no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Accessibility of COVID-19 Websites of Asian Countries: An Evaluation Using Automated Tools
|
Niom, Telcia |
|
|
3 |
6 |
|
article |
2 |
A CNN Based Air-Writing Recognition Framework for Multilinguistic Characters and Digits
|
Kumar, Prabhat |
|
|
3 |
6 |
|
article |
3 |
A Comparative Analysis Between Proposed Neuro-fuzzy, Fuzzy, and Heuristic-Neuro-fuzzy Controller for Autonomous Vehicle Parking in the Dynamic Environment
|
Nakrani, Naitik M. |
|
|
3 |
6 |
|
article |
4 |
A Comparative Study on the Extraction of Dependency Links Between Different Personality Traits
|
Ellouze, Mourad |
|
|
3 |
6 |
|
article |
5 |
A Critical Scrutiny of ConvNets (CNNs) and Its Applications: Review
|
Shanmuganathan, M. |
|
|
3 |
6 |
|
article |
6 |
A Deeper Analysis of the Hierarchical Clustering and Set Unionability-Based Data Union Method
|
Dang, Tran Khanh |
|
|
3 |
6 |
|
article |
7 |
A Hybrid Multilayer Perceptron-Radial Basis Function (HMLP-RBF) Neural Network for Solving Hyperbolic Conservation Laws
|
Xiao, Yang |
|
|
3 |
6 |
|
article |
8 |
A Multi-objective Optimization Approach for the Synthesis of Granular Computing-Based Classification Systems in the Graph Domain
|
Baldini, Luca |
|
|
3 |
6 |
|
article |
9 |
An Analytical Study of Multiprocessor Scheduling Using Metaheuristic Approach
|
Acharya, Biswaranjan |
|
|
3 |
6 |
|
article |
10 |
An Approach to Detect Fake Profiles in Social Networks Using Cellular Automata-Based PageRank Validation Model Involving Energy Transfer
|
Mitra, Arnab |
|
|
3 |
6 |
|
article |
11 |
An Empirical Evaluation of Constrained Feature Selection
|
Bach, Jakob |
|
|
3 |
6 |
|
article |
12 |
An Intelligent Kurdish Sign Language Recognition System Based on Tuned CNN
|
Ahmed, Hunar Abubakir |
|
|
3 |
6 |
|
article |
13 |
A Novel IOT-Based Medicine Consumption System for Elders
|
Abdullah, Raiyaan |
|
|
3 |
6 |
|
article |
14 |
Application of Gradient Boosting in Evaluating Surgical Ablation for Atrial Fibrillation
|
Pande, Amol |
|
|
3 |
6 |
|
article |
15 |
A Reference Architecture for IoT-Enabled Smart Buildings
|
Bashir, Muhammad Rizwan |
|
|
3 |
6 |
|
article |
16 |
A Review on Machine Learning Approaches in Identification of Pediatric Epilepsy
|
Ahmed, Mohammed Imran Basheer |
|
|
3 |
6 |
|
article |
17 |
A Review Paper on the Role of Sentiment Analysis in Quality Education
|
Pooja, |
|
|
3 |
6 |
|
article |
18 |
Artificial Intelligence for Modelling the Wet Agglomeration Process of Fine Materials: A Survey
|
Nadeem, Mohammad |
|
|
3 |
6 |
|
article |
19 |
A Smart Logistic Classification Method for Remote Sensed Image Land Cover Data
|
Sahu, Madhusmita |
|
|
3 |
6 |
|
article |
20 |
Assessing Meteorological Drought and Detecting LULC Dynamics at a Regional Scale Using SPI, NDVI, and Random Forest Methods
|
Gaikwad, Sandeep V. |
|
|
3 |
6 |
|
article |
21 |
A Strategy-Based Algorithm for Moving Targets in an Environment with Multiple Agents
|
Afzalov, Azizkhon |
|
|
3 |
6 |
|
article |
22 |
