A Critical Review on the 3D Cephalometric Analysis Using Machine Learning |
by nShtwai Alsubai |
|
A Systemic Mapping Study of Business Intelligence Maturity Models for Higher Education Institutions |
by nChristopher Lee Stewart andnM. Ali Akber Dewan |
|
Machine Learning Models for Classification of Human Emotions Using Multivariate Brain Signals |
by nShashi Kumar G. S.,nAhalya Arun,nNiranjana Sampathila andnR. Vinoth |
|
Towards Predicting Architectural Design Patterns: A Machine Learning Approach |
by nSirojiddin Komolov,nGcinizwe Dlamini,nSwati Megha andnManuel Mazzara |
|
Physical Activity Recommendation System Based on Deep Learning to Prevent Respiratory Diseases |
by nUsharani Bhimavarapu,nM. Sreedevi,nNalini Chintalapudi andnGopi Battineni |
|
User Analytics in Online Social Networks: Evolving from Social Instances to Social Individuals |
by nGerasimos Razis,nStylianos Georgilas,nGiannis Haralabopoulos andnIoannis Anagnostopoulos |
|
Vehicle Auto-Classification Using Machine Learning Algorithms Based on Seismic Fingerprinting |
by nAhmad Bahaa Ahmad,nHakim Saibi,nAbdelkader Nasreddine Belkacem andnTakeshi Tsuji |
|
User Authentication and Authorization Framework in IoT Protocols |
by nAmmar Mohammad,nHasan Al-Refai andnAli Ahmad Alawneh |
|
ILP-Based and Heuristic Scheduling Techniques for Variable-Cycle Approximate Functional Units in High-Level Synthesis |
by nKoyu Ohata,nHiroki Nishikawa,nXiangbo Kong andnHiroyuki Tomiyama |
|
Application of Feature Selection Approaches for Prioritizing and Evaluating the Potential Factors for Safety Management in Transportation Systems |
by nGiuseppe Guido,nSami Shaffiee Haghshenas,nSina Shaffiee Haghshenas,nAlessandro Vitale andnVittorio Astarita |
|
Solution of Extended Multi-Objective Portfolio Selection Problem in Uncertain Environment Using Weighted Tchebycheff Method |
by nPavan Kumar |
|
Exploiting Augmented Reality Technology in Special Education: A Systematic Review |
by nAndrianthi Kapetanaki,nAkrivi Krouska,nChristos Troussas andnCleo Sgouropoulou |
|
Efficient, Lightweight Cyber Intrusion Detection System for IoT Ecosystems Using MI2G Algorithm |
by nSunil Kaushik,nAkashdeep Bhardwaj,nAbdullah Alomari,nSalil Bharany,nAmjad Alsirhani andnMohammed Mujib Alshahrani |
|
Measuring Impact of Dependency Injection on Software Maintainability |
by nPeter Sun,nDae-Kyoo Kim,nHua Ming andnLunjin Lu |
|
Feature Encoding and Selection for Iris Recognition Based on Variable Length Black Hole Optimization |
by nTara Othman Qadir Saraf,nN. Fuad andnN. S. A. M. Taujuddin |
|
Drone Deployment Algorithms for Effective Communication Establishment in Disaster Affected Areas |
by nBivin Varkey Varghese,nParavurumbel Sreedharan Kannan,nRavilal Soni Jayanth,nJohns Thomas andnKavum Muriyil Balachandran Shibu Kumar |
|
“Metrology†Approach to Data Streams Initiated by Internet Services in the Local Networks |
by nNina A. Filimonova,nAlexander G. Kolpakov andnSergei I. Rakin |
|
The Historical Relationship between the Software Vulnerability Lifecycle and Vulnerability Markets: Security and Economic Risks |
by nAbdullah M. Algarni |
|
Predicting Breast Cancer from Risk Factors Using SVM and Extra-Trees-Based Feature Selection Method |
by nGanjar Alfian,nMuhammad Syafrudin,nImam Fahrurrozi,nNorma Latif Fitriyani,nFransiskus Tatas Dwi Atmaji,nTri Widodo,nNurul Bahiyah,nFilip Benes andnJongtae Rhee |
|
Vertical Farming Perspectives in Support of Precision Agriculture Using Artificial Intelligence: A Review |
by nRiki Ruli A. Siregar,nKudang Boro Seminar,nSri Wahjuni andnEdi Santosa |
|