International Journal of Advanced Computer Science and Applications

journal

International Journal of Advanced Computer Science and Applications is …
instance of (P31):
scientific journalQ5633421

External links are
P8375Crossref journal ID233408
P8903HAL journal ID107154
P236ISSN2156-5570
2158-107X
P7363ISSN-L2156-5570
P856official websitehttp://bibpurl.oclc.org/web/51561
http://sites.google.com/site/ijacsa2010/
http://thesai.org/Publications/IJACSA
P10283OpenAlex IDV23629721
P7662Scilit journal ID652498
P1156Scopus source ID21100867241

P495country of originUnited States of AmericaQ30
P8875indexed in bibliographic reviewScopusQ371467
P407language of work or nameEnglishQ1860
P123publisherScience and Information OrganizationQ30267116
P1813short nameIJACSA
P1476titleInternational Journal of Advanced Computer Science and Applications
International journal of advanced computer science & applications

Reverse relations

published in (P1433)
Q1264051585G Enabled Technologies for Smart Education
Q121738920A Block Cipher Involving a Key Bunch Matrix and an Additional Key Matrix, Supplemented with Modular Arithmetic Addition and supported by Key-based Substitution
Q123122609A Block Cipher Involving a Key Bunch Matrix and an Additional Key Matrix, Supplemented with Xor Operation and Supported by Key-Based Permutation and Substitution
Q121890850A Block Cipher Involving a Key and a Key Bunch Matrix, Supplemented with Key-Based Permutation and Substitution
Q114368084A Blockchain-based Crowdsourced Task Assessment Framework using Smart Contract
Q126853970A Built-in Criteria Analysis for Best IT Governance Framework
Q110500161A Classification Javanese Letters Model using a Convolutional Neural Network with KERAS Framework
Q114965792A Classification of Essential Factors for the Development and Implementation of Cyber Security Strategy in Public Sector Organizations
Q114965829A Cluster-Based Mitigation Strategy Against Security Attacks in Wireless Sensor Networks
Q114053797A Code Level Based Programmer Assessment and Selection Criterion Using Metric Tools
Q113178689A Collaborative Filtering Recommender System Model for Recommending Intervention to Improve Elderly Well-being
Q126007624A Comparative Study of Stereovision Algorithms
Q126407524A Comparative Study of Supervised Machine Learning Techniques for Diagnosing Mode of Delivery in Medical Sciences
Q121437370A Comparative Study of Twofish, Blowfish, and Advanced Encryption Standard for Secured Data Transmission
Q113237329A Comparative Study on the Effect of Multiple Inheritance Mechanism in Java, C++, and Python on Complexity and Reusability of Code
Q57607741A Comparative Usability Study on the Use of Auditory Icons to Support Virtual Lecturers in E-Learning Interfaces
Q57722403A Comparative study of Arabic handwritten characters invariant feature
Q114965959A Comprehensive Analysis on the Security Threats and their Countermeasures of IoT
Q113237323A Comprehensive Evaluation of Cue-Words based Features and In-text Citations based Features for Citation Classification
Q57895791A Computational Model of Extrastriate Visual Area MT on Motion Perception
Q126008341A Computer Vision-based System for Surgical Waste Detection
Q57977695A Conceptual Design Model for High Performance Hotspot Network Infrastructure (GRID WLAN)
Q114845930A Cryptographic Technique for Communication among IoT Devices using Tiger192 and Whirlpool
Q114845939A DNA Cryptographic Solution for Secured Image and Text Encryption
Q113426322A Data Security Algorithm for the Cloud Computing based on Elliptic Curve Functions and Sha3 Signature
Q114965768A Deep Transfer Learning Approach to Enhance Network Intrusion Detection Capabilities for Cyber Security
Q125877480A Feasible Rural Education System
Q126174779A Flood Forecasting Model based on Wireless Sensor and Actor Networks
Q121299675A Format-Compliant Selective Encryption Scheme for Real-Time Video Streaming of the H.264/AVC
Q114965865A Framework for Cloud Security Risk Management based on the Business Objectives of Organizations
Q114845941A Framework for Detecting Botnet Command and Control Communication over an Encrypted Channel
Q126841335A Framework for Hoax News Detection and Analyzer used Rule-based Methods
Q114965988A Framework for an Effective Information Security Awareness Program in Healthcare
Q122656238A Fresnelet-Based Encryption of Medical Images using Arnold Transform
Q113178684A Fuzzy MCDM Approach for Structured Comparison of the Health Literacy Level of Hospitals
Q114965859A Fuzzy Multi-Objective Covering-based Security Quantification Model for Mitigating Risk of Web based Medical Image Processing System
Q114254075A Fuzzy Similarity Based Concept Mining Model for Text Classification
Q110565913A Fuzzy based Model for Effort Estimation in Scrum Projects
Q121410564A Generic Framework for Automated Quality Assurance of Software Models –Implementation of an Abstract Syntax Tree
Q114966002A Generic Model for Assessing Multilevel Security-Critical Object-Oriented Programs
Q125591915A Hybrid Document Features Extraction with Clustering based Classification Framework on Large Document Sets
Q114965800A Hybrid Encryption Solution to Improve Cloud Computing Security using Symmetric and Asymmetric Cryptography Algorithms
Q125623315A Japanese Tourism Recommender System with Automatic Generation of Seasonal Feature Vectors
Q121943995A Key-Ordered Decisional Learning Parity with Noise (DLPN) Scheme for Public Key Encryption Scheme in Cloud Computing
Q113426335A Knowledge-based Expert System for Supporting Security in Software Engineering Projects
Q114053789A Machine Learning based Analytical Approach for Envisaging Bugs
Q124829650A Meta Analysis of Attention Models on Legal Judgment Prediction System
