This document summarizes 17 research papers published in volume 12, issue 4 of the International Journal of Computer Science and Information Technology. The papers cover a range of topics related to computer science and information technology, including IoT applications in banking, cyber situational awareness, digital marketing opportunities in Bangladesh, and using fashion-driven textiles for stakeholder capitalism. The document lists the paper title, authors, and source for each of the 17 papers.
Book of abstract volume 8 no 9 ijcsis december 2010Oladokun Sulaiman
The International Journal of Computer Science and Information Security (IJCSIS) is a publication venue for novel research in computer science and information security. This issue from December 2010 contains 5 research papers. The first paper proposes a 128-bit chaotic hash function that uses the logistic map and MD5/SHA-1 hashes. The second paper discusses constructing an ontology for representing human emotions in videos to improve video retrieval. The third paper proposes an intelligent memory controller for H.264 encoders to reduce external memory access. The fourth paper investigates the impact of fragmentation on query performance in distributed databases. The fifth paper examines the effect of guard intervals in a proposed MIMO-OFDM system for wireless communication.
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...aciijournal
Advanced Computational Intelligence: An International Journal (ACII) is a quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of computational intelligence. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced computational intelligence concepts and establishing new collaborations in these areas.
IJCNC Top 10 Trending Articles in Academia !!!IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAijsptm
DNA Cryptography is a new born cryptographic field emerged with the research of DNA Computing in which DNA is used as an Information carrier. Cellular automata is dynamic in nature so it provide dynamic behavior in the system which may increase the security in the system. DNA cryptography is
provide a secure way to encrypt the text and automata changes the state of the system based on the present
state, it will occur in discrete time. These qualities are most impressive in these techonology which help us to provide a highly secured security system for the users. Most of the encryption techniques based on the cellular automata have limitations. To overcome this lacuna, we propose a novel DNA cryptography algorithm with cellular automata to achieve randomness, parallelism, uniformity, reversibility and stable.
An algorithm implemented and its results obtained are depicts here, and a result analysis is done with other algorithms.
This document summarizes an article that proposes a novel approach called NOFITC (Near Real Time Online Flow-based Internet Traffic Classification) for online network traffic classification using machine learning. The approach customizes an open source C4.5 algorithm to work for online classification of NetFlow data in real-time. It evaluates the accuracy and processing time of the approach by comparing its performance to Weka's C4.5 implementation and a packet sniffing program on collected network traffic data. The results show that the accuracy is identical to C4.5 and it can classify NetFlow packets with no packet loss due to parallel processing, demonstrating it can perform online traffic classification in real-time.
Data mining with human genetics to enhance gene based algorithm andIAEME Publication
This document summarizes a research study on enhancing DNA database security through data mining techniques. The study aims to understand relationships between DNA sequences and disease risk, and develop improved parental identification algorithms. Data mining is used to analyze large DNA datasets and extract patterns. Security methods like encryption algorithms are also applied to DNA databases to protect the data. The study examines using data mining, visualization, parallel processing and high-performance computing for DNA sequence analysis while enhancing security. The goal is to discover knowledge from DNA databases and securely store citizen identity data to prevent fraud.
A Novel Technique for Name Identification from Homeopathy Diagnosis Discussio...home
Named entities are the most informative element of a textual document and identification of the names is very much
important for extracting further information from text. We have developed a conditional random field based system to
identify the named entities from homeopathic diagnosis discussion forum text. We have manually annotated a training
corpus for the task. As manual creation of a sufficiently large annotated corpus is costly and time consuming, we use an
active learning based semi-supervised framework to increase the efficiency of the system with the help of un-annotated
data. Our system achieves the highest f-value of
Book of abstract volume 8 no 9 ijcsis december 2010Oladokun Sulaiman
The International Journal of Computer Science and Information Security (IJCSIS) is a publication venue for novel research in computer science and information security. This issue from December 2010 contains 5 research papers. The first paper proposes a 128-bit chaotic hash function that uses the logistic map and MD5/SHA-1 hashes. The second paper discusses constructing an ontology for representing human emotions in videos to improve video retrieval. The third paper proposes an intelligent memory controller for H.264 encoders to reduce external memory access. The fourth paper investigates the impact of fragmentation on query performance in distributed databases. The fifth paper examines the effect of guard intervals in a proposed MIMO-OFDM system for wireless communication.
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...aciijournal
Advanced Computational Intelligence: An International Journal (ACII) is a quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of computational intelligence. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced computational intelligence concepts and establishing new collaborations in these areas.
IJCNC Top 10 Trending Articles in Academia !!!IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAijsptm
DNA Cryptography is a new born cryptographic field emerged with the research of DNA Computing in which DNA is used as an Information carrier. Cellular automata is dynamic in nature so it provide dynamic behavior in the system which may increase the security in the system. DNA cryptography is
provide a secure way to encrypt the text and automata changes the state of the system based on the present
state, it will occur in discrete time. These qualities are most impressive in these techonology which help us to provide a highly secured security system for the users. Most of the encryption techniques based on the cellular automata have limitations. To overcome this lacuna, we propose a novel DNA cryptography algorithm with cellular automata to achieve randomness, parallelism, uniformity, reversibility and stable.
An algorithm implemented and its results obtained are depicts here, and a result analysis is done with other algorithms.
This document summarizes an article that proposes a novel approach called NOFITC (Near Real Time Online Flow-based Internet Traffic Classification) for online network traffic classification using machine learning. The approach customizes an open source C4.5 algorithm to work for online classification of NetFlow data in real-time. It evaluates the accuracy and processing time of the approach by comparing its performance to Weka's C4.5 implementation and a packet sniffing program on collected network traffic data. The results show that the accuracy is identical to C4.5 and it can classify NetFlow packets with no packet loss due to parallel processing, demonstrating it can perform online traffic classification in real-time.
Data mining with human genetics to enhance gene based algorithm andIAEME Publication
This document summarizes a research study on enhancing DNA database security through data mining techniques. The study aims to understand relationships between DNA sequences and disease risk, and develop improved parental identification algorithms. Data mining is used to analyze large DNA datasets and extract patterns. Security methods like encryption algorithms are also applied to DNA databases to protect the data. The study examines using data mining, visualization, parallel processing and high-performance computing for DNA sequence analysis while enhancing security. The goal is to discover knowledge from DNA databases and securely store citizen identity data to prevent fraud.
A Novel Technique for Name Identification from Homeopathy Diagnosis Discussio...home
Named entities are the most informative element of a textual document and identification of the names is very much
important for extracting further information from text. We have developed a conditional random field based system to
identify the named entities from homeopathic diagnosis discussion forum text. We have manually annotated a training
corpus for the task. As manual creation of a sufficiently large annotated corpus is costly and time consuming, we use an
active learning based semi-supervised framework to increase the efficiency of the system with the help of un-annotated
data. Our system achieves the highest f-value of
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing.
June 2020: Top Read Articles in Advanced Computational Intelligenceaciijournal
Advanced Computational Intelligence: An International Journal (ACII) is a quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of computational intelligence. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced computational intelligence concepts and establishing new collaborations in these areas.
New Research Articles 2020 June Issue International Journal on Cryptography a...ijcisjournal
International Journal on Cryptography and Information Security ( IJCIS)
ISSN : 1839-8626
https://wireilla.com/ijcis/index.html
New Research Articles 2020 June Issue International Journal on Cryptography and Information Security (IJCIS)
Selective Encryption of Image by Number Maze Technique
Santosh Mutnuru, Sweeti Kumari Sah and S. Y Pavan Kumar, Eastern Michigan University, USA
Towards A Deeper NTRU Analysis: A Multi Modal Analysis
Chuck Easttom1, Anas Ibrahim2, Alexander Chefranov3, Izzat Alsmadi4 and Richard Hansen5, 1Adjunct Georgetown University and University of Dallas, 2&3Eastern Mediterranean University, 4Texas A&M University, 5Capitol Technology University
https://wireilla.com/ijcis/vol10.html
On the large scale of studying dynamics with MEG: Lessons learned from the Hu...Robert Oostenveld
As part of the Human Connectome Project (HCP), which includes high-quality fMRI, anatomical MRI, DTi and genetic data from 1200 subjects, we have scanned and investigated a subset of 100 subjects (mostly comprised of pairs of twins) using MEG. The raw data acquired in the HCP has been analyzed using standard pipelines [ref1] and both raw and results at various levels of processing have been shared though the ConnectomeDB [ref2].
Throughout the process of the HCP we have not only analyzed (resting state) MEG data, but also have developed the data analysis protocols, the software and the strategies to achieve reproducible MEG connectivity results. The MEG data analysis software is based on FieldTrip, an open source toolbox [ref3], and is shared alongside the data to allow the analyses to be repeated on independent data.
In this presentation I will outline what the HCP MEG team has learned along the way and I will provide recommendations on what to do and what to avoid in making MEG studies on (resting state) connectivity more reproducible.
1. Larson-Prior LJ, Oostenveld R, Della Penna S, Michalareas G, Prior F, Babajani-Feremi A, Schoffelen JM, Marzetti L, de Pasquale F, Di Pompeo F, Stout J, Woolrich M, Luo Q, Bucholz R, Fries P, Pizzella V, Romani GL, Corbetta M, Snyder AZ; WU-Minn HCP Consortium. Adding dynamics to the Human Connectome Project with MEG. Neuroimage, 2013.
doi:10.1016/j.neuroimage.2013.05.056
2. Hodge MR, Horton W, Brown T, Herrick R, Olsen T, Hileman ME, McKay M, Archie KA, Cler E, Harms MP, Burgess GC, Glasser MF, Elam JS, Curtiss SW, Barch DM, Oostenveld R, Larson-Prior LJ, Ugurbil K, Van Essen DC, Marcus DS. ConnectomeDB-Sharing human brain connectivity data. Neuroimage, 2016. doi:10.1016/j.neuroimage.2015.04.046
3. Oostenveld R, Fries P, Maris E, Schoffelen JM. FieldTrip: Open Source Software for Advanced Analysis of MEG, EEG, and Invasive Electrophysiological Data. Comput Intell Neurosci. 2011. doi:10.1155/2011/156869
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Prediction of Student's Performance with Deep Neural NetworksCSCJournals
The performance of education has a big part in people's life. The prediction of student's performance in advance is very important issue for education. School administrators and students' parents impact on students' performance. Hence, academic researchers have developed different types of models to improve student performance. The main goal to reveal of this study is to search the best model of neural network models for the prediction of the performance of the high school students. For this purpose, five different types of neural network models have been developed and compared to their results. The data set obtained from Taldykorgan Kazakh Turkish High School (in Kazakhstan) students was used. Test results show that proposed two types of neural network model are predicted students' real performance efficiently and provided better accuracy when the test of today’s and future’s samples have similar characteristics.
This document is a newsletter from the Malaysian Society for Computed Tomography and Imaging Technology (MyCT) providing updates on recent events and the society's upcoming events. It discusses MyCT becoming a legally registered organization, the society's role in knowledge sharing and promoting the field. It also summarizes a regional training course hosted by IAEA on industrial computed tomography and announces the society's next board meeting and seminar to be held at Universiti Teknologi Petronas in May 2013.
This document provides a detailed bio-data of Prof. K. Deergha Rao including his educational background, teaching and research experience, publications, projects, awards and other professional details. Some key points:
- Prof. Rao received his B.E., M.E. and Ph.D. from institutions in India and conducted postdoctoral research at Concordia University, Canada.
- He has over 30 years of teaching experience and has guided over 25 M.E. students and 3 Ph.D. students.
- His research interests include wireless communications, signal processing and VLSI. He has over 100 publications in international and national journals and conferences.
- Prof. R
This document summarizes a book and 28 journal articles and conference papers authored or co-authored by C.G. Dethe. It includes the following key information:
- A book on performance evaluation of intelligent WLAN systems in multipath fading environments.
- 28 journal articles published in various international journals between 2009-2012 related to topics like UWB antenna design, resource allocation in MC-CDMA, medical image analysis, and video processing.
- 22 papers presented at international conferences between 2003-2013 on similar topics as the journal articles.
- 7 papers presented at national conferences in India between 2009-2014 related to wireless sensor networks, network traffic analysis, and intelligent transportation systems.
AN APPROACH FOR IRIS PLANT CLASSIFICATION USING NEURAL NETWORKijsc
Classification is a machine learning technique used to predict group membership for data instances. To simplify the problem of classification neural networks are being introduced. This paper focuses on IRIS plant classification using Neural Network. The problem concerns the identification of IRIS plant species on
the basis of plant attribute measurements. Classification of IRIS data set would be discovering patterns from examining petal and sepal size of the IRIS plant and how the prediction was made from analyzing the pattern to form the class of IRIS plant. By using this pattern and classification, in future upcoming years
the unknown data can be predicted more precisely. Artificial neural networks have been successfully applied to problems in pattern classification, function approximations, optimization, and associative memories. In this work, Multilayer feed- forward networks are trained using back propagation learning
algorithm.
New Research Articles 2019 October Issue Signal & Image Processing An Interna...sipij
Signal & Image Processing: An International Journal (SIPIJ)
ISSN: 0976 – 710X [Online]; 2229 - 3922 [Print]
http://www.airccse.org/journal/sipij/index.html
Current Issue; October 2019, Volume 10, Number 5
Free- Reference Image Quality Assessment Framework Using Metrics Fusion and Dimensionality Reduction
Besma Sadou1, Atidel Lahoulou2, Toufik Bouden1, Anderson R. Avila3, Tiago H. Falk3 and Zahid Akhtar4, 1Non Destructive Testing Laboratory, University of Jijel, Algeria, 2LAOTI laboratory, University of Jijel, Algeria, 3University of Québec, Canada and 4University of Memphis, USA
Test-cost-sensitive Convolutional Neural Networks with Expert Branches
Mahdi Naghibi1, Reza Anvari1, Ali Forghani1 and Behrouz Minaei2, 1Malek-Ashtar University of Technology, Iran and 2Iran University of Science and Technology, Iran
Robust Image Watermarking Method using Wavelet Transform
Omar Adwan, The University of Jordan, Jordan
Improvements of the Analysis of Human Activity Using Acceleration Record of Electrocardiographs
Itaru Kaneko1, Yutaka Yoshida2 and Emi Yuda3, 1&2Nagoya City University, Japan and 3Tohoku University, Japan
http://www.airccse.org/journal/sipij/vol10.html
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Prasanna Raut is a postdoctoral research associate at National Sun Yat-sen University in Taiwan. He received his Ph.D. in Electronics and Communication Engineering from Visvesvaraya National Institute of Technology in India. His research focuses on ultra-reliable low-latency communication, UAV communications, and machine learning applications for wireless communications. He has published several journal and conference papers in these areas and received grants from the Government of India and Ministry of EIT.
Soft computing is likely to play an important role in science and engineering in the future. The successful applications of soft computing and the rapid growth suggest that the impact of soft computing will be felt increasingly in coming years. Soft Computing encourages the integration of soft computing techniques and tools into both everyday and advanced applications. This Open access peer-reviewed journal serves as a platform that fosters new applications for all scientists and engineers engaged in research and development in this fast growing field.
