Abstract is missing.
- Mask RCNN for Human Motion and Actions RecognitionSoumaya Zaghbani, Med Salim Bouhlel. 1-9 [doi]
- Intelligent and Secure Autofill System in Web BrowsersJoy Bose. 10-19 [doi]
- Synthesis Biometric Materials Based on Cooperative Among (DSA, WOA and gSpan-FBR) to Water TreatmentSamaher Al-Janabi, Ghydaa Kadhum. 20-33 [doi]
- An Initial Parameter Search for Rapid Concept Drift Adaptation in Deep Neural NetworksMuhammad Zafran Bin Muhammad Zaly Shah, Anazida Binti Zainal. 34-42 [doi]
- A Comparison of Swarm Intelligence Algorithms Exploiting a Novel Neighbour Generation TechniqueGözde Alp, Ali Fuat Alkaya. 43-52 [doi]
- Skin Cancer Automatic Detection Based on Image Characteristics of Shape, Colour, and TextureHugo W. Maia, Marcos E. Cintra. 53-62 [doi]
- Breast Cancer Detection in Infrared Thermal Images Using Convolutional Neural Networks: A Transfer Learning ApproachSwapna Davies, S. Anand. 63-74 [doi]
- Implementation of a System for Collecting and Analyzing Public and Open Access Information from Brazilian Federal Legislative HousesIván José Mestre Fernández, Leonardo de Souza Mendes. 75-84 [doi]
- Data Origination: Human-Centered Approach for Design, Acquisition, and Utilization of DataTeruaki Hayashi, Yukio Ohsawa. 85-93 [doi]
- Coarse-Grained Genetic Algorithm for Flexible Job Scheduling ProblemEliot Bytyçi, Artan Berisha, Fis Geci. 94-102 [doi]
- AI Improving the Lives of Physically DisabledHemshree Madaan, Shubham Gupta. 103-112 [doi]
- Subspace Guided Collaborative Clustering Based on Optimal TransportFatima Ezzahraa Ben Bouazza, Younès Bennani, Abdelfettah Touzani, Guénaël Cabanes. 113-124 [doi]
- Exploring Automatic Assessment-Based Features for Clustering of Students' Academic PerformanceAnita Qoiriah, Yuni Yamasari, Asmunin, Andi Iwan Nurhidayat, Rina Harimurti. 125-134 [doi]
- Quantum Semi Non-negative Matrix FactorizationKaoutar Benlamine, Younès Bennani, Basarab Matei, Nistor Grozavu. 135-144 [doi]
- A New Genetic-Based Hyper-Heuristic Algorithm for Clustering ProblemMohammad Babrdel Bonab, Goi Bok-Min, Madhavan Balan Nair, Chua Kein Huat, Wong Chim Chwee. 145-155 [doi]
- LSTM vs. GRU for Arabic Machine TranslationNouhaila Bensalah, Habib Ayad, Abdellah Adib, Abdelhamid Ibn El Farouk. 156-165 [doi]
- Towards Lip Motion Based Speaking Mode Detection Using Residual Neural NetworksSadia Afroze, Mohammed Moshiul Hoque. 166-175 [doi]
- Reducing the Error Mapping of the Students' Performance Using Feature SelectionYuni Yamasari, Naim Rochmawati, Anita Qoiriah, Dwi F. Suyatno, Tohari Ahmad. 176-185 [doi]
- Spatial Graph Regularized Correlation Filters for Visual Object TrackingSajid Javed, Xiao Zhang, Jorge Dias 0001, Lakmal D. Seneviratne, Naoufel Werghi. 186-195 [doi]
- Three Dimensional Wireframe Model of Medical and Complex Images Using Cellular Logic Array Processing TechniquesShilpa Rani, Kamlesh Lakhwani, Sandeep Kumar. 196-207 [doi]
- Suspicious Activity Detection Using Transfer Learning Based ResNet Tracking from Surveillance VideosShubhangi Kale, Raghunathan Shriram. 208-220 [doi]
- Vehicle Detection in UAV Videos Using CNN-SVMNajiya Koderi Valappil, Qurban A. Memon. 221-232 [doi]
- Underwater Moving Object Detection Using GMGVrushali Pagire, Anuradha Phadke. 233-244 [doi]
- Linear Dilation-Erosion Perceptron Trained Using a Convex-Concave ProcedureAngelica Lourenço Oliveira, Marcos Eduardo Valle. 245-255 [doi]
- A Performance Evaluation of Machine Learning Models on Human Activity Identification (HAI)Taki Hasan Rafi, Faisal Farhan. 256-265 [doi]
- Wavelet Filtering for Limited-Angle and Low-Dose Computed Tomographic ReconstructionThavavel Vaiyapuri. 266-277 [doi]
