no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Access Security Policy Generation for Containers as a Cloud Service
|
Zhu, Hui |
|
|
4 |
6 |
|
article |
2 |
A Chaos BSA-Based Optimization Approach for Task Planning to Improve Resource Deployment in Cloud Computing
|
Mantri, Archana |
|
|
4 |
6 |
|
article |
3 |
A Comparative Performance Study on the Time Intervals of Hybrid Brain–Computer Interface Signals
|
Shelishiyah, R. |
|
|
4 |
6 |
|
article |
4 |
A Deep Convolutional Neural Network for Time Series Classification with Intermediate Targets
|
Taherkhani, Aboozar |
|
|
4 |
6 |
|
article |
5 |
A Diabetic Retinopathy Classification and Analysis Towards the Development of a Computer-Aided Medical Decision Support System
|
Aknan, Mohammad |
|
|
4 |
6 |
|
article |
6 |
A Distributed Microservice Architecture Pattern for the Automated Generation of Information Extraction Pipelines
|
Sildatke, Michael |
|
|
4 |
6 |
|
article |
7 |
A Diversity-Based Synthetic Oversampling Using Clustering for Handling Extreme Imbalance
|
Yang, Yuxuan |
|
|
4 |
6 |
|
article |
8 |
Advancing Personalized Federated Learning: Group Privacy, Fairness, and Beyond
|
Galli, Filippo |
|
|
4 |
6 |
|
article |
9 |
A Fuzzy-Based Multi-objective Optimization Applied to Analog Circuits for Fuzzy Systems
|
Coelho, Pedro |
|
|
4 |
6 |
|
article |
10 |
A Generic Tool for Identification of Indo-Aryan Multi Word Expression
|
Saini, Jatinderkumar R. |
|
|
4 |
6 |
|
article |
11 |
A Heuristic Approach to Solve Author Name Ambiguity Using Minimum Bibliographic Evidences
|
Bhattacharya, Sovan |
|
|
4 |
6 |
|
article |
12 |
A Hybrid Technique to Re-establish Squat Contrast Underwater Images Centred on Principal Component Analysis
|
Mittal, Aman |
|
|
4 |
6 |
|
article |
13 |
A Lattice-Based Single-Share Secret Sharing Scheme
|
Kumar, Ramakant |
|
|
4 |
6 |
|
article |
14 |
A Machine Learning-Based Hybrid Approach to Subset Selection Using Binary Ant Colony Optimization Functions
|
Selvi, R. Senthamil |
|
|
4 |
6 |
|
article |
15 |
A Miniscule and Self-Adaptive Autoregressive Dragonfly Optimization for Secrecy Conserved Data Publication in Mobile Cloud Computing
|
Mishra, Rahul |
|
|
4 |
6 |
|
article |
16 |
A Model for Detecting Type 2 Diabetes Using Mixed Single-Cell RNA Sequencing with Optimized Data
|
Padmaja, K. |
|
|
4 |
6 |
|
article |
17 |
A Multivariate Convertible Group Signature Scheme
|
Omar, Satyam |
|
|
4 |
6 |
|
article |
18 |
Analysis of Context-Oriented Source Location Privacy Preservation Techniques for Wireless Sensor Networks
|
Singh, Nisha |
|
|
4 |
6 |
|
article |
19 |
Analysis of Learning Heuristic Estimates for Grid Planning with Cellular Simultaneous Recurrent Networks
|
Urbanovská, Michaela |
|
|
4 |
6 |
|
article |
20 |
Analyzing Brain Tumor from Structural MR Images Using Kernel Support Vector Machine and Principal Component Analysis
|
Yugander, P. |
|
|
4 |
6 |
|
article |
21 |
An Analytical Insight of Discussions and Sentiments of Indians on Omicron-Driven Third Wave of COVID-19
|
Vatsa, Deepika |
|
|
4 |
6 |
|
article |
22 |
An Autoregressive Dragonfly Optimization-Based Assignment Planning Procedures for Refining Enactment and Data Security in Mobile Cloud Computing
|
Mishra, Rahul |
|
|
4 |
6 |
|
article |
23 |
An Edge Computing Architecture for Internet Measurement Network to Measure and Analyze Protocol Data
