Abstract is missing.
- Data Jackets as Communicable Metadata for Potential Innovators - Toward Opening to Social ContextsYukio Ohsawa, Sae Kondo, Teruaki Hayashi. 1-13 [doi]
- A Proposal Based on Instance Typicality for Dealing with Nominal Attribute Values in Instance-Based Learning EnvironmentsS. V. Gonçalves, Maria C. Nicoletti. 14-23 [doi]
- Dataset for Intrusion Detection in Mobile Ad-Hoc NetworksRahma Meddeb, Bayrem Triki, Farah Jemili, Ouajdi Korbaa. 24-34 [doi]
- Visual Password Scheme Using Bag Context Shape GrammarsBlessing Ogbuokiri, Mpho Raborife. 35-47 [doi]
- Peak Detection Enhancement in Autonomous Wearable Fall DetectionMario Villar, José Ramón Villar. 48-58 [doi]
- Automated Detection of Tuberculosis from Sputum Smear Microscopic Images Using Transfer Learning TechniquesLillian Muyama, Joyce Nakatumba-Nabende, Deborah Mudali. 59-68 [doi]
- Comparative Performance Analysis of Neural Network Base Training Algorithm and Neuro-Fuzzy System with SOM for the Purpose of Prediction of the Features of SuperconductorsSubrato Bharati, Mohammad Atikur Rahman, Prajoy Podder, Md. Robiul Alam Robel, Niketa Gandhi. 69-79 [doi]
- Automatic Detection of Parkinson's Disease from Speech Using Acoustic, Prosodic and Phonetic FeaturesRania Khaskhoussy, Yassine Ben Ayed. 80-89 [doi]
- A Deep Convolutional Neural Network Model for Multi-class Fruits ClassificationLaith Alzubaidi, Omran Al-Shamma, Mohammed A. Fadhel, Zinah Mohsin Arkah, Fouad H. Awad. 90-99 [doi]
- Distributed Architecture of Snort IDS in Cloud EnvironmentMondher Essid, Farah Jemili, Ouajdi Korbaa. 100-111 [doi]
- Turing-Style Test Approach for Verification and Validation of Unmanned Aerial Vehicles' IntelligenceMarwa Brichni, Said El Gattoufi. 112-121 [doi]
- Big Data Processing for Intrusion Detection System Context: A ReviewMarwa Elayni, Farah Jemili, Ouajdi Korbaa, Basel Solaiman. 122-131 [doi]
- Hardware Accelerator for Real-Time Holographic ProjectorMohammed A. Fadhel, Omran Al-Shamma, Laith Alzubaidi. 132-139 [doi]
- Automatic Lung Segmentation in CT Images Using Mask R-CNN for Mapping the Feature Extraction in Supervised Methods of Machine LearningLuís Fabrício de F. Souza, Gabriel Bandeira Holanda, Shara S. A. Alves, Francisco Hércules dos S. Silva, Pedro Pedrosa Rebouças Filho. 140-149 [doi]
- Structures Discovering for Optimizing External Clustering Validation MetricsMarcos A. Spalenza, Juliana P. C. Pirovani, Elias de Oliveira. 150-161 [doi]
- The Influence of NER on the Essay GradingElias Oliveira, James Alves, Jessica Oliveira Brito, Juliana P. C. Pirovani. 162-171 [doi]
- Evaluation of Acoustic Features for Early Diagnosis of Alzheimer DiseaseRanda Ben Ammar, Yassine Ben Ayed. 172-181 [doi]
- P-Median Problem: A Real Case ApplicationMaría Beatríz Bernábe Loranca, Rogelio González Velázquez, Erika Granillo-Martínez, Mauricio Romero Montoya, Ricardo A. Barrera-Cámara. 182-192 [doi]
- Towards Context-Aware Business Process Cost Data Analysis Including the Control-Flow Perspective - A Process Mining-Based ApproachDhafer Thabet, Nourhen Ganouni, Sonia Ayachi Ghannouchi, Henda Hajjami Ben Ghézala. 193-204 [doi]
- Drone Authentication Using ID-Based Signcryption in LoRaWAN NetworkSana Benzarti, Bayrem Triki, Ouajdi Korbaa. 205-216 [doi]
- Extrinsic Plagiarism Detection for French Language with Word EmbeddingsMaryam Elamine, Fethi Bougares, Seifeddine Mechti, Lamia Hadrich Belguith. 217-224 [doi]