Q126242067A Meta-Model for Strategic Educational Goals
Q126840869A Method for Designing Domain-Specific Document Retrieval Systems using Semantic Indexing
Q126841631A Method for Segmentation of Vietnamese Identification Card Text Fields
Q113237316A Method to Prevent SQL Injection Attack using an Improved Parameterized Stored Procedure
Q126404429A Mobile Agent Team Works based on Load-Balancing Middleware for Distributed Computing Systems
Q122214810A Modified Feistel Cipher Involving Modular Arithmetic Addition and Modular Arithmetic Inverse of a Key Matrix
Q121033205A Modified Feistel Cipher Involving Substitution, Shifting of rows, Mixing of columns, XOR operation with a Key and Shuffling
Q121461184A Modified Feistel Cipher Involving XOR Operation and Modular Arithmetic Inverse of a Key Matrix
Q114965863A Multi-Layered Security Model for Learning Management System
Q123357025A Multi-Threaded Symmetric Block Encryption Scheme Implementing PRNG for DES and AES Systems
Q114966044A Multimodal Firefly Optimization Algorithm Based on Coulomb’s Law
Q111097052A New Application Programming Interface and a Fortran-like Modeling Language for Evaluating Functions and Specifying Optimization Problems at Runtime
Q114966038A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network
Q123232377A New Key Generation Technique based on Neural Networks for Lightweight Block Ciphers
Q122464056A New Message Encryption Method based on Amino Acid Sequences and Genetic Codes
Q114856346A New Method to Build NLP Knowledge for Improving Term Disambiguation
Q126407606A New Method to Find Image Recovery
Q110565914A New Project Risk Management Model based on Scrum Framework and Prince2 Methodology
Q114965891A New Security Model for Web Browser Local Storage
Q114596115A New Shoulder Surfing and Mobile Key-Logging Resistant Graphical Password Scheme for Smart-Held Devices
Q122485104A New Solution to Protect Encryption Keys when Encrypting Database at the Application Level
Q122931405A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture
Q114845932A Note on Time and Space Complexity of RSA and ElGamal Cryptographic Algorithms
Q114965836A Novel ASCII Code-based Polybius Square Alphabet Sequencer as Enhanced Cryptographic Cipher for Cyber Security Protection (APSAlpS-3CS)
Q114966057A Novel Adaptive Grey Verhulst Model for Network Security Situation Prediction
Q126169822A Novel Approach for an Outdoor Oyster Mushroom Cultivation using a Smart IoT-based Adaptive Neuro Fuzzy Controller
Q125408344A Novel Approach to Multi-Layer-Perceptron Training using Quadratic Interpolation Flower Pollination Neural Network on Non-Binary Datasets
Q114965909A Novel Architecture for Information Security using Division and Pixel Matching Techniques
Q121621035A Novel Block Cipher Involving a Key bunch Matrix and a Key-based Permutation and Substitution
Q121456232A Novel Chaotic System for Text Encryption Optimized with Genetic Algorithm
Q114966071A Novel Cloud Computing Security Model to Detect and Prevent DoS and DDoS Attack
Q125422695A Novel Convolutional Neural Network Architecture for Pollen-Bearing Honeybee Recognition
Q115358200A Novel E-Mail Network Evolution Model based on user Information
Q115358193A Novel Evolving Sentimental Bag-of-Words Approach for Feature Extraction to Detect Misinformation
Q122271286A Novel Feistel Cipher Involving a Bunch of Keys Supplemented with XOR Operation
Q122145845A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition
Q114965777A Novel Framework for Cloud based Virtual Machine Security by Change Management using Machine
Q115358196A Novel Framework for Drug Synergy Prediction using Differential Evolution based Multinomial Random Forest
Q123151698A Novel Framework for Modelling Wheelchairs under the Realm of Internet-of-Things
Q126207528A Novel Framework for Semi-supervised Multiple-label Image Classification using Multi-stage CNN and Visual Attention Mechanism
Q122537848A Novel Image Encryption Approach for Cloud Computing Applications
Q123270154A Novel Image Encryption Supported by Compression Using Multilevel Wavelet Transform
Q123147872A Novel Image Encryption using Memetic Differential Expansion based Modified Logistic Chaotic Map
Q114053794A Novel Image Fusion Scheme using Wavelet Transform for Concealed Weapon Detection
Q125854597A Novel Method for Anomaly Detection in the Internet of Things using Whale Optimization Algorithm
Q126406591A Novel Method for Patients Identification in Emergency Cases using RFID based RADIO Technology
Q122505250A Novel Prediction Model for Compiler Optimization with Hybrid Meta-Heuristic Optimization Algorithm
Q121894593A Novel Secure Transposition Cipher Technique using Arbitrary Zigzag Patterns
Q114965968A Novel Security Scheme based on Twofish and Discrete Wavelet Transform
Q121179687A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix
Q114965945A Portable Virtual LAB for Informatics Education using Open Source Software
Q111822753A Prediction Error Nonlinear Difference Expansion Reversible Watermarking for Integrity and Authenticity of DICOM Medical Images
Q126840525A Prediction-based Curriculum Analysis using the Modified Artificial Bee Colony Algorithm
Q114965924A Proposal for A High Availability Architecture for VoIP Telephone Systems based on Open Source Software
Q111519074A Proposed Approach for Image Compression based on Wavelet Transform and Neural Network
Q125765569A Proposed Model for Improving the Performance of Knowledge Bases in Real-World Applications by Extracting Semantic Information
Q114596117A Qualitative Comparison of NoSQL Data Stores
Q114296690A Readiness Evaluation of Applying e-Government in the Society: Shall Citizens begin to Use it?