- Handwritten Signature Verification Using Complex Wavelet Transform and Mutual Information Based KernelAnushka Desai, Vraj Mashruwala, Manish Khare. 278-288 [doi]
- Multi-Scale Oriented Basic Image Features Column for Handwritten Digit RecognitionAbdeljalil Gattal, Chawki Djeddi, Akhtar Jamil, Ameur Bensefia. 289-298 [doi]
- Delving into Feature Maps: An Explanatory Analysis to Evaluate Weight InitializationMeenal Narkhede, Prashant P. Bartakke, Mukul S. Sutaone. 299-310 [doi]
- Historical Kannada Handwritten Character Recognition Using Machine Learning AlgorithmParashuram Bannigidad, Chandrashekar Gudada. 311-319 [doi]
- Home Health Care Network Management Under Fuzzy Environment Using Meta-heuristic AlgorithmsFariba Goodarzian, Aida Goodarzian, Ajith Abraham, Sohaib Dastgoshade. 320-332 [doi]
- The Lagrangian Relaxation Approach for Home Health Care ProblemsSohaib Dastgoshade, Ajith Abraham, Nazanin Fozooni. 333-344 [doi]
- Study on Vision System for Disease Detection Using CNN and LabVIEW of an Agricultural RobotPradeep Nahak, Atanu Jana, Dilip Kumar Pratihar, Alok Kanti Deb, Hena Ray. 345-353 [doi]
- An Autonomous Galactic Swarm Optimization Algorithm Supported by Hidden Markov ModelMauricio Castillo, Broderick Crawford, Ricardo Soto 0001, Wenceslao Palma, José Lemus-Romani, Diego Tapia, Felipe Cisternas-Caneo, Marcelo Becerra-Rozas, Fernando Paredes, Sanjay Misra. 354-363 [doi]
- Machine Learning for Breast Cancer Diagnosis and Classification Using Hand-Crafted FeaturesDhawa Sang Dong, Suraj Kandel. 364-373 [doi]
- Automatic Seeded Region Growing with Level Set Technique Used for Segmentation of PancreasPradip M. Paithane, S. N. Kakarwal, D. V. Kurmude. 374-382 [doi]
- Sustainability Considerations in the Product Design Using System Dynamics and Fuzzy Cognitive MapsElahe Mohagheghian, Hasan Hosseini Nasab, Ajith Abraham, Mohammad Bagher Fakhrzad. 383-394 [doi]
- Dominant Voiced Speech Segregation and Noise Reduction Pre-processing Module for Hearing Aids and Speech Processing ApplicationsShibani Hamsa, Youssef Iraqi, Ismail Shahin, Naoufel Werghi. 395-403 [doi]
- Forensic Analysis of Copy-Move Attack with Robust Duplication DetectionHudan Studiawan, Rahmat Nazali Salimi, Tohari Ahmad. 404-413 [doi]
- Feature Selection Approach Based on a Novel Variant of Hybrid Differential Evolution and PSO for Sentiment ClassificationAbhishek Dixit, Ashish Mani, Rohit Bansal. 414-423 [doi]
- A Comparative Study for Fisheye Image Classification: SVM or DNNZhen Chen, Anthimos Georgiadis. 424-433 [doi]
- A Survey on Applications of Modern Deep Learning Techniques in Team Sports AnalyticsGervas Batister Mgaya, Hongbo Liu, Bo Zhang. 434-443 [doi]
- Describing Brachiopods Shape Based on Fusion of Curvature and Fourier DescriptorsYoussef Ait Khouya, Mohammed Ait Oussous, Faouzi Ghorbel. 444-455 [doi]
- Early Diagnosis of Parkinson's Disease Using LSTM: A Deep Learning ApproachAmit Gawade, Rohit Pandharkar, Subodh Deolekar, Uday Salunkhe. 456-465 [doi]
- Segmentation of Foetus Brain MRI Based on K-nn Algorithm, A Case StudyPaulo Salgado, Teresa Paula Azevedo Perdicoúlis. 466-475 [doi]
- Design of a Closed Supply Chain Under Uncertainty with Regards to Social and Environmental ImpactsOmid Abdolazimi, Mitra Salehi Esfandarani, Ajith Abraham. 476-488 [doi]
- Contour Method for Ultrasound ImagesPaulo Salgado, Paulo Afonso. 489-495 [doi]
- Unsupervised Learning from Data and LearnersYohan Foucade, Younès Bennani. 496-507 [doi]
- Using Microsoft Kinect V2 for Custom Upper-Limb Rehabilitation ExercisesShourav Bin Rabbani, Amin Ahsan Ali, M. Ashraful Amin. 508-519 [doi]
- Customer Churn Prediction Using Deep LearningOmer Faruk Seymen, Onur Dogan 0001, Abdulkadir Hiziroglu. 520-529 [doi]