- Using Opinion Mining in Student Assessments to Improve Teaching Quality in UniversitiesAillkeen Bezerra de Oliveira, André Luiz Firmino Alves, Cláudio de Souza Baptista. 225-234 [doi]
- Automated Threat Propagation Model Through a Topographical Environment ModellingKilian Vasnier, Abdel-Illah Mouaddib, Sylvain Gatepaille, Stephan Brunessaux. 235-244 [doi]
- Solving Lorenz ODE System Based Hardware BoosterHassan Al-Yassin, Mohammed A. Fadhel, Omran Al-Shamma, Laith Alzubaidi. 245-254 [doi]
- Object Recognition Software Using RGBD Kinect Images and the YOLO Algorithm for Mobile Robot NavigationDouglas Henke Dos Reis, Daniel Welfer, Marco Antônio De Souza Leite Cuadros, Daniel Fernando Tello Gamarra. 255-263 [doi]
- Paper Co-citation Analysis Using Semantic Similarity MeasuresMohamed Ali Hadj Taieb, Mohamed Ben Aouicha, Houcemeddine Turki. 264-277 [doi]
- Assessment of the ISNT Rule on Publicly Available DatasetsJoshua Afolabi Oluwatobi, Gugulethu Mabuza-Hocquet, Fulufhelo V. Nelwamondo. 278-286 [doi]
- An Autonomous Fallers Monitoring Kit: Release 0.0Enrique A. de la Cal, Alvaro DaSilva, Mirko Fáñez, José Ramón Villar, Javier Sedano, Victor M. González Suárez. 287-297 [doi]
- Random Forest Missing Data Imputation Methods: Implications for Predicting At-Risk StudentsBevan I. Smith, Charles Chimedza, Jacoba H. Bührmann. 298-308 [doi]
- Noise Reduction with Detail Preservation in Low-Dose Dental CT Images by Morphological Operators and BM3DRômulo Marconato Stringhini, Daniel Welfer, Daniel Fernando Tello Gamarra, Gustavo Nogara Dotto. 309-317 [doi]
- An Effective Approach to Detect and Prevent Collaborative Grayhole Attack by Malicious Node in MANETSanjeev Yadav, Rupesh Kumar, Naveen Tiwari, Abhishek Bajpai. 318-335 [doi]
- Hand-Crafted and Learned Features Fusion for Predicting Freezing of Gait Events in Patients with Parkinson's DiseaseHadeer El-ziaat, Nashwa El-Bendary, Ramadan Moawad. 336-345 [doi]
- Signature of Electronic Documents Based on Fingerprint Recognition Using Deep LearningSouhaïl Smaoui, Manel Ben Salah, Mustapha Sakka. 346-354 [doi]
- Comparison of a Trajectory Controller Based on Fuzzy Logic and Backstepping Using Image Processing for a Mobile RobotRodrigo Mattos da Silva, Thiago Rodrigues Garcia, Marco Antônio De Souza Leite Cuadros, Daniel Fernando Tello Gamarra. 355-364 [doi]
- The Use of Area Covered by Blood Vessels in Fundus Images to Detect GlaucomaJoshua Afolabi Oluwatobi, Gugulethu Mabuza-Hocquet, Fulufhelo V. Nelwamondo. 365-375 [doi]
- Complexity of Rule Sets Induced from Data with Many Lost Values and "Do Not Care" ConditionsPatrick G. Clark, Jerzy W. Grzymala-Busse, Zdzislaw S. Hippe, Teresa Mroczek, Rafal Niemiec. 376-385 [doi]
- ReLU to Enhance MDLSTM for Offline Arabic Handwriting RecognitionRania Maalej, Monji Kherallah. 386-395 [doi]
- Histogram Based Method for Unsupervised Meeting Speech SummarizationNouha Dammak, Yassine Ben Ayed. 396-405 [doi]
- Deep Support Vector Machines for Speech Emotion RecognitionHadhami Aouani, Yassine Ben Ayed. 406-415 [doi]
- Biometric Individual Identification System Based on the ECG SignalSihem Hamza, Yassine Ben Ayed. 416-425 [doi]
- Bayesian Anomaly Detection and Classification for Noisy DataEthan Roberts, Bruce A. Bassett, Michelle Lochner. 426-435 [doi]
- How to Trust the Middle Artificial Intelligence: Uncertainty Oriented EvaluationMarwa Brichni, Said El Gattoufi. 436-445 [doi]
- Design the HCI Interface Through Prototyping for the Telepresence Robot Empowered Smart LabRamona Plogmann, Qing Tan, Frédérique C. Pivot. 446-455 [doi]