Q115149095A Recognition Method for Cassava Phytoplasma Disease (CPD) Real-Time Detection based on Transfer Learning Neural Networks
Q126202903A Recommender System for Mobile Applications of Google Play Store
Q114965781A Reliable Lightweight Trust Evaluation Scheme for IoT Security
Q114965855A Review and Development Methodology of a LightWeight Security Model for IoT-based Smart Devices
Q126024560A Review of Blockchain based Educational Projects
Q125815958A Review of Fake News Detection Models: Highlighting the Factors Affecting Model Performance and the Prominent Techniques Used
Q114966033A Review of Solutions for SDN-Exclusive Security Issues
Q125100181A Review on Event-Based Epidemic Surveillance Systems that Support the Arabic Language
Q114965902A Review on Security Issues and their Impact on Hybrid Cloud Computing Environment
Q114053786A Review on Software Bug Localization Techniques using a Motivational Example
Q114965896A Review on the Verification Approaches and Tools used to Verify the Correctness of Security Algorithms and Protocols
Q114053785A Review-based Context-Aware Recommender Systems: Using Custom NER and Factorization Machines
Q123198354A Risk Management Framework for Large Scale Scrum using Metadata Outer Request Management Methodology
Q126841583A Robust Method for Diagnostic Energetic System with Bond Graph
Q113237321A Robust Optimization Approach of SQL-to-SPARQL Query Rewriting
Q114965839A Robust Scheme to Improving Security of Data using Graph Theory
Q60686612A Robust System for Noisy Image Classification Combining Denoising Autoencoder and Convolutional Neural Network
Q123194441A Secure Cloud Computing Architecture Using Homomorphic Encryption
Q121567000A Secure Fog-cloud Architecture using Attribute-based Encryption for the Medical Internet of Things (MIoT)
Q122942145A Secure Network Communication Protocol Based on Text to Barcode Encryption Algorithm
Q126853762A Semantic Ontology for Disaster Trail Management System
Q108926731A Sentiment Analysis of Egypt’s New Real Estate Registration Law on Facebook
Q114965922A Serious Game for Healthcare Industry: Information Security Awareness Training Program for Hospital Universiti Kebangsaan Malaysia
Q114965840A Service Scheduling Security Model for a Cloud Environment
Q114368094A Service-Oriented Architecture for Optimal Service Selection and Positioning in Extremely Large Crowds
Q113178693A Smartphone Intervention for Cycle Commuting
Q126170626A Social Semantic Web based Conceptual Architecture of Disaster Trail Management System
Q111925393A Software Framework for Self-Organized Flocking System Motion Coordination Research
Q122872941A Study of Encryption for Multimedia Digital Audio Security
Q114845927A Study of Security Impacts and Cryptographic Techniques in Cloud-based e-Learning Technologies
Q114966047A Study to Investigate State of Ethical Development in E-Learning
Q125762566A Survey of Automated Text Simplification
Q114254072A Survey of Topic Modeling in Text Mining
Q125623862A Survey on Blockchain Technology Concepts, Applications and Security
Q114965858A Survey on Cloud Data Security using Image Steganography
Q121942895A Survey on Image Encryption using Chaos-based Techniques
Q114368104A Survey on Location Privacy-Preserving Mechanisms in Mobile Crowdsourcing
Q121160823A Survey on Privacy Vulnerabilities in Permissionless Blockchains
Q114966048A Survey on Security for Smartphone Device
Q114254068A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks
Q122642993A Survey on Tor Encrypted Traffic Monitoring
Q123225353A Survey on the Cryptographic Encryption Algorithms
Q113426378A Survey: Agent-based Software Technology Under the Eyes of Cyber Security, Security Controls, Attacks and Challenges
Q121682042A Synchronous Stream Cipher Generator Based on Quadratic Fields (SSCQF)
Q110570071A Systematic Literature Review of Success Factors and Barriers of Agile Software Development
Q114965933A Systematic Review of Cyber Security and Classification of Attacks in Networks
Q114053790A Systematic Study of Duplicate Bug Report Detection
Q126404631A Systematic TRMA Protocol for Yielding Secure Environment for Authentication and Privacy Aspects
Q126405821A Technical Guide for the RASP-FIT Tool
Q114965958A Text based Authentication Scheme for Improving Security of Textual Passwords
Q121432198A Topic Modeling Based Solution for Confirming Software Documentation Quality
Q115018887A Trait-based Deep Learning Automated Essay Scoring System with Adaptive Feedback
Q111823278A Type-2 Fuzzy in Image Extraction for DICOM Image
Q114368087A Visual Analytics System for Route Planning and Emergency Crowd Evacuation
Q113237305A new algorithm for detecting SQL injection attack in Web application
Q113237340A new graph based text segmentation using Wikipedia for automatic text summarization
Q114966063A survey on top security threats in cloud computing
Q114368082A-SA SOS: A Mobile- and IoT-based Pre-hospital Emergency Service for the Elderly and Village Health Volunteers
Q121902812ABJAD Arabic-Based Encryption