A Survey of the Software Test Methods and Identification of Critical Success Factors for Automation
|
Bindu Bhargavi, S. M. |
|
|
3 |
6 |
|
article |
23 |
A Survey on Object Instance Segmentation
|
Sharma, Rabi |
|
|
3 |
6 |
|
article |
24 |
A View Independent Classification Framework for Yoga Postures
|
Chasmai, Mustafa |
|
|
3 |
6 |
|
article |
25 |
Axial Generation: Mixing Colour and Shapes to Automatically Form Diverse Digital Sculptures
|
Easton, Edward |
|
|
3 |
6 |
|
article |
26 |
BarChartAnalyzer: Data Extraction and Summarization of Bar Charts from Images
|
Daggubati, Siri Chandana |
|
|
3 |
6 |
|
article |
27 |
Bidirectional Point Cloud Holes Repair Obtained by SfM and Structured Light
|
Chen, Hui |
|
|
3 |
6 |
|
article |
28 |
Bio-inspired Computing Techniques for Data Security Challenges and Controls
|
Sripriyanka, G |
|
|
3 |
6 |
|
article |
29 |
Checking Contact Tracing App Implementations with Bespoke Static Analysis
|
Flood, Robert |
|
|
3 |
6 |
|
article |
30 |
Chord Function Recognition as Latent State Transition
|
Uehara, Yui |
|
|
3 |
6 |
|
article |
31 |
Composition-Nominative Methods and Models in Program Development
|
Nikitchenko, Mykola |
|
|
3 |
6 |
|
article |
32 |
Context-Aware Interactive Knowledge-Based Recommendation
|
Dadouchi, Camélia |
|
|
3 |
6 |
|
article |
33 |
Contrastive Metric Learning for Lithium Super-ionic Conductor Screening
|
Zhang, Boyu |
|
|
3 |
6 |
|
article |
34 |
Corpus Construction for Historical Newspapers: A Case Study on Public Meeting Corpus Construction Using OCR Error Correction
|
Tanaka, Koji |
|
|
3 |
6 |
|
article |
35 |
Correction: A Learning Classifier System for Automated Test Case Prioritization and Selection
|
Rosenbauer, Lukas |
|
|
3 |
6 |
|
article |
36 |
Correction: Enhancing Cross-lingual Biomedical Concept Normalization Using Deep Neural Network Pretrained Language Models
|
Lin, Ying-Chi |
|
|
3 |
6 |
|
article |
37 |
Deep Learning-Based Approach to Detect and Classify Signs of Crop Leaf Diseases and Pest Damage
|
Mondal, Dhiman |
|
|
3 |
6 |
|
article |
38 |
Denoising Latent Representation with SOMs for Unsupervised IoT Malware Detection
|
Nguyen, Huu Noi |
|
|
3 |
6 |
|
article |
39 |
Design and Modeling of Intelligent Building Office and Thermal Comfort Based on Probabilistic Neural Network
|
Kciuk, Marek |
|
|
3 |
6 |
|
article |
40 |
Designing a RESTful Northbound Interface for Incompatible Software Defined Network Controllers
|
Alghamdi, Abdullah |
|
|
3 |
6 |
|
article |
41 |
Disease Prediction Based on Symptoms Given by User Using Machine Learning
|
Divya, A. |
|
|
3 |
6 |
|
article |
42 |
Distributed Model Architecture for Cuff-Less Blood Pressure Measurement System
|
Dave, Tejal |
|
|
3 |
6 |
|
article |
43 |
Effective Utilization of Multiple Convolutional Neural Networks for Chest X-Ray Classification
|
Rammuni Silva, Ravidu Suien |
|
|
3 |
6 |
|
article |
44 |
Efficacy of Residual Methods for Passive Image Forensics Using Four Filtered Residue CNN
|
Agarwal, Aanchal |
|
|
3 |
6 |
|
article |
45 |
Efficient Parabolic Optimisation Algorithm for Adaptive VQE Implementations
|
