70 | -- | 0 | Ireneusz Kubiak. Font Design - Shape Processing of Text Information Structures in the Process of Non-Invasive Data Acquisition |
71 | -- | 0 | Pourya Hoseini, Janelle Blankenburg, Mircea Nicolescu, Monica N. Nicolescu, David Feil-Seifer. Active Eye-in-Hand Data Management to Improve the Robotic Object Detection Performance |
72 | -- | 0 | Igor Varfolomeev, Ivan Yakimchuk, Ilia Safonov. An Application of Deep Neural Networks for Segmentation of Microtomographic Images of Rock Samples |
73 | -- | 0 | Elisa Rossi, Cinzia Rubattino, Gianluigi Viscusi. Big Data Use and Challenges: Insights from Two Internet-Mediated Surveys |
74 | -- | 0 | Fotis Kitsios, Maria Kamariotou. Strategizing Information Systems: An Empirical Analysis of IT Alignment and Success in SMEs |
75 | -- | 0 | Safwan M. Ghaleb, Shamala Subramaniam, Mukhtar Ghaleb, Ali Mohamed E. Ejmaa. An Efficient Group-Based Control Signalling within Proxy Mobile IPv6 Protocol |
76 | -- | 0 | Laurynas Pipiras, Rytis Maskeliunas, Robertas Damasevicius. Lithuanian Speech Recognition Using Purely Phonetic Deep Learning |
77 | -- | 0 | Muhammad Azfar Firdaus Azlah, Lee Suan Chua, Fakhrul Razan Rahmad, Farah Izana Abdullah, Sharifah Rafidah Wan Alwi. Review on Techniques for Plant Leaf Classification and Recognition |
78 | -- | 0 | Valerio Freschi, Emanuele Lattanzi. On the Stability of a Hardware Compensation Mechanism for Embedded Energy Harvesting Emulators |
79 | -- | 0 | S. Kok, Azween B. Abdullah, N. Z. Jhanjhi, Mahadevan Supramaniam. Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm |
80 | -- | 0 | Michael Lescisin, Qusay H. Mahmoud, Anca Cioraca. Design and Implementation of SFCI: A Tool for Security Focused Continuous Integration |
81 | -- | 0 | Natalija Vlajic, Mashruf Chowdhury, Marin Litoiu. IP Spoofing In and Out of the Public Cloud: From Policy to Practice |
82 | -- | 0 | Jabbar Al-Dulaimi, John Cosmas, Maysam Abbod. Smart Health and Safety Equipment Monitoring System for Distributed Workplaces |
83 | -- | 0 | Reggie Davidrajuh. A New Modular Petri Net for Modeling Large Discrete-Event Systems: A Proposal Based on the Literature Study |
84 | -- | 0 | Alaa Alqatawneh, Rania Alhalaseh, Ahmad B. A. Hassanat, Mohammad Ali Abbadi. Statistical-Hypothesis-Aided Tests for Epilepsy Classification |
85 | -- | 0 | Seth Djane Kotey, Eric Tutu Tchao, James Dzisi Gadze. A Proposed DoS Detection Scheme for Mitigating DoS Attack Using Data Mining Techniques |
86 | -- | 0 | Nureni Ayofe Azeez, Tolulope Jide Ayemobola, Sanjay Misra, Rytis Maskeliunas, Robertas Damasevicius. Network Intrusion Detection with a Hashing Based Apriori Algorithm Using Hadoop MapReduce |
87 | -- | 0 | Kathia Chenane, Youcef Touati 0001, Larbi Boubchir, Boubaker Daachi. Neural Net-Based Approach to EEG Signal Acquisition and Classification in BCI Applications |
88 | -- | 0 | Hsiao-Chung Lin, Ping Wang 0007, Wen-Hui Lin. Implementation of a PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks |
89 | -- | 0 | Imane Essebaa, Salima Chantit, Mohammed Ramdani. MoDAr-WA: Tool Support to Automate an MDA Approach for MVC Web Application |
90 | -- | 0 | Mirjana Radonjic-Simic, Dennis Pfisterer. Beyond Platform Economy: A Comprehensive Model for Decentralized and Self-Organizing Markets on Internet-Scale |
91 | -- | 0 | Sara Sekkate, Mohammed Khalil, Abdellah Adib, Sofia Ben Jebara. An Investigation of a Feature-Level Fusion for Noisy Speech Emotion Recognition |