Abstract is missing.
- Artificial Bee Colony for Automated Black-Box Testing of RESTful APISeif Ahmed, Abeer Hamdy. 1-17 [doi]
- Classifying Human Activities Using Machine Learning and Deep Learning TechniquesSanku Satya Uday, Satti Thanuja Pavani, T. Jaya Lakshmi, Y. V. Nandini. 19-29 [doi]
- Explainable Artificial Intelligence and Mobile Health for Treating Eating Disorders in Young Adults with Autism Spectrum Disorder Based on the Theory of Change: A Mixed Method ProtocolOmobolanle Omisade, Alexander E. Gegov, Shang Ming Zhou, Alice Good, Catherine Tryfona, Sandeep Singh Sengar, Amie-Louise Prior, Bangli Liu, Taiwo Adedeji, Carrie M. Toptan. 31-44 [doi]
- Novel Deep Learning Models for Optimizing Human Activity Recognition Using Wearable Sensors: An Analysis of Photoplethysmography and Accelerometer SignalsRohit Kumar Bondugula, Siba Kumar Udgata. 45-56 [doi]
- Link Prediction in Complex Networks: An Empirical ReviewY. V. Nandini, T. Jaya Lakshmi, Murali Krishna Enduri. 57-67 [doi]
- High Utility Itemset Mining and Inventory Management: Theory and Use CasesGutha Jaya Krishna. 69-76 [doi]
- Using Clustering Approach to Enhance Prioritization of Regression Test CasesUmakanta Dash, Arup Abhinna Acharya, Satya Ranjan Dash. 77-88 [doi]
- Nucleus Segmentation Using Adaptive Thresholding for Analysis of Blood and Bone Marrow Smear ImagesVikrant Bhateja, Sparshi Gupta, Siddharth Verma, Sourabh Singh, Ahmad Taher Azar, Aimé Lay-Ekuakille, Jerry Chun-Wei Lin. 89-96 [doi]
- A Systematic Review on Automatic Speech Recognition for Odia LanguageNamita Mishra, Satya Ranjan Dash, Shantipriya Parida, Ravi Shankar Prasad. 97-109 [doi]
- A Study on Influence Maximization in Complex NetworksChennapragada V. S. S. Mani Saketh, Kakarla Pranay, Akhila Susarla, Dukka Ravi Ram Karthik, T. Jaya Lakshmi, Y. V. Nandini. 111-119 [doi]
- A Survey on Smart Hydroponics Farming: An Integration of IoT and AI-Based Efficient Alternative to Land FarmingSnehal V. Laddha, Pratik P. Shastrakar, Sanskruti A. Zade. 121-130 [doi]
- Angiosperm Genus Classification by RBF-SVMShuwen Chen, Jiaji Wang, Yiyang Ni, Jiaqi Shao, Hui Qu, Ziyi Wang. 131-140 [doi]
- Signage Detection Based on Adaptive SIFTJiaji Wang, Shuwen Chen, Jiaqi Shao, Hui Qu, Ziyi Wang. 141-152 [doi]
- Surface Electromyography Assisted Hand Gesture Recognition Using Bidirectional LSTM and Unidirectional LSTM for the Hearing ImpairedNeel Gandhi, Shakti Mishra. 153-164 [doi]
- The Potential of Using Corpora and Concordance Tools for Language Learning: A Case Study of 'Interested in (Doing)' and 'Interested to (Do)'Lily Lim, Vincent Xian Wang. 165-175 [doi]
- Analysis of Various Video-Based Human Action Recognition Techniques Using Deep Learning TechniquesLakshmi Alekhya Jandhyam, Ragupathy Rengaswamy, Narayana Satyala. 177-188 [doi]
- Penetration Testing of Web Server Using Metasploit Framework and DVWATamanna Jena Singhdeo, S. R. Reeja, Arpan Bhavsar, Suresh Satapathy. 189-199 [doi]
- Periodic Rampart Line Inspired Circular Microstrip Patch AntennaChirag Arora. 201-206 [doi]
- A Deep Learning-Based Prediction Model for Wellness of Male Sea Bass FishVelaga Sai Sreeja, Kotha Sita Kumari, Duddugunta Bharath Reddy, Paladugu Ujjwala. 207-217 [doi]
