Abstract is missing.
- A fuzzy-based approach for approximating depth information in RGB-D imagesMau Uyen Nguyen, Thanh Tinh Dao, Long Thanh Ngo. 1-5 [doi]
- An efficient LBP-based descriptor for real-time object detectionNgoc Tran Nguyen. 1-5 [doi]
- A simple braking model for detecting incidents locations by smartphonesViet-Chau Dang, Masao Kubo, Hiroshi Sato, Akihiro Yamaguchi, Akira Namatame. 1-5 [doi]
- Control of a mobile agent using only bearing measurements in triangular regionMinh Hoang Trinh, Kwang-Kyo Oh, Hyo-Sung Ahn. 1-5 [doi]
- SSSM-semantic set and string matching based malware detectionNguyen Van Nhuong, Vo Thi Yen Nhi, Cam Nguyen Tan, Mai Xuan Phu, Tan Cao Dang. 1-6 [doi]
- An improved memetic algorithm to enhance the sustainability and reliability of transport in container terminalsShayan Kavakeb, Trung Thanh Nguyen, Mohamed Benmerikhi, Zaili Yang, Ian Jenkinson. 1-8 [doi]
- A hybrid framework for enhancing correlation to solve cold-start problem in recommender systemsThai Thinh Dang, Trang Hai Duong, Hong Son Nguyen. 1-5 [doi]
- Design of Takagi-Sugeno fuzzy controller for automatic stabilization system of missiles with blended aerodynamic and lateral impulsive reaction-jetCao Huu Tinh, Vu Hoa Tien, Nguyen Cong Dinh, Mai Ngoc Anh. 1-7 [doi]
- On trust and influence: A computational red teaming game theoretic perspectiveEleni Petraki, Hussein A. Abbass. 1-7 [doi]
- Risk management with hard-soft data fusion in maritime domain awarenessRafael Falcon, Rami Abielmona, Sean Billings, Alex Plachkov, Hussein Abbass. 1-8 [doi]
- Malware detection using genetic programmingThi Anh Le, Thi Huong Chu, Quang Uy Nguyen, Xuan Hoai Nguyen. 1-6 [doi]
- DMEA-II and its application on spam email detection problemsLong Nguyen, Anh Quang Tran, Lam Thu Bui. 1-6 [doi]
- Analysis of maritime air defence scenariosBao Nguyen, Md. Suruz Miah. 1-8 [doi]
- A multi-objective method for discovery of pathways in protein-protein interaction networksNguyen Hoai Anh. 1-7 [doi]
- Effects of the cookie cutter function shapes on Monte Carlo simulations of weapon effectivenessPawat Chusilp, Weerawut Charubhun, Otsin Nilubol. 1-7 [doi]
- An optimization procedure for enhancing network robustness against cascading failuresHoang Anh Q. Tran, Akira Namatame, Augie Widyotriatmo, Endra Joelianto. 1-7 [doi]
- Smoothing gamma ray spectra to improve outlier detectionVincent Barnabe-Lortie, Colin Bellinger, Nathalie Japkowicz. 1-8 [doi]
- Automated generation of ham rules for Vietnamese spam filteringQuan Dang Dinh, Quang-Anh Tran, Frank Jiang. 1-5 [doi]
- R2-BEAN: R2 indicator based evolutionary algorithm for noisy multiobjective optimizationDung H. Phan, Junichi Suzuki. 1-8 [doi]
- Behavior-driven video analytics system for critical infrastructure protectionPhillip Curtis, Moufid Harb, Rami S. Abielmona, Emil M. Petriu. 1-8 [doi]
- Maritime air defence firing tacticsSuruz Miah, Bao Nguyen, Davide Spinello, Wail Gueaieb. 1-9 [doi]
- Neural network technologies for information systems securityEduard Avedyan, Alexander I. Galushkin, Dmitry V. Pantiukhin. 1-5 [doi]
- Intrusion detection system using Discrete Fourier TransformEnkhbold Chimedtseren, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa. 1-5 [doi]
- B-tree based two-dimensional early packet rejection technique against DoS traffic targeting firewall default security ruleNguyen Manh Hung, Vu Duy Nhat. 1-6 [doi]