Face recognition for presence system by using residual networks-50 architectu...IJECEIAES
Presence system is a system for recording the individual attendance in the company, school or institution. There are several types presence system, including the manually presence system using signatures, presence system using fingerprints and presence system using face recognition technology. Presence system using face recognition technology is one of presence system that implements biometric system in the process of recording attendance. In this research we used one of the convolutional neural network (CNN) architectures that won the imagenet large scale visual recognition competition (ILSVRC) in 2015, namely the Residual Networks-50 architecture (ResNet-50) for face recognition. Our contribution in this research is to determine effectiveness ResNet architecture with different configuration of hyperparameters. This hyperparameters includes the number of hidden layers, the number of units in the hidden layer, batch size, and learning rate. Because hyperparameter are selected based on how the experiments performed and the value of each hyperparameter affects the final result accuracy, so we try 22 configurations (experiments) to get the best accuracy. We conducted experiments to get the best model with an accuracy of 99%.
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
This document summarizes a research paper that proposes using principal component analysis and sequential hypothesis testing in a game theory framework to detect intrusions in a mobile ad hoc network. Specifically, it detects replica node attacks by tracking features like source/destination addresses and routing requests/replies to build profiles for each node. It then applies sequential probability ratio testing on routing requests and replies to test hypotheses about whether nodes are normal or abnormal. A two-player game model is also used to identify the optimal attack and defense strategies between an attacker and defender. Simulation results show that the approach can decrease the number of claims needed for detection while minimizing false positives and negatives.
Ravi Tandon is applying for a PhD in computer science at Princeton University. His research interests include developing technologies that enhance human understanding through seamless integration. As an undergraduate, he worked on resolving energy deficiencies in wireless sensor networks and developing transaction support in file systems. Some of his projects include designing an energy efficient clustering scheme for sensor networks, developing a stochastic model for predicting optimal cluster heads, and implementing transaction support on a flash file system. He hopes to continue research in areas like ubiquitous computing and sensor networks at Princeton.
International Journal of Network Security & Its Applications (IJNSA) - Curren...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Speech recognition techniques are one of the most important modern technologies. Many different systems have been developed in terms of methods used in the extraction of features and methods of classification. Voice recognition includes two areas: speech recognition and speaker recognition, where the research is confined to the field of speech recognition. The research presents a proposal to improve the performance of single word recognition systems by an algorithm that combines more than one of the techniques used in character extraction and modulation of the neural network to study the effects of recognition science and study the effect of noise on the proposed system. In this research four systems of speech recognition were studied, the first system adopted the MFCC algorithm to extract the features. The second system adopted the PLP algorithm, while the third system was based on combining the two previous algorithms in addition to the zero-passing rate. In the fourth system, the neural network used in the differentiation process was modified and the error ratio was determined. The impact of noise on these previous systems. The outcomes were looked at regarding the rate of recognizable proof and the season of preparing the neural network for every system independently, to get a rate of distinguishing proof and quiet up to 98% utilizing the proposed framework.
SPEECH RECOGNITION BY IMPROVING THE PERFORMANCE OF ALGORITHMS USED IN DISCRIM...ijcsit
This document discusses improving speech recognition performance through algorithms used for feature extraction and classification. It examines 4 systems: 1) MFCC extraction, 2) PLP extraction, 3) combining MFCC, PLP and zero-crossing rate, 4) modifying the neural network. System 3 achieved the highest recognition rate of 98% even with noise, outperforming the individual algorithms. Increasing the training samples to 500 further improved recognition ratio.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Current Issue - January 2022, Volume 14, Number 1 - International Journal of ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing.
June 2020: Top Read Articles in Advanced Computational Intelligenceaciijournal
Advanced Computational Intelligence: An International Journal (ACII) is a quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of computational intelligence. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced computational intelligence concepts and establishing new collaborations in these areas.
New Research Articles 2020 June Issue International Journal on Cryptography a...ijcisjournal
International Journal on Cryptography and Information Security ( IJCIS)
ISSN : 1839-8626
https://wireilla.com/ijcis/index.html
New Research Articles 2020 June Issue International Journal on Cryptography and Information Security (IJCIS)
Selective Encryption of Image by Number Maze Technique
Santosh Mutnuru, Sweeti Kumari Sah and S. Y Pavan Kumar, Eastern Michigan University, USA
Towards A Deeper NTRU Analysis: A Multi Modal Analysis
Chuck Easttom1, Anas Ibrahim2, Alexander Chefranov3, Izzat Alsmadi4 and Richard Hansen5, 1Adjunct Georgetown University and University of Dallas, 2&3Eastern Mediterranean University, 4Texas A&M University, 5Capitol Technology University
https://wireilla.com/ijcis/vol10.html
On the large scale of studying dynamics with MEG: Lessons learned from the Hu...Robert Oostenveld
As part of the Human Connectome Project (HCP), which includes high-quality fMRI, anatomical MRI, DTi and genetic data from 1200 subjects, we have scanned and investigated a subset of 100 subjects (mostly comprised of pairs of twins) using MEG. The raw data acquired in the HCP has been analyzed using standard pipelines [ref1] and both raw and results at various levels of processing have been shared though the ConnectomeDB [ref2].
Throughout the process of the HCP we have not only analyzed (resting state) MEG data, but also have developed the data analysis protocols, the software and the strategies to achieve reproducible MEG connectivity results. The MEG data analysis software is based on FieldTrip, an open source toolbox [ref3], and is shared alongside the data to allow the analyses to be repeated on independent data.
In this presentation I will outline what the HCP MEG team has learned along the way and I will provide recommendations on what to do and what to avoid in making MEG studies on (resting state) connectivity more reproducible.
1. Larson-Prior LJ, Oostenveld R, Della Penna S, Michalareas G, Prior F, Babajani-Feremi A, Schoffelen JM, Marzetti L, de Pasquale F, Di Pompeo F, Stout J, Woolrich M, Luo Q, Bucholz R, Fries P, Pizzella V, Romani GL, Corbetta M, Snyder AZ; WU-Minn HCP Consortium. Adding dynamics to the Human Connectome Project with MEG. Neuroimage, 2013.
doi:10.1016/j.neuroimage.2013.05.056
2. Hodge MR, Horton W, Brown T, Herrick R, Olsen T, Hileman ME, McKay M, Archie KA, Cler E, Harms MP, Burgess GC, Glasser MF, Elam JS, Curtiss SW, Barch DM, Oostenveld R, Larson-Prior LJ, Ugurbil K, Van Essen DC, Marcus DS. ConnectomeDB-Sharing human brain connectivity data. Neuroimage, 2016. doi:10.1016/j.neuroimage.2015.04.046
3. Oostenveld R, Fries P, Maris E, Schoffelen JM. FieldTrip: Open Source Software for Advanced Analysis of MEG, EEG, and Invasive Electrophysiological Data. Comput Intell Neurosci. 2011. doi:10.1155/2011/156869
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Prediction of Student's Performance with Deep Neural NetworksCSCJournals
The performance of education has a big part in people's life. The prediction of student's performance in advance is very important issue for education. School administrators and students' parents impact on students' performance. Hence, academic researchers have developed different types of models to improve student performance. The main goal to reveal of this study is to search the best model of neural network models for the prediction of the performance of the high school students. For this purpose, five different types of neural network models have been developed and compared to their results. The data set obtained from Taldykorgan Kazakh Turkish High School (in Kazakhstan) students was used. Test results show that proposed two types of neural network model are predicted students' real performance efficiently and provided better accuracy when the test of today’s and future’s samples have similar characteristics.
This document is a newsletter from the Malaysian Society for Computed Tomography and Imaging Technology (MyCT) providing updates on recent events and the society's upcoming events. It discusses MyCT becoming a legally registered organization, the society's role in knowledge sharing and promoting the field. It also summarizes a regional training course hosted by IAEA on industrial computed tomography and announces the society's next board meeting and seminar to be held at Universiti Teknologi Petronas in May 2013.
This document provides a detailed bio-data of Prof. K. Deergha Rao including his educational background, teaching and research experience, publications, projects, awards and other professional details. Some key points:
- Prof. Rao received his B.E., M.E. and Ph.D. from institutions in India and conducted postdoctoral research at Concordia University, Canada.
- He has over 30 years of teaching experience and has guided over 25 M.E. students and 3 Ph.D. students.
- His research interests include wireless communications, signal processing and VLSI. He has over 100 publications in international and national journals and conferences.
- Prof. R
This document summarizes a book and 28 journal articles and conference papers authored or co-authored by C.G. Dethe. It includes the following key information:
- A book on performance evaluation of intelligent WLAN systems in multipath fading environments.
- 28 journal articles published in various international journals between 2009-2012 related to topics like UWB antenna design, resource allocation in MC-CDMA, medical image analysis, and video processing.
- 22 papers presented at international conferences between 2003-2013 on similar topics as the journal articles.
- 7 papers presented at national conferences in India between 2009-2014 related to wireless sensor networks, network traffic analysis, and intelligent transportation systems.
AN APPROACH FOR IRIS PLANT CLASSIFICATION USING NEURAL NETWORKijsc
Classification is a machine learning technique used to predict group membership for data instances. To simplify the problem of classification neural networks are being introduced. This paper focuses on IRIS plant classification using Neural Network. The problem concerns the identification of IRIS plant species on
the basis of plant attribute measurements. Classification of IRIS data set would be discovering patterns from examining petal and sepal size of the IRIS plant and how the prediction was made from analyzing the pattern to form the class of IRIS plant. By using this pattern and classification, in future upcoming years
the unknown data can be predicted more precisely. Artificial neural networks have been successfully applied to problems in pattern classification, function approximations, optimization, and associative memories. In this work, Multilayer feed- forward networks are trained using back propagation learning
algorithm.
New Research Articles 2019 October Issue Signal & Image Processing An Interna...sipij
Signal & Image Processing: An International Journal (SIPIJ)
ISSN: 0976 – 710X [Online]; 2229 - 3922 [Print]
http://www.airccse.org/journal/sipij/index.html
Current Issue; October 2019, Volume 10, Number 5
Free- Reference Image Quality Assessment Framework Using Metrics Fusion and Dimensionality Reduction
Besma Sadou1, Atidel Lahoulou2, Toufik Bouden1, Anderson R. Avila3, Tiago H. Falk3 and Zahid Akhtar4, 1Non Destructive Testing Laboratory, University of Jijel, Algeria, 2LAOTI laboratory, University of Jijel, Algeria, 3University of Québec, Canada and 4University of Memphis, USA
Test-cost-sensitive Convolutional Neural Networks with Expert Branches
Mahdi Naghibi1, Reza Anvari1, Ali Forghani1 and Behrouz Minaei2, 1Malek-Ashtar University of Technology, Iran and 2Iran University of Science and Technology, Iran
Robust Image Watermarking Method using Wavelet Transform
Omar Adwan, The University of Jordan, Jordan
Improvements of the Analysis of Human Activity Using Acceleration Record of Electrocardiographs
Itaru Kaneko1, Yutaka Yoshida2 and Emi Yuda3, 1&2Nagoya City University, Japan and 3Tohoku University, Japan
http://www.airccse.org/journal/sipij/vol10.html
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Prasanna Raut is a postdoctoral research associate at National Sun Yat-sen University in Taiwan. He received his Ph.D. in Electronics and Communication Engineering from Visvesvaraya National Institute of Technology in India. His research focuses on ultra-reliable low-latency communication, UAV communications, and machine learning applications for wireless communications. He has published several journal and conference papers in these areas and received grants from the Government of India and Ministry of EIT.
Soft computing is likely to play an important role in science and engineering in the future. The successful applications of soft computing and the rapid growth suggest that the impact of soft computing will be felt increasingly in coming years. Soft Computing encourages the integration of soft computing techniques and tools into both everyday and advanced applications. This Open access peer-reviewed journal serves as a platform that fosters new applications for all scientists and engineers engaged in research and development in this fast growing field.
Face recognition for presence system by using residual networks-50 architectu...IJECEIAES
Presence system is a system for recording the individual attendance in the company, school or institution. There are several types presence system, including the manually presence system using signatures, presence system using fingerprints and presence system using face recognition technology. Presence system using face recognition technology is one of presence system that implements biometric system in the process of recording attendance. In this research we used one of the convolutional neural network (CNN) architectures that won the imagenet large scale visual recognition competition (ILSVRC) in 2015, namely the Residual Networks-50 architecture (ResNet-50) for face recognition. Our contribution in this research is to determine effectiveness ResNet architecture with different configuration of hyperparameters. This hyperparameters includes the number of hidden layers, the number of units in the hidden layer, batch size, and learning rate. Because hyperparameter are selected based on how the experiments performed and the value of each hyperparameter affects the final result accuracy, so we try 22 configurations (experiments) to get the best accuracy. We conducted experiments to get the best model with an accuracy of 99%.
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
This document summarizes a research paper that proposes using principal component analysis and sequential hypothesis testing in a game theory framework to detect intrusions in a mobile ad hoc network. Specifically, it detects replica node attacks by tracking features like source/destination addresses and routing requests/replies to build profiles for each node. It then applies sequential probability ratio testing on routing requests and replies to test hypotheses about whether nodes are normal or abnormal. A two-player game model is also used to identify the optimal attack and defense strategies between an attacker and defender. Simulation results show that the approach can decrease the number of claims needed for detection while minimizing false positives and negatives.
Ravi Tandon is applying for a PhD in computer science at Princeton University. His research interests include developing technologies that enhance human understanding through seamless integration. As an undergraduate, he worked on resolving energy deficiencies in wireless sensor networks and developing transaction support in file systems. Some of his projects include designing an energy efficient clustering scheme for sensor networks, developing a stochastic model for predicting optimal cluster heads, and implementing transaction support on a flash file system. He hopes to continue research in areas like ubiquitous computing and sensor networks at Princeton.
International Journal of Network Security & Its Applications (IJNSA) - Curren...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Speech recognition techniques are one of the most important modern technologies. Many different systems have been developed in terms of methods used in the extraction of features and methods of classification. Voice recognition includes two areas: speech recognition and speaker recognition, where the research is confined to the field of speech recognition. The research presents a proposal to improve the performance of single word recognition systems by an algorithm that combines more than one of the techniques used in character extraction and modulation of the neural network to study the effects of recognition science and study the effect of noise on the proposed system. In this research four systems of speech recognition were studied, the first system adopted the MFCC algorithm to extract the features. The second system adopted the PLP algorithm, while the third system was based on combining the two previous algorithms in addition to the zero-passing rate. In the fourth system, the neural network used in the differentiation process was modified and the error ratio was determined. The impact of noise on these previous systems. The outcomes were looked at regarding the rate of recognizable proof and the season of preparing the neural network for every system independently, to get a rate of distinguishing proof and quiet up to 98% utilizing the proposed framework.