Q108466903AHP-based Security Decision Making: How Intention and Intrinsic Motivation Affect Policy Compliance
Q111996177Accessibility of Bulgarian Regional Museums Websites
Q126404747Accurate Speech Emotion Recognition by using Brain-Inspired Decision-Making Spiking Neural Network
Q126853855Achieving High Privacy Protection in Location-based Recommendation Systems
Q122189555Acoustic Strength of Green Turtle and Fish Based on FFT Analysis
Q126404839Activation and Spreading Sequence for Spreading Activation Policy Selection Method in Transfer Reinforcement Learning
Q125465315Adaptive Balance Optimizer: A New Adaptive Metaheuristic and its Application in Solving Optimization Problem in Finance
Q126411010Adaptive Cluster based Model for Fast Video Background Subtraction
Q115237634Adaptive Error Detection Method for P300-based Spelling Using Riemannian Geometry
Q41523241Adaptive e-learning using Genetic Algorithm and Sentiments Analysis in a Big Data System
Q114254049Adopting Vulnerability Principle as the Panacea for Security Policy Monitoring
Q123323261Advanced Steganography Algorithm using Encrypted secret message
Q126406862Adverse Impacts of Social Networking Sites on Academic Result: Investigation, Cause Identification and Solution
Q110512233Aesthetics Versus Readability of Source Code
Q126407219Affective Educational Application of Fish Tank Hydroponics System
Q57722351Agent-Based System for Efficient kNN Query Processing with Comprehensive Privacy Protection
Q126007877Agent-based Managing for Grid Cloud System — Design and Prototypal Implementation
Q110570078Agile Fitness of Software Companies in Bangladesh: An Empirical Investigation
Q125925456Alzheimer’s Disease Detection using Neighborhood Components Analysis and Feature Selection
Q121336497An Algorithm that Prevents SPAM Attacks using Blockchain
Q120986915An Analysis of Encryption and Decryption Application by using One Time Pad Algorithm
Q115363436An Approach for Teaching of National Languages and Cultures through ICT in Cameroon
Q114053782An Architecture of Domain Independent and Extensible Intelligent Tutoring System based on Concept Dependencies and Subject Paths
Q125801338An Augmented Reality Approach to Integrate Practical Activities in E-Learning Systems
Q114596106An Authorization Framework for Preserving Privacy of Big Medical Data via Blockchain in Cloud Server
Q110512234An Automated Framework for Detecting Change in the Source Code and Test Case Change Recommendation
Q121628117An Automatic Cryptanalysis of Arabic Transposition Ciphers using Compression
Q113178682An Early Intervention Technique for At-Risk Prediction of Higher Education Students in Cloud-based Virtual Learning Environment using Classification Algorithms during COVID-19
Q114965786An Effective Design of Model for Information Security Requirement Assessment
Q114053791An Effective Solution to Count-to-Infinity Problem for both Complex and Linear Sub-Networks
Q126404694An Efficient Algorithm to Find the Height of a Text Line and Overcome Overlapped and Broken Line Problem during Segmentation
Q114965978An Efficient Approach for the Security Threats on Data Centers in IOT Environment
Q122438789An Efficient Computational Method of Motif Finding in the Zika Virus Genome
Q125882693An Efficient Feature Selection Approach for Intrusion Detection System using Decision Tree
Q126407656An Efficient Method for Speeding up Large-Scale Data Transfer Process to Database: A Case Study
Q124937353An Efficient Unusual Event Tracking in Video Sequence using Block Shift Feature Algorithm
Q114846168An Empirical Comparison of Machine Learning Algorithms for Classification of Software Requirements
Q123020067An Empirical Investigation on a Tool-Based Boilerplate Technique to Improve Software Requirement Specification Quality
Q113264783An Enhanced Artificial Bee Colony: Naïve Bayes Technique for Optimizing Software Testing
Q123281644An Enhanced Steganographic Model Based on DWT Combined with Encryption and Error Correction Techniques
Q126840155An Enhanced Weighted Associative Classification Algorithm without Preassigned Weight based on Ranking Hubs
Q111519075An Enhencment Medical Image Compression Algorithm Based on Neural Network
Q114965923An Ensemble Approach to Big Data Security (Cyber Security)
Q125972316An Ensemble of Arabic Transformer-based Models for Arabic Sentiment Analysis
Q126846654An Evaluation of User Awareness for the Detection of Phishing Emails
Q122987276An Image Encryption Technique based on Chaotic S-Box and Arnold Transform
Q126840122An Immunity-based Error Containment Algorithm for Database Intrusion Response Systems
Q121307639An Improved Homomorphic Encryption for Secure Cloud Data Storage
Q114596110An Improved Time-Based One Time Password Authentication Framework for Electronic Payments
Q114965956An Intelligent Security Approach using Game Theory to Detect DoS Attacks In IoT
Q125352900An Internet-based Student Admission Screening System utilizing Data Mining
