no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge
|
Renaud, Karen |
|
|
3 |
5 |
|
article |
2 |
A Comparative Study on the Impact of Adversarial Machine Learning Attacks on Contemporary Intrusion Detection Datasets
|
Pujari, Medha |
|
|
3 |
5 |
|
article |
3 |
A Deep Learning-Based Approach to Detect Correct Suryanamaskara Pose
|
Bhaumik, Ujjayanta |
|
|
3 |
5 |
|
article |
4 |
A Fast Parallelizable Algorithm for Constructing Balanced Binary Search Trees
|
Ruzankin, Pavel S. |
|
|
3 |
5 |
|
article |
5 |
A Flow-Based Node Dominance Centrality Measure for Complex Networks
|
Mandyam Kannappan, Sridhar |
|
|
3 |
5 |
|
article |
6 |
A Formally Validated Authentication Algorithm for Secure Message Forwarding in Smart Home Networks
|
Nyangaresi, Vincent Omollo |
|
|
3 |
5 |
|
article |
7 |
A Fully Automated Methodology for the Selection and Extraction of Energy-Relevant Features for the Energy Consumption of Battery Electric Vehicles
|
Petersen, Patrick |
|
|
3 |
5 |
|
article |
8 |
A Hybrid Approach Using Decision Tree and Multiple Linear Regression for Predicting Students’ Performance Based on Learning Progress and Behavior
|
Dang, Tran Khanh |
|
|
3 |
5 |
|
article |
9 |
A Learning Classifier System for Automated Test Case Prioritization and Selection
|
Rosenbauer, Lukas |
|
|
3 |
5 |
|
article |
10 |
An Application to Detect Cyberbullying Using Machine Learning and Deep Learning Techniques
|
Raj, Mitushi |
|
|
3 |
5 |
|
article |
11 |
An Empirical Study on the Use of Quantum Computing for Financial Portfolio Optimization
|
Gomes, Cláudio |
|
|
3 |
5 |
|
article |
12 |
A New Approach for Control Chart Pattern Recognition Using Nonlinear Correlation Measure
|
Janan, Farhatul |
|
|
3 |
5 |
|
article |
13 |
A New Version of Energy-Efficient Optimization Protocol Using ICMA-PSOGA Algorithm in Wireless Sensor Network
|
Rambabu, Ch |
|
|
3 |
5 |
|
article |
14 |
An Exhaustive Analytical Study of U-Net Architecture on Two Diverse Biomedical Imaging Datasets of Electron Microscopy Drosophila ssTEM and Brain MRI BraTS-2021 for Segmentation
|
Jena, Biswajit |
|
|
3 |
5 |
|
article |
15 |
An Online Activity Monitoring for Geriatric Care Using Ambient Sensors
|
Ghosh, Moumita |
|
|
3 |
5 |
|
article |
16 |
An Optimized MRI Contrast Enhancement Scheme Using Cycle Generative Adversarial Network
|
Sharma, Shikha |
|
|
3 |
5 |
|
article |
17 |
A North–South Problem in Civic-Tech and Volunteered Geographic Information as Countermeasures of COVID-19: A Brief Overview
|
Suzuki, Koshiro |
|
|
3 |
5 |
|
article |
18 |
A Practical Guide to an Open-Source Map-Matching Approach for Big GPS Data
|
Saki, Siavash |
|
|
3 |
5 |
|
article |
19 |
Area Coverage Strategy in IoT Networks Based on Redeployment, Descriptive Statistics, Correlation and Regression Parameters
|
Boualem, Adda |
|
|
3 |
5 |
|
article |
20 |
A Recursive Algorithm for Mining Association Rules
|
Mokkadem, Abdelkader |
|
|
3 |
5 |
|
article |
21 |
A SoC-Based Programmable Portable Ultrasound Scanning System for Point-of-Care Applications and Clinical Research Activities
|
Bharath, R. |
|
|
3 |
5 |
|
article |
22 |
Assessing Mobile Usage, Physical Activity and Sleep Through Smartphone Sensing: A Digital Phenotype Study