|
Raje, Anand |
|
|
4 |
6 |
|
article |
24 |
An Effective Machine-Learning-Based Approach for Removal of Colour Cast in Underwater Images
|
Mittal, Amit |
|
|
4 |
6 |
|
article |
25 |
An Efficient ACO-based Routing and Data Fusion Approach for IoT Networks
|
Chakraborty, Ishita |
|
|
4 |
6 |
|
article |
26 |
An Efficient Approach to Detect and Predict the Tomato Leaf Disease Using Enhance Segmentation Neural Network
|
Bajpai, Abhishek |
|
|
4 |
6 |
|
article |
27 |
A New Technique for Network Heterogeneity and Stability in Infrastructureless Environment
|
Pandey, Vipin Kumar |
|
|
4 |
6 |
|
article |
28 |
An Image Encryption Algorithm Based on Trivium Cipher and Random Substitution
|
Alghamdi, Yousef |
|
|
4 |
6 |
|
article |
29 |
An Improved Analysis of TNN-Based Managed and Unverified Learning Approaches for Optimum Threshold Resolve
|
Pandey, Sakshi |
|
|
4 |
6 |
|
article |
30 |
An Improved Parallel Particle Swarm Optimization
|
Charilogis, Vasileios |
|
|
4 |
6 |
|
article |
31 |
An Innovative Method for Hindi Word Sense Disambiguation
|
Mishra, Binod Kumar |
|
|
4 |
6 |
|
article |
32 |
An Intellectual Fusion Classification Prototypical for an Imbalanced Electrocardiogram Data
|
Ruth Isabels, K. |
|
|
4 |
6 |
|
article |
33 |
An Investigation of Complex Interactions Between Genetically Determined Protein Expression and the Metabolic Phenotype of Human Islet Cells Using Deep Learning
|
Padmaja, K. |
|
|
4 |
6 |
|
article |
34 |
An Iterated Local Search for the Minimum Edge-Dilation K-Center Problem
|
Israni, Manisha |
|
|
4 |
6 |
|
article |
35 |
Anomaly Detection in Surveillance Scenes Using Autoencoders
|
Joshi, Kinjal V. |
|
|
4 |
6 |
|
article |
36 |
An Operative Analysis of Influence on Human Physical Activities Using Ubiquitous Ambulatory Electrocardiogram
|
Nuryadin, Islahuzzaman |
|
|
4 |
6 |
|
article |
37 |
An Operative Medical Angio-Image Improvement with Adaptive Fractional Differential Filter
|
Singh, Dhiraj |
|
|
4 |
6 |
|
article |
38 |
An Optimal Topic Centric Crawler for Acquiring Bio-medical Themes Utilizing Gaussian Support Vector Regression
|
Rajiv, S. |
|
|
4 |
6 |
|
article |
39 |
A Novel Approach for Specification Testing on Heart Disease Detection Using Feed-Forward Neural Network
|
Naresh, E. |
|
|
4 |
6 |
|
article |
40 |
A Novel Approach of Stock Price Direction and Price Prediction Based on Investor’s Sentiments
|
Singh, Harmanjeet |
|
|
4 |
6 |
|
article |
41 |
A Novel Deep Learning Language Model with Hybrid-GFX Embedding and Hyperband Search for Opinion Analysis
|
Jawale, Shila |
|
|
4 |
6 |
|
article |
42 |
A Novel Intelligent Approach for Efficient Detection of Respiratory Infections Combining Face Mask Detection and Thermal Images on Embedded Devices
|
Annadurai, C. |
|
|
4 |
6 |
|
article |
43 |
A Novel Transfer Learning Method for Code Smell Detection on Heterogeneous Data: A Feasibility Study
|
Gupta, Ruchin |
|
|
4 |
6 |
|
article |
44 |
A Privacy Preservation Framework Using Integration of Blockchain and Federated Learning
|
Sameera, K. M. |
|
|
4 |
6 |
|
article |
45 |
A Quality Assessment Framework for Information Extraction in Job Advertisements
|
Espinal, Albeiro |
|
|
4 |
6 |
|
article |
46 |
A Review and Analysis of the Characteristics of Cyber-physical Systems in Industry 4.0
|
Eslami, Yasamin |
|
|
4 |
6 |
|
