Abstract is missing.
- Dimension Reduction with Extraction Methods (Principal Component Analysis - Self Organizing Map - Isometric Mapping) in Indonesian Language Text Documents ClusteringMuhammad Ihsan Jambak, Ahmad Ikrom Izzuddin Jambak, Rahmad Tirta Febrianto, Danny Matthew Saputra, Muhammad Irfan Jambak. 1-9 [doi]
- Reducing Data Volume in Instance Based LearningMaria do Carmo Nicoletti, Luis Andre Claudiano. 10-20 [doi]
- State Estimation of Moving Vehicle Using Extended Kalman Filter: A Cyber Physical AspectAnkur Jain, Binoy Krishna Roy. 21-30 [doi]
- ADAL System: Aspect Detection for Arabic LanguageTrigui Sana, Ines Boujelben, Salma Jamoussi, Yassine Ben Ayed. 31-40 [doi]
- Modelling, Analysis and Simulation of a Patient Admission Problem: A Social Network ApproachVeera Babu Ramakurthi, Vijayakumar Manupati, Suraj Panigrahi, Maria Leonilde R. Varela, Goran Putnik, P. S. C. Bose. 41-51 [doi]
- Short-Term Load Forecasting: An Intelligent Approach Based on Recurrent Neural NetworkAtul Patel, Monidipa Das, Soumya K. Ghosh 0001. 52-62 [doi]
- Design and Analysis of Anti-windup Techniques for Anti-lock Braking SystemPrangshu Saikia, Ankur Jain. 63-71 [doi]
- Wind-Power Intra-day Statistical Predictions Using Sum PDE Models of Polynomial Networks Combining the PDE Decomposition with Operational Calculus TransformsLadislav Zjavka, Václav Snásel, Ajith Abraham. 72-82 [doi]
- Heterogeneous Engineering in Intelligent LogisticsYury Iskanderov, Mikhail Pautov. 83-91 [doi]
- Extracting Unknown Repeated Pattern in Tiled ImagesPrasanga Neupane, Archana Tuladhar, Shreeniwas Sharma, Ravi Tamang. 92-102 [doi]
- Convolutional Deep Learning Network for Handwritten Arabic Script RecognitionMohamed Elleuch, Monji Kherallah. 103-112 [doi]
- Diversity in Recommendation System: A Cluster Based ApproachNaina Yadav, Rajesh Kumar Mundotiya, Anil Kumar Singh, Sukomal Pal. 113-122 [doi]
- Contribution on Arabic Handwriting Recognition Using Deep Neural NetworkZouhaira Noubigh, Anis Mezghani, Monji Kherallah. 123-133 [doi]
- Analyzing and Enhancing Processing Speed of K-Medoid Algorithm Using Efficient Large Scale Processing FrameworksAyshwarya Jaiswal, Vijay Kumar Dwivedi, Om Prakash Yadav. 134-144 [doi]
- Multiple Criteria Fake Reviews Detection Based on Spammers' Indicators Within the Belief Function TheoryMalika Ben Khalifa, Zied Elouedi, Eric Lefèvre. 145-155 [doi]
- Data Clustering Using Environmental Adaptation MethodTribhuvan Singh, Krishn Kumar Mishra, Ranvijay. 156-164 [doi]
- Soft Computing, Data Mining, and Machine Learning Approaches in Detection of Heart Disease: A ReviewKeshav Srivastava, Dilip Kumar Choubey. 165-175 [doi]
- A Novel CAD System for Breast DCE-MRI Based on Textural Analysis Using Several Machine Learning MethodsRaouia Mokni, Norhene Gargouri, Alima Damak Masmoudi, Dorra Sellami, Wiem Feki, Zaineb Mnif. 176-187 [doi]
- An Adversarial Learning Mechanism for Dealing with the Class-Imbalance Problem in Land-Cover ClassificationShounak Chakraborty 0002, Indrajit Kalita, Moumita Roy. 188-196 [doi]
- An Integrated Fuzzy ANP-TOPSIS Approach to Rank and Assess E-Commerce Web SitesRim Rekik. 197-209 [doi]
- Implementation of Block Chain Technology in Public Distribution SystemPratik Thakare, Nitin Dighore, Ankit Chopkar, Aakash Chauhan, Diksha Bhagat, Milind Tote. 210-219 [doi]