Armaos, V. |
|
|
3 |
6 |
|
article |
46 |
Energy-Shaping Controllers for Soft Robot Manipulators Through Port-Hamiltonian Cosserat Models
|
Caasenbrood, Brandon |
|
|
3 |
6 |
|
article |
47 |
Enhancing the Cognition and Efficacy of Machine Learning Through Similarity
|
Pendyala, Vishnu |
|
|
3 |
6 |
|
article |
48 |
Enhancing Warning, Situational Awareness, Assessment and Education in Managing Emergency: Case Study of COVID-19
|
Bouzidi, Zair |
|
|
3 |
6 |
|
article |
49 |
Evaluating Models with Dynamic Sampling Holdout in Auto-ML
|
Larcher, Celio H. N. |
|
|
3 |
6 |
|
article |
50 |
Explanation of HRV Features for Detecting Atrial Fibrillation
|
Lee, Yongho |
|
|
3 |
6 |
|
article |
51 |
Exploring Root Causes of CNN-Based Image Classifier Failures Using 3-Nearest Neighbors
|
Bilgin, Zeki |
|
|
3 |
6 |
|
article |
52 |
Fake Information Analysis and Detection on Pandemic in Twitter
|
Jeyasudha, J. |
|
|
3 |
6 |
|
article |
53 |
Fast Hubness-Reduced Nearest Neighbor Search for Entity Alignment in Knowledge Graphs
|
Obraczka, Daniel |
|
|
3 |
6 |
|
article |
54 |
Fuzzy Pattern Tree Evolution Using Grammatical Evolution
|
Murphy, Aidan |
|
|
3 |
6 |
|
article |
55 |
Hyperparameter Tuning for Medicare Fraud Detection in Big Data
|
Hancock, John T. |
|
|
3 |
6 |
|
article |
56 |
Improving Web Application Firewalls with Automatic Language Detection
|
Nguyen, Tri-Chan-Hung |
|
|
3 |
6 |
|
article |
57 |
Information Technology for Parametric Optimization of Fuzzy Systems Based on Hybrid Grey Wolf Algorithms
|
Kozlov, Oleksiy V. |
|
|
3 |
6 |
|
article |
58 |
Investigation of Cybersecurity Attacks and Threats on Cloud Using Black Widow Algorithm with Recurrent Neural Network
|
Senthil Kumar, S. |
|
|
3 |
6 |
|
article |
59 |
Machine Learning-Based Trust Management in Cloud Using Blockchain Technology
|
Benjamin Franklin, I. |
|
|
3 |
6 |
|
article |
60 |
Machine Learning Workflow to Explain Black-Box Models for Early Alzheimer’s Disease Classification Evaluated for Multiple Datasets
|
Bloch, Louise |
|
|
3 |
6 |
|
article |
61 |
Model-Driven Engineering of Process-Aware Information Systems
|
Drave, Imke |
|
|
3 |
6 |
|
article |
62 |
Optimal Contact Points for an Octopus Arm
|
Cacace, Simone |
|
|
3 |
6 |
|
article |
63 |
Optimal Feature Selection Based on Evolutionary Algorithm for Intrusion Detection
|
Prashanth, S. K. |
|
|
3 |
6 |
|
article |
64 |
Optimizations of a Multi-Agent System for a Real-World Warehouse Problem
|
Ács, Botond |
|
|
3 |
6 |
|
article |
65 |
PaFSe: A Parameter-Free Segmentation Approach for 3D Fluorescent Images
|
Ameli, Corrado |
|
|
3 |
6 |
|
article |
66 |
Performance Analysis of Automatic Integrated Long-Range RFID and Webcam System
|
Tran, Minh-Duy |
|
|
3 |
6 |
|
article |
67 |
Performance Evaluation of Multiband Embroidered Fractal Antenna on Human Body
|
Gite, Shruti |
|
|
3 |
6 |
|
article |
68 |
Plascua: Programming Language Support for Continuous User Authentication
|
Muganji, Julius |
|
|
3 |
6 |
|
article |
69 |