- The Fusion of Features for Detection of Cotton Wool Spots in Digital Fundus ImagesParashuram Bannigidad, Asmita Deshpande. 530-538 [doi]
- Thyroid Nodule Cell Classification in Cytology Images Using Transfer Learning ApproachAhsan Baidar Bakht, Sajid Javed, Roberto Dina, Hasan Almarzouqi, Ahsan Khandoker, Naoufel Werghi. 539-549 [doi]
- Deep Fusion Driven Semantic Segmentation for the Automatic Recognition of Concealed Contraband ItemsMuhammad Shafay, Taimur Hassan, Divya Velayudhan, Ernesto Damiani, Naoufel Werghi. 550-559 [doi]
- Project Comparison Method Supporting Participatory Budget Process - Poznan Case StudyAleksandra Rutkowska, Dariusz Walczak, Agata Filipowska. 560-571 [doi]
- Seeding Initial Population, in Genetic Algorithm for Features SelectionMarc Chevallier, Nicoleta Rogovschi, Faouzi Boufarès, Nistor Grozavu, Charly Clairmont. 572-582 [doi]
- An Incremental Fuzzy Learning Approach for Online Classification of Data StreamsVladyslav Yavtukhovskyi, Rami Abukhader, Nils Tillaeus, Ning Xiong. 583-592 [doi]
- Depth Image Completion Using Anisotropic OperatorsVanel Lazcano, Felipe Calderero, Coloma Ballester. 593-604 [doi]
- Hyperparameter Tuning Based Performance Analysis of Machine Learning Approaches for Prediction of Cardiac ComplicationsShital Patil, Surendra Bhosale. 605-617 [doi]
- Acousto-Prosodic Delineation and Classification of Speech Disfluencies in Bilingual ChildrenSheena Christabel Pravin, M. Palanivelan. 618-628 [doi]
- Real-Time Traffic Sign Recognition and Classification Using Deep LearningIlaiah Kavati, E. Suresh Babu, Ramalingaswamy Cheruku. 629-636 [doi]
- Merits of Mixotrophic Cultivation for Microalgal Biomass ProductionGeetanjali Udawat, Niketa Gandhi, Sanjay Deshmukh. 637-647 [doi]
- Deep Neural Network Based Phishing Classification on a High-Risk URL DatasetMehmet Korkmaz, Emre Kocyigit, Ozgur Koray Sahingoz, Banu Diri. 648-657 [doi]
- A Secure Bayesian Compressive Spectrum Sensing Technique Based Chaotic Matrix for Cognitive Radio NetworksSalma Benazzouza, Mohammed Ridouani, Fatima Salahdine, Aawatif Hayar. 658-668 [doi]
- Optimized Machine Learning Techniques for IoT 6LoWPAN Cyber Attacks DetectionYassine Maleh, Abdelkebir Sahid, Mustapha Belaïssaoui. 669-677 [doi]
- Inadequacy of IT Approaches to Manage Cyber Security in ICS ContextOmar El Idrissi, Abdellatif Mezrioui, Abdelhamid Belmekki. 678-689 [doi]
- Trust-Based Intrusion Detection for Multi Path OLSR ProtocolHicham Zougagh, Noureddine Idboufker, Youssef Saadi. 690-705 [doi]
- Bitcoin Technology and Its Security Challenges: A Research SurveyAman Bhargava, Kartik Shankhavaram, Priyanshu Agarwal, Jayaprakash Kar. 706-715 [doi]
- Zero Trust User Access and Identity Security in Smart Grid Based SCADA SystemsAbdul Wahid Mir, Ketti Ramachandran Ram Kumar. 716-726 [doi]
- Man-in-the-Browser Attacks Against IoT Devices: A Study of Smart HomesSampsa Rauti, Samuli Laato, Tinja Pitkämäki. 727-737 [doi]
- Scambaiting as a Form of Online Video Entertainment: An Exploratory StudySamuli Laato, Sampsa Rauti. 738-748 [doi]
- Create a Hybrid Algorithm by Combining Hill and Advanced Encryption Standard Algorithms to Enhance Efficiency of RGB Image EncryptionRania A. Tabeidi, Hanaa F. Morse, Samia M. Masaad, Reem H. Al-shammari, Dalia M. Alsaffar. 749-757 [doi]
- An Improved Smart Wheat Health Monitor for Smart Farming Application Using Deep Residual Learning FrameworkMohammed Elidrissi, Omar Elbeqqali, Jamal Riffi. 758-767 [doi]
- A New Electronic Voting System Based on Elliptic Curve in a Cloud Computing EnvironmentMeryem Cherkaoui Semmouni, Ali Azougaghe, Abderrahmane Nitaj, Mostafa Belkasmi. 768-778 [doi]