Q114965797An Ontological Framework for Healthcare Web Applications Security
Q114966074An Open Source P2P Encrypted Voip Application
Q114965787An Open-source Wireless Platform for Real-time Water Quality Monitoring with Precise Global Positioning
Q57607746An Optimized Analogy-Based Project Effort Estimation
Q121174666An RGB Image Encryption Supported by Wavelet-based Lossless Compression
Q113237335An SMS-SQL based On-board system to manage and query a database
Q113178681An Urban Water Infrastructure Management System Design with Storm Water Intervention for Smart Cities
Q57977659Analysis of Cloud Network Management Using Resource Allocation and Task Scheduling Services
Q126404449Analysis of Multi-hop Wireless Sensor Networks using Probability Propagation Models
Q114596113Analysis of Password and Salt Combination Scheme To Improve Hash Algorithm Security
Q114965755Analysis of Privacy and Security Challenges in e-Health Clouds
Q114966007Analysis of Security Requirements Engineering: Towards a Comprehensive Approach
Q111897199Analysis of Software Deformity Prone Datasets with Use of AttributeSelectedClassifier
Q114965846Analysis of an eHealth app: Privacy, Security and Usability
Q122258384Analyzing the Efficiency of Text-to-Image Encryption Algorithm
Q115018881Analyzing the Relationship between the Personality Traits and Drug Consumption (Month-based user Definition) using Rough Sets Theory
Q113178692Analyzing the Social Awareness in Autistic Children Trained through Multimedia Intervention Tool using Data Mining
Q114965895Android Security Development: SpywareDetection, Apps Secure Level and Data Encryption Improvement
Q122283391Anomaly Detection using Network Metadata
Q114965820Anti-Molestation: An IoT based Device for Women’s Self-Security System to Avoid Unlawful Activities
Q125964858Application of Artificial Intelligence-Genetic Algorithms to Select Stock Portfolios in the Asian Markets
Q126410763Application of Computer-Aided to Improve Industrial Productivity in Cement Factories by using a Novel Design of Quantitative Conveyor
Q123339475Application of Homomorphic Encryption on Neural Network in Prediction of Acute Lymphoid Leukemia
Q119821183Application of Random Forest Regression with Hyper-parameters Tuning to Estimate Reference Evapotranspiration
Q120964177Applying Cellular Automata for Simulating and Assessing Urban Growth Scenario Based in Nairobi, Kenya
Q73606063Arabic Cursive Characters Distributed Recognition using the DTW Algorithm on BOINC: Performance Analysis
Q125910593Arabic Location Named Entity Recognition for Tweets using a Deep Learning Approach
Q125874750Architecture Considerations for Big Data Management
Q114368114Arijo: Location-Specific Data Crowdsourcing Web Application as a Curriculum Supplement
Q113264786Artificial Bee Colony Algorithm Optimization for Video Summarization on VSUMM Dataset
Q123129373Artificial Intelligence-based Detection of Fava Bean Rust Disease in Agricultural Settings: An Innovative Approach
Q121752994Assessing Architectural Sustainability during Software Evolution using Package-Modularization Metrics
Q114965776Assessing and Proposing Countermeasures for Cyber-Security Attacks
Q114965794Assessment of Emotion in Online News based on Kansei Approach for National Security
Q121364748Attribute-based Encryption for Fine-Grained Access Control on Secure Hybrid Clouds
Q114053784Augmented System for Food Crops Production in Agricultural Supply Chain using Blockchain Technology
Q114965844Authentication using Robust Primary PIN (Personal Identification Number), Multifactor Authentication for Credit Card Swipe and Online Transactions Security
Q126840331Automatic Classification of Academic and Vocational Guidance Questions using Multiclass Neural Network
Q114856344Automatic Structured Abstract for Research Papers Supported by Tabular Format using NLP
Q126410948Automatically Extract Vertebra and Compute the Cobb Angle based on Spine’s Features and Adaptive ASMs in Posteroanterior Radiographs
Q114965750Automating the Shaping of Metadata Extracted from a Company Website with Open Source Tools
Q122914814Autonomous Control of Eye Based Electric Wheel Chair with Obstacle Avoidance and Shortest Path Findings Based on Dijkstra Algorithm
Q114966041Awareness Training Transfer and Information Security Content Development for Healthcare Industry
Q114965861Awareness of Ethical Issues when using an e-Learning System
Q113426319BCSM: A BlockChain-based Security Manager for Big Data
Q113237318BERT+vnKG: Using Deep Learning and Knowledge Graph to Improve Vietnamese Question Answering System
Q114965823BOTNETs: A Network Security Issue
Q122680697BREPubSub: A Secure Publish-Subscribe Model using Blockchain and Re-encryption for IoT Data Sharing Management
Q126406126Best-Choice Topology: An Optimized Array-based Maximum Finder
Q125291900Big Data Strategy
Q114596116Bio-inspired Think-and-Share Optimization for Big Data Provenance in Wireless Sensor Networks
Q126854014Bioinspired Immune System for Intrusions Detection System in Self Configurable Networks