- Depression Detection Using Deep LearningG. Gopichand, Anirudh Ramesh, Vasant Tholappa, G. Sridara Pandian. 219-229 [doi]
- Fusion of Variational Autoencoder-Generative Adversarial Networks and Siamese Neural Networks for Face MatchingGarvit Luhadia, Aditya Deepak Joshi, V. Vijayarajan, V. Vinoth Kumar. 231-241 [doi]
- An Invasion Detection System in the Cloud That Use Secure Hashing TechniquesSridevi Sakhamuri, Gopi Krishna Yanala, Varagani Durga Shyam Prasad, Ch. Bala Subrmanyam, Aika Pavan Kumar. 243-254 [doi]
- Detection of Suspicious Human Activities from Surveillance Camera Using Neural NetworksA. Kousar Nikhath, N. Sandhya, Sayeeda Khanum Pathan, B. Venkatesh. 255-263 [doi]
- High Resolution Remote Sensing Image Classification Using Convolutional Neural NetworksK. Giridhar Sai, B. Sujatha, R. Tamilkodi, N. Leelavathy. 265-277 [doi]
- FSVM: Time Series Forecasting Using Fuzzy Support Vector MachineN. Sravani, B. Sujatha, R. Tamilkodi, N. Leelavathy. 279-290 [doi]
- Deep Learning Framework for the Detection of Invasive Ductal CarcinomaK. V. Aditya, N. Leelavathy, B. Sujatha, R. Tamilkodi, D. Sattibabu. 291-304 [doi]
- Iris-Based Human Identity Recognition Using Transfer Learning ApproachChinthapalli Karthik, B. Sujatha, T. K. Charan Babu, D. PhaniKumar, S. Mohan Krishna. 305-314 [doi]
- Ensemble Model for Lidar Data Analysis and Nocturnal Boundary Layer Height EstimationGurram Sunitha, K. Reddy Madhavi, Janagaraj Avanija, K. Srujan Raju, Adepu Kirankumar, Avala Raji Reddy. 315-326 [doi]
- Classical and Parameterized Complexity of Line Segment Covering Problems in ArrangementM. Rema, R. Subashini, Subhasree Methirumangalath, Varun Rajan. 327-338 [doi]
- User Story-Based Automatic Keyword Extraction Using Algorithms and AnalysisArantla Jaagruthi, Mallu Varshitha, Karumuru Sai Vinaya, Vayigandla Neelesh Gupta, C. Arunkumar, B. A. Sabarish. 339-350 [doi]
- Prediction of Sepsis Disease Using Random Search to Optimize Hyperparameter Tuning Based on Lazy Predict ModelE. Laxmi Lydia, Sara A. Althubiti, C. S. S. Anupama, Kollati Vijaya Kumar. 351-367 [doi]
- Surveillance Video-Based Object Detection by Feature Extraction and Classification Using Deep Learning ArchitectureElvir Akhmetshin, Sevara Sultanova, C. S. S. Anupama, Kollati Vijaya Kumar, E. Laxmi Lydia. 369-378 [doi]
- Deep Learning-Based Recommender Systems - A Systematic Review and Future PerspectiveS. Krishnamoorthi, Gopal K. Shyam. 379-397 [doi]
- Hybrid Security Against Black Hole and Sybil Attacks in Drone-Assisted Vehicular Ad Hoc NetworksAryan Abdlwhab Qader, Mohammed Hasan Mutar, Sameer Alani, Waleed Khalid Al-Azzawi, Sarmad Nozad Mahmood, Hussein Muhi Hariz, Mustafa Asaad Rasol. 399-413 [doi]
- Optimization of Metal Removal Rate, Surface Roughness, and Hardness Using the Taguchi Method in CNC Turning MachineZahraa N. Abdul Hussain, Mohammed Jameel Alsalhy. 415-432 [doi]
- Qualitative Indicator of Growth of Segments of the Network with Various Service DisciplinesZamen Latef Naser, Ban Kadhim Murih, M. W. Alhamd. 433-440 [doi]
