning-Based Intrusion Detection for Internet of Things Traffic |
149 | -- | 0 | Zoltán Richárd Jánki, Vilmos Bilicki. The Impact of the Web Data Access Object (WebDAO) Design Pattern on Productivity |
150 | -- | 0 | Xufeng Ling, Yu Zhu, Wei Liu, Jingxin Liang, Jie Yang. The Generation of Articulatory Animations Based on Keypoint Detection and Motion Transfer Combined with Image Style Transfer |
151 | -- | 0 | Moez Krichen. Convolutional Neural Networks: A Survey |
152 | -- | 0 | Anil B. Gavade, Rajendra Nerli, Neel Kanwal, Priyanka A. Gavade, Shridhar Sunilkumar Pol, Syed Tahir Hussain Rizvi. Automated Diagnosis of Prostate Cancer Using mpMRI Images: A Deep Learning Approach for Clinical Decision Support |
153 | -- | 0 | Marta Montenegro Rueda, José Fernández-Cerero, José María Fernández Batanero, Eloy López-Meneses. Impact of the Implementation of ChatGPT in Education: A Systematic Review |
154 | -- | 0 | Johan Thunberg, Taqwa Saeed, Galina Sidorenko, Felipe Valle, Alexey V. Vinel. Cooperative Vehicles versus Non-Cooperative Traffic Light: Safe and Efficient Passing |
155 | -- | 0 | William Eduardo Villegas-Ch., Joselin García-Ortiz, Jaime Govea. A Comprehensive Approach to Image Protection in Digital Environments |
156 | -- | 0 | Ron S. Hirschprung. Is the Privacy Paradox a Domain-Specific Phenomenon |
157 | -- | 0 | Wejdan Almutairi, Tarek Moulahi. Joining Federated Learning to Blockchain for Digital Forensics in IoT |
158 | -- | 0 | Nahla NurElmadina, Rashid A. Saeed, Elsadig Saeid, Elmustafa Sayed Ali, Maha S. Abdelhaq, Raed A. Alsaqour, Nawaf Alharbe. Downlink Power Allocation for CR-NOMA-Based Femtocell D2D Using Greedy Asynchronous Distributed Interference Avoidance Algorithm |
159 | -- | 0 | Erol Özçekiç, Selçuk Kavut, Hakan Kutucu. Genetic Approach to Improve Cryptographic Properties of Balanced Boolean Functions Using Bent Functions |
160 | -- | 0 | Saja Theab Ahmed, Dalal Abdulmohsin Hammood, Raad Farhood Chisab, Ali Al-Naji, Javaan S. Chahl. Medical Image Encryption: A Comprehensive Review |
161 | -- | 0 | János Hollósi, Áron Ballagi, Gábor Kovács, Szabolcs Fischer, Viktor Nagy. Face Detection Using a Capsule Network for Driver Monitoring Application |
162 | -- | 0 | Banoth Ravi, Blesson Varghese, Ilir Murturi, Praveen Kumar Donta, Schahram Dustdar, Chinmaya Kumar Dehury, Satish Narayana Srirama. Stochastic Modeling for Intelligent Software-Defined Vehicular Networks: A Survey |
163 | -- | 0 | George K. Adam. Timing and Performance Metrics for TWR-K70F120M Device |
164 | -- | 0 | Rida Fatima, Furkh Zeshan, Adnan Ahmad, Muhamamd Hamid, Imen Filali, Amel Ali Alhussan, Hanaa A. Abdallah. Requirement Change Prediction Model for Small Software Systems |
165 | -- | 0 | Anibal Flores, Hugo Tito-Chura, Deymor Centty-Villafuerte, Alejandro Manuel Ecos Espino. Pm2.5 Time Series Imputation with Deep Learning and Interpolation |
166 | -- | 0 | Noura A. Mawla, Hussein K. Khafaji. Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography |
167 | -- | 0 | Nehad T. A. Ramaha, Ruaa M. Mahmood, Alaa Ali Hameed, Norma Latif Fitriyani, Ganjar Alfian, Muhammad Syafrudin. Brain Pathology Classification of MR Images Using Machine Learning Techniques |