- Investigation of Stereo Camera Calibration Based on PythonElmehdi Adil, Mohammed Mikou, Ahmed Mouhsen. 779-789 [doi]
- Study on the Different Types of Neural Networks to Improve the Classification of RansomwaresHouria Madani, Noura Ouerdi, Ahmed Boumesaoud, Abdelmalek Azizi. 790-798 [doi]
- Quality of Service Evaluation with DSR (Dynamic Source Routing) Protocol in the Classroom Ad Hoc Network of the New Generation of Digital Open Universities (DOUNG)Mahamadou Issoufou Tiado, Ibrahim Ganaou Noura, Chaibou Dan Inna Hussein, Harouna Gazobi Souleymane, Hamani Mounkaila Mahamadou. 799-809 [doi]
- Detection of Vulnerabilities Related to Permissions Requests for Android Apps Using Machine Learning TechniquesDidier Bassolé, Yaya Traoré, Gouayon Koala, Franklin Tchakounté, Oumarou Sié. 810-822 [doi]
- A New Approach to Detecting Bot Attack Activity ScenarioDandy Pramana Hostiadi, Tohari Ahmad, Waskitho Wibisono. 823-835 [doi]
- A Log-Based Method to Detect and Resolve Efficiently Conflicts in Access Control PoliciesMaryem Ait El Hadj, Ahmed Khoumsi, Yahya Benkaouz, Mohammed Erradi. 836-846 [doi]
- A Hybrid Policy Engineering Approach for Attribute-Based Access Control (ABAC)Manar Alohaly, Daniel Takabi. 847-857 [doi]
- Anomaly Detection for Internet of Things (IoT) Using an Artificial Immune SystemNoe Elisa, Longzhi Yang, Fei Chao 0001, Nitin Naik. 858-867 [doi]
- Agreement-Broker: Performance Analysis Using KNN, SVM, and ANN ClassifiersZineb Bakraouy, Amine Baïna, Mostafa Bellafkih. 868-879 [doi]
- Secret Disclosure Attacks on a Recent Ultralightweight Mutual RFID Authentication Protocol for Blockchain-Enabled Supply ChainsPaolo D'Arco, Zahra Ebadi Ansaroudi. 880-890 [doi]
- A Novel Image Encryption Technique Using Multiple One Dimensional Chaotic MapShahna K. U., Anuj Mohamed. 891-903 [doi]
- Use of Cryptography for Monetary Issuance and Securing Financial TransactionsMamadou MBaye, Cheikhou Thiam. 904-910 [doi]
- MAAMSIC: Multimodal Authentication and Authorization Model for Security of IoT Communication via GSM Messaging in Sub-Saharan AfricaJoan Nabusoba, Calvins Otieno, Wilson Cheruiyot. 911-920 [doi]
- Towards a Proactive System of DDoS Attacks Detection in the CloudMohamed Ouhssini, Karim Afdel, Elhafed Agherrabi. 921-933 [doi]
- Edge Computing Enabled Technologies for Secure 6G Smart Environment-An OverviewSyed Usman Jamil, M. Arif Khan, Sabih ur Rehman. 934-945 [doi]
- Secure QIM-Based Image Watermarking in JPEG Compression DomainVictor Fedoseev, Daniil Kozlov. 946-955 [doi]
- Security and Privacy on IoMTLatifah Almaiman, Noura Alqahtani. 956-963 [doi]
- Biometric Template Protection Using Deep LearningAshutosh Singh, Yogendra Narain Singh, Pramod Kumar. 964-974 [doi]
- Inner and Outer Race Bearing Defects of Induction Motor Running at Low Speeds Signal Analysis with DWTBellal Belkacemi, Salah Saad. 975-983 [doi]
- Transformation of PrivUML into XACML Using QVTJihane El Mokhtari, Anas Abou El Kalam, Siham Benhadou, Jean-Philippe Leroy. 984-996 [doi]
- Robust and Secure Watermarking Technique for E-Health ApplicationsHedi Choura, Faten Chaabane, Tarek Frikha, Mouna Baklouti. 997-1008 [doi]
- Emoji Score and Polarity Evaluation Using CLDR Short Name and Expression SentimentShelley Gupta, Archana Singh, Jayanthi Ranjan. 1009-1016 [doi]
- Dynamic and Decentralized Trust Management for the Internet of Things (IoT) ParadigmKazi Masum Sadique, Rahim Rahmani, Paul Johannesson. 1017-1026 [doi]
- Comparison of Parental Control Tools for Blocking Advertisements on a Home NetworkKhaznah Alhajri, Wadha Almarrai, Amani Alzahrani, Ezaz Aldahasi, Maha AlGhamdi, Dabiah Alboaneen. 1027-1037 [doi]