Q125405841Bird Image Classification using Convolutional Neural Network Transfer Learning Architectures
Q124857406Black Sea Catchment Observation System as a Portal for GEOSS Community
Q122269868Blind Turing-Machines: Arbitrary Private Computations from Group Homomorphic Encryption
Q114596105Blockchain Privacy Data Access Control Method Based on Cloud Platform Data
Q121890294Blockchain Traffic Offence Demerit Points Smart Contracts: Proof of Work
Q126190419Blockchain and Internet of Things for Business Process Management: Theory, Challenges, and Key Success Factors
Q125566840Blockchain in Insurance: Exploratory Analysis of Prospects and Threats
Q111992660Bootstrapping Domain Knowledge Exploration using Conceptual Mapping of Wikipedia
Q125262124BrainNet-7: A CNN Model for Diagnosing Brain Tumors from MRI Images based on an Ablation Study
Q125588997Building Regional Capacities for GEOSS and INSPIRE: a journey in the Black Sea Catchment
Q126404884BulkSort: System Design and Parallel Hardware Implementation Considerations
Q121197742CDRA: A Community Detection based Routing Algorithm for Link Failure Recovery in Software Defined Networks
Q113237310CISE: Community Engagement of CEB Cloud Ecosystem in Box
Q114368100CREeLS: Crowdsourcing based Requirements Elicitation for eLearning Systems
Q114965860Cancelable Face Template Protection using Transform Features for Cyberworld Security
Q113426367Capturing Software Security Practices using CBR: Three Case Studies
Q126410603Cardiovascular Disease Diagnosis: A Machine Learning Interpretation Approach
Q126044737Causal Impact Analysis on Android Market
Q114965942Challenges in Designing Ethical Rules for Infrastructures in Internet of Vehicles
Q126410680Classification Performance of Violence Content by Deep Neural Network with Monarch Butterfly Optimization
Q126853847Classification of Arabic Writing Styles in Ancient Arabic Manuscripts
Q126840509Classification of People who Suffer Schizophrenia and Healthy People by EEG Signals using Deep Learning
Q114966050Cloud CRM: State-of-the-Art and Security Challenges
Q114965953Cloud Computing Environment and Security Challenges: A Review
Q114965888Cloud Security based on the Homomorphic Encryption
Q114965905Cloud Server Security using Bio-Cryptography
Q125359781Cloud based Forecast of Municipal Solid Waste Growth using AutoRegressive Integrated Moving Average Model: A Case Study for Bengaluru
Q126407429Cloud-Edge Network Data Processing based on User Requirements using Modify MapReduce Algorithm and Machine Learning Techniques
Q123162222Cloud-based Secure Healthcare Framework by using Enhanced Ciphertext Policy Attribute-Based Encryption Scheme
Q126405274Clustering Analysis for Malware Behavior Detection using Registry Data
Q57929435Clustering based Max-Min Scheduling in Cloud Environment
Q126411062Clustering based Privacy Preserving of Big Data using Fuzzification and Anonymization Operation
Q114596109Code Optimizations for Parallelization of Programs using Data Dependence Identifier
Q125563098Collaborative Editing over Opportunistic Networks: State of the Art and Challenges
Q110570074Collaborative Integrated Model in Agile Software Development (MDSIC/MDSIC–M)-Case Study and Practical Advice
Q114966059Community Perception of the Security and Acceptance of Mobile Banking Services in Bahrain: An Empirical Study
Q126853869Comparative Analysis between a Photovoltaic System with Two-Axis Solar Tracker and One with a Fixed Base
Q114965778Comparative Analysis of National Cyber Security Strategies using Topic Modelling
Q57607718Comparative Analysis of Online Rating Systems
Q114965819Comparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practice
Q110570075Comparative Study between Lean Six Sigma and Lean-Agile for Quality Software Requirement
Q114856339Comparative Study of Truncating and Statistical Stemming Algorithms
Q110565915Comparison of Agile Method and Scrum Method with Software Quality Affecting Factors
Q114053792Comparison of Item Difficulty Estimates in a Basic Statistics Test using ltm and CTT Software Packages in R
Q122973074Compiler Optimization Prediction with New Self-Improved Optimization Model
Q111519073Comprehensive Analysis of Flow Incorporated Neural Network based Lightweight Video Compression Architecture
Q114053788Comprehensive Study on Machine Learning Techniques for Software Bug Prediction
Q114966069Computer Ethics in the Semantic Web Age
Q114965803Computing Academics’ Perceived Level of Awareness and Exposure to Software Engineering Code of Ethics: A Case Study of a South African University of Technology
Q125975462Concentrated Solar Power Site Suitability using GIS-MCDM Technique taken UAE as a Case Study
Q114965827Conceptual Model for Connected Vehicles Safety and Security using Big Data Analytics
Q114966061Contemplation of Effective Security Measures in Access Management from Adoptability Perspective
Q114966089Context Switching Semaphore with Data Security Issues using Self-healing Approach
