Journal: Computers

Volume 8, Issue 4

70 -- 0Ireneusz Kubiak. Font Design - Shape Processing of Text Information Structures in the Process of Non-Invasive Data Acquisition
71 -- 0Pourya Hoseini, Janelle Blankenburg, Mircea Nicolescu, Monica N. Nicolescu, David Feil-Seifer. Active Eye-in-Hand Data Management to Improve the Robotic Object Detection Performance
72 -- 0Igor Varfolomeev, Ivan Yakimchuk, Ilia Safonov. An Application of Deep Neural Networks for Segmentation of Microtomographic Images of Rock Samples
73 -- 0Elisa Rossi, Cinzia Rubattino, Gianluigi Viscusi. Big Data Use and Challenges: Insights from Two Internet-Mediated Surveys
74 -- 0Fotis Kitsios, Maria Kamariotou. Strategizing Information Systems: An Empirical Analysis of IT Alignment and Success in SMEs
75 -- 0Safwan M. Ghaleb, Shamala Subramaniam, Mukhtar Ghaleb, Ali Mohamed E. Ejmaa. An Efficient Group-Based Control Signalling within Proxy Mobile IPv6 Protocol
76 -- 0Laurynas Pipiras, Rytis Maskeliunas, Robertas Damasevicius. Lithuanian Speech Recognition Using Purely Phonetic Deep Learning
77 -- 0Muhammad Azfar Firdaus Azlah, Lee Suan Chua, Fakhrul Razan Rahmad, Farah Izana Abdullah, Sharifah Rafidah Wan Alwi. Review on Techniques for Plant Leaf Classification and Recognition
78 -- 0Valerio Freschi, Emanuele Lattanzi. On the Stability of a Hardware Compensation Mechanism for Embedded Energy Harvesting Emulators
79 -- 0S. Kok, Azween B. Abdullah, N. Z. Jhanjhi, Mahadevan Supramaniam. Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm
80 -- 0Michael Lescisin, Qusay H. Mahmoud, Anca Cioraca. Design and Implementation of SFCI: A Tool for Security Focused Continuous Integration
81 -- 0Natalija Vlajic, Mashruf Chowdhury, Marin Litoiu. IP Spoofing In and Out of the Public Cloud: From Policy to Practice
82 -- 0Jabbar Al-Dulaimi, John Cosmas, Maysam Abbod. Smart Health and Safety Equipment Monitoring System for Distributed Workplaces
83 -- 0Reggie Davidrajuh. A New Modular Petri Net for Modeling Large Discrete-Event Systems: A Proposal Based on the Literature Study
84 -- 0Alaa Alqatawneh, Rania Alhalaseh, Ahmad B. A. Hassanat, Mohammad Ali Abbadi. Statistical-Hypothesis-Aided Tests for Epilepsy Classification
85 -- 0Seth Djane Kotey, Eric Tutu Tchao, James Dzisi Gadze. A Proposed DoS Detection Scheme for Mitigating DoS Attack Using Data Mining Techniques
86 -- 0Nureni Ayofe Azeez, Tolulope Jide Ayemobola, Sanjay Misra, Rytis Maskeliunas, Robertas Damasevicius. Network Intrusion Detection with a Hashing Based Apriori Algorithm Using Hadoop MapReduce
87 -- 0Kathia Chenane, Youcef Touati 0001, Larbi Boubchir, Boubaker Daachi. Neural Net-Based Approach to EEG Signal Acquisition and Classification in BCI Applications
88 -- 0Hsiao-Chung Lin, Ping Wang 0007, Wen-Hui Lin. Implementation of a PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks
89 -- 0Imane Essebaa, Salima Chantit, Mohammed Ramdani. MoDAr-WA: Tool Support to Automate an MDA Approach for MVC Web Application
90 -- 0Mirjana Radonjic-Simic, Dennis Pfisterer. Beyond Platform Economy: A Comprehensive Model for Decentralized and Self-Organizing Markets on Internet-Scale
91 -- 0Sara Sekkate, Mohammed Khalil, Abdellah Adib, Sofia Ben Jebara. An Investigation of a Feature-Level Fusion for Noisy Speech Emotion Recognition