- Chaotic Salp Swarm Optimization Using SVM for Class Imbalance ProblemsGillala Rekha, V. Krishna Reddy, Amit Kumar Tyagi. 220-229 [doi]
- Three-Layer Security for Password Protection Using RDH, AES and ECCNishant Kumar, Suyash Ghuge, C. D. Jaidhar. 230-239 [doi]
- Clothing Classification Using Deep CNN Architecture Based on Transfer LearningMohamed Elleuch, Anis Mezghani, Mariem Khemakhem, Monji Kherallah. 240-248 [doi]
- Identification of Botnet Attacks Using Hybrid Machine Learning ModelsAmritanshu Pandey, Sumaiya Thaseen, Ch. Aswani Kumar, Gang Li. 249-257 [doi]
- Congestion Control in Vehicular Ad-Hoc Networks (VANET's): A ReviewLokesh M. Giripunje, Deepika Masand, Shishir Kumar Shandilya. 258-267 [doi]
- Advances in Cyber Security Paradigm: A ReviewShahana Gajala Qureshi, Shishir Kumar Shandilya. 268-276 [doi]
- Weighted Mean Variant with Exponential Decay Function of Grey Wolf Optimizer on Applications of Classification and Function Approximation DatasetAlok Kumar, Avjeet Singh, Lekhraj, Anoj Kumar. 277-290 [doi]
- Enhanced Homomorphic Encryption Scheme with Particle Swarm Optimization for Encryption of Cloud DataAbhishek Mukherjee, Dhananjay Bisen, Praneet Saurabh, Lalit Kane. 291-298 [doi]
- Detection and Prevention of Black Hole Attack Using Trusted and Secure Routing in Wireless Sensor NetworkDhananjay Bisen, Bhavana Barmaiya, Ritu Prasad, Praneet Saurabh. 299-308 [doi]
- Recursive Tangent Algorithm for Path Planning in Autonomous SystemsAdhiraj Shetty, Annapurna Jonnalagadda, Aswani Kumar Cherukuri. 309-318 [doi]
- Marathi Handwritten Character Recognition Using SVM and KNN ClassifierDiptee Chikmurge, R. Shriram. 319-327 [doi]
- Whale Optimization Algorithm with Exploratory Move for Wireless Sensor Networks LocalizationNebojsa Bacanin, Eva Tuba, Miodrag Zivkovic, Ivana Strumberger, Milan Tuba. 328-338 [doi]
- Facial Expression Recognition Using Histogram of Oriented Gradients with SVM-RFE Selected FeaturesSumeet Saurav, Sanjay Singh 0001, Ravi Saini. 339-349 [doi]
- Automated Security Driven Solution for Inter-Organizational WorkflowsAsmaa El Kandoussi, Hanan El Bakkali. 350-361 [doi]
- Network Packet Analysis in Real Time Traffic and Study of Snort IDS During the Variants of DoS AttacksNilesh Kunhare, Ritu Tiwari, Joydip Dhar. 362-375 [doi]
- Securing Trustworthy Evidences for Robust Forensic Cloud in Spite of Multi-stakeholder Collusion ProblemSagar Rane, Sanjeev Wagh, Arati M. Dixit. 376-386 [doi]
- Threat-Driven Approach for Security Analysis: A Case Study with a Telemedicine SystemRaj Kamal Kaur, Lalit Kumar Singh, Babita Pandey, Aditya Khamparia. 387-397 [doi]
- Key-Based Obfuscation Using Strong Physical Unclonable Function: A Secure ImplementationSurbhi Chhabra, Kusum Lata. 398-408 [doi]
- A Survey on Countermeasures Against Man-in-the-Browser AttacksSampsa Rauti. 409-418 [doi]
- Towards Cyber Attribution by DeceptionSampsa Rauti. 419-428 [doi]
- Tangle the Blockchain: Toward IOTA and Blockchain Integration for IoT EnvironmentHussein Hellani, Layth Sliman, Motaz Ben Hassine, Abed Ellatif Samhat, Ernesto Exposito, Mourad Kmimech. 429-440 [doi]
- Towards a Better Security in Public Cloud ComputingSonia Amamou, Zied Trifa, Maher Khemakhem. 441-453 [doi]