no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A decentralised federated learning scheme for heterogeneous devices in cognitive IoT
|
Ge, Huanhuan |
|
|
5 |
C |
p. 357-366 |
article |
2 |
Advanced deep learning for masked individual surveillance
|
Elhoseny, Mohamed |
|
|
5 |
C |
p. 406-415 |
article |
3 |
Advanced Parkinson’s Disease Detection: A comprehensive artificial intelligence approach utilizing clinical assessment and neuroimaging samples
|
Islam, Nusrat |
|
|
5 |
C |
p. 199-220 |
article |
4 |
Advancing real-time fuel classification with novel multi-scale and multi-level MHOG and light gradient boosting machine
|
S., Hemachandiran |
|
|
5 |
C |
p. 398-405 |
article |
5 |
Adversarial learning for Mirai botnet detection based on long short-term memory and XGBoost
|
Vajrobol, Vajratiya |
|
|
5 |
C |
p. 153-160 |
article |
6 |
A multi-fused convolutional neural network model for fruit image classification
|
Sinha, Bam Bahadur |
|
|
5 |
C |
p. 416-424 |
article |
7 |
Analyze the impact of feature selection techniques in the early prediction of CKD
|
Hema, K |
|
|
5 |
C |
p. 66-77 |
article |
8 |
Analyzing emotions in online classes: Unveiling insights through topic modeling, statistical analysis, and random walk techniques
|
Abdellaoui, Benyoussef |
|
|
5 |
C |
p. 221-236 |
article |
9 |
An effective object detection and tracking using automated image annotation with inception based faster R-CNN model
|
Vijiyakumar, K. |
|
|
5 |
C |
p. 343-356 |
article |
10 |
A novel and secured email classification and emotion detection using hybrid deep neural network
|
Krishnamoorthy, Parthiban |
|
|
5 |
C |
p. 44-57 |
article |
11 |
A novel medical steganography technique based on Adversarial Neural Cryptography and digital signature using least significant bit replacement
|
Hameed, Mohamed Abdel |
|
|
5 |
C |
p. 379-397 |
article |
12 |
A novel rice plant leaf diseases detection using deep spectral generative adversarial neural network
|
Mahadevan, K. |
|
|
5 |
C |
p. 237-249 |
article |
13 |
A stacked ensemble approach to detect cyber attacks based on feature selection techniques
|
Urmi, Wahida Ferdose |
|
|
5 |
C |
p. 316-331 |
article |
14 |
A tweet sentiment classification approach using an ensemble classifier
|
KP, Vidyashree |
|
|
5 |
C |
p. 170-177 |
article |
15 |
Data-driven strategies for digital native market segmentation using clustering
|
Uddin, Md Ashraf |
|
|
5 |
C |
p. 178-191 |
article |
16 |
DDSS: Driver decision support system based on the driver behaviour prediction to avoid accidents in intelligent transport system
|
S, Balasubramani |
|
|
5 |
C |
p. 1-13 |
article |
17 |
Deep learning-based approaches for abusive content detection and classification for multi-class online user-generated data
|
Kaur, Simrat |
|
|
5 |
C |
p. 104-122 |
article |
18 |
Deep learning-based human activity recognition using CNN, ConvLSTM, and LRCN
|
Uddin, Md. Ashraf |
|
|
5 |
C |
p. 259-268 |
article |
19 |
ECDSA-based tamper detection in medical data using a watermarking technique
|
Ch, Rupa |
|
|
5 |
C |
p. 78-87 |
article |
20 |
End-to-end solution for automatic beverage stock detection in supermarkets based on image processing and convolutional neural networks
|
Muñoz, Jorge |
|
|
5 |
C |
p. 453-474 |
article |
21 |
Enhancing personalized learning: AI-driven identification of learning styles and content modification strategies
|
Kanchon, Md. Kabin Hasan |
|
|
5 |
C |
p. 269-278 |
article |
22 |
Exploring static rebalancing strategies for dockless bicycle sharing systems based on multi-granularity behavioral decision-making
|
Zhang, Chao |
|
|
5 |
C |
p. 27-43 |
article |
23 |
Fake review detection using transformer-based enhanced LSTM and RoBERTa
|
Mohawesh, Rami |
|
|
5 |
C |
p. 250-258 |
article |
24 |
From predictive analytics to emotional recognition–The evolving landscape of cognitive computing in animal welfare
|
Neethirajan, Suresh |
|
|
5 |
C |
p. 123-131 |
article |
25 |
GNN-RM: A trajectory completion algorithm based on graph neural networks and regeneration modules
|
Zhang, Jiyuan |
|
|
5 |
C |
p. 297-306 |
article |
26 |
Gorilla troops optimization with deep learning based crop recommendation and yield prediction
|
Punitha, A. |
|
|
5 |
C |
p. 494-504 |
article |
27 |
Handwritten alphabet classification in Tamil language using convolution neural network
|
Ravi, Jayasree |
|
|
5 |
C |
p. 132-139 |
article |
28 |
Identification of continuous-time Hammerstein model using improved Archimedes optimization algorithm
|
Islam, Muhammad Shafiqul |
|
|
5 |
C |
p. 475-493 |
article |
29 |
Image cyberbullying detection and recognition using transfer deep machine learning
|
Almomani, Ammar |
|
|
5 |
C |
p. 14-26 |
article |
30 |
Integration of Artificial Intelligence and Wearable Internet of Things for Mental Health Detection
|
Wang, Wei |
|
|
5 |
C |
p. 307-315 |
article |
31 |
Knowledge mapping analysis of situational awareness and aviation: A bibliometric study
|
Lopes, Nuno Moura |
|
|
5 |
C |
p. 279-296 |
article |
32 |
Multi-Agent cubature Kalman optimizer: A novel metaheuristic algorithm for solving numerical optimization problems
|
Musa, Zulkifli |
|
|
5 |
C |
p. 140-152 |
article |
33 |
Multi-objective Harris Hawks optimization algorithm for selecting best location and size of distributed generation in radial distribution system
|
Gogula, Sandeep |
|
|
5 |
C |
p. 436-452 |
article |
34 |
Navigating the Nexus: A systematic review of the symbiotic relationship between the metaverse and gaming
|
Mohammed, Sahar Yousif |
|
|
5 |
C |
p. 88-103 |
article |
35 |
NeuroRF FarmSense: IoT-fueled precision agriculture transformed for superior crop care
|
Vats, Tarun |
|
|
5 |
C |
p. 425-435 |
article |
36 |
Novel Darknet traffic data synthesis using Generative Adversarial Networks enhanced with oscillatory Growing Cosine Unit activated convolution layers
|
Pradeep C, Antony |
|
|
5 |
C |
p. 58-65 |
article |
37 |
Optimized charging-station placement and UAV trajectory for enhanced uncertain target detection in intelligent UAV tracking systems
|
Bany Salameh, Haythem |
|
|
5 |
C |
p. 367-378 |
article |
38 |
Supportive particle swarm optimization with time-conscious scheduling (SPSO-TCS) algorithm in cloud computing for optimized load balancing
|
Menaka, M. |
|
|
5 |
C |
p. 192-198 |
article |
39 |
Trie-PMS8: A trie-tree based robust solution for planted motif search problem
|
Hasan, Mohammad |
|
|
5 |
C |
p. 332-342 |
article |
40 |
Twitter sentiment analysis using conditional generative adversarial network
|
Mahalakshmi, V. |
|
|
5 |
C |
p. 161-169 |
article |