article |
47 |
A Review of Feature Extraction and Classification Techniques in Speech Recognition
|
Yadav, Sonal |
|
|
4 |
6 |
|
article |
48 |
Artificial Intelligence Modeling for Scour Depth Prediction Upstream of Bridge Piers
|
Fujail, Abul Kashim Md. |
|
|
4 |
6 |
|
article |
49 |
A Statistical Language Modeling Framework for Extractive Summarization of Text Documents
|
Gupta, Pooja |
|
|
4 |
6 |
|
article |
50 |
A Study of the Dissemination of Malware and the Enhancement of the Lifespan of Rechargeable Wireless Sensor Networks: An Epidemiological Approach
|
Awasthi, Shashank |
|
|
4 |
6 |
|
article |
51 |
A Survey and Taxonomy of Sequential Recommender Systems for E-commerce Product Recommendation
|
Nasir, Mahreen |
|
|
4 |
6 |
|
article |
52 |
A Survey of Cyberbullying Detection and Performance: Its Impact in Social Media Using Artificial Intelligence
|
Ambareen, Khateeja |
|
|
4 |
6 |
|
article |
53 |
Asynchronous Consensus in Synchronous Systems Using send_to_all Primitive
|
Srinivasan, Sathyanarayanan |
|
|
4 |
6 |
|
article |
54 |
A System Review on Fraudulent Website Detection Using Machine Learning Technique
|
Saraswathi, P. |
|
|
4 |
6 |
|
article |
55 |
A Theory of Secure and Efficient Implementation of Electronic Money
|
Buldas, Ahto |
|
|
4 |
6 |
|
article |
56 |
Automatic Diseases Classification and Detection in Castor Oil Plant Leaves Using Convolutional Neural Network
|
Kukadiya, Hirenkumar |
|
|
4 |
6 |
|
article |
57 |
Automatic Extraction of Conversation Flows from Human Dialogues: Understanding Their Impact to Refine NLP Models
|
Sanches, Matheus Ferraroni |
|
|
4 |
6 |
|
article |
58 |
A Vision-Based Pothole Detection Using CNN Model
|
Kumar, Prashant |
|
|
4 |
6 |
|
article |
59 |
A Wavelet Features and Machine Learning Founded Error Analysis of Sound and Trembling Signal
|
Shukla, Prashant Kumar |
|
|
4 |
6 |
|
article |
60 |
BayWT Image Fusion Method for Enhancement of Eddy Current Sub-surface Defect Images
|
Soni, Anil Kumar |
|
|
4 |
6 |
|
article |
61 |
Blockchain-Enabled Intelligent Solution Using Structured Equation Modelling Based on the UTAUT Framework
|
Vijh, Garima |
|
|
4 |
6 |
|
article |
62 |
Brain MRI Image Classification and Analysis Using Modified ResNet50V2 for Parkinson’s Disease Detection
|
Sailaja, B. |
|
|
4 |
6 |
|
article |
63 |
Breast Cancer CT-Scan Image Classification Using Transfer Learning
|
Shehzad, Ibrahim |
|
|
4 |
6 |
|
article |
64 |
Breast Cancer Data Classification Using Xception-Based Neural Network
|
Malve, Pravin |
|
|
4 |
6 |
|
article |
65 |
Building Multiple Classifier Systems Using Linear Combinations of Reduced Graphs
|
Gillioz, Anthony |
|
|
4 |
6 |
|
article |
66 |
Checking Pattern Query Containment Under Shape Expression
|
Fujimoto, Haruna |
|
|
4 |
6 |
|
article |
67 |
Computationally Efficient Labeling of Cancer-Related Forum Posts by Non-clinical Text Information Retrieval
|
Agerskov, Jimmi |
|
|
4 |
6 |
|
article |
68 |
Constructing and Understanding Customer Spending Prediction Models
|
Dang, Tran Tri |
|
|
4 |
6 |
|
article |
69 |
Corpus Creation in Telugu: Sentiment Classification Using Ensemble Approaches
|
Chattu, Kannaiah |
|
|
4 |
6 |
|
article |
70 |
Correction: A Statistical Language Modeling Framework for Extractive Summarization of Text Documents
|
Gupta, Pooja |
|
|
4 |
6 |
|
article |
71 |