SPEECH RECOGNITION BY IMPROVING THE PERFORMANCE OF ALGORITHMS USED IN DISCRIM...ijcsit
This document discusses improving speech recognition performance through algorithms used for feature extraction and classification. It examines 4 systems: 1) MFCC extraction, 2) PLP extraction, 3) combining MFCC, PLP and zero-crossing rate, 4) modifying the neural network. System 3 achieved the highest recognition rate of 98% even with noise, outperforming the individual algorithms. Increasing the training samples to 500 further improved recognition ratio.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Current Issue - January 2022, Volume 14, Number 1 - International Journal of ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
This document discusses several papers related to ad hoc networks. The first paper analyzed examines the impact of different mobility models on the performance of multi-path routing algorithms in mobile ad hoc networks. It finds that the Gauss-Markov mobility model yields the fewest number of paths but the longest lifetime per path, while the Random Direction model yields the shortest lifetime but more paths. The second paper proposes a distributed trust-based clustering framework to improve security in ad hoc networks by evaluating node trustworthiness without a central authority. It uses evidence theory and recommendations to calculate direct trust ratings. The third paper discusses a proactive load-aware gateway discovery scheme for internet connectivity in ad hoc networks that considers interface queue sizes in addition to hop count.
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
The high-level contribution of this paper is a detailed simulation based analysis about the impact of mobility models on the performance of node-disjoint and link-disjoint multi-path routing algorithms for mobile ad hoc networks (MANETs).
Current Issue - November 2022, Volume 14, Number 6 - The International Journa...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications.The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Current Issue: July 2022, Volume 14, Number 4 - International Journal of Comp...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Hybrid features selection method using random forest and meerkat clan algorithmTELKOMNIKA JOURNAL
In the majority of gene expression investigations, selecting relevant genes for sample classification is considered a frequent challenge, with researchers attempting to discover the minimum feasible number of genes while yet achieving excellent predictive performance. Various gene selection methods employ univariate (gene-by-gene) gene relevance rankings as well as arbitrary thresholds for selecting the number of genes, are only applicable to 2-class problems and use gene selection ranking criteria unrelated to the algorithm of classification. A modified random forest (MRF) algorithm depending on the meerkat clan algorithm (MCA) is provided in this work.
It is one of the swarm intelligence algorithms and one of the most significant machine learning approaches in the decision tree. MCA is used to choose characteristics for the RF algorithm. In information systems, databases, and other applications, feature selection imputation is critical. The proposed algorithm was applied to three different databases, where the experimental results for accuracy and time proved the superiority of the proposed algorithm over the original algorithm.
APPLICATION OF ARTIFICIAL NEURAL NETWORKS IN ESTIMATING PARTICIPATION IN ELEC...Zac Darcy
This document discusses using artificial neural networks to estimate voter participation rates in future elections in Iran. Specifically, it describes using a two-layer feed-forward neural network to predict voter turnout in the Kohgiluyeh and Boyer-Ahmad province with 91% accuracy. The neural network was trained on past electoral data from the province. The document also provides background on artificial neural networks and reviews their use in predicting outcomes in various domains, including economics, politics, tourism, the environment, and information technology.
International Journal of Network Security & Its Applications (IJNSA) - Curren...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
January 2021: Top Ten Cited Article in Computer Science, Engineering IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
Most Cited Articles in Academia - International Journal of Computer Science a...IJCSES Journal
The AIRCC's International Journal of Computer Science and Engineering Survey (IJCSES) is devoted to fields of Computer Science and Engineering surveys, tutorials and overviews. The IJCSES is a peer-reviewed, open access scientific journal published in electronic form as well as print form. The journal will publish research surveys, tutorials and expository overviews in computer science and engineering. Articles from supplementary fields are welcome, as long as they are relevant to computer science and engineering
Trends in mobile network communication and telematics in 2020ijmnct
International Journal of Mobile Network Communications & Telematics (IJMNCT) is an open access peer-reviewed journal that addresses the impacts and challenges of mobile communications and telematics. The journal also aims to focus on various areas such as ecommerce, e-governance, Telematics, Telelearning nomadic computing, data management, related software and hardware technologies, and mobile user services. The journal documents practical and theoretical results which make a fundamental contribution for the development of mobile communication technologies.
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
June 2020: Most Downloaded Article in Soft Computing ijsc
Soft computing is likely to play an important role in science and engineering in the future. The successful applications of soft computing and the rapid growth suggest that the impact of soft computing will be felt increasingly in coming years. Soft Computing encourages the integration of soft computing techniques and tools into both everyday and advanced applications. This Open access peer-reviewed journal serves as a platform that fosters new applications for all scientists and engineers engaged in research and development in this fast growing field.
This document provides a bio sketch of Dr. Mahendra Prasad Sharma including his educational qualifications, designation, experience, areas of specialization, publications, patents, awards, and workshops/training programs attended and conducted. He has over 16 years of teaching experience and holds a Ph.D. in Computer Science and Engineering. His research interests include network security and wireless networks.
This document provides information about the National Conference on Recent Innovations in Science, Engineering, Technology and Management (NCRISETM - 2016) to be held from October 25-27, 2016 at Amity University in Greater Noida, India. The conference aims to bring together academics and industry experts to address advances in various fields. It invites authors to submit unpublished papers on topics related to several disciplines including science, engineering, technology, management, and humanities. The document provides details about registration fees, paper submission guidelines, sponsorship opportunities, and accommodation options for attending the conference.
This document provides information about the National Conference on Recent Innovations in Science, Engineering, Technology and Management (NCRISETM - 2016) to be held from October 25-27, 2016 at Amity University in Greater Noida, India. The conference aims to bring together academics and industry experts to address advances in various fields. It invites authors to submit unpublished papers on topics related to various disciplines like science, engineering, technology, management, and humanities. The document provides details about paper submissions, registrations fees, sponsorships, and accommodation.
Similar to Top research articles in 2020 in the area of Computer Science & Engineering (20)
International Conference on Information Technology Convergence Services & AI ...gerogepatton
International Conference on Information Technology Convergence Services & AI (ITCAI 2024) will provide an excellent international forum for sharing knowledge and new research results in all areas of Information Technology Convergence Services & AI. The Conference focuses on all technical and practical aspects of ITC & AI. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding Information Technology Convergence and services, AI, and establishing new collaborations in these areas.
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
The International Journal of Artificial Intelligence & Applications (IJAIA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Artificial Intelligence & Applications (IJAIA). It is an international journal intended for professionals and researchers in all fields of AI for researchers, programmers, and software and hardware manufacturers. The journal also aims to publish new attempts in the form of special issues on emerging areas in Artificial Intelligence and applications.
PhotoQR: A Novel ID Card with an Encoded Viewgerogepatton
There is an increasing interest in developing techniques to identify and assess data to allow an easy and
continuous access to resources, services or places that require thorough ID control. Usually, in order to
give access to these resources, different kinds of documents are mandatory. In order to avoid forgeries
without the need of extra credentials, a new system –named photoQR, is here proposed. This system is
based on a ID card having two objects: one person’s picture (pre-processed via blur and/or swirl
techniques) and one QR code containing embedded data related to the picture. The idea is that the picture
and the QR code can assess each other by a proper hash value in the QR. The QR without the picture
cannot be assessed and vice versa. An open source prototype of the photoQR system has been implemented
in Python and can be used both in offline and real-time environments, which effectively combines security
concepts and image processing algorithms to obtain data assessment.
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...gerogepatton
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI & FL 2024) provides a
forum for researchers who address this issue and to present their work in a peer-reviewed forum. Authors
are solicited to contribute to the conference by submitting articles that illustrate research results, projects,
surveying works and industrial experiences that describe significant advances in the following areas, but
are not limited to these topics only.
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
The International Journal of Artificial Intelligence & Applications (IJAIA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Artificial Intelligence & Applications (IJAIA). It is an international journal intended for professionals and researchers in all fields of AI for researchers, programmers, and software and hardware manufacturers. The journal also aims to publish new attempts in the form of special issues on emerging areas in Artificial Intelligence and applications.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
10th International Conference on Artificial Intelligence and Applications (AI...gerogepatton
10th International Conference on Artificial Intelligence and Applications (AI 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Artificial Intelligence and its applications. The Conference looks for significant contributions to all major fields of the Artificial Intelligence, Soft Computing in theoretical and practical aspects. The aim of the Conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
The International Journal of Artificial Intelligence & Applications (IJAIA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Artificial Intelligence & Applications (IJAIA). It is an international journal intended for professionals and researchers in all fields of AI for researchers, programmers, and software and hardware manufacturers. The journal also aims to publish new attempts in the form of special issues on emerging areas in Artificial Intelligence and applications.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
May 2024 - Top 10 Read Articles in Artificial Intelligence and Applications (...gerogepatton
The International Journal of Artificial Intelligence & Applications (IJAIA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Artificial Intelligence & Applications (IJAIA). It is an international journal intended for professionals and researchers in all fields of AI for researchers, programmers, and software and hardware manufacturers. The journal also aims to publish new attempts in the form of special issues on emerging areas in Artificial Intelligence and applications.
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)gerogepatton
3rd International Conference on Artificial Intelligence Advances (AIAD 2024) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the area advanced Artificial Intelligence. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the research area. Core areas of AI and advanced multi-disciplinary and its applications will be covered during the conferences.
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
The International Journal of Artificial Intelligence & Applications (IJAIA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Artificial Intelligence & Applications (IJAIA). It is an international journal intended for professionals and researchers in all fields of AI for researchers, programmers, and software and hardware manufacturers. The journal also aims to publish new attempts in the form of special issues on emerging areas in Artificial Intelligence and applications.
Information Extraction from Product Labels: A Machine Vision Approachgerogepatton
This research tackles the challenge of manual data extraction from product labels by employing a blend of
computer vision and Natural Language Processing (NLP). We introduce an enhanced model that combines
Convolutional Neural Networks (CNN) and Recurrent Neural Networks (RNN) in a Convolutional
Recurrent Neural Network (CRNN) for reliable text recognition. Our model is further refined by
incorporating the Tesseract OCR engine, enhancing its applicability in Optical Character Recognition
(OCR) tasks. The methodology is augmented by NLP techniques and extended through the Open Food
Facts API (Application Programming Interface) for database population and text-only label prediction.
The CRNN model is trained on encoded labels and evaluated for accuracy on a dedicated test set.
Importantly, our approach enables visually impaired individuals to access essential information on
product labels, such as directions and ingredients. Overall, the study highlights the efficacy of deep
learning and OCR in automating label extraction and recognition.
10th International Conference on Artificial Intelligence and Applications (AI...gerogepatton
10th International Conference on Artificial Intelligence and Applications (AI 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Artificial Intelligence and its applications. The Conference looks for significant contributions to all major fields of the Artificial Intelligence, Soft Computing in theoretical and practical aspects. The aim of the Conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
The International Journal of Artificial Intelligence & Applications (IJAIA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Artificial Intelligence & Applications (IJAIA). It is an international journal intended for professionals and researchers in all fields of AI for researchers, programmers, and software and hardware manufacturers. The journal also aims to publish new attempts in the form of special issues on emerging areas in Artificial Intelligence and applications.
Research on Fuzzy C- Clustering Recursive Genetic Algorithm based on Cloud Co...gerogepatton
Aiming at the problems of poor local search ability and precocious convergence of fuzzy C-cluster
recursive genetic algorithm (FOLD++), a new fuzzy C-cluster recursive genetic algorithm based on
Bayesian function adaptation search (TS) was proposed by incorporating the idea of Bayesian function
adaptation search into fuzzy C-cluster recursive genetic algorithm. The new algorithm combines the
advantages of FOLD++ and TS. In the early stage of optimization, fuzzy C-cluster recursive genetic
algorithm is used to get a good initial value, and the individual extreme value pbest is put into Bayesian
function adaptation table. In the late stage of optimization, when the searching ability of fuzzy C-cluster
recursive genetic is weakened, the short term memory function of Bayesian function adaptation table in
Bayesian function adaptation search algorithm is utilized. Make it jump out of the local optimal solution,
and allow bad solutions to be accepted during the search. The improved algorithm is applied to function
optimization, and the simulation results show that the calculation accuracy and stability of the algorithm
are improved, and the effectiveness of the improved algorithm is verified
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
The International Journal of Artificial Intelligence & Applications (IJAIA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Artificial Intelligence & Applications (IJAIA). It is an international journal intended for professionals and researchers in all fields of AI for researchers, programmers, and software and hardware manufacturers. The journal also aims to publish new attempts in the form of special issues on emerging areas in Artificial Intelligence and applications.
10th International Conference on Artificial Intelligence and Soft Computing (...gerogepatton
10th International Conference on Artificial Intelligence and Soft Computing (AIS 2024) will
provide an excellent international forum for sharing knowledge and results in theory, methodology, and
applications of Artificial Intelligence, Soft Computing. The Conference looks for significant
contributions to all major fields of the Artificial Intelligence, Soft Computing in theoretical and practical
aspects. The aim of the Conference is to provide a platform to the researchers and practitioners from
both academia as well as industry to meet and share cutting-edge development in the field.
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
Employee attrition refers to the decrease in staff numbers within an organization due to various reasons.
As it has a negative impact on long-term growth objectives and workplace productivity, firms have
recognized it as a significant concern. To address this issue, organizations are increasingly turning to
machine-learning approaches to forecast employee attrition rates. This topic has gained significant
attention from researchers, especially in recent times. Several studies have applied various machinelearning methods to predict employee attrition, producing different resultsdepending on the employed
methods, factors, and datasets. However, there has been no comprehensive comparative review of multiple
studies applying machine-learning models to predict employee attrition to date. Therefore, this study aims
to fill this gap by providing an overview of research conducted on applying machine learning to predict
employee attrition from 2019 to February 2024. A literature review of relevant studies was conducted,
summarized, and classified. Most studies agree on conducting comparative experiments with multiple
predictive models to determine the most effective one.From this literature survey, the RF algorithm and
XGB ensemble method are repeatedly the best-performing, outperforming many other algorithms.
Additionally, the application of deep learning to employee attrition prediction issues also shows promise.
While there are discrepancies in the datasets used in previous studies, it is notable that the dataset
provided by IBM is the most widely utilized. This study serves as a concise review for new researchers,
facilitating their understanding of the primary techniques employed in predicting employee attrition and
highlighting recent research trends in this field. Furthermore, it provides organizations with insight into
the prominent factors affecting employee attrition, as identified by studies, enabling them to implement
solutions aimed at reducing attrition rates.
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
AI for Legal Research with applications, toolsmahaffeycheryld
AI applications in legal research include rapid document analysis, case law review, and statute interpretation. AI-powered tools can sift through vast legal databases to find relevant precedents and citations, enhancing research accuracy and speed. They assist in legal writing by drafting and proofreading documents. Predictive analytics help foresee case outcomes based on historical data, aiding in strategic decision-making. AI also automates routine tasks like contract review and due diligence, freeing up lawyers to focus on complex legal issues. These applications make legal research more efficient, cost-effective, and accessible.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Software Engineering and Project Management - Software Testing + Agile Method...Prakhyath Rai
Software Testing: A Strategic Approach to Software Testing, Strategic Issues, Test Strategies for Conventional Software, Test Strategies for Object -Oriented Software, Validation Testing, System Testing, The Art of Debugging.
Agile Methodology: Before Agile – Waterfall, Agile Development.