|
Vaghela, Maitri |
|
|
3 |
5 |
|
article |
23 |
A Study on Indirect Performance Parameters of Object Detection
|
Arulprakash, Enoch |
|
|
3 |
5 |
|
article |
24 |
A Theoretical Foundation for Explaining and Predicting the Effectiveness of a Bring Your Own Device Program in Organizations
|
Akande, Alexander O. |
|
|
3 |
5 |
|
article |
25 |
Attention-Based Deep Odometry Estimation on Point Clouds
|
Kapoor, Prince |
|
|
3 |
5 |
|
article |
26 |
Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks: A Survey
|
Bahache, Anwar Noureddine |
|
|
3 |
5 |
|
article |
27 |
Automatic Detection and Decryption of AES Using Dynamic Analysis
|
Kokeš, Josef |
|
|
3 |
5 |
|
article |
28 |
Automating the Detection of Access Control Vulnerabilities in Web Applications
|
Rennhard, Marc |
|
|
3 |
5 |
|
article |
29 |
Band Selection in Hyperspectral Image with Chaotic Binary MOCLONAL Algorithm
|
Nanda, Satyasai Jagannath |
|
|
3 |
5 |
|
article |
30 |
BB-CSP: An Efficient Blockchain-Based Collective Salary Payment Framework Using Weighted Functional Encryption
|
Banaeian Far, Saeed |
|
|
3 |
5 |
|
article |
31 |
Breast Cancer Detection and Classification from Mammogram Images Using Multi-model Shape Features
|
Gurudas, V. R. |
|
|
3 |
5 |
|
article |
32 |
Building a Vietnamese Dataset for Natural Language Inference Models
|
Nguyen, Chinh Trong |
|
|
3 |
5 |
|
article |
33 |
CAPTION: Caption Analysis with Proposed Terms, Image of Objects, and Natural Language Processing
|
Ferreira, Leonardo A. |
|
|
3 |
5 |
|
article |
34 |
Cephalometric Skeletal Structure Classification Using Convolutional Neural Networks and Heatmap Regression
|
Rashmi, S. |
|
|
3 |
5 |
|
article |
35 |
Chinese Sign Language Recognition with Batch Sampling ResNet-Bi-LSTM
|
Chung, Wan-Young |
|
|
3 |
5 |
|
article |
36 |
Classification of Breast Cancer Diagnosis Systems Using Artificial Intelligence Techniques: Survey
|
Abokaff, Loujain Mohammad |
|
|
3 |
5 |
|
article |
37 |
Classification of Effect on Real Estates in Mumbai During Covid-19
|
Kumar, S. Ananda |
|
|
3 |
5 |
|
article |
38 |
Classification of Silent Speech in English and Bengali Languages Using Stacked Autoencoder
|
Ghosh, Rajdeep |
|
|
3 |
5 |
|
article |
39 |
Collusion-Resistant Worker Set Selection for Transparent and Verifiable Voting
|
Bettinger, Matthieu |
|
|
3 |
5 |
|
article |
40 |
Correction to: A SoC-Based Programmable Portable Ultrasound Scanning System for Point-of-Care Applications and Clinical Research Activities
|
Bharath, R. |
|
|
3 |
5 |
|
article |
41 |
Correction to: Image Abstraction Framework as a Pre‑processing Technique for Accurate Classification of Archaeological Monuments Using Machine Learning Approaches
|
Kumar, M. P. Pavan |
|
|
3 |
5 |
|
article |
42 |
Deep Leaning Based Static Indian-Gujarati Sign Language Gesture Recognition
|
Patel, Dhaval U. |
|
|
3 |
5 |
|
article |
43 |
Deep Learning Models for the Diagnosis and Screening of COVID-19: A Systematic Review
|
Siddiqui, Shah |
|
|
3 |
5 |
|
article |
44 |
DepML: An Efficient Machine Learning-Based MDD Detection System in IoMT Framework
|
Sharma, Geetanjali |
|
|
3 |
5 |
|
article |
45 |
Design and Development of a Text-to-Speech Synthesizer for Afan Oromo