Q111822536Contribution to the Improvement of Cryptographic Protection Methods for Medical Images in DICOM Format through a Combination of Encryption Method
Q121667248Controlling a Wheelchair using a Brain Computer Interface based on User Controlled Eye Blinks
Q113074225Convex Hybrid Restoration and Segmentation Model for Color Images
Q126405405Convolutional Neural Network Considering Physical Processes and its Application to Diatom Detection
Q114965913Cookies and Sessions: A Study of what they are, how they can be Stolen and a Discussion on Security
Q114596122Creating and Protecting Password: A User Intention
Q114368111Crowd Counting Mapping to make a Decision
Q114368119Crowd Mobility Analysis using WiFi Sniffers
Q114368102Crowd-Generated Data Mining for Continuous Requirements Elicitation
Q123155277Crypto-Steganographic LSB-based System for AES-Encrypted Data
Q56568444Cryptocurrency Mining – Transition to Cloud
Q122263790Cryptography using Random Rc4 Stream Cipher on SMS for Android-Based Smartphones
Q114965774Customer Satisfaction with Digital Wallet Services: An Analysis of Security Factors
Q114965831Cyber Security Defence Policies: A Proposed Guidelines for Organisations Cyber Security Practices
Q114965946Cyber-Security Incidents: A Review Cases in Cyber-Physical Systems
Q113237315Cyberattacks and Vociferous Implications on SECS/GEM Communications in Industry 4.0 Ecosystem
Q114966062Cyberspace Forensics Readiness and Security Awareness Model
Q124900982DBTechVoc: A POS-tagged Vocabulary of Tokens and Lemmata of the Database Technical Domain
Q126841455Data Augmentation to Stabilize Image Caption Generation Models in Deep Learning
Q111896879Data Backup Approach using Software-defined Wide Area Network
Q114966064Data Center Governance Information Security Compliance Assessment Based on the Cobit Framework
Q66677643Data Citation Service for Wikipedia Articles
Q114965920Data Governance Cloud Security Checklist at Infrastructure as a Service (IaaS)
Q114965754Data Recovery Comparative Analysis using Open-based Forensic Tools Source on Linux
Q113426316Data Security Awareness in Online Learning
Q114966039Data Security Using Cryptography and Steganography Techniques
Q114966045Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions
Q114965788Data Security: A New Symmetric Cryptosystem based on Graph Theory
Q114368109Decision Support System for Agriculture Industry using Crowd Sourced Predictive Analytics
Q122609578Defects Prediction and Prevention Approaches for Quality Software Development
Q114965938Defining Network Exposure Metrics in Security Risk Scoring Models
Q123253419Design and Analysis of DNA Encryption and Decryption Technique based on Asymmetric Cryptography System
Q113237312Design and Implementation of HSQL: A SQL-like language for Data Analysis in Distributed Systems
Q114845935Design and Implementation of a Most Secure Cryptographic Scheme for Lightweight Environment using Elliptic Curve and Trigonohash Technique
Q114845937Design and Implementation of a Strong and Secure Lightweight Cryptographic Hash Algorithm using Elliptic Curve Concept: SSLHA-160
Q126841507Design of Embedded Vision System based on FPGA-SoC
Q121358764Design of Higher-Dimensional Hyperchaotic System based on Combined Control and its Encryption Application
Q126853689Design of an Efficient Steganography Model using Lifting based DWT and Modified-LSB Method on FPGA
Q114965992Design, Release, Update, Repeat: The Basic Process of a Security Protocol’s Evolution
Q126410905Designing an Automated Intelligent e-Learning System to Enhance the Knowledge using Machine Learning Techniques
Q126410583Detecting Fake Images on Social Media using Machine Learning
Q125802023Detecting Public Sentiment of Medicine by Mining Twitter Data
Q125627002Detection and Analysis of Oil Spill using Image Processing
Q113237328Detection and Prevention of SQL Injection Attack by Dynamic Analyzer and Testing Model
Q113237330Detection of SQL Injection Using a Genetic Fuzzy Classifier System
Q114965758Determinants of Information Security Awareness and Behaviour Strategies in Public Sector Organizations among Employees
Q114368126Determining Public Structure Crowd Evacuation Capacity
Q115363431Developing A Model for Predicting the Speech Intelligibility of South Korean Children with Cochlear Implantation using a Random Forest Algorithm
Q126854057Developing Agriculture Land Mapping using Rapid Application Development (RAD): A Case Study from Indonesia
Q126411227Developing a Framework for Potential Candidate Selection
Q125761128Developing a Mining Robot for Mars Exploitation: NASA Robotics Mining Competition (RMC)
Q122070220Developing a New Hybrid Cipher Algorithm using DNA and RC4
Q126840272Developing an Algorithm for Securing the Biometric Data Template in the Database
Q125615773Developing an Intelligent Framework for Improving the Quality of Service in the Government Organizations in the Kingdom of Saudi Arabia
Q115363428Development Trends of Online-based Aural Rehabilitation Programs for Children with Cochlear Implant Coping with the Fourth Industrial Revolution and Implication in Speech-Language Pathology
