1 | -- | 18 | Yi-Chun Chang, Kuan-Ting Lai, Seng-cho Timothy Chou, Wei-Chuan Chiang, Yuan-Chen Lin. Who is the boss? Identifying key roles in telecom fraud network via centrality-guided deep random walk |
19 | -- | 40 | K. Satya Sujith, G. Sasikala. Optimal support vector machine and hybrid tracking model for behaviour recognition in highly dense crowd videos |
41 | -- | 63 | Mahesh P. Wankhade, Kalpana C. Jondhale. Enhancing lifetime of wireless multimedia sensor networks using modified lion algorithm-based image transmission model |
64 | -- | 81 | Lokesh Singh, Rekh Ram Janghel, Satya Prakash Sahu. TrCSVM: a novel approach for the classification of melanoma skin cancer using transfer learning |
82 | -- | 96 | Brunno e Souza Rodrigues, Carla Martins Floriano, Valdecy Pereira, Marcos Costa Roboredo. An algorithm to elicitate ELECTRE II, III and IV parameters |
97 | -- | 117 | Shu-Hao Chang. Technical trends of artificial intelligence in standard-essential patents |
118 | -- | 148 | Seyed Mohammad Javad Hosseini, Bahman Arasteh, Ayaz Isazadeh, Mehran Mohsenzadeh, Mitra Mirzarezaee. An error-propagation aware method to reduce the software mutation cost using genetic algorithm |
149 | -- | 174 | Samira Khodabandehlou, S. Alireza Hashemi Golpayegani, Mahmoud Zivari Rahman. An effective recommender system based on personality traits, demographics and behavior of customers in time context |