|
Chala, Tamrat Delessa |
|
|
3 |
5 |
|
article |
46 |
Detection of Drowsiness Using the Pulse Rate Variability of Finger
|
Heydari, Saeideh |
|
|
3 |
5 |
|
article |
47 |
Detection of Heart Disease Utilising a Feature Fusion Technique and Machine Learning-Augmented Classification
|
Mishra, Jyoti |
|
|
3 |
5 |
|
article |
48 |
Diabetic Retinopathy Classification Using Hybrid Deep Learning Approach
|
Menaouer, Brahami |
|
|
3 |
5 |
|
article |
49 |
Digital Signature Schemes Based on Group Ring
|
Kumar, Sunil |
|
|
3 |
5 |
|
article |
50 |
Discovering Tampered Image in Social Media Using ELA and Deep Learning
|
Chakraborty, Sunen |
|
|
3 |
5 |
|
article |
51 |
DLToDW: Transferring Relational and NoSQL Databases from a Data Lake
|
Jemmali, Rym |
|
|
3 |
5 |
|
article |
52 |
Encoding High-Dimensional Procedure Codes for Healthcare Fraud Detection
|
Johnson, Justin M. |
|
|
3 |
5 |
|
article |
53 |
Enhancing and Evaluating the Product Fuzzy DPLL Solver
|
Uhliarik, Ivor |
|
|
3 |
5 |
|
article |
54 |
Enhancing Cross-lingual Biomedical Concept Normalization Using Deep Neural Network Pretrained Language Models
|
Lin, Ying-Chi |
|
|
3 |
5 |
|
article |
55 |
Forecasting Bitcoin Price Using Interval Graph and ANN Model: A Novel Approach
|
Murugesan, R. |
|
|
3 |
5 |
|
article |
56 |
Formalizing and Integrating User Knowledge into Security Analytics
|
Böhm, Fabian |
|
|
3 |
5 |
|
article |
57 |
From Legal Contracts to Formal Specifications: A Systematic Literature Review
|
Soavi, Michele |
|
|
3 |
5 |
|
article |
58 |
Fr-WCSO- DRN: Fractional Water Cycle Swarm Optimizer-Based Deep Residual Network for Pulmonary Abnormality Detection from Respiratory Sound Signals
|
Dar, Jawad Ahmad |
|
|
3 |
5 |
|
article |
59 |
Fuzzy Confidence Intervals by the Likelihood Ratio: Testing Equality of Means—Application on Swiss SILC Data
|
Berkachy, Rédina |
|
|
3 |
5 |
|
article |
60 |
How is People’s Awareness of “Biodiversity” Measured? Using Sentiment Analysis and LDA Topic Modeling in the Twitter Discourse Space from 2010 to 2020
|
Ohtani, Shimon |
|
|
3 |
5 |
|
article |
61 |
Hydra: Practical Metadata Security for Contact Discovery, Messaging, and Voice Calls
|
Schatz, David |
|
|
3 |
5 |
|
article |
62 |
Iterative Respacing of Polygonal Curves
|
Manivel, Marcella |
|
|
3 |
5 |
|
article |
63 |
Learning to See: Using Mixed OR Methods to Model Radiology Staff Workload and Support Decision Making in CT
|
Conlon, Mary |
|
|
3 |
5 |
|
article |
64 |
Measuring When a Music Generation Algorithm Copies Too Much: The Originality Report, Cardinality Score, and Symbolic Fingerprinting by Geometric Hashing
|
Yin, Zongyu |
|
|
3 |
5 |
|
article |
65 |
Micro-YOLO+: Searching Optimal Methods for Compressing Object Detection Model Based on Speed, Size, Cost, and Accuracy
|
Hu, Lining |
|
|
3 |
5 |
|
article |
66 |
Missing Data Analysis Using Statistical and Machine Learning Methods in Facility-Based Maternal Health Records
|
Memon, Shaheen M. Z. |
|
|
3 |
5 |
|
article |
67 |
Modelling the Impact of Individual Preferences on Traffic Policies
|
Nguyen, Johannes |
|
|
3 |
5 |
|
article |
68 |
MQTT-Based Android Chat Application for IoT
|
Anne, Lahari |
|
|
3 |
5 |
|
article |