Top research articles in 2020 in the area of Computer Science & Engineering
1. S.No Volume Issue Paper Title Authors Papers
1 12 1
Concurrency Within Ternary Galois Processing of
Highly-regular 3D Networks Via Controlled Nano
Switching
Anas N. Al-Rabadi, The University of Jordan, Jordan & Isra University,
Jordan
Full Text
2 12 1
Web Services as A Solution for Cloud Enterprise
Resource Planning Interoperability
Djamal Ziani and Nada Alfaadhel, King Saud University, Saudi Arabia Full Text
3 12 1
Study of an Application Development Environment
Based on Unity Game Engine
Sagor Ahamed, Anomita Das, Shahnawaz Md Tanjib and Ms. Qamrun
Nahar Eity, Ahsanullah University of Science and Technology,
Bangladesh
Full Text
4 12 2
Lidar Point Cloud Classification Using Expectation
Maximization Algorithm
Nguyen Thi Huu Phuong, Hanoi University of Mining and Geology,
Vietnam
Full Text
5 12 2
Enactment Ranking of Supervised Algorithms
Dependence of Data Splitting Algorithms: A Case
Study of Real Datasets
Hina Tabassum and Muhammad Mutahir Iqbal, Bahauddin Zakariya
University, Pakistan
Full Text
6 12 2
Application of Facebook's Prophet Algorithm for
Successful Sales Forecasting Based on Real-world
Data
Emir Žunić1,2, Kemal Korjenić1, Kerim Hodžić2,1 and Dženana
Đonko2, 1Info Studio d.o.o. Sarajevo, Bosnia and Herzegovina
and 2University of Sarajevo, Bosnia and Herzegovina
Full Text
7 12 3
A New Hybrid Diversity Combining Scheme for
Mobile Radio Communication Systems over Nakagami
Fading Chanel
Akinyinka Olukunle Akande, Onyebuchi Chikezie Nosiri, Nnaemeka
Chiemezie Onuekwusi and Emmanuel Uchenna Ekwueme, Federal
University of Technology Owerri, Nigeria
Full Text
8 12 3
Using Social Media as A Tool for Promoting Festival
Tourism
Krittanai Ngernyuang and Pei-Ying Wu, Chung Hua University, Taiwan Full Text
9 12 3
Web-based Learning In Periods of Crisis: Reflections
on the Impact of Covid-19
Stella Chiemeke1 and Omokhagbo Mike Imafidor2,1University of Benin,
Nigeria and 2Africa PPP Advisory Nigeria Limited, Nigeria
Full Text
10 12 4
Importance of Process Mining for Big Data
Requirements Engineering
Sandhya Rani Kourla, Eesha Putti, and Mina Maleki, University of Detroit
Mercy, USA
Full Text
11 12 4
XML Encryption and Signature for Securing Web
ServicesFull
Iehab ALRassan, King Saud University, Saudi Arabia Full Text
12 12 4
Variations in Outcome for the Same Map Reduce
Transitive Closure Algorithm Implemented on
Different Hadoop Platforms
Purvi Parmar, MaryEtta Morris, John R. Talburt and Huzaifa F. Syed,
University of Arkansas, USA
Full Text
13 12 4
Constraint-based and Fuzzy Logic Student Modeling
for Arabic Grammar
Nabila A. Khodeir, Electronic Research Institute, Egypt Full Text
14 12 4 The Smart Parking Management System
Amira. A. Elsonbaty1 and Mahmoud Shams2, 1Higher institute of
engineering and technology, Egypt, 2Kafrelsheikh University, Egypt
Full Text
15 12 4
Performance Evaluation of LTE Network using
Maximum Flow Algorithm
Bir Bahadur Khatri1, Bulbul Ahammad1, Md. Mezbahul Islam2,
Rahmina Rubaiat2 and Md. Imdadul Islam1, 1Jahangirnagar University,
Bangladesh, 2MBSTU, Bangladesh
Full Text
16 12 4
A Novel Study of Lichen Planopilaris Among Different
Iranian Ethnicities based on Computer-aided Programs
Maryamsadat Nejadghaderi1, Ashkan Tashk2, Parvin Mansouri1 and
Zahra Safaei Naraghi1, 1Tehran University of Medica1 Sciences
(TUMS), Iran, 2University of Southern Denmark (SDU), Denmark
Full Text
17 12 4
Railway Safety Protection with Android Mobile
Application for 5G New Radio Network
Tony Tsang and Man Cheng Chong, Hong Kong College of Technology,
Hong Kong
Full Text
18 12 5
Machine Learning in Early Genetic Detection of
Multiple Sclerosis Disease: A Survey
Nehal M. Ali1, Mohamed Shaheen2, Mai S. Mabrouk3 and Mohamed A.
AboRezka1, 1Arab Academy for Science Technology and Maritime
Transport, Cairo, Egypt, 2Arab Academy for Science Technology and
Maritime Transport, Alexandria, Egypt, 3Misr University for Science and
Full Text
19 12 5 Comparison of Rendering Processes on 3D Model
Filip Popovski1, Nikola Spasov1, Svetlana Mijakovska1 and Gorica
Popovska Nalevska2, 1SS KlimentOhridski, Macedonia, 2International
Slavic University Gavrilo RomanovicDerzavin, Macedonia
Full Text
20 12 5
IoT Security: Penetration Testing of White-label Cloud-
based IoT Camera Compromising Personal Data
Privacy
Marlon Intal Tayag, Francisco Napalit and Arcely Napalit, School of
Computing Holy Angel University, Philippines
Full Text
21 12 6
Adaptive Vocabulary Construction for Frustration
Intensity Modelling in Customer Support Dialog Texts
Janis Zuters and Viktorija Leonova, University of Latvia, Latvia Full Text
22 12 6
A New Approach for Ranking Shadowed Fuzzy
Numbers and its Application
Mohamed A. H. El-Hawy, Modern Academy for Computer Science and
Management Technology, Egypt
Full Text
Top research articles in 2020 in the area of Computer Science &
Engineering
COMPUTER SCIENCE & INFORMATION TECHNOLOGY
International Journal of Computer Science and Information Technology (IJCSIT)
2. 23 12 6
Simulation of Package Delivery Optimization using a
Combination of Carriers and Drop-Ship
Valentyn M. Yanchuk, Andrii G. Tkachuk, Dmytro S. Antoniuk, Tetiana
A. Vakaliuk and Anna A. Humeniuk, Zhytomyr Polytechnic State
University, Ukraine
Full Text
24 12 6 Determining Business Intelligence Usage Success
Javier N. Montero and Mary L. Lind, Defense Information Systems
Agency, USA, Louisiana State University Shreveport, USA
Full Text
S.No Volume Issue Paper Title Authors Papers
25 11 2
Brain Computer Interfaces Employing Machine
Learning Methods : A Systematic Review
Sejal Vyas, Stevens Institute of Technology, USA Full Text
26 11 3
Artificial Neural Networks for Medical Diagnosis: A
Review of Recent Trends
Egba. Anwaitu Fraser1, Okonkwo Obikwelu R2, 1Federal College of
Education (Technical), Nigeria, 2Nnamdi Azikiwe University, Nigeria
Full Text
S.No Volume Issue Paper Title Authors Papers
27 10 5 Crime Detection using Data Mining Techniques
Md. Sumon Rony, Sagor Chandra Bakchy and Hadisur Rahman,
Varendra University, Bangladesh
Full Text
28 10 4
A Feasible Voice based Inhouse Navigation System for
the Visually Impaired
Soham Roy, Kalinga Institute of Industrial Technology, India Full Text
S.No Volume Issue Paper Title Authors Papers
29 11 4
Exploring the Link Between Leadership and Devops
Practice and Principle Adoption
Krikor Maroukian1 and Stephen R. Gulliver2, 1Microsoft,
Greece, 2University of Reading, Henley Business School, UK
Full Text
S.No Volume Issue Paper Title Authors Papers
30 10 6 Change Back Feature for Consumer Accounts Cheman Shaik, VISH Consulting Services Inc, USA Full Text
31 10 4
Evaluation of (GPS/GLONASS) Patch Versus RF
GPS (L1) Patchantenna Performance Parameter
Gholam Aghashirin1, Hoda S. Abdel-Aty-Zohdy1, Mohamed A. Zohdy1,
Darrell Schmidt1 and Adam Timmons2,1Oakland University, USA,
2McMaster University, Canada
Full Text
32 10 4
Design and Implementation of an Intelligent Gas
Cylinder Valve Regulating System using Solenoid
Ebenezer Narh Odonkor1, Willie K. Ofosu3, Patrick Appiah3 and Daniel
Kubawe4, 1Takoradi Technical University, Ghana,2Penn State Wilkes,
USA, 3Methodist Technical Institute, Ghana, 4Alang Junior High School,
Ghana
Full Text
33 10 3
Using GSM SMS Controller Alarm Configurator to
Develop Cost Effective Intelligent Fire Safety System
in A Developing Country
Ebenezer Narh Odonkor1, Willie K. Ofosu2 and Kingsley
Nunoo1, 1Takoradi Technical University, Ghana, 2Penn State Wilkes-
Barre, USA
Full Text
34 10 1
Counter Challenge Authentication Method: A
Defeating Solution to Phishing Attacks
Cheman Shaik, VISH Consulting Services Inc, USA Full Text
S.No Volume Issue Paper Title Authors Papers
Advanced Computing: An International Journal (ACIJ)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal on Computational Science & Applications(IJCSA)
International Journal of Computer Science and Engineering Survey (IJCSES)
Computer Science & Engineering: An International Journal (CSEIJ)
3. 35 10 5
Covid-19 Chest X-ray Images: Lung Segmentation and
Diagnosis using Neural Networks
Alan Zhang, Chinese International School, China Full Text
36 10 4 Opti2I and ε-precis Methods Selection Algorithm
Nombre Claude Issa1, Brou Konan Marcellin2, Kimou Kouadio
Prosper3, 1Polytechnic Doctoral School, 2National Polytechnic Institute
Houphouet Boigny – Yamoussoukro, 3Research Laboratory of Computer
Science and Technology
Full Text
S.No Volume Issue Paper Title Authors Papers
37 9 4
A Realist Model of Communication Applications for
Informational Technology and Artificial Cognitive
Systems
Monica R. Kimmel, Collibri NGO, Gothenburg, Sweden Full Text
38 9 2 Skew Constacyclic Codes Over the Ring Sarra Manseri, Central China Normal University, China Full Text
S.No Volume Issue Paper Title Authors Papers
39 7 4
FTMCP: Fuzzy based Test Metrics for Cosmetology
Paradigm
Shahzad Ashraf1, Sehrish Saleem2 and Syed Afnan3, 1Hohai University
Changzhou Jiangsu, China, 2Muhammad Nawaz Sharif University of
Engineering & Technology, Pakistan, 3Hilal Foods Private Limited,
Pakistan
Full Text
S.No Volume Issue Paper Title Authors Papers
40 9 6
Automatic Arabic Named Entity Extraction and
Classification for Information Retrieval
Omar ASBAYOU, Lumière Lyon 2 University, France Full Text
41 9 6
Dutch Named Entity Recognition and De-Identification
Methods for the Human Resource Domain
Chaïm van Toledo, Friso van Dijk, and Marco Spruit, Utrecht University,
Netherlands
Full Text
42 9 5
XAI Language Tutor - A XAI-based Language
Learning Chatbot using Ontology and Transfer
Learning Techniques
Nuobei SHI, Qin Zeng and Raymond Lee, Beijing Normal University-
Hong Kong Baptist University United International College, China
Full Text
43 9 5
Covhindia: Deep Learning Framework for Sentiment
Polarity Detection of Covid-19 Tweets in Hindi
Purva Singh, VIT University, India Full Text
44 9 4
Stockgram : Deep Learning Model for Digitizing
Financial Communications via Natural Language
Generation
Purva Singh, VIT University, India Full Text
45 9 4
An Affective Aware Pseudo Association Method to
Connect Disjoint Users Across Multiple Datasets – an
enhanced validation method for Text-based Emotion
Aware Recommender
John Kalung Leung, Igor Griva and William G. Kennedy, George Mason
University, USA
Full Text
46 9 4
A Semantic Question Answering through
Heterogeneous Data Source in the Domain of Smart
Factory
Orçun Oruç, Technische Universität Dresden, Germany Full Text
47 9 3
Driving Product Sales Performance by Analysing
Product Prelaunch in A Linguistics Approach
Winnie Ng and Vincent Cho, The Hong Kong Polytechnic University,
Hong Kong
Full Text
48 9 3
The Ability of Word Embeddings to Capture Word
Similarities
Martina Toshevska, Frosina Stojanovska and Jovan Kalajdjieski, Ss. Cyril
and Methodius University, Macedonia
Full Text
49 9 3
Vector Space Modeling based Evaluation of
Automatically Generated Text Summaries
Alaidine Ben Ayed1 Ismaïl Biskri1, 2 and Jean-Guy
Meunier1, 1Université du Québec à Montréal (UQAM),
Canada,2Université du Québec à TroisRivières (UQTR), Canada
Full Text
50 9 2
Rita Shelke1 and Devendrasingh Thakore2, 1Research
Scholar, Pune, India 2Bharati Vidyapeeth College of
Engineering, Pune, India
Rita Shelke1 and Devendrasingh Thakore2, 1Research Scholar, Pune,
India 2Bharati Vidyapeeth College of Engineering, Pune, India
Full Text
51 9 2
Developing a Simplified Morphological Analyzer for
Arabic Pronominal System
Mohammad Mahyoob, Taibah University, KSA Full Text
52 9 2
A Sentiment Lexicon-based Analysis for Food and
Beverage Industry Reviews. The Greek Language
Paradigm
Anastasios Liapakis, Theodore Tsiligiridis and Constantine Yialouris,
University of Athens, Greece
Full Text
International Journal on Information Theory (IJIT)
Advanced Computational Intelligence: An International Journal (ACII)
International Journal on Natural Language Computing(IJNLC)
4. 53 9 1
On the Relevance of Query Expansion Using Parallel
Corpora and Word Embeddings to Boost Text
Document Retrieval Precision
Alaidine Ben Ayed1 and Ismaïl Biskri2, 1Université du Québec à
Montréal (UQAM), Canada and 2Université du Québec à Trois Rivières
(UQTR), Canada
Full Text
54 9 1
Finding out Noisy Patterns for Relation Extraction of
Bangla Sentences
Rukaiya Habib and Md. Musfique Anwar, Jahangirnagar University,
Bangladesh
Full Text
55 9 1 Predicting Election Outcome from Social Media Data
Badhan Chandra Das and Md Musfique Anwar, Jahangirnagar University,
Bangladesh
Full Text
S.No Volume Issue Paper Title Authors Papers
56 12 4
Mediating and Moderating Factors Affecting Readiness
to IoT Applications: The Banking Sector Context
RashaAbd El-Aziz, Sarah El-Gamal and Miran Ismail, Arab Academy for
Science, Egypt
Full Text
57 12 3 Developing Enterprise Cyber Situational Awareness Christopher L. Gorham, Capitol Technology University, USA Full Text
58 12 3
Assess the Effect of Service Quality on Customer
Satisfaction in Facebook Social Commerce in Egypt
Rehab ELBadrawy, Sara ElKheshin and Nermine ELEssawy, Arab
Academy for Science, Technology and Maritime Transport, Egypt
Full Text
59 12 3
Analyzing the Opportunities of Digital Marketing in
Bangladesh to Provide an Efficient Interrelation
between Business Organization and Consumer
Farjana Akter, Zayed- Us- Salehin, Abul Kalam Azad and Sultana Jahan
Soheli, Noakhali Science and Technology University, Bangladesh
Full Text
60 12 2
An Analysis of Consumer Interest Level Data for
Online Health Information in the Early Stages of the
Covid-19 Pandemic
David C. Wyld, Southeastern Louisiana University, USA Full Text
61 12 2
Fashion-driven Textiles as A Crystal of A New Stream
for Stakeholder Capitalism – Amazon’s Endeavor
Chihiro Watanabe1, 2, Waleed Akhtar1, Yuji Tou3, Pekka
Neittaanmäki1, 1University of Jyväskylä, Finland, 2International Institute
for Applied Systems Analysis (IIASA), Austria, 3Tokyo Institute of
Technology, Japan
Full Text
62 12 2
The Demand Side of Open Government Data: A Case
Study of Kingdom of Bahrain
Abdulkarim Katbi1, Jaflah AlAmmari2, Ali AlSoufi3, 1King Hamad
University Hospital, Kingdom of Bahrain, 2University of Bahrain,
Kingdom of Bahrain and 3British University of Bahrain, Kingdom of
Bahrain
Full Text
63 12 2
The Fourth 4th Industrial Revolution’s Effect on the
Enterprise Cyber Strategy
Christopher L. Gorham, Capitol Technology University, USA Full Text
64 12 1
Assessing the Adoption of E-government Using Tam