Correction: SN Computer Science
|
|
|
|
4 |
6 |
|
article |
72 |
Cost Efficient Task Offloading for Delay Sensitive Applications in Fog Computing System
|
Lone, Kalimullah |
|
|
4 |
6 |
|
article |
73 |
Credit Quality Evaluation on a Dynamic Network with Latent Variables
|
Sewe, Stanley |
|
|
4 |
6 |
|
article |
74 |
CViT: A Convolution Vision Transformer for Video Abnormal Behavior Detection and Localization
|
Roka, Sanjay |
|
|
4 |
6 |
|
article |
75 |
DeePLS: Personalize Lighting in Smart Home by Human Detection, Recognition, and Tracking
|
Sobhani, Ali |
|
|
4 |
6 |
|
article |
76 |
Design and Development of Novel Refresh Technique for Gain Cell Embedded DRAM
|
Shravan, Chintam |
|
|
4 |
6 |
|
article |
77 |
Design and Implementation of an Efficient Sierpinski Carpet Fractal Antenna for 2.45 GHZ Applications
|
Kalaiyarasan, R. |
|
|
4 |
6 |
|
article |
78 |
Design and Optimization of Feedback Controllers for Motion Control in the Manufacturing System for Digital Twin
|
Ramesh, P. S. |
|
|
4 |
6 |
|
article |
79 |
Designing a Data Quality Management Framework for CRM Platform Delivery and Consultancy
|
Albrecht, Renee |
|
|
4 |
6 |
|
article |
80 |
Design of Machine Learning Approach Based Characterization of HRV Dynamics During Meditation Using Multi-domain HRV Features
|
Chitkara, Mansi |
|
|
4 |
6 |
|
article |
81 |
Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing
|
Radha, S. |
|
|
4 |
6 |
|
article |
82 |
Development of an Ontology-Based Technique for Labeling Land Cover Classes with Minimum Utilization of SAR Features
|
Gupta, Shruti |
|
|
4 |
6 |
|
article |
83 |
Digital Forensics Analysis of a Vehicle Tracking System
|
Amala, R. |
|
|
4 |
6 |
|
article |
84 |
Digital Organizational Culture: A Qualitative Study on the Identification and Impact of the Characteristics of a Digital Culture in the Craft Sector
|
Kocak, Seyma |
|
|
4 |
6 |
|
article |
85 |
Discovering Rules for Rule-Based Machine Learning with the Help of Novelty Search
|
Heider, Michael |
|
|
4 |
6 |
|
article |
86 |
Domain-Checker: A Classification of Malicious and Benign Domains Using Multitier Filtering
|
Bhadauria, Abhay Pratap Singh |
|
|
4 |
6 |
|
article |
87 |
Effective Tools and Technologies for IoT and Blockchain-Based Remote Patient Monitoring: A Comparative Analysis
|
Shilpi, Garg |
|
|
4 |
6 |
|
article |
88 |
Efficient Neuroimaging Data Security and Encryption Using Pixel-Based Homomorphic Residue Number System
|
Usman, Lateef Opeyemi |
|
|
4 |
6 |
|
article |
89 |
Energy–QoS-Aware Data Communication and Optimal Path Selection in Software-Defined Networks Using EOMBA and IBSO
|
Mahantesh, H. M. |
|
|
4 |
6 |
|
article |
90 |
Engineering the Human Mind: Social Engineering Attack Using Kali Linux
|
James, Joy Winston |
|
|
4 |
6 |
|
article |
91 |
Enhancing Big Data Conversion Validation with Alpha-Lightweight Coreset
|
Hoang, Nguyen Le |
|
|
4 |
6 |
|
article |
92 |
Enhancing Intrusion Detection System Performance to Detect Attacks on Edge of Things
|
Kumar, Vipin |
|
|
4 |
6 |
|
article |
93 |
Enhancing Land Use Identification Through Fusion of Densenet121 DCNN and Thepade SBTC Features Using Machine Learning Algorithms and Ensembles
|
Thepade, Sudeep D. |
|
|
4 |
6 |
|
article |
94 |
Enhancing the Efficiency of Solar Energy Harvesting System for Wireless Sensor Network Nodes
|
Dandime, Gopal M. |
