Journal: Computers

Volume 12, Issue 8

147 -- 0László Göcs, Zsolt Csaba Johanyák. Feature Selection with Weighted Ensemble Ranking for Improved Classification Performance on the CSE-CIC-IDS2018 Dataset
148 -- 0Sarah Alkadi, Saad Al-Ahmadi 0002, Mohamed Maher Ben Ismail. Toward Improved Machine Learning-Based Intrusion Detection for Internet of Things Traffic
149 -- 0Zoltán Richárd Jánki, Vilmos Bilicki. The Impact of the Web Data Access Object (WebDAO) Design Pattern on Productivity
150 -- 0Xufeng Ling, Yu Zhu, Wei Liu, Jingxin Liang, Jie Yang. The Generation of Articulatory Animations Based on Keypoint Detection and Motion Transfer Combined with Image Style Transfer
151 -- 0Moez Krichen. Convolutional Neural Networks: A Survey
152 -- 0Anil B. Gavade, Rajendra Nerli, Neel Kanwal, Priyanka A. Gavade, Shridhar Sunilkumar Pol, Syed Tahir Hussain Rizvi. Automated Diagnosis of Prostate Cancer Using mpMRI Images: A Deep Learning Approach for Clinical Decision Support
153 -- 0Marta Montenegro Rueda, José Fernández-Cerero, José María Fernández Batanero, Eloy López-Meneses. Impact of the Implementation of ChatGPT in Education: A Systematic Review
154 -- 0Johan Thunberg, Taqwa Saeed, Galina Sidorenko, Felipe Valle, Alexey V. Vinel. Cooperative Vehicles versus Non-Cooperative Traffic Light: Safe and Efficient Passing
155 -- 0William Eduardo Villegas-Ch., Joselin García-Ortiz, Jaime Govea. A Comprehensive Approach to Image Protection in Digital Environments
156 -- 0Ron S. Hirschprung. Is the Privacy Paradox a Domain-Specific Phenomenon
157 -- 0Wejdan Almutairi, Tarek Moulahi. Joining Federated Learning to Blockchain for Digital Forensics in IoT
158 -- 0Nahla NurElmadina, Rashid A. Saeed, Elsadig Saeid, Elmustafa Sayed Ali, Maha S. Abdelhaq, Raed A. Alsaqour, Nawaf Alharbe. Downlink Power Allocation for CR-NOMA-Based Femtocell D2D Using Greedy Asynchronous Distributed Interference Avoidance Algorithm
159 -- 0Erol Özçekiç, Selçuk Kavut, Hakan Kutucu. Genetic Approach to Improve Cryptographic Properties of Balanced Boolean Functions Using Bent Functions
160 -- 0Saja Theab Ahmed, Dalal Abdulmohsin Hammood, Raad Farhood Chisab, Ali Al-Naji, Javaan S. Chahl. Medical Image Encryption: A Comprehensive Review
161 -- 0János Hollósi, Áron Ballagi, Gábor Kovács, Szabolcs Fischer, Viktor Nagy. Face Detection Using a Capsule Network for Driver Monitoring Application
162 -- 0Banoth Ravi, Blesson Varghese, Ilir Murturi, Praveen Kumar Donta, Schahram Dustdar, Chinmaya Kumar Dehury, Satish Narayana Srirama. Stochastic Modeling for Intelligent Software-Defined Vehicular Networks: A Survey
163 -- 0George K. Adam. Timing and Performance Metrics for TWR-K70F120M Device
164 -- 0Rida Fatima, Furkh Zeshan, Adnan Ahmad, Muhamamd Hamid, Imen Filali, Amel Ali Alhussan, Hanaa A. Abdallah. Requirement Change Prediction Model for Small Software Systems
165 -- 0Anibal Flores, Hugo Tito-Chura, Deymor Centty-Villafuerte, Alejandro Manuel Ecos Espino. Pm2.5 Time Series Imputation with Deep Learning and Interpolation
166 -- 0Noura A. Mawla, Hussein K. Khafaji. Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography
167 -- 0Nehad T. A. Ramaha, Ruaa M. Mahmood, Alaa Ali Hameed, Norma Latif Fitriyani, Ganjar Alfian, Muhammad Syafrudin. Brain Pathology Classification of MR Images Using Machine Learning Techniques