Model: Case of Egypt
Sara ELKheshin1 and Noha Saleeb2 1Arab Academy for Science, Egypt
and 2Middlesex University, UK
Full Text
S.No Volume Issue Paper Title Authors Papers
65 11 4
Procurement Performance Practices and Waste
Management in Textile Manufacturing Firms in
Nairobi City County
Enock Gideon Musau, Kisii University, Kenya Full Text
66 11 3
Justification of, and Benefits Realization Beyond IT
Investments: Analysis from Literature
Godfred Yaw Koi-Akrofi, University of Professional Studies, Ghana Full Text
67 11 3
Supply Chain Management and Organizational
Performance among Kenyan Textile Firms: A
Moderated Mediation Model of Government Support
and Environmental Uncertainty
Enock Gideon Musau, Kisii University, Kenya Full Text
68 11 2
Electronic Material Management Practice on Supply
Chain Performance of Sugar Processing Firms in
Kenya
Evans Biraori Oteki1, Prof. Maurice Sakwa2, 1Murang’a University of
Technology, Kenya, 2Jomo Kenyatta University of Agriculture &
Technology, Kenya
Full Text
69 11 2
Complementary Assets and Value Creation Beyond
Information Technology Investments
Godfred Yaw Koi-Akrofi, University of Professional Studies, Accra,
Ghana
Full Text
70 11 1
The Value of Loyalty: Understanding Brand Loyalty
from A Consumer Point of View
Russell McKenzie1 Aristides R. Baraya1, David C. Wyld1, Carolina
Garzón Medina2, and Adriana Marcela Gordillo
González2, 1Southeastern Louisiana University, USA and 2Universidad
Santo Tomas, Colombia
Full Text
S.No Volume Issue Paper Title Authors Papers
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Value and Supply Chains ( IJMVSC )
IJMPICT
5. 71 11 3
Accounting Information Systems and Knowledge
Management
Mohammed Khaled Aljarallah, King Saud University, Saudi Arabia Full Text
72 11 1
An Analysis of Consumer Preferences for Mobile
Voice Calling in Different Contextual Usages: A Case
of Thailand
Monarat Jirakasem, Waseda University, Japan Full Text
S.No Volume Issue Paper Title Authors Papers
73 9 4
Socio-Organo Complexity, Project Schedule
Performance and Underdamped Transient Motion
Dimitris N. Antoniadis, DANTON PROGM, UK & London Metropolitan
College, UK
Full Text
74 9 4
State Observer Designs for Quarter-car Passive
Suspension
Tasya Y. Christnantasari, Institut Teknologi Sepuluh Nopember,
Indonesia
Full Text
S.No Volume Issue Paper Title Authors Papers
75 9 4
Organizational Factors in Determining Data Quality
Produced from Health Management Information
Systems in Low- And Middle-income Countries: A
Systematic Review
Thein Hlaing1 and Thant Zin2, 1District Public Health Department
(Ministry of Health and Sports), Myanmar,2STI Myanmar University,
Myanmar
Full Text
76 9 4
The Correlation between HPV Vaccination Rate and
Income Inequality
Zhifei Xie, Garrison Forest School, USA Full Text
77 9 4 Influenza Awareness in the Workplace
Tyler D. Asher and Ian R. McAndrew, Capitol Technology University,
USA
Full Text
78 9 3
The Role of State-Wide Stay-at-Home Policies on
Confirmed Covid-19 Cases in the United States: A
Deterministic Sir Model
David Chen1, Seungmin Lee2and Jason Sang3, 1University of Western
Ontario, Canada, 2University of Toronto, Canada, 3University of
Waterloo, Canada
Full Text
79 9 1
Mhealth Applications Developed by the Ministry of
Health for Public Users in KSA: A Persuasive Systems
Design Evaluation
Asmaa Shati, IMSIU University, KSA and KKU University, KSA Full Text
80 9 1
EEG Signal Classification using LDA and MLP
Classifier
Romain Atangana1,2,3, Daniel Tchiotsop1, GodpromesseKenne1,
Laurent Chane1 Djoufack Nkengfack1,2, 1Unité de Recherche
d’Automatique et d’InformatiqueAppliquée (UR-AIA), University of
Dschang, Cameroon, 2Unité de Recherche de Matière Condensée-
Full Text
S.No Volume Issue Paper Title Authors Papers
81 9 3
An Analytical Analysis of Path Loss Models for Mobile
Cellular Wireless Communications
Md. Shariful Islam1*, Md. AshekRaihan Mahmud1, Md. Jashim
Uddin1 and PallabKanti Podder2, 1Islamic University,
Bangladesh, 2Pabna University of Science and Technology, Bangladesh
Full Text
S.No Volume Issue Paper Title Authors Papers
82 9 4
An Exploration of the Relationship between Modern
Foreign Language (MFL) Teachers and Computer
Assisted Language Learning (Call)
Louise Hanna, David Barr, Helen Hou and Shauna McGill, Ulster
University, UK
Full Text
83 9 4
Children using Facebook: Personality Traits, Self-
concept and School Performance
Mitsoula Ioanna, Karatrantou Anthi, Panagiotopoulou Penny and
Panagiotakopoulos Christos, University Campus, Greece
Full Text
84 9 4
Challenges of Distance, Blended, and Online Learning:
A Literature based Approach
Godfred Yaw Koi-Akrofi, Emmanuel Owusu-Oware and Hannah Tanye,
University of Professional Studies, Ghana
Full Text
85 9 3
E-supporting Performance Styles based on Learning
Analytics for Development of Teaching Practices in
Teaching Science
Jielan Elsayed, Laila Maawad, Zeinab khalifa, Ain shams University,
Egypt
Full Text
International Journal of Chaos, Control, Modelling and Simulatio (IJCCMS)
Health Informatics: An International Journal (HIIJ)
International Journal on Cybernetics & Informatics ( IJCI)
International Journal on Integrating Technology in Education (IJITE)
6. 86 9 1
Questioning the Significance of Technologizing
Algerian Schools and Universities: Did it Fail or
Succeed?
Dallel Sarnou, Abdelhamid Ibn Badis University, Algeria Full Text
87 9 1
Power Stability Analysis of A Transmission System
with A Unified Power Flow Controller using
Transformative Intrinsic Algorithm
Sindhu. K, Sona College of Technology, Salem, India Full Text
S.No Volume Issue Paper Title Authors Papers
88 12 6
Mobility Speed Effect and Neural Network
Optimization for Deep MIMO Beamforming in
mmWave Networks
Mustafa S. Aljumaily and Husheng Li, University of Tennessee, USA Full Text
89 12 6
Wireless Networks Performance Monitoring Based on
Passive-active Quality of Service Measurements
Yazeed A. Al-Sbou, Applied Science University, Bahrain Full Text
90 12 6
Towards Fog-Assisted Virtual Reality MMOG with
Ultra-Low Latency
YOSHIHARA Tsuyoshi and FUJITA Satoshi, Hiroshima University,
Japan
Full Text
91 12 6
Prediction Algorithm for Mobile Ad Hoc Network
Connection Breaks
Yasir Mohammed1, Maha Abdelhaq2 and Raed Alsaqour3, 1Iraqi
Ministry of Electricity, Iraq, 2Princess Nourah bint Abdulrahman
University, Saudi Arabia, 3Saudi Electronic University, Saudi Arabia
Full Text
92 12 6
Peer to Peer Approach based Replica and Locality
Awareness to Manage and Disseminate Data in
Vehicular Ad Hoc Networks
Abdelkader Guezzi1, Abderrahmane Lakas2, Ahmed Korichi1, Sarra
Cherbal3, 1Kasdi Merbah University, Algeria, 2UAE University,
UAE, 3University of Ferhat Abbas Setif, Algeria
Full Text
93 12 6
Scenarios of Lifetime Extension Algorithms for
Wireless Ad Hoc Networks
Amir J. Majid, Ajman University, UAE Full Text
94 12 6
Using Machine Learning to Build a Classification
Model for IoT Networks to Detect Attack Signatures
Mousa Al-Akhras1,2,Mohammed Alawairdhi1, Ali Alkoudari1 and
Samer Atawneh1, 1Saudi Electronic University, Saudi Arabia, 2The
University of Jordan, Jordan
Full Text
95 12 6
Network Anomaly Detection based on Late Fusion of
Several Machine Learning Algorithms
Tran Hoang Hai1, Le Huy Hoang11 and Eui-nam Huh2, 1Hanoi
University of Science and Technology, Vietnam, 2Kyung Hee University,
Korea
Full Text
96 12 5
An Efficient Data Collection Protocol for Underwater
Wireless Sensor Networks
Khaled Day1, Faiza Al-Salti2, Abderezak Touzene1 and Nasser
Alzeidi1, 1Sultan Qaboos University, Oman, 2Muscat College, Oman
Full Text
97 12 5
Jamming Detection based on Doppler Shift Estimation
in Vehicular Communications Systems
Javad Afshar Jahanshahi, Universidad Catolica Los Angeles de Chimbote,
Peru
Full Text
98 12 5
A Deep Learning Technique for Web Phishing
Detection Combined URL Features and Visual
Similarity
Saad Al-Ahmadi and Yasser Alharbi, King Saud University, Saudi Arabia Full Text
99 12 5
A Retrial Queueing Model with Scheduling Admission
Control in QoS Supporting for FDL-equipped at OBS
Core Node
Dang Thanh Chuong1, Nguyen Hong Quoc1, Doan Van Thang2 and
Pham Trung Duc1,1Hue University, Vietnam, 2Industrial University of
HCM City, Vietnam
Full Text
100 12 5
Mean Object Size Considering Average Waiting
Latency in M/BP/1 System
Y. –J. Lee, Korea National University of Education, South Korea Full Text
101 12 5
A Cooperative Approach to Extend Cellular Coverage
via D2D Architecture based on OLSR Protocol
Youssef Lmoumen1, Yassine Ruichek1 and Raja Touahni2,1University
Bourgogne FrancheComté, France, 2University IbnTofail, Morocco
Full Text
102 12 5
Client Performance Predictions for Private Blockchain
Networks
YLászló Viktor Jánoky, János Levendovszky and Péter Ekler, Budapest
University of Technology and Economics, Hungary
Full Text
103 12 4
Determination of Minimum Number of UAVs for
Local Area Networks of Drones
Sandaruvan Rajasinghege and Rohan de Silva, CQ University, Australia Full Text
104 12 4
Performance Analysis of Routing Protocols with
Roadside Unit Infrastructure in a Vehicular Ad Hoc
Network
Safae Smiri, Abdelali Boushaba, Rachid Ben Abbou and Azeddine Zahi,
Sidi Mohamed Ben Abdelah University, Morocco
Full Text
105 12 4
Multi-criteria Handover Decision for Heterogeneous
Networks: Carrier Aggregation Deployment Scenario
Maryam Abdulazeez- Ahmed, Nor Kamariah Nordin, Aduwati Bint Sali
and Fazirulhisyam Hashim, Universiti Putra Malaysia, Malaysia
Full Text
106 12 4
Hybrid Model in the Block Cipher Applications for
High-speed Communications Networks
Minh Nguyen Hieu1, Bac Do Thi2, Canh Hoang Ngoc3, Manh Cong
Tran4, Phan Duong Phuc5 and Khoa Nguyen Tuan6, 1Institute of
Cryptographic Science and Technology, Vietnam, 2Thai Nguyen
University of Information and Communication Technology,
Full Text
107 12 4
Robotic Inner Signal Propagation and Random Access
over Hybrid Access Scheme
Abir Hossain, Zhenni Pan, Megumi Saito, Jiang Liu and Shigeru
Shimamoto, Waseda University, Japan
Full Text
108 12 4
An Experimental Study of IoT Networks Under
Internal Routing Attack
Mohammad Alreshoodi, Qassim University, Saudi Arabia Full Text
109 12 4
Analytic Hierarchy Process-based Fuzzy Measurement
to Quantify Vulnerabilities of Web Applications
Mohammad Shojaeshafiei, Letha Etzkorn and Michael Anderson, The
University of Alabama in Huntsville, USA
Full Text
International Journal of Computer Networks & Communications (IJCNC)
7. 110 12 3
Consensus Routing And Environmental Discrete Trust
Based Secure AODV in MANETs
Radha Raman Chandan and P.K.Mishra, Banaras Hindu University, India Full Text
111 12 3
6RLR-ABC: 6LOWPAN Routing Protocol with Local
Repair using Bio Inspired Artificial Bee Colony
Nurul Halimatul Asmak Ismail1, Samer A. B. Awwad2 and Rosilah
Hassan3, 1Princess Nourah Bint Abdulrahman University, Kingdom of
Saudi Arabia, 2Independent Researcher, Kingdom of Saudi
Arabia, 3Universiti Kebangsaan Malaysia, Malaysia
Full Text
112 12 3
Swarm Optimization based Gravitational Search
Approach for Channel Assignment in MCMR Wireless
Mesh Network
Nandini Balusu1, Suresh Pabboju2 and Narsimha G3, 1Telangana
University, India, 2Chaitanya Bharathi Institute of Technology, India
and 3JNTUH College of Engineering, India
Full Text
113 12 3
Energy-efficient Multi-hop Routing with Unequal
Clustering Approach for Wireless Sensor Networks
Younes El Assari, Samia Al Fallah, Jihane El Aasri, Mounir Arioua and
Ahmed El Oualkadi, Abdelmalek Essaadi University, Morocco
Full Text
114 12 3
Flooding Attack Detection and Mitigation in SDN with
Modified Adaptive Threshold Algorithm
Nan Haymarn Oo1, Aris Cahyadi Risdianto2, Teck Chaw Ling3 and
Aung Htein Maw4, 1University of Computer Studies, Yangon,
Myanmar, 2Gwangju Institute of Science and Technology,
Korea, 3University of Malaya, Malaysia 4University of Information
Full Text
115 12 3 Signaling Protocols for Local Area Networks of Drones
Prabhu Jyot Singh and Rohan de Silva, School of Engineering and
Technology CQ University Sydney, Australia
Full Text
116 12 3
Localization Schemes for Underwater Wireless Sensor
Networks: Survey
Faiza Al-Salti1, N. Alzeidi2 and Khaled Day2, 1Muscat College, Oman
and 2Sultan Qaboos University, Oman
Full Text
117 12 2
Performance Evaluation of Modbus TCP in Normal
Operation and Under A Distributed Denial of Service
Attack
Eric Gamess1, Brody Smith1 and Guillermo Francia III2, 1Jacksonville
State University, USA and 2University of West Florida, USA
Full Text
118 12 2
An Adaptive Diffserv Approach to Support QoS in
Network Mobility NEMO Environment
Loay F. Hussein1,2, Aisha-Hassan AbdallaHashim2, Mohamed Hadi
Habaebi2 and Wan Haslina Hassan3, 1Jouf University, Saudi
Arabia, 2International Islamic University Malaysia, Malaysia
and 3Universiti Teknologi Malaysia, Malaysia
Full Text
119 12 2
Mobile Crowd Sensing RPL-based Routing Protocol
for Smart City
Yahya Al Sawafi, Abderezak Touzene, Khaled Day and Nasser Alzeidi,
Sultan Qaboos University, Oman
Full Text
120 12 2
Virtual Cache & Virtual Wan Accelerator Function
Placement for Cost-effective Content Delivery Services
Shin-ichi Kuribayashi, Seikei University, Japan Full Text
121 12 2
Auto Resource Management to Enhance Reliability and
Energy Consumption in Heterogeneous Cloud
Computing
Moataz H. Khalil1,2, Mohamed Azab2, Ashraf Elsayed3, Walaa
Sheta1,2 ,Mahmoud Gabr3 and Adel S. Elmaghraby1,2, 1University of
Louisville, USA, 2The City of Scientific Research and Technology
Applications, Egypt and 3Alexandria University, Egypt
Full Text
122 12 2
CLBNSRM - Confidence Level Based Unblend
Neighbor Selection &Blend Node Report Based
Optimized Route Formation in MANET
S. J. Patil1, L.S. Admuthe2 and M. R. Patil3, 1VTU, India, 2DKTE’S
Textile & Engineering Institute, India and 3J.A.G.M. Institute of
Technology, Indiat
Full Text
123 12 2
Energy Performance of a Combined Horizontal and
Vertical Compression Approach in Cluster-based
WSNS
Jihane El Aasri, Samia Al Fallah, Mounir Arioua and Ahmed El Oualkadi,
Tangier Abdelmalek Essaadi University, Morocco
Full Text
124 12 1
Least Square Channel Estimation for Image
Transmission with OFDM Over Fading Channel
Usha S.M1 and Mahesh H.B2, 1JSS Academy of Technical Education,
India and 2PES University, India
Full Text
125 12 1
A Modified Interference Approximation Scheme for
Improving Preamble Based Channel Estimation
Performance in FBMC System
Radwa A. Roshdy1, Mohamed A. Aboul-Dahab2 and Mohamed M.