|
|
4 |
6 |
|
article |
95 |
Entropy-Based Automation Detection on Twitter Using DNA Profiling
|
Gilmary, Rosario |
|
|
4 |
6 |
|
article |
96 |
Eye Disease Detection Through Image Classification Using Federated Learning
|
Kaushal, Vishal |
|
|
4 |
6 |
|
article |
97 |
Fake News Detection Using Hybrid Deep Learning Method
|
Yadav, Arun Kumar |
|
|
4 |
6 |
|
article |
98 |
Fog Computing Complete Review: Concepts, Trends, Architectures, Technologies, Simulators, Security Issues, Applications, and Open Research Fields
|
Ahammad, Ishtiaq |
|
|
4 |
6 |
|
article |
99 |
Formalstyler: GPT-Based Model for Formal Style Transfer with Meaning Preservation
|
de Rivero, Mariano |
|
|
4 |
6 |
|
article |
100 |
Fuzzy Deep Learning Model for Prediction of Conformational Epitope
|
Singh, Chhaya |
|
|
4 |
6 |
|
article |
101 |
Glaucoma Classification Using Enhanced Deep Transfer Learning Models with Hybrid ROI Cropped Optic Disc Technique
|
Singh, Piyush Bhushan |
|
|
4 |
6 |
|
article |
102 |
HiTACoD: Hierarchical Framework for Textual Abusive Content Detection
|
Gashroo, Ovais Bashir |
|
|
4 |
6 |
|
article |
103 |
Human Activity Behavioural Pattern Recognition in Smart Home with Long-Hour Data Collection
|
Kolkar, Ranjit |
|
|
4 |
6 |
|
article |
104 |
IAN-BERT: Combining Post-trained BERT with Interactive Attention Network for Aspect-Based Sentiment Analysis
|
Verma, Sharad |
|
|
4 |
6 |
|
article |
105 |
Implementation of TCAM Controller Enabled CDMA Network on Chip Router for High-Speed 5G Communications
|
Renuka, G. |
|
|
4 |
6 |
|
article |
106 |
Improved Software Fault Prediction Model Based on Optimal Features Set and Threshold Values Using Metaheuristic Approach
|
Singh, Manpreet |
|
|
4 |
6 |
|
article |
107 |
Improving Performance of Intrusion Detection Using ALO Selected Features and GRU Network
|
Sundaram, Karthic |
|
|
4 |
6 |
|
article |
108 |
Integrating a Rule-Based Approach to Malware Detection with an LSTM-Based Feature Selection Technique
|
Bhardwaj, Sonam |
|
|
4 |
6 |
|
article |
109 |
Intelligent Power and Cost Management System in Small-Scale Grid-Associated PV-Wind Energy System Using RNN-LSTM
|
Kothai Andal, C. |
|
|
4 |
6 |
|
article |
110 |
Intrusion Detection and Prevention in OpenStack: A Case Study on Enhancing Security and Threat Detection
|
Adiwal, Sanjay |
|
|
4 |
6 |
|
article |
111 |
IoT-Enabled Smart Solar Energy Management System for Enhancing Smart Grid Power Quality and Reliability
|
Shahed, Md. Tanvir |
|
|
4 |
6 |
|
article |
112 |
Irıs Predıctıon Usıng L1-Norm-Based Convolutıonal Network Model Convolutıonal Network Model
|
Ramana, N. Venkata |
|
|
4 |
6 |
|
article |
113 |
Isochronous Temporal Metric for Neighbourhood Analysis in Classification Tasks
|
Kumar, Amit Krishan |
|
|
4 |
6 |
|
article |
114 |
JMCD Dataset for Brain Tumor Detection and Analysis Using Explainable Deep Learning
|
Verma, Aryan |
|
|
4 |
6 |
|
article |
115 |
Keep It Simple: Evaluating Local Search-Based Latent Space Editing
|
Meißner, Andreas |
|
|
4 |
6 |
|
article |
116 |
LightGBM: Next Point of Interest Location Prediction Using Ensemble Machine Learning
|
NarendraBabu, C. R. |
|
|
4 |
6 |
|
article |
117 |
Low Dose CT Image Reconstruction Using Deep Convolutional Residual Learning Network
|
Ramanathan, Shalini |
|
|
4 |
6 |
|
article |
118 |
