0 | -- | 0 | Prarna Mehta, Shubhangi Aggarwal, Abhishek Tandon. The Effect of Topic Modelling on Prediction of Criticality Levels of Software Vulnerabilities |
0 | -- | 0 | Umar Ali Bukar, Md Shohel Sayeed, Siti Fatimah Abdul Razak, Sumendra Yogarayan, Oluwatosin Ahmed Amodu. An exploratory bibliometric analysis of the literature on the age of information-aware unmanned aerial vehicles aided communication |
0 | -- | 0 | Akinyemi Bodunde Odunola, Dauda Akinwuyi Olalere, Mistura Laide Sanni, Emmanuel Ajayi Olajubu, Ganiyu Adesola Aderounmu, Isa Ibrahim Ali. Performance Evaluation of Machine Learning Models for Cyber Threat Detection and Prevention in Mobile Money Services |
0 | -- | 0 | Darwin Samalo, Rizky Martin, Ditdit Nugeraha Utama. Improved Model for Identifying the Cyberbullying based on Tweets of Twitter |
0 | -- | 0 | Hussain M. Al-Saadi, Imad Alshawi. Provably-Secure LED Block Cipher Diffusion and Confusion based on Chaotic Maps |
0 | -- | 0 | Wei Zhou, Ke Ma. Video Background Music Recognition and Automatic Recommendation Based on Gmm Model |
0 | -- | 0 | Matthew Abiola Oladipupo, Princewill Chima Obuzor, Babatunde Joseph Bamgbade, Emmanuel Abidemi Adeniyi, Kazeem M. Olagunju, Sunday Adeola Ajagbe. An Automated Python Script for Data Cleaning and Labeling using Machine Learning Technique |
0 | -- | 0 | Raidah S. Khudeyer, Noor Mohammed Almoosawi. Fake Image Detection Using Deep Learning |
0 | -- | 0 | Zakariya A. Oraibi, Safaa Albasri. A Robust End-to-End CNN Architecture for Efficient COVID-19 Prediction form X-ray Images with Imbalanced Data |
0 | -- | 0 | Fouad Hammadi Awad, Murtadha M. Hamad. Big Data Clustering Techniques Challenged and Perspectives: Review |
0 | -- | 0 | Ebenezer Komla Gavua, Gabor Kecskemeti. ASM-based Formal Model for Analysing Cloud Auto-Scaling Mechanisms |
0 | -- | 0 | Yuhan Jie. Design and Application of Neural Network-based Bp Algorithm in Speech Translation Robot |
0 | -- | 0 | Muhammad Donny Devanda, Ditdit Nugeraha Utama. Group Decision Support Model for Tech-Based Startup Funding using Multistage Fuzzy Logic |
0 | -- | 0 | Zaka Ullah, Ayman Odeh, Ihtisham Khattak, Muath Al-Hasan. Enhancement of Pre-Trained Deep Learning Models to Improve Brain Tumor |
0 | -- | 0 | Yohannes Biadgligne, Kamel Smaïli. Baseline Transliteration Corpus for Improved English-Amharic Machine Translation |
0 | -- | 0 | Wafaa Al-Chaab, Zaid Ameen Abduljabbar, Enas Wahab Abood, Vincent Omollo Nyangaresi, Hussein M. Mohammed, Junchao Ma. Secure and Low-Complexity Medical Image Exchange Based on Compressive Sensing and LSB Audio Steganography |
0 | -- | 0 | Alaa Dhahi Khaleefah, Haider M. Al-Mashhadi. Detection of IoT Botnet Cyber Attacks using Machine Learning |
0 | -- | 0 | Ravindar Mogili, Mandalapu Ekambaram Naidu, G. Narsimha. A New Multimedia Web-Data Mining Approach based on Equivalence Class Evaluation Pipelined to Feature Maps onto Planar Projection |
0 | -- | 0 | Tanu Sharma, Kamaldeep Kaur. A Deep Learning-Fuzzy based hybrid ensemble approach for Aspect level sentiment classification |
0 | -- | 0 | Quoc-Dung Ngo, Huy-Trung Nguyen. Towards an efficient approach using graph-based evolutionary algorithm for IoT botnet detection |
0 | -- | 0 | Khawlah M. Harahsheh, Chung-Hao Chen. A Survey of Using Machine Learning in IoT Security and the Challenges Faced by Researchers |
0 | -- | 0 | Aya Abdulhussein Alyousif, Ali Adil Yassin. Locality Improvement Scheme Based on QR Code Technique within Inverted Index |