2091

Technical e-Papers
Title Author URL
A Critical Review on the 3D Cephalometric Analysis Using Machine Learning by nShtwai Alsubai
A Systemic Mapping Study of Business Intelligence Maturity Models for Higher Education Institutions by nChristopher Lee Stewart andnM. Ali Akber Dewan
Machine Learning Models for Classification of Human Emotions Using Multivariate Brain Signals by nShashi Kumar G. S.,nAhalya Arun,nNiranjana Sampathila andnR. Vinoth
Towards Predicting Architectural Design Patterns: A Machine Learning Approach by nSirojiddin Komolov,nGcinizwe Dlamini,nSwati Megha andnManuel Mazzara
Physical Activity Recommendation System Based on Deep Learning to Prevent Respiratory Diseases by nUsharani Bhimavarapu,nM. Sreedevi,nNalini Chintalapudi andnGopi Battineni
User Analytics in Online Social Networks: Evolving from Social Instances to Social Individuals by nGerasimos Razis,nStylianos Georgilas,nGiannis Haralabopoulos andnIoannis Anagnostopoulos
Vehicle Auto-Classification Using Machine Learning Algorithms Based on Seismic Fingerprinting by nAhmad Bahaa Ahmad,nHakim Saibi,nAbdelkader Nasreddine Belkacem andnTakeshi Tsuji
User Authentication and Authorization Framework in IoT Protocols by nAmmar Mohammad,nHasan Al-Refai andnAli Ahmad Alawneh
ILP-Based and Heuristic Scheduling Techniques for Variable-Cycle Approximate Functional Units in High-Level Synthesis by nKoyu Ohata,nHiroki Nishikawa,nXiangbo Kong andnHiroyuki Tomiyama
Application of Feature Selection Approaches for Prioritizing and Evaluating the Potential Factors for Safety Management in Transportation Systems by nGiuseppe Guido,nSami Shaffiee Haghshenas,nSina Shaffiee Haghshenas,nAlessandro Vitale andnVittorio Astarita
Solution of Extended Multi-Objective Portfolio Selection Problem in Uncertain Environment Using Weighted Tchebycheff Method by nPavan Kumar
Exploiting Augmented Reality Technology in Special Education: A Systematic Review by nAndrianthi Kapetanaki,nAkrivi Krouska,nChristos Troussas andnCleo Sgouropoulou
Efficient, Lightweight Cyber Intrusion Detection System for IoT Ecosystems Using MI2G Algorithm by nSunil Kaushik,nAkashdeep Bhardwaj,nAbdullah Alomari,nSalil Bharany,nAmjad Alsirhani andnMohammed Mujib Alshahrani
Measuring Impact of Dependency Injection on Software Maintainability by nPeter Sun,nDae-Kyoo Kim,nHua Ming andnLunjin Lu
Feature Encoding and Selection for Iris Recognition Based on Variable Length Black Hole Optimization by nTara Othman Qadir Saraf,nN. Fuad andnN. S. A. M. Taujuddin
Drone Deployment Algorithms for Effective Communication Establishment in Disaster Affected Areas by nBivin Varkey Varghese,nParavurumbel Sreedharan Kannan,nRavilal Soni Jayanth,nJohns Thomas andnKavum Muriyil Balachandran Shibu Kumar
“Metrology” Approach to Data Streams Initiated by Internet Services in the Local Networks by nNina A. Filimonova,nAlexander G. Kolpakov andnSergei I. Rakin
The Historical Relationship between the Software Vulnerability Lifecycle and Vulnerability Markets: Security and Economic Risks by nAbdullah M. Algarni
Predicting Breast Cancer from Risk Factors Using SVM and Extra-Trees-Based Feature Selection Method by nGanjar Alfian,nMuhammad Syafrudin,nImam Fahrurrozi,nNorma Latif Fitriyani,nFransiskus Tatas Dwi Atmaji,nTri Widodo,nNurul Bahiyah,nFilip Benes andnJongtae Rhee
Vertical Farming Perspectives in Support of Precision Agriculture Using Artificial Intelligence: A Review by nRiki Ruli A. Siregar,nKudang Boro Seminar,nSri Wahjuni andnEdi Santosa
{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}
>