Fouad3, 1Higher Technological Institute, Egypt, 2Arab Academy for
Science Technology and Martine transport, Egypt and 3Zagazig
University, Egypt
Full Text
126 12 1
Evaluation Methodology of MIMO Networks
Performance over Rayleigh Fading
Eleftherios Stergiou, Constantinos Angelis and Spiridoula V. Margariti,
University of Ioannina, Greece
Full Text
127 12 1
LTE Scheduler Algorithms for VANET Traffic in
Smart City
Khadija Raissi and Bechir Ben Gouissem, University of Tunis El Manar,
Tunisia
Full Text
128 12 1
Lorawan Scalability Analysis – Co Spreading Factor
Interference
Aiju Thomas and N V Eldhose, M G University, India Full Text
129 12 1
Load Balancing Algorithm for Efficient VM Allocation
in Heterogeneous Cloud
Badshaha P Mulla1, C. Rama Krishna1 and Raj Kumar
Tickoo1, 1NITTTR, India and 1National Informatics Centre, Punjab State
Unit, India
Full Text
130 12 1
An Efficient and Secure Malicious Node Detection
Model for Wireless Sensor Networks
Asmaa M.Morsi1, Tamer M. Barakat2 and Ahmed Ali Nashaat2, 1Al-
Madina Higher Institute for Engineering and Technology, Egypt
and 2Fayoum University, Egypt
Full Text
S.No Volume Issue Paper Title Authors Papers
131 12 6
Performance Analysis of Spatially Correlated
Cylindrical Antenna Array for 3D Massive MIMO
Patrick Danuor1 and Emmanuel Ampoma Affum2, 1Ho Technical
University, Ghana, 2Kwame Nkrumah University of Science and
Technology, Ghana
Full Text
132 12 4
Performance Comparison and Analysis of Proactive,
Reactive and Hybrid Routing Protocols for Wireless
Sensor Networks
Faïza Tabbana, Military Academy, Tunisia Full Text
133 12 4
Energy Efficient Animal Sound Recognition Scheme in
Wireless Acoustic Sensors Networks
Saad Al-Ahmadi and Badour AlMulhem, King Saud University, Saudi
Arabia
Full Text
International Journal of Wireless & Mobile Networks (IJWMN)
8. 134 12 4
A Node Deployment Model with Variable
Transmission Distance for Wireless Sensor Networks
Fan Tiegang and Chen Junmin, Hebei University, China Full Text
135 12 3
Enhancing Routing Protocol for Wireless Sensor
Network to Advance Network Lifetime
Mohammad Abdus Salam1, Kosta Varnavas2 and Bhargava
Maddireddy1, 1Southern University, USA and 2NASA Marshall Space
Flight Center, USA
Full Text
136 12 3
Performance Evaluation and Enhancement of VLAN
via Wireless Networks using OPNET Modeler
Tareq Al-Khraishi and Muhannad Quwaider, Jordan University of Science
and Technology, Jordan
Full Text
137 12 3
Explainable AI for Autonomous Network Functions in
Wireless and Mobile Networks
Premnath K Narayanan1 and David K Harrison2, 1LM Ericsson Ltd., SA
OSS PDU OSS S&T Research & PCT, Ireland and 2Glasgow Caledonian
University, United Kingdom
Full Text
138 12 3
Atmospheric Propagation Impairment Effects for
Wireless Communications
Sharmin Tajria Ananya1, Md. Shariful Islam1*, Md.Ashek Raihan
Mahmud1, Pallab Kanti Podder2 and Md Jashim Uddin1, 1Islamic
University, Bangladesh and 2Pabna University of Science and
Technology, Bangladesh
Full Text
139 12 3
An Intelligent Channel Estimation Method for Future
Mobile Generation
Khaled H. Almotairi, Umm Al-Qura University, Saudi Arabia Full Text
140 12 3
Occupant Activity Detection in Smart Buildings: A
Review
Yudith Cardinale1,2, Eduardo Blanco1, 1Universidad Simón Bolívar,
Venezuela and 2Universidad Católica San Pablo, Peru
Full Text
141 12 2
Security Enhancements over AODV Using Multi-hop
Acknowledgment
Aditya Saravanan, Arjun Pant and A. Jeyasekar, SRM Institute of Science
and Technology, India
Full Text
142 12 1
Privacy Preserving Participatory Sensor Network on
Named Data Networking Infrastructure
M. Kaosar and X. Yi, RMIT University, Australia Full Text
143 12 1
An Enhanced Hybrid Routing and Clustering
Technique for Wireless Sensor Network
Hasan Al-Refai, Philadelphia University, Jordan Full Text
144 12 1
IoT-based Activity Recognition with Machine Learning
from Smartwatch
Nassim Mozaffaric, Javad Rezazadeha,c, Reza Farahbakhshb, John
Ayoadea, aKent Institute Australia, Australia, bInstitut Mines-Te´le´com,
Te´le´com SudParis and cIslamic Azad University, Iran
Full Text
S.No Volume Issue Paper Title Authors Papers
145 12 3
Mobile Primary User in Cognitive Radio State of the
Arts and Recent Advances
Amine hamdouchi1, Badr Benmammar2, Aouatef EI Biari1 and
Abdellatif Medouri1, 1National School of Applied Sciences,
Morocco, 2University of Tlemcen, Algeria
Full Text
S.No Volume Issue Paper Title Authors Papers
146 11 5
Distributed E-learning System using an Hybrid P2P-
based Content Addressable Network Architecture
Telesphore Tiendrebeogo1 and Kabre Laciné2, 1Nazi Boni University,
Burkina Faso, 2Zerbo University, Burkina Faso
Full Text
147 11 5
Consensus based Data Aggregation for Energy
Conservation in Wireless Sensor Network
Tamal Banerjee, Priyansh Sharma, Shrijana Pradhan, Sikkim Manipal
Institute of Technology, India
Full Text
S.No Volume Issue Paper Title Authors Papers
148 11 4
Face Expression Recognition using Convolution Neural
Network (CNN) Models
Nahla Nour1, Mohammed Elhebir2 and Serestina Viriri3, 1Sudan
University of Science and Technology, Sudan, 2University of Gezira,
Sudan, 3University of KwaZulu-Natal, South Africa
Full Text
S.No Volume Issue Paper Title Authors Papers
International Journal of Next - Generation Network ( IJNGN)
International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Grid Computing & Applications (IJGCA)
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
9. 149 10 3
Development of Som Neural Network based Energy
Efficient Clustering Hierarchical Protocol for Wireless
Sensor Network
Md. Tofael Ahmed1, Bipasa Sharmin Setu1, Maqsudur Rahman2 and A.
Z. M. Touhidul Islam3, 1Comilla University, Bangladesh, 2Port City
International University, Bangladesh, 3University of Rajshahi, Bangladesh
Full Text
S.No Volume Issue Paper Title Authors Papers
150 10 3
Trustbased Routing Metric for RPL Routing Protocol
in the Internet of Things.
Asma Lahbib1, Khalifa Toumi2, Anis Laouiti1 and Steven
Martin3, 1SAMOVAR, Université Paris-Saclay, France,2IRT SystemX,
France, 2LRI, Université Paris-Sud, France
Full Text
151 10 3
Two Level Data Fusion Model for Data Minimization
and Event Detection in Periodic Wireless Sensor
Network.
Neetu Verma and Dinesh Singh, DCRUST, India Full Text
IJASA
152 8 2
Study of Attenuation and Bending Losses in Signal
Transmission over Step Index Multimode Pmma Fibers
A. Z. M. Touhidul Islam and Md. Firoz Ahmed, University of Rajshahi,
Bangladesh
Full Text
153 8 2
Video Transmission in V-blast Encoded MIMO MC-
CDMA Wireless System: Performance Study
Md. Juwel Sheikh, Md. Firoz Ahmed and A. Z. M. Touhidul Islam,
University of Rajshahi, Bangladesh
Full Text
154 8 2
On Detection and Tracking of the Vehicles from the
Real Time Video Stream using Background
Subtraction Process with Blob Tracker Algorithm
Maqsudur Rahman1, Md. Tofael Ahmed2 and A. Z. M. Touhidul
Islam3, 1Port City International University, Bangladesh,2Comilla
University, Bangladesh, 3University of Rajshahi, Bangladesh
Full Text
S.No Volume Issue Paper Title Authors Papers
155 11 6 Stated Preference Data & Alogit Mina Hassanvand, University of Calgary, Canada Full Text
156 11 6
Learning-based Orchestrator for Intelligent Software-
defined Networking Controllers
Imene Elloumi Zitouna, University of Tunis El Manar, Tunisia Full Text
157 11 6
A Data Extraction Algorithm from Open Source
Software Project Repositories for Building Duration
Estimation Models: Case Study of Github
Donatien K. Moulla1,2, Alain Abran3 and Kolyang4, 1Faculty of Mines
and Petroleum Industries, University of Maroua, Cameroon, 2LaRI Lab,
University of Maroua, Cameroon, 3École de Technologie Supérieure,
Canada, 4The Higher Teachers’ Training College, University of Maroua,
Full Text
158 11 5
Secure Descartes: A Security Extension to Descartes
Specification Language
Venkata N Inukollu1 and Joseph E Urban2, 1Purdue University,
USA, 2Arizona State University, USA
Full Text
159 11 5
Iterative and Incremental Development Analysis Study
of Vocational Career Information Systems
Isyaku Maigari Ibrahim, Ogwueleka Francisca Nonyelum and Isah Rambo
Saidu, Nigerian Defense Academy, Nigeria
Full Text
160 11 5
MASRML - A Domain-specific Modeling Language
for Multi-agent Systems Requirements
Gilleanes Thorwald Araujo Guedes1, Iderli Pereira de Souza Filho1,
Lukas Filipe Gaedicke1, Giovane D’Ávila Mendonça1, Rosa Maria
Vicari2 and Carlos Brusius2, 1Pampa Federal University,
Brazil, 2Federal University of Rio Grande do Su1, Brazil
Full Text
161 11 4 An Ad-hoc Social Network Generation Approach
Maurice Tchoupé Tchendji1,2, Martin Xavier Tchembé2 and Armelle
Linda Maténé Kakeu2, 1LIRIMA - FUCHSIA team, 2University of
Dschang, Cameroon
Full Text
162 11 4
How do Agile Software Startups deal with
uncertainties by Covid-19 pandemic?
Rafael da Camara1,2, Marcelo Marinho1, Suzana Sampaio1 and Saulo
Cadete2,1Federal Rural University of Pernambuco, Brazil, 2Di2win,
Brazil
Full Text
163 11 3
Programmer Productivity Enhancement Through
Controlled Natural Language Input
Howard Dittmer and Xiaoping Jia, DePaul University, USA Full Text
164 11 3
Towards Auditability Requirements Specification using
an Agent-based Approac
Denis J. S. de Albuquerque1, Vanessa Tavares Nunes1, Claudia
Cappelli2 and Célia Ghedini Ralha1, 1University of Brasilia, Brazil and
2Federal University of Rio de Janeiro, Brazil
Full Text
165 11 3
How (UN) Happiness Impacts on Software Engineers
in Agile Teams?