69 |
Multi-objective PID Controller Tuning for Multi-model Control of Nonlinear Systems
|
Reynoso-Meza, Gilberto |
|
|
3 |
5 |
|
article |
70 |
Multi-path Convolutional Neural Network to Identify Tumorous Sub-classes for Breast Tissue from Histopathological Images
|
Das, Rangan |
|
|
3 |
5 |
|
article |
71 |
Needle in a Haystack: Generating Audit Hypotheses for Clinical Audits of Hospitals
|
Pawde, Aditi |
|
|
3 |
5 |
|
article |
72 |
NVRAM as an Enabler to New Horizons in Graph Processing
|
Capelli, Ludovic Anthony Richard |
|
|
3 |
5 |
|
article |
73 |
Offence Detection in Dravidian Languages Using Code-Mixing Index-Based Focal Loss
|
Tula, Debapriya |
|
|
3 |
5 |
|
article |
74 |
On the Security and Complexity of Periodic Systems
|
Alturki, Musab A. |
|
|
3 |
5 |
|
article |
75 |
Posture and Mechanical Load Assessment During Patient Transfers
|
Hellmers, Sandra |
|
|
3 |
5 |
|
article |
76 |
Priority-Based Adaptive Traffic Signal Control System for Smart Cities
|
Mondal, Md. Ashifuddin |
|
|
3 |
5 |
|
article |
77 |
PUFchain 2.0: Hardware-Assisted Robust Blockchain for Sustainable Simultaneous Device and Data Security in Smart Healthcare
|
Bathalapalli, Venkata K. V. V. |
|
|
3 |
5 |
|
article |
78 |
Raw Anode Volume Density Prediction Algorithm Based on the Genetic Algorithm
|
Cao, Danyang |
|
|
3 |
5 |
|
article |
79 |
Real-Time Heuristic-Based Detection of Attacks Performed on a Linux Machine Using Osquery
|
Ahamed, Sarfaraz |
|
|
3 |
5 |
|
article |
80 |
Resolving Linguistic Ambiguities by Visual Context
|
Pavone, Arianna |
|
|
3 |
5 |
|
article |
81 |
Route Planning Service for Emergency Vehicles with Increased Accuracy and Efficiency for Online Platforms
|
Sarkar, Shankha Shubhra |
|
|
3 |
5 |
|
article |
82 |
Secure Covid-19 Electronic Health Records Management for Telediagnosis and Travel Ticket Assistant System Using Cryptographic Approaches
|
Falmari, Vinod Ramesh |
|
|
3 |
5 |
|
article |
83 |
Securing Account Recovery Mechanism on Desktop Computers and Mobile Phones with Keystroke Dynamics
|
Wahab, Ahmed Anu |
|
|
3 |
5 |
|
article |
84 |
Study of Evolutionary Algorithms for Multi-objective Optimization
|
Gaikwad, Rama |
|
|
3 |
5 |
|
article |
85 |
The Authenticity of Digital News Coverage in the Mainstream Media in Japan
|
Miyazoe, Terumi |
|
|
3 |
5 |
|
article |
86 |
The Hardest Hamiltonian Cycle Problem Instances: The Plateau of Yes and the Cliff of No
|
Sleegers, Joeri |
|
|
3 |
5 |
|
article |
87 |
Time-Series Prediction for the Epidemic Trends of COVID-19 Using Conditional Generative Adversarial Networks Regression on Country-Wise Case Studies
|
Bej, Arnabi |
|
|
3 |
5 |
|
article |
88 |
To Teach or Not to Teach: An International Study of Language Teachers’ Experiences of Online Teaching During the COVID-19 Pandemic
|
Kwee, Ching Ting Tany |
|
|
3 |
5 |
|
article |
89 |
Towards a Better Data Collection of Crisis Situations Based on Ontologies
|
Maalel, Ahmed |
|
|
3 |
5 |
|
article |
90 |
Tunnel Vision Hypothesis: Cognitive Factor Affecting Crowd Evacuation Decisions
|
Tsurushima, Akira |
|
|
3 |
5 |
|
article |
91 |
Ubiquitous Secure Communication in a Future Internet Architecture
|
Krähenbühl, Cyrill |
|
|
3 |
5 |
|
article |