Potential Attacks of DeepFake on eKYC Systems and Remedy for eKYC with DeepFake Detection Using Two-Stream Network of Facial Appearance and Motion Features
|
Do, Trong-Le |
|
|
3 |
6 |
|
article |
70 |
Prediction and Analysis of Air Pollution Using Machine Learning
|
Murali, Manju |
|
|
3 |
6 |
|
article |
71 |
Prediction of Phishing Websites Using Stacked Ensemble Method and Hybrid Features Selection Method
|
Pandey, Mithilesh Kumar |
|
|
3 |
6 |
|
article |
72 |
Privacy-Preserving Healthcare Data Modeling Based on Sensitivity and Utility
|
Saha, Sayantani |
|
|
3 |
6 |
|
article |
73 |
Privacy-Preserving Parallel Computation of Minimum Spanning Forest
|
Anagreh, Mohammad |
|
|
3 |
6 |
|
article |
74 |
Problems of Semantic and Syntactic Modeling of Verbs in the Tibetan Corpus
|
Kramskova, Anna |
|
|
3 |
6 |
|
article |
75 |
Promotional Predictive Marketing: User Centric Data Driven Approach
|
Tokdar, Soumi |
|
|
3 |
6 |
|
article |
76 |
Protecting Systems from Violating Constraints Using Reference Governors
|
Kolmanovsky, Ilya |
|
|
3 |
6 |
|
article |
77 |
Research on Selective Combination of Distributed Machine Learning Models
|
Tsuchiya, Takeshi |
|
|
3 |
6 |
|
article |
78 |
Roman Urdu Fake Reviews Detection Using Stacked LSTM Architecture
|
Hayat, Umer |
|
|
3 |
6 |
|
article |
79 |
Self-Calibration of the Descent Camera of the Tianwen-1 Probe
|
Zhang, Shuo |
|
|
3 |
6 |
|
article |
80 |
Semantic Integration of Heterogeneous Data Sources Using Ontology-Based Domain Knowledge Modeling for Early Detection of COVID-19
|
Thirumahal, R. |
|
|
3 |
6 |
|
article |
81 |
Sentiment Thesaurus, Synset and Word2Vec Based Improvement in Bigram Model for Classifying Product Reviews
|
Poomagal, S. |
|
|
3 |
6 |
|
article |
82 |
Smart and Deep Hand Movement Tracking from Crowd Videos through Particle Filtering and Matrix Transformation
|
Sreenu, G. |
|
|
3 |
6 |
|
article |
83 |
Static and Dynamic Dependency Visualization in a Layered Software City
|
Dashuber, Veronika |
|
|
3 |
6 |
|
article |
84 |
Stride Window Approach with Anomaly Detection for Probability Risk Assessment
|
Singh, Brijendra |
|
|
3 |
6 |
|
article |
85 |
The Efficacy of Object Deciphering in STEAM Education Beyond Encounters and Collisions Between Learners and Objects
|
Tanabashi, Sayuri |
|
|
3 |
6 |
|
article |
86 |
The Improved Framework for Traffic Sign Recognition Using Guided Image Filtering
|
Xing, Jiawei |
|
|
3 |
6 |
|
article |
87 |
Towards an AI-Driven Marketplace for Small Businesses During COVID-19
|
Coltey, Erik |
|
|
3 |
6 |
|
article |
88 |
Towards the Use of Hypermedia MAS and Microservices for Web Scale Agent-Based Simulation
|
Collier, Rem |
|
|
3 |
6 |
|
article |
89 |
Traditional Machine Learning and Deep Learning Modeling for Legume Species Recognition
|
Rimi, Iffat Firozy |
|
|
3 |
6 |
|
article |
90 |
Using Dominated Solutions at Edges to the Diversity and the Uniformity of Non-dominated Solution Distributions in NSGA-II
|
Sato, Yuji |
|
|
3 |
6 |
|
article |
91 |
What Can the Millions of Random Treatments in Nonexperimental Data Reveal About Causes?
|
F. Ribeiro, Andre |
|
|
3 |
6 |
|
article |