Luís Felipe Amorim, Marcelo Marinho and Suzana Sampaio, Federal
Rural University of Pernambuco (UFRPE), Brazil
Full Text
166 11 3
The Proposed Implementation of RFID based
Attendance System
Rizwan Qureshi, King Abdul-Aziz University, Saudi Arabia Full Text
167 11 3
Ensemble Regression Models for Software
Development Effort Estimation: A Comparative Study
Halcyon D. P. Carvalho, Marília N. C. A. Lima, Wylliams B. Santos and
Roberta A. de A.Fagunde, University of Pernambuco, Brazil
Full Text
168 11 3
Factors that Affect the Requirements Adherence to
Business in Agile Projects: An Industrial Cross-case
Analysis
Helena Bastos1, Alexandre Vasconcelos1, Wylliams Santos2 and Juliana
Dantas3, 1Universidade Federal de Pernambuco,Brazil, 2Universidade de
Pernambuco, Brazil and 3Instituto Federal de Educação Ciência e
Tecnologia da Paraíba, Brazil
Full Text
International Journal on AdHoc Networking Systems (IJANS)
International Journal of Software Engineering & Applications (IJSEA)
10. 169 11 3
IT Project Showstopper Framework: The View of
Practitioners
Godfred Yaw Koi-Akrofi, University of Professional Studies, Accra Full Text
170 11 2 Essential Activities for Secure Software Development
Mamdouh Alenezi and Sadiq Almuairfi, Prince Sultan University, Saudi
Arabia
Full Text
171 11 1
Proposing Automated Regression Suite Using Open
Source Tools for A Health Care Solution
Anjali Rawat and Shahid Ali, AGI Institute, New Zealand Full Text
172 11 1 Quality Assessment Model of the Adaptive Guidance
Hamid Khemissa1 and Mourad Oussalah2, 1USTHB: University of
Science and Technology Houari Boumediene, Algeria and 2Nantes
University, France
Full Text
173 11 1
An Application of Physics Experiments of High School
by using Augmented Reality
Hussain Mohammed Abu-Dalbouh, Samah Mohammed AlSulaim,
Shaden Abdulaziz AlDera, Shahd Ebrahim Alqaan, Leen Muteb Alharbi
and Maha Abdullah AlKeraida, Qassim University, Kingdom of Saudi
Arabia
Full Text
174 11 1
On the Relationship between Software Complexity and
Security
Mamdouh Alenezi and Mohammad Zarour, Prince Sultan University,
Saudi Arabia
Full Text
175 11 1
Structural Complexity Attribute Classification
Framework (SCACF) for Sassy Cascading Style Sheets
John Gichuki Ndia1, Geoffrey Muchiri Muketha1 and Kelvin Kabeti
Omieno2, 1Murang’a University of Technology, Kenya and 2Kaimosi
Friends University College, Kenya
Full Text
IJNSA
176 12 6 Hybrid Chaotic Method for Medical Images Ciphering
Seham Muawadh Ali Ebrahim, Modern Academy for Engineering and
Information Technology, Egypt
Full Text
177 12 6 The Brazilian Law on Personal Data Protection
Jonatas S. de Souza1,2, Jair M. Abe1, Luiz A. de Lima1,2 and Nilson A.
de Souza2,3, 1Paulista University, São Paulo, Brazil,2National
Association of Data Privacy Professionals, ANPPD, Brazil, 3São Paulo
State Supplementary Pension Foundation, PREVCOM, Brazil
Full Text
178 12 5
Secured AODV to Protect WSN Against Malicious
Intrusion
Saad Al-Ahmadi and Abdulrahman Alseqyani, King Saud University,
Saudi Arabia
Full Text
179 12 4
Enhanced Authentication for Web-Based Security
using Keystroke Dynamics
Siti Rahayu Selamat1, Teh Teck Guan2 and Robiah Yusof1, 1Universiti
Teknikal Malaysia Melaka, Malaysia, 2Infineon Technologies Melaka,
Malaysia
Full Text
180 12 4
A Proposed Model for Dimensionality Reduction to
Improve the Classification Capability of Intrusion
Protection Systems
Hajar Elkassabi, Mohammed Ashour and Fayez Zaki, Mansoura
University, Egypt
Full Text
181 12 4
Effective Method for Managing Automation and
Monitoring in Multi-cloud Computing: Panacea for
Multi-cloud Security Snags
Uchechukwu Emejeamara1, Udochukwu Nwoduh2 and Andrew
Madu2, 1IEEE Computer Society, Connecticut Section, USA,2Federal
Polytechnic Nekede, Nigeria
Full Text
182 12 3
Ontology-based Model for Security Assessment:
Predicting Cyberattacks through Threat Activity
Analysis
Pavel Yermalovich and Mohamed Mejri, Université Laval, Canada Full Text
183 12 3
Advanced Multimedia Platform based on Big Data and
Artificial Intelligence Improving Cybersecurity
Alessandro Massaro1*, Gaetano Panarosa1, Nicola Savino1, Simone
Buonopane2 and Angelo Galiano1,1Dyrecta Lab, IT Research
Laboratory, Italy, 1Spacertron srl, Italy
Full Text
184 12 3 An Empirical Analysis of Email Forensics Tools
Ahmad Ghafarian, Ash Mady and Kyung Park, University of North
Georgia, USA
Full Text
185 12 3
PDMLP: Phishing Detection using Multilayer
Perceptron
Saad Al-Ahmadi and Tariq Lasloum, King Saud University, Saudi Arabia Full Text
186 12 2
Security Consideration in Peer-to-peer Networks with
A Case Study Application
Nick Rahimi, Southern Illinois University, USA Full Text
187 12 2
Providing Anonymous Communication, Privacy-
Preserving Data Aggregation and Dynamic Billing
System in Smart Grid Using Permissioned Blockchain
Ozgur Oksuz, Adiyaman University, Turkey Full Text
188 12 2 A Survey on Malware Detection and Analysis Tools
Sajedul Talukder1 and Zahidur Talukder2, 1Edinboro University, USA
and 2University of Texas at Arlington, USA
Full Text
189 12 2
An Enhanced User Authentication Framework in Cloud
Computing
SHasan Al-Refai, Khaldoun Batiha, Ahmad M. Al-Refai, Philadelphia
University, Jordan
Full Text
190 12 1
A Survey on the Use of Data Clustering for Intrusion
Detection System in Cybersecurity
Binita Bohara1, Jay Bhuyan1, Fan Wu1 and Junhua Ding2, 1Tuskegee
University, USA and 2University of North Texas, USA
Full Text
191 12 1 Self-organization and Autonomous Network Survey Houneida SAKLY, Campus University of Mannouba, Tunisia Full Text
S.No Volume Issue Paper Title Authors Papers
International Journal of Security, Privacy and Trust Management ( IJSPTM )
11. 192 9 4
Political Risks and Blockchain: Definitions and
Possible Case Examples
Remy Zgraggen, University Oldenburg, Switzerland Full Text
193 9 3
Emulating Trusted Platform Module 2.0 on Raspberry
Pi 2
Jen-Liang Cheng, Kuang-Chi Chen, Hong-Wei Zhang, Wei-Yu Chen and
Dai-Ye Wu, Tzu-Chi University, Taiwan
Full Text
194 9 2
Voice Biometric Identity Authentication Model for IoT
Devices
Salahaldeen Duraibi1, Frederick T. Sheldon2 and Wasim
Alhamdani3, 1University of Idaho Moscow, USA & Jazan University,
KSA, 2University of Idaho, USA and 3University of the Cumberlands,
USA
Full Text
S.No Volume Issue Paper Title Authors Papers
195 12 1
Operational Intelligence Performance Inferencing
Across Business Processes
Rajeev Kaula, Missouri State University, USA Full Text
196 12 2
A Novel Remote Access Control for the Real-time
Streaming Data of IP Cameras
Kuen-Liang Sue and Ting-Yuan Wu, National Central University
Taoyuan, Taiwan
Full Text
197 12 2
Storing Data in A Document-oriented Database and
Implemented from A Structured Nesting Logical
Model
Y. Hiyane, A. Benmakhlouf and A. Marzouk, University Hassan 1st,
Morocco
Full Text
198 12 2
Acceptance of E-procurement in Organisations: Using
Structural Equation Modeling (SEM)
Muhammed S. Maddi1, Paul Davis2 and John Geraghty3, 4Dublin City
University, Ireland & College of economic and Management Bani Walid
City University, Libya and 2Dublin City University Business School,
Ireland 3Dublin City University Mechanical and Manufacturing
Full Text
199 12 3
Design, Implementation, and Assessment of Innovative
Data Warehousing; Extract, Transformation, and
Load(ETL);and Online Analytical Processing(OLAP)
on BI
Ramesh Venkatakrishnan, Colorado Technical University, USA Full Text
200 12 3
HISTSFC: Optimization for ND Massive Spatial Points
Querying
Haicheng Liu1, Peter van Oosterom1, Martijn Meijers1, Xuefeng Guan2,
Edward Verbree1, Mike Horhammer3,1Delft University of Technology,
the Netherlands, 2Wuhan University, China and 3Oracle Inc, USA
Full Text
201 12 3
A Context-aware Strategy for Mobile Services in M-
commerce
Kuen-Liang Sue, National Central University Taoyuan, Taiwan Full Text
202 12 3 Sarcasm Detection Beyond using Lexical Features
ADEWUYI Joseph Oluwaseyi and OLADEJI Ifeoluwa David, University
of Ibadan, Nigeria
Full Text
203 12 5
Big Data Storage System Based on a Distributed Hash
Tables System
Telesphore Tiendrebeogo and Mamadou Diarra, Nazi Boni University,
Burkina Faso
Full Text
S.No Volume Issue Paper Title Authors Papers
204 10 1
A Web Repository System for Data Mining in Drug
Discovery
Jiali Tang, Jack Wang and Ahmad Reza Hadaegh, California State
University San Marcos, USA
Full Text
205 10 2
Application of Spatiotemporal Association Rules on
Solar Data to Support Space Weather Forecasting
Carlos Roberto Silveira Junior1, José Roberto Cecatto2, Marilde
Terezinha Prado Santos1 and Marcela Xavier Ribeiro1,1Federal
University of São Carlos, Brazil and 2National Institute of Space
Research, Brazil
Full Text
206 10 3 Data Science Curriculum: Current Scenario Duaa Bukhari, Taibah University, Saudi Arabia Full Text
207 12 4
Efficacy of Non-negative Matrix Factorization for
Feature Selection in Cancer Data
Parth Patel1, Kalpdrum Passi1 and Chakresh Kumar Jain2, 1Laurentian
University, Canada, 2Jaypee Institute of Information Technology, India
Full Text
S.No Volume Issue Paper Title Authors Papers
208 12 4
Improving PSNR and Processing Speed for HEVC
Using Hybrid PSO for Intra Frame Prediction
Swati Vinod Sakhare and Upena D. Dalal, The Sardar Vallabhbhai
National Institute of Technology, India
Full Text
209 12 4
Performance Analysis of Different Acoustic Features
based on LSTM for Bangla Speech Recognition
Nahyan Al Mahmud, Ahsanullah University of Science and Technology,
Bangladesh
Full Text
International Journal of Database Management Systems (IJDMS)
International Journal of Data Mining & Knowledge Management Process ( IJDKP )
International Journal of Multimedia & Its Applications (IJMA)
12. 210 12 5
Qualitative Analysis of PLP in LSTM for Bangla
Speech Recognition
Nahyan Al Mahmud1 and Shahfida Amjad Munni2, 1Ahsanullah
University of Science and Technology, Bangladesh,2Cygnus Innovation
Limited, Bangladesh
Full Text
211 12 6
Development of a Mobile Learning Application of
Malay Vocabulary for Lower Secondary School Level
Nor Zuhaidah Mohamed Zain, Maizatul Hayati Mohamad Yatim, Ummu
Husna Azizan and Hasrina Baharum, Universiti Pendidikan Sultan Idris,
Malaysia
Full Text
S.No Volume Issue Paper Title Authors Papers
212 10 1
Human Photogrammetry: Foundational Techniques for
Creative Practitioners
Trendt Boe and Chris Carter, Queensland University of Technology,
Australia
Full Text
213 10 3
Media Students’ Capability to Interact with Augmented
Reality and 3D Animations in Virtual Broadcast News
Studios
Tariq Alrimawi and Wasan Haddad, University of Petra, Jordan Full Text
S.No Volume Issue Paper Title Authors Papers
214 6 1
With a transaction fee market and without a block size
limit in Bitcoin network; there exists a Nash
equilibrium points of the mining game
Moustapha BA, Université Paris Nanterre (Paris X), France Full Text
S.No Volume Issue Paper Title Authors Papers
215 11 3
Identification of Technology-relevant Entities Based on
Trend Curves and Semantic Similarities
Sukhwan Jung, Rachana Reddy Kandadi, Rituparna Datta, Ryan Benton,
and Aviv Segev, University of South Alabama, USA
Full Text
S.No Volume Issue Paper Title Authors Papers
216 11 1
Toward a Formalization of BPEL 2.0 : An Algebra
Approach
L. Boumlik1, M. Mejri1 and H. Boucheneb2, 1Laval University, Canada
and 2Polytechnique Montreal University, Canada
Full Text
217 11 2
A Comparative Study between Graph-QL& Restful
Services in API Management of Stateless Architectures
Sayan Guha and Shreyasi Majumder, Cognizant Technology Solutions,
India
Full Text
S.No Volume Issue Paper Title Authors Papers
218 10 2
SLA-driven Load Scheduling in Multi-tier Cloud
Computing: Financial Impact Considerations
Husam Suleiman and Otman Basir, University of Waterloo, Canada Full Text
219 10 3
MCCVA: A New Approach Using SVM and Kmeans
for Load Balancing on Cloud
Hieu Le Ngoc1,3, Trang Nguyen Thi Huyen2, Xuan Phi Nguyen3 and
Cong Hung Tran3, 1Ho Chi Minh City Open University, Vietnam,2Sai
Gon University, Vietnam, 3Post and Telecommunication Institute of
Technology, Ho Chi Minh City Open University, Vietnam
Full Text
220 10 3
Load Balancing Algorithm on Cloud Computing for
Optimize Respone Time
Nguyen Xuan Phi, Le Ngoc Hieu and Tran Cong Hung, Posts and
Telecoms Institute of Technology, Vietnam
Full Text
221 10 5
Success-Driving Business Model Characteristics of
IaaS Providers – Towards a Quantitative Evaluation
Sebastian Floerecke, Florian Felix Röck and Franz Lehner, University of
Passau, Germany
Full Text
International Journal of Web & Semantic Technology (IJWesT)
International Journal on Web Service Computing (IJWSC)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal of Computer Graphics & Animation (IJCGA)
International Journal of Game Theory and Technology ( IJGTT)
13. S.No Volume Issue Paper Title Authors Papers
222 11 5
A New Generalization of Edge Overlap to Weighted
Networks
Ali Choumane, Lebanese University, Lebanon Full Text
223 11 1
Construction of Amharic-arabic Parallel Text Corpus
for Neural Machine Translation
Ibrahim Gashaw and H L Shashirekha, Mangalore University, India Full Text
224 11 1
Novel Machine Learning Algorithms for Centrality and
Cliques Detection in Youtube Social Networks
Craigory Coppola and Heba Elgazzar, Morehead State University, USA Full Text
225 11 1