Machine Learning Based Approach for User Story Clustering in Agile Engineering
|
Kumar, Bhawnesh |
|
|
4 |
6 |
|
article |
119 |
Machine Learning-Based Automatic Text Summarization Techniques
|
Radhakrishnan, P. |
|
|
4 |
6 |
|
article |
120 |
Machine-Learning-Based Spam Mail Detector
|
Charanarur, Panem |
|
|
4 |
6 |
|
article |
121 |
Mental Health Monitoring Using Deep Learning Technique for Early-Stage Depression Detection
|
Singh, Khushboo |
|
|
4 |
6 |
|
article |
122 |
Methods to Authenticate Luxury Products: Identifying Key Features and Most Recognized Deficits
|
Zimmermann, Robert |
|
|
4 |
6 |
|
article |
123 |
ML-KFHE: Multi-label Ensemble Classification Algorithm Exploiting Sensor Fusion Properties of the Kalman Filter
|
Pakrashi, Arjun |
|
|
4 |
6 |
|
article |
124 |
MLOps Challenges in Industry 4.0
|
Faubel, Leonhard |
|
|
4 |
6 |
|
article |
125 |
Multiple Teacher Knowledge Distillation for Head Pose Estimation Without Keypoints
|
Thai, Chien |
|
|
4 |
6 |
|
article |
126 |
Multi-step Ahead Urban Water Demand Forecasting Using Deep Learning Models
|
Sahoo, Bibhuti Bhusan |
|
|
4 |
6 |
|
article |
127 |
Neural Network-Based Human Motion Predictor and Smoother
|
Graßhof, Stella |
|
|
4 |
6 |
|
article |
128 |
New ECC-Based IoT Authentication Protocol for Securing RFID Systems
|
Timouhin, Hind |
|
|
4 |
6 |
|
article |
129 |
Novel Automatic Approach Using Modified Differential Evaluation to Software Module Clustering Problem
|
Gupta, Neetu |
|
|
4 |
6 |
|
article |
130 |
Opinion Mining Using Optimized K-Means Algorithm and a Word Weighting Technique
|
Poomagal, S. |
|
|
4 |
6 |
|
article |
131 |
Optimal Cloudlet Selection in Edge Computing for Resource Allocation
|
Kumar, Bablu |
|
|
4 |
6 |
|
article |
132 |
Optimized Prediction Framework for Improving Cost Effectiveness of the Software Defined Network
|
Shivakeshi, Choupiri |
|
|
4 |
6 |
|
article |
133 |
Optimized Residual Parallel Separable Convolution Layers for Pest Classification
|
Vedhamuru, Naresh |
|
|
4 |
6 |
|
article |
134 |
Optimizing Deep Learning Networks for Edge Devices with an Instance of Skin Cancer and Corn Leaf Disease Dataset
|
Sharmila, B. S. |
|
|
4 |
6 |
|
article |
135 |
Optimizing Dynamic Ride Sharing with Multiple Objectives
|
Chakma, Samar Bijoy |
|
|
4 |
6 |
|
article |
136 |
Panthera Leo Optimized Multilayer Feed Forward Learning-Based Intrusion Detection Model for Cloud
|
Kalaivani, M. |
|
|
4 |
6 |
|
article |
137 |
Parts of Speech Tagged Phrase-Based Statistical Machine Translation System for English → Mizo Language
|
Devi, Chanambam Sveta |
|
|
4 |
6 |
|
article |
138 |
Patterns of User Behavior and Token Adoption on ERC20
|
Morales, Alfredo J. |
|
|
4 |
6 |
|
article |
139 |
Physical Feature-Based Machine Learning Algorithm to Differentiate Sri Lankan Music Based on Their Foreign Influence
|
Premasiri, L. D. M. |
|
|
4 |
6 |
|
article |
140 |
Plant Leaf Disease Classification Using Optimal Tuned Hybrid LSTM-CNN Model
|
Patil, Manoj A. |
|
|
4 |
6 |
|
article |
141 |
Plutchik Wheel of Emotion and Machine Learning-Based Hybrid Sentiment Analysis for the Hindi Language with Minimum Dependency on High Computation Resources
|
Kumar, Pravin |
|
|
4 |
6 |
|
article |
142 |
Predicting Renal Toxicity of Compounds with Deep Learning and Machine Learning Methods
|
Mazumdar, Bitopan |
|
|
4 |
6 |
|
article |
143 |