- Ant Colony Optimization on an OBS Network with Link Cost and ImpairmentsFrancois Du Plessis, M. C. du Plessis, Tim Gibbon. 456-465 [doi]
- The Categorical Integration of Symbolic and Statistical AI: Quantum NLP and Applications to Cognitive and Machine Bias ProblemsYoshihiro Maruyama. 466-476 [doi]
- Vehicle Routing Problem with Fuel Station Selection (VRPFSS): Formulation and Greedy HeuristicJhonata Soares de Freitas, André Gustavo dos Santos. 477-486 [doi]
- Requirements Change Requests Classification: An Ontology-Based ApproachZaineb Sakhrawi, Asma Sellami, Nadia Bouassida. 487-496 [doi]
- An Efficient MPLS-Based Approach for QoS Providing in SDNManel Majdoub, Ali El Kamel, Habib Youssef. 497-508 [doi]
- HoneyBees Mating Optimization Algorithm for the Static Bike Rebalancing ProblemMariem Sebai, Ezzeddine Fatnassi, Lilia Rejeb. 509-519 [doi]
- A Hybrid MAC Protocol for Heterogeneous M2M NetworksAbdelfetteh Lachtar, Marwa Lachtar, Abdennaceur Kachouri. 520-529 [doi]
- Hybrid Approach for Trajectory Identification of Mobile Node via Lagrange Interpolation and Kalman Filtering FrameworkPranchal Mishra, Ayush Tripathi, Abhishek Bajpai, Naveen Tiwari. 530-539 [doi]
- Post-Truth AI and Big Data Epistemology: From the Genealogy of Artificial Intelligence to the Nature of Data Science as a New Kind of ScienceYoshihiro Maruyama. 540-549 [doi]
- Interoperable Decision Support System Based on Multivariate Time Series for Setup Data Processing and VisualizationMaria Leonilde Rocha Varela, Gabriela Amaral, Sofia Pereira, Diogo Machado, António Falcão, Rita A. Ribeiro, Emanuel Sousa, Jorge A. Santos, Alfredo F. Pereira. 550-560 [doi]
- Cross-Model Retrieval Via Automatic Medical Image Diagnosis GenerationSabrine Benzarti, Wahiba Ben Abdessalem Karaa, Henda Hajjami Ben Ghézala. 561-571 [doi]
- Gap-Filling of Missing Weather Conditions Data Using Support Vector Regression MethodHeba Osman, Nashwa El-Bendary, Essam El Fakharany. 572-581 [doi]
- Automating the Process of Faculty Evaluation in a Private Higher InstitutionAdewole Adewumi, Olamide Laleye, Sanjay Misra, Rytis Maskeliunas, Robertas Damasevicius, Ravin Ahuja. 582-591 [doi]
- A Web Based System for the Discovery of Blood Banks and Donors in EmergenciesBabajide Ayeni, Olaperi Yeside Sowunmi, Sanjay Misra, Rytis Maskeliunas, Robertas Damasevicius, Ravin Ahuja. 592-600 [doi]
- Smart City Waste Management System Using Internet of Things and Cloud ComputingAderemi A. Atayero, Segun I. Popoola, Rotimi Williams, Joke A. Badejo, Sanjay Misra. 601-611 [doi]
- Employability Skills: A Web-Based Employer Appraisal System for Construction StudentsAfolabi Adedeji, Afolabi Ibukun, Ojelabi Rapheal, Sanjay Misra, Ravin Ahuja. 612-621 [doi]
- A Prognosis Method for Esophageal Squamous Cell Carcinoma Based on CT Image and Three-Dimensional Convolutional Neural NetworksKaipeng Fan, Jifeng Guo, Bo Yang, Lin Wang, Lizhi Peng, Baosheng Li, Jian Zhu, Ajith Abraham. 622-631 [doi]
- Age Distribution Adjustments in Human Resource Department Using Shuffled Frog Leaping AlgorithmTarun Kumar Sharma, Ajith Abraham. 632-640 [doi]
- Selection of Cloud Service Provider Based on Sampled Non-functional Attribute SetMehul Mahrishi, Kamal Kant Hiran, Ruchi Doshi. 641-648 [doi]
- Image Processing Techniques for Breast Cancer Detection: A ReviewMahendra G. Kanojia, Mohd. Abuzar Mohd. Haroon Ansari, Niketa Gandhi, S. K. Yadav. 649-660 [doi]