Novel Hybrid ANT Colony Algorithm for the Multi-
depot Periodic Open Capacitated Arc Routing Problem
Bilal Kanso, Lebanese University, Lebanon Full Text
226 11 1
Hybrid ANT Colony Algorithm for the Multi-depot
Periodic Open Capacitated Arc Routing Problem
Bilal Kanso, Lebanese University, Lebanon Full Text
227 11 1
Using Semi-supervised Classifier to Forecast Extreme
CPU Utilization
Nitin Khosla1 and Dharmendra Sharma2, 1ICTCAPM, Australia
and 2University of Canberra, Australia
Full Text
228 11 1
A Hybrid Algorithm Based on Invasive Weed
Optimization Algorithm and Grey Wolf Optimization
Algorithm
Wisam Abdulelah Qasim and Ban Ahmed Mitras, College of Computer
Science & Mathematics, Mosul, Iraq
Full Text
229 11 1
An Ontological Analysis and Natural Language
Processing of Figures of Speech
Christiana Panayiotou, Technological University of Cyprus, Cyprus Full Text
230 11 1
Capsule Network Performance with Autonomous
Navigation
Thomas Molnar and Eugenio Culurciello, Purdue University, USA Full Text
231 11 2
A Modified Maximum Relevance Minimum
Redundancy Feature Selection Method Based on Tabu
Search For Parkinson’s Disease Mining
Waheeda Almayyan, PAAET, Kuwait Full Text
232 11 2 Data Mining Applied in Food Trade Network
Alessandro Massaro, Giovanni Dipierro, Annamaria Saponaro and Angelo
Galiano, Dyrecta Lab,IT Research Laboratory, Italy
Full Text
233 11 2
Automated Discovery of Logical Fallacies in Legal
Argumentation
Callistus Ireneous Nakpih1 and Simone Santini2, 1St. John Bosco’s
College of Education, Ghana and 2Universidad Autonoma De Madrid,
Spain
Full Text
234 11 2
A BI-objective Model for SVM With an Interactive
Procedure to Identify the Best Compromise Solution
Mohammed Zakaria Moustafa1, Mohammed Rizk Mohammed1, Hatem
Awad Khater2 and Hager Ali Yahia1,1ALEXANDRIA University,
Egypt, and 2Horus University, Egypt
Full Text
235 11 3
Application of Target Detection Algorithm based on
Deep Learning in Farmland Pest Recognition
Shi Wenxiu and Li Nianqiang, University of Jinan, China Full Text
236 11 3
Graphical Model and Clustering-Regression based
Methods for Causal Interactions: Breast Cancer Case
Study
Suhilah Alkhalifah and Adel Aloraini, Qassim University, Saudi Arabia Full Text
237 11 4
CPU Hardware Classification and Performance
Prediction using Neural Networks and Statistical
Learning
Courtney Foots1, Palash Pal2, Rituparna Datta1 and Aviv
Segev1, 1University of South Alabama, USA,2Burdwan University, India
Full Text
238 11 4
A Deep Learning Approach for Denoising Air-Coupled
Ultrasonic Responds Data
Mikel David Jedrusiak and Frank Weichert, Technical University of
Dortmund, Germany
Full Text
239 11 4 Detection of Dense, Overlapping, Geometric Objects Adele Peskin, Boris Wilthan and Michael Majurski, NIST, USA Full Text
240 11 4
Categorizing 2019-n-CoV Twitter Hashtag Data by
Clustering
Koffka Khan1 and Emilie Ramsahai2, 1The University of the West Indies,
Trinidad, 2UWI School of Business & Applied Studies Ltd (UWI-
ROYTEC), Trinidad and Tobago
Full Text
241 11 4 Log Message Anomaly Detection with Oversampling Amir Farzad and T. Aaron Gulliver, University of Victoria, Canada Full Text
242 11 4
Insight about Detection, Prediction and Weather Impact
of Coronavirus (Covid-19) using Neural Network
A K M Bahalul Haque, Tahmid Hasan Pranto, Abdulla All Noman and
Atik Mahmood, North South University, Bangladesh
Full Text
243 11 4 Scaling the HTM Spatial Pooler
Damir Dobric1, Andreas Pech2, Bogdan Ghita1 and Thomas
Wennekers1, 1University of Plymouth, UK,2Frankfurt University of
Applied Sciences, Germany
Full Text
244 11 4
Analysis of Roadway Fatal Accidents using Ensemble-
based Meta-Classifiers
Waheeda Almayyan, Collage of Business Studies, PAAET, Kuwait Full Text
245 11 6
Problem Decomposition and Information Minimization
for the Global, Concurrent, On-line Validation of
Neutron Noise Signals and Neutron Detector Operation
Tatiana Tambouratzis, University of Piraeus, Greece Full Text
International Journal of Artificial Intelligence & Applications (IJAIA)
14. 246 11 6
PIntelligent Portfolio Management via NLP Analysis of
Financial 10-k Statements
Purva Singh, VIT University, India Full Text
247 11 6 Object Sorting using Faster R-CNN
Pengchang Chen and Vinayak Elangovan, Division of Science and
Engineering, Penn State Abington, USA
Full Text
248 11 6
Using Contextual Graphs as a Decision-making Tool in
the Process of Hiring Candidates
Hassane Tahir1 and Patrick Brézillon2, 1Links Consultants, Paris,
France, 2LIP6 - Sorbonne University - CNRS, Paris, France
Full Text
249 11 6
Automatic Transfer Rate Adjustment for Transfer
Reinforcement Learning
Hitoshi Kono1, Yuto Sakamoto1, Yonghoon Ji2 and Hiromitsu
Fujii3, 1Tokyo Polytechnic University, Japan,2Japan Advanced Institute
of Science and Technology, Japan, 3Chiba Institute of Technology, Japan
Full Text
250 11 6
Answer Set Programming to Model Plan Agent
Scenarios
Fernando Zacarias Flores, Rosalba Cuapa Canto and José María Ángeles
López, Autonomous University of Puebla, México
Full Text
S.No Volume Issue Paper Title Authors Papers
251 10 1
Interval Type-2 Intuitionistic Fuzzy Logic System for
Time Series and Identification Problems - A
Comparative Study
Imo Eyoh1, Jeremiah Eyoh2 and Roy Kalawsky2, 1University of Uyo,
Nigeria and 2Loughborough University, UK
Full Text
252 10 1
A Simulation Based Study of A Greenhouse System
with Intelligent Fuzzy Logic
Niaz Mostakim1, Shuaib Mahmud2 and *Khalid Hossain Jewel3, 1Atish
Dipankar University of Science and Technology, Bangladesh, 2Jatiya
Kabi Kazi Nazrul Islam University, Bangladesh and 3Islamic University,
Bangladesh
Full Text
253 10 2
Application of Fuzzy Rule based System for Highway
Research Board Classification of Soils
Sujatha A1, L Govindaraju2 and N Shivakumar1, 1RV College of
Engineering, India and 2University Visveswaraya College of Engineering,
India
Full Text
254 10 2
Breast Cancer Diagnosis Based on Genetic-fuzzy
Logic and ANFIS Using WBCD
Amany Mostafa Lotayef, Khaled H. Ibrahim and Rania Ahmed Abul
Seoud, Fayoum University, Egypt
Full Text
255 10 4
Annual Precipitation in Southern of Madagascar:
Modeling using High Order Fuzzy Time Series
Harimino Andriamalala Rajaonarisoa, Irrish Parker Ramahazosoa, Hery
Zojaona Tantely Stefana Zafimarina Reziky, Adolphe Andriamanga
Ratiarison, University of Antananarivo, Madagascar
Full Text
S.No Volume Issue Paper Title Authors Papers
256 9 3
A Utilization of Convolutional Matrix Methods on
Sliced Hippocampal Neuron Region Images for Cell
Segmentation
Neeraj Rattehalli and Ishan Jain, USA Full Text
257 9 4
SVM &Ga-clustering Based Feature Selection
Approach for Breast Cancer Detection
Rashmi Priya1 and Syed Wajahat Abbas Rizvi2, 1GD Goenka University,
India,2Amity University, India
Full Text
S.No Volume Issue Paper Title Authors Papers
258 7 2
Quantum Criticism: an Analysis of Political News
Reporting
Ashwini Badgujar, Sheng Chen, Pezanne Khambatta, Tuethu Tran,
Andrew Wang, Kai Yu, Paul Intrevado and David Guy Brizan, University
of San Francisco, USA
Full Text
259 7 4
A Newly Proposed Technique for Summarizing the
Abstractive Newspapers’ Articles based on Deep
Learning
Sherif Kamel Hussein1,2, and Joza Nejer AL-Otaibi2, 1October
University for Modern Sciences and Arts, Egypt, 2Arab East Colleges for
Graduate Studies, KSA
Full Text
260 7 4
A Deep Learning Model to Predict Congressional Roll
Call Votes from Legislative Texts
Jonathan Wayne Korn and Mark A. Newman, Harrisburg University,
USA
Full Text
S.No Volume Issue Paper Title Authors Papers
Machine Learning and Applications: An International Journal (MLAIJ)
Signal & Image Processing : An International Journal (SIPIJ)
International Journal of Fuzzy Logic Systems (IJFLS)
International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI)
15. 261 11 6
Further Improvements of CFA 3.0 by Combining
Inpainting and Pansharpening Techniques
Chiman Kwan and Jude Larkin, Applied Research, LLC, USA Full Text
262 11 6
Off-Line Arabic Handwritten Words Segmentation
using Morphological Operators
Nisreen AbdAllah1 and Serestina Viriri2, 1Sudan University of Science
and Technology, Sudan and 2University of KwaZulu-Natal, South Africa
Full Text
263 11 6
Neighbour Local Variability for Multi-Focus Images
Fusion
Ias Sri Wahyuni1 and Rachid Sabre2 Full Text
264 11 6
Facial Age Estimation using Transfer Learning and
Bayesian Optimization based on Gender Information
Marwa Ahmed1 and Serestina Viriri2, 1Sudan University of Science and
Technology, Sudan, 2University of KwaZulu-Nata, South Africa
Full Text
265 11 6
A Novel Graph Representation for Skeleton-based
Action Recognition
Tingwei Li, Ruiwen Zhang and Qing Li, Tsinghua University, China Full Text
266 11 5
Eye Gaze Estimation Invisible and IR Spectrum for
Driver Monitoring System
Susmitha Mohan and Manoj Phirke, HCL Technologies, India Full Text
267 11 5
Batch Normalized Convolution Neural Network for
Liver Segmentation
Fatima Abdalbagi1, Serestina Viriri2 and Mohammed Tajalsir
Mohammed1, 1Sudan University of Science and Technology,
Sudan, 2University of KwaZulu-Natal, South Africa
Full Text
268 11 5
Comparison of Denoising Algorithms for Demosacing
Low Lighting Images Using CFA 2.0
Chiman Kwan and Jude Larkin, Applied Research, LLC, USA Full Text
269 11 5
Face Verification Across Age Progression using
Enhanced Convolution Neural Network
Areeg Mohammed Osman1 and Serestina Viriri2, 1Sudan University of
Science and Technology, Sudan, 2University of Kwa Zulu-Natal, South
Africa
Full Text
270 11 5
Bata-Unet: Deep Learning Model for Liver
Segmentation
Fatima Abdalbagi1, Serestina Viriri2 and Mohammed Tajalsir
Mohammed1, 1Sudan University of Science and Technology,
Sudan, 2University of KwaZulu-Natal, South Africa
Full Text
271 11 4
Melanoma Cell Detection in Lymph Nodes
Histopathological Images using Deep Learning
Salah Alheejawi, Richard Berendt, Naresh Jha and Mrinal Mandal,
University of Alberta, Canada
Full Text
272 11 4
Gender Discrimination based on the Thermal Signature
of the Face and the External Ear
Georgia Koukiou and Vassilis Anastassopoulos, University of Patras,
Greece
Full Text
273 11 4
Demosaicing of Real Low Lighting Images using CFA
3.0
Chiman Kwan, Jude Larkin and Bence Budavari, Applied Research, LLC,
USA
Full Text
274 11 3
Demosaicing Mastcam Images using A New Color
Filter Array
Chiman Kwan and Jude Larkin, Applied Research, USA Full Text
275 11 3
Estimation of Separation and Location of Wave
Emitting Sources : A Comparison Study between
Parametric and Non-parametric Methods
Mujahid F. AL-Azzo and Azzah T.Qaba, Ninevah University, Iraq Full Text
276 11 2
Strange Behaviors and Root Cause in the Compression
of Previously Compressed Videos
Chiman Kwan and Jude Larkin, Applied Research, LLC, USA Full Text
277 11 2
Secure OMP Based Pattern Recognition that Supports
Image Compression
Takayuki Nakachi1 and Hitoshi Kiya2 ,1 Nippon Telegraph and
Telephone Corporation, Japan and 2 Tokyo Metropolitan University,
Japan
Full Text
278 11 1
Applying R-spatiogram in Object Tracking for
Occlusion Handling
Niloufar Salehi Dastjerdi and M. Omair Ahmad, Concordia University,
Canada
Full Text
279 11 1 Wavelet Decomposition and Alpha Stable Fusion
Rachid Sabre1 and Ias Wahyuni2 , 1 University of Burgundy/Agrosup
Dijon, France and 2 Universitas Gunadarma, Indonesia
Full Text
280 11 1
Enhanced System for Computer-aided Detection of
MRI Brain Tumors
Umar Alqasmi, Ammar Alzuhair and Abduallah Bama'bad, King Abul-
Aziz University, KSA
Full Text
281 11 1
Suitable Mother Wavelet Selection for EEG Signals
Analysis: Frequency Bands Decomposition and
Discriminative Feature Selection
Romain Atangana1,2,3 , Daniel Tchiotsop1 , GodpromesseKenne1 ,
Laurent Chanel Djoufack Nkengfack1,2 , 1 Unité de Recherche
d’Automatique et d’InformatiqueAppliquée (UR-AIA), University of
Dschang, Cameroon, 2 Unité de Recherche de Matière Condensée-
Full Text
282 11 1
Advanced Single Image Resolution Upsurging Using A
Generative Adversarial Network
Md. Moshiur Rahman1 , Samrat Kumar Dey2 and Kabid Hassan
Shibly2 , 1 Bangladesh Open University, Bangladesh and 2 Dhaka
International University, Bangladesh
Full Text
S.No Volume Issue Paper Title Authors Papers
283 11 6
Concurrent Ternary Galois-based Computation using
Nano-apex Multiplexing Nibs of Regular Three-
dimensional Networks, Part II: Formalistic Architecture
Realization
Anas N. Al-Rabadi, The University of Jordan, Jordan & Isra University,
Jordan
Full Text
284 11 6
Concurrent Ternary Galois-based Computation using
Nano-apex Multiplexing Nibs of Regular Three-
dimensional Networks, Part III: Layout Congestion-free
Effectuation
Anas N. Al-Rabadi, The University of Jordan, Jordan & Isra University,
Jordan
Full Text
International Journal of VLSI design & Communication Systems (VLSICS)
16. 285 11 5
Concurrent Ternary Galois-based Computation using
Nano-apex Multiplexing Nibs of Regular Three-
dimensional Networks, Part I: Basics
Anas N. Al-Rabadi, The University of Jordan, Jordan & Isra University,
Jordan
Full Text
S.No Volume Issue Paper Title Authors Papers
286 11 4
An Inventory Management System for Deteriorating
Items with Ramp Type and Quadratic Demand: A
Structural Comparative Study
Biswaranjan Mandal, Acharya Jagadish Chandra Bose College, India Full Text
International Journal on Soft Computing ( IJSC )