-
1
-
Wearable Device Technology in Healthcare—Exploring Constraining and Enabling Factors
-
2
-
Proposed System for Effective Adoption of E-government to Obtain Construction Permit in Egypt
-
3
-
Potential Use of Bitcoin in B2C E-commerce
-
4
-
Smart Cabin: A Semantic-Based Framework for Indoor Comfort Customization Inside a Cruise Cabin
-
5
-
Formal Modeling and Analysis of Probabilistic Real-Time Systems
-
6
-
Regional Agricultural Land Classification Based on Random Forest (RF), Decision Tree, and SVMs Techniques
-
7
-
On Hierarchical Classification Implicative and Cohesive <inline-formula><alternatives><tex-math>\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$M_{GK}$$\end{document}</tex-math><inline-graphic></inline-graphic></alternatives></inline-formula>-Based: Application on Analysis of the Computing Curricula and Students Abilities According the Anglo-Saxon Model
-
8
-
A Modeling Environment for Dynamic and Adaptive Network Models Implemented in MATLAB
-
9
-
Face Authentication Using Image Signature Generated from Hyperspectral Inner Images
-
10
-
Unsupervised Learning of Image Data Using Generative Adversarial Network
-
11
-
Adaptive Message Embedding in Raw Images
-
12
-
Megapolis Tourism Development Strategic Planning with Cognitive Modelling Support
-
13
-
Design and Implementation of Ancient and Modern Cryptography Program for Documents Security
-
14
-
Methodology for Selecting Cameras and Its Positions for Surround Camera System in Large Vehicles
-
15
-
Fuzzy Models and System Technical Condition Estimation Criteria
-
16
-
Software Tools and Techniques for the Expert Systems Building
-
17
-
A Component-Based Method for Developing Cross-Platform User Interfaces for Mobile Applications
-
18
-
Improvement of Vehicles Production by Means of Creating Intelligent Information System for the Verification of Manufacturability of Design Documentation
-
19
-
Group Delay Function Followed by Dynamic Programming Versus Multiscale-Product for Glottal Closure Instant Detection
-
20
-
Activity Logging in a Bring Your Own Application Environment for Digital Forensics
-
21
-
Game Theory for Wireless Sensor Network Security
-
22
-
DSP Implementation of OQPSK Baseband Demodulator for Geosynchronous Multichannel TDMA Satellite Receiver
-
23
-
Textile Sensor-Based Exoskeleton Suits for the Disabled
-
24
-
A Comparison of Indoor Positioning Systems for Access Control Using Virtual Perimeters
-
25
-
q-LMF: Quantum Calculus-Based Least Mean Fourth Algorithm
-
26
-
Process Driven Access Control and Authorization Approach
-
27
-
Comprehensive Exploration of Game Reviews Extraction and Opinion Mining Using NLP Techniques
-
28
-
MHAD: Multi-Human Action Dataset
-
29
-
Machine Learning-Based Approaches for Location Based Dengue Prediction: Review
-
30
-
Critical Evaluation of Different Biomarkers and Machine-Learning-Based Approaches to Identify Dementia Disease in Early Stages
-
31
-
Interactive Visualization of Ontology-Based Conceptual Domain Models in Learning and Scientific Research
-
32
-
A Secure Lightweight Mutual Authentication and Message Exchange Protocol for IoT Environments Based on the Existence of Active Server
-
33
-
Monetary Transaction Fraud Detection System Based on Machine Learning Strategies
-
34
-
The Impact of Service-Level Agreement (SLA) on a Cloudlet Deployed in a Coffee Shop Scenario
-
35
-
A New Use of Doppler Spectrum for Action Recognition with the Help of Optical Flow
-
36
-
Meeting Challenges in IoT: Sensing, Energy Efficiency, and the Implementation
-
37
-
Small Cells Handover Performance in Centralized Heterogeneous Network
-
38
-
CRISP-DM/SMEs: A Data Analytics Methodology for Non-profit SMEs
-
39
-
Bridges Strengthening by Conversion to Tied-Arch Using Monarch Butterfly Optimization
-
40
-
Deep Learning Approach for IDS
-
41
-
Outlier Detection Method-Based KPCA for Water Pipeline in Wireless Sensor Networks
-
42
-
Data Extraction and Exploration Tools for Business Intelligence
-
43
-
Systems and Methods for Implementing Deterministic Finite Automata (DFA) via a Blockchain
-
44
-
Closest Fit Approach Through Linear Interpolation to Recover Missing Values in Data Mining