- Hidden Attractor in a Asymmetrical Novel Hyperchaotic System Involved in a Bounded Function of Exponential Form with Image Encryption ApplicationAli A. Shukur, Mohanad A. AlFallooji. 441-451 [doi]
- AI-Based Secure Software-Defined Controller to Assist Alzheimer's Patients in Their Daily RoutinesS. Nithya, Satheesh Kumar Palanisamy, Ahmed J. Obaid, K. N. Apinaya Prethi, Mohammed Ayad Alkhafaji. 453-463 [doi]
- An Optimized Deep Learning Algorithm for Cyber-Attack DetectionM. Eugine Prince, P. Josephin Shermila, S. Sajithra Varun, E. Anna Devi, P. Sujatha Therese, A. Ahilan, A. Jasmine Gnana Malar. 465-472 [doi]
- Estimation of Wind Energy Reliability Using Modeling and Simulation MethodA. Jasmine Gnana Malar, M. Ganga, V. Parimala, S. Chellam. 473-480 [doi]
- Authentication Protocol for Secure Data Access in Fog Computing-Based Internet of ThingsPriyanka Surendran, Bindhya Thomas, Densy John, Anupama Prasanth, Joy Winston, AbdulKhadar Jilani. 481-494 [doi]
- Efficient Data Security Using Hybrid RSA-TWOFISH Encryption Technique on Cloud ComputingA. Jenice Prabhu, S. Vallisree, S. N. Kumar, R. Sitharthan, M. Rajesh, A. Ahilan, M. Usha. 495-502 [doi]
- Fuzzy-Based Cluster Head Selection for Wireless Sensor NetworksR. Surendiran, D. Nageswari, R. Jothin, A. Jegatheesh, A. Ahilan, A. Bhuvanesh. 503-510 [doi]
- An Optimized Cyber Security Framework for Network ApplicationsB. Veerasamy, D. Nageswari, S. N. Kumar, Anil Shirgire, R. Sitharthan, A. Jasmine Gnana Malar. 511-518 [doi]
- Modified Elephant Herd Optimization-Based Advanced Encryption StandardR. Surendiran, S. Chellam, R. Jothin, A. Ahilan, S. Vallisree, A. Jasmine Gnana Malar, J. Sathiamoorthy. 519-528 [doi]
- Phonocardiographic Signal Analysis for the Detection of Cardiovascular DiseasesDeena Nath Gupta, Rohit Anand, Shahanawaj Ahamad, Trupti Patil, Dharmesh Dhabliya, Ankur Gupta. 529-538 [doi]
- Object Localization in Emoji-Based Social Networks Using Deep Learning TechniquesGaliveeti Poornima, Y. Sudha, B. C. Manujakshi, R. Pallavi, Deepak S. Sakkari, P. Karthikeyan. 539-552 [doi]
- Mathematical Gann Square Model and Elliott Wave Principle with Bi-LSTM for Stock Price PredictionK. V. Manjunath, M. Chandra Sekhar. 553-565 [doi]
- Crowd Monitoring System Using Facial RecognitionSunanda Das, R. Chinnaiyan, G. Sabarmathi, A. Maskey, M. Swarnamugi, S. Balachandar, R. Divya. 567-577 [doi]
- Performance Augmentation of DIMOS TransistorS. Jafar Ali Ibrahim, V. Jeya Kumar, N. S. Kalyan Chakravarthy, Alhaf Malik Kaja Mohideen, M. Mani Deepika, M. Sathya. 579-584 [doi]
- A Hyperparameter Tuned Ensemble Learning Classification of Transactions over Ethereum BlockchainRohit Saxena, Deepak Arora, Vishal Nagar, Satyasundara Mahapatra, Malay Tripathi. 585-594 [doi]
- Data Integrity Protection Using Multi-level Reconstructive Error Data and Auditing for Cloud StorageKaushik Sekaran, B. Seetharamulu, J. Kalaivani, Vijayalaxmi C. Handaragall, B. Venkatesh. 595-606 [doi]
- Emotion-Based Song Recommendation SystemA. R. Sathya, Alluri Raghav Varma. 607-615 [doi]
- A Hybrid Model for Forecasting Stock Prices Using Bayesian and LSTMRohini Pinapatruni, Faizan Mohammed, Syed Anas Mohiuddin, Dheeraj Patel. 617-631 [doi]