Public Social Distance Monitoring System Using Object Detection YOLO Deep Learning Algorithm
|
R, Vijayan |
|
|
4 |
6 |
|
article |
144 |
Quality of Service (QoS) Enhancement of IoT WSNs Using an Efficient Hybrid Protocol for Data Aggregation and Routing
|
Chandnani, Neeraj |
|
|
4 |
6 |
|
article |
145 |
Region Centric Multi Feature Growth Analysis Model for Efficient Plant Selection and Recommendation
|
Bommi, K. |
|
|
4 |
6 |
|
article |
146 |
Relation Extraction: Hypernymy Discovery Using a Novel Pattern Learning Algorithm
|
Pinto, Olan |
|
|
4 |
6 |
|
article |
147 |
Research on Distributed Machine Learning Model for Predicting Users’ Interest by Acquired Web Contents Similarity
|
Tsuchiya, Takeshi |
|
|
4 |
6 |
|
article |
148 |
Retraction Note: A Novel Framework in Software Engineering for Deep Learning
|
Lin, Tao |
|
|
4 |
6 |
|
article |
149 |
Reviewing Image Data: Detecting Forgery Using a Robust Forensic Method
|
Mishra, Manuj |
|
|
4 |
6 |
|
article |
150 |
RGF-Bot: A Novel Feature Selection Method to Identify Malicious Bot Accounts on Social Networking Sites Using Machine Learning
|
Chanti, S. |
|
|
4 |
6 |
|
article |
151 |
Secure Cloud Data Access: Unifying Quantum Key Distribution and Attribute-Based Encryption for Enhanced Data Protection
|
Kumar, Ashutosh |
|
|
4 |
6 |
|
article |
152 |
Secure Communication Using Multi-Layer Perceptron Neural Network and the Adaptive-Network-Based Fuzzy Inference System in Wireless Network
|
Kamala, J. |
|
|
4 |
6 |
|
article |
153 |
Sentinel-2 Data for Land Use/Land Cover Mapping: A Meta-analysis and Review
|
Kumari, Annu |
|
|
4 |
6 |
|
article |
154 |
SMAN2: Soft-Max Multilayer Adversarial Neural Network-Based Cross-Project Software Defect Prediction
|
Ruckmani, V. |
|
|
4 |
6 |
|
article |
155 |
Speed Control of PMSM Using Modified Particle Swarm Optimization Technique Based on Inertia Weight Updating Mechanism
|
Gandhi, Raja |
|
|
4 |
6 |
|
article |
156 |
Surface Object Detection Algorithm of Lightweight Steel Rolling Based on Machine Vision
|
Zhong, Zhifeng |
|
|
4 |
6 |
|
article |
157 |
Sustainable Short-Term Production Planning Optimization
|
Zanella, Fernando |
|
|
4 |
6 |
|
article |
158 |
Taguchi Design for Setting EHO Variants Parameters: Application in Brain Image Segmentation Using HMRF
|
Mahiou, Ramdane |
|
|
4 |
6 |
|
article |
159 |
Threat Modeling and Assessment Methods in the Healthcare-IT System: A Critical Review and Systematic Evaluation
|
Aijaz, Mohammad |
|
|
4 |
6 |
|
article |
160 |
To Wrap, or Not to Wrap: Examining the Distinctions Between Model Implementations of Face Recognition on Mobile Devices in an Automatic Attendance System
|
Tran, Trung-Dung |
|
|
4 |
6 |
|
article |
161 |
User Authentication and Identification on Smart Glasses with Motion Sensors
|
Agac, Sumeyye |
|
|
4 |
6 |
|
article |
162 |
Vision-Based Multilingual Sign Language Translation
|
Ghotkar, Archana |
|
|
4 |
6 |
|
article |
163 |
Visual Representation for Patterned Proliferation of Social Media Addiction: Quantitative Model and Network Analysis
|
Mallick, Dibyajyoti |
|
|
4 |
6 |
|
article |
164 |
ViT: Quantifying Chest X-Ray Images Using Vision Transformer & XAI Technique
|
Salini, Yalamanchili |
|
|
4 |
6 |
|
article |
165 |
Word Association Thematic Analysis: Insight Discovery from the Social Web
|
Thelwall, Mike |
|
|
4 |
6 |
|
article |