Q111898000Development of Architecture and Software Implementation of Deep Neural Network Models Repository for Spatial Data Analysis
Q113426330Development of Mathematics Web-based Learning on Table Set-Up Activities
Q126025560Development of Social Media GIS to Support Information Utilization from Normal Times to Disaster Outbreak Times
Q121633710Development of a New Lightweight Encryption Algorithm
Q114596103Differential Privacy Technology of Big Data Information Security based on ACA-DMLP
Q123026853Digital Image Encryption using Composition of RaMSH-1 Map Transposition and Logistic Map Keystream Substitution
Q114965971Digital Image Security: Fusion of Encryption, Steganography and Watermarking
Q114965763Digital Learning Tools for Security Inductions in Mining Interns: A PLS-SEM Analysis
Q114822057Digitization of Supply Chains as a Lever for Controlling Cash Flow Bullwhip: A Systematic Literature Review
Q126841551Discovering Gaps in Saudi Education for Digital Health Transformation
Q113074224Discrete Cosine Transformation based Image Data Compression Considering Image Restoration
Q113426363DistB-SDoIndustry: Enhancing Security in Industry 4.0 Services based on Distributed Blockchain through Software Defined Networking-IoT Enabled Architecture
Q126841127Distance based Sweep Nearest Algorithm to Solve Capacitated Vehicle Routing Problem
Q126407649Distributed SDN Deployment in Backbone Networks for Low-Delay and High-Reliability Applications
Q114965866Distributed Shadow Controllers based Moving Target Defense Framework for Control Plane Security
Q114965934Divide and Conquer Approach for Solving Security and Usability Conflict in User Authentication
Q114965802Drone Security: Issues and Challenges
Q114966054Dual Security Testing Model for Web Applications
Q121742971Dynamic Access Control Policy based on Blockchain and Machine Learning for the Internet of Things
Q59386334Dynamic Evaluation and Visualisation of the Quality and Reliability of Sensor Data Sources
Q114965796Dynamic Management of Security Policies in PrivOrBAC
Q126405402Dynamic Performance of Synchronous Generator in Steam Power Plant
Q113074227Dynamic path restoration for new call blocking versus handoff call blocking in heterogeneous network using buffers for QoS
Q121874911Dynamics of Organizational Change
Q56565525E-Learning Collaborative System for Practicing Foreign Languages with Native Speakers
Q114596111EDES-ACM: Enigma Diagonal Encryption Standard Access Control Model for Data Security in Cloud Environment
Q125623496Economic Development Efficiency Based on Tobit Model: Guided by Sustainable Development
Q111822847Edge Detection on DICOM Image using Triangular Norms in Type-2 Fuzzy
Q114965936Effect of Service Broker Policies and Load Balancing Algorithms on the Performance of Large Scale Internet Applications in Cloud Datacenters
Q126840434Effective Methods to Improve the Educational Process of Medicine in Bulgaria
Q57977697Effective Security Architecture for Virtualized Data Center Networks
Q123220707Efficient Arnold and Singular Value Decomposition based Chaotic Image Encryption
Q113237322Efficient Distributed SPARQL Queries on Apache Spark
Q114254070Efficient Hybrid Semantic Text Similarity using Wordnet and a Corpus
Q121344042Efficient Image Cipher using 2D Logistic Mapping and Singular Value Decomposition
Q114254076Efficient Retrieval of Text for Biomedical Domain using Data Mining Algorithm
Q114965811Efficient Security Model for RDF Files Used in IoT Applications
Q114965808Efficient Security Solutions for IoT Devices
Q126047997Efficient Weighted Edit Distance and N-gram Language Models to Improve Spelling Correction of Segmentation Errors
Q126406140Embedded Mission Decision-Making based on Dynamic Decision Networks in SoPC Platform
Q126404777Embedding Adaptation Levels within Intelligent Tutoring Systems for Developing Programming Skills and Improving Learning Efficiency
Q126410917Embracing Localization Inaccuracy with a Single Beacon
Q125699033Emergence of Unstructured Data and Scope of Big Data in Indian Education
Q114053780Emergency Decision Model by Combining Preference Relations with Trapezoidal Pythagorean Fuzzy Probabilistic Linguistic Priority Weighted Averaging PROMETHEE Approach
Q125894537Emotion Recognition on Multimodal with Deep Learning and Ensemble
Q113178685Emotional Evocative User Interface Design for Lifestyle Intervention in Non-communicable Diseases using Kansei
Q125845825Empirical Study on Intelligent Android Malware Detection based on Supervised Machine Learning
Q126404404Employing Takaful Islamic Banking through State of the Art Blockchain: A Case Study
Q124857408Enabling Efficient Discovery of and Access to Spatial Data Services
Q121287330Encrypted Fingerprint into VoIP Systems using Cryptographic Key Generated by Minutiae Points
Q121310671Encrypted Storage Method of Oral English Teaching Resources based on Cloud Platform
Q121605455Encrypted With Fuzzy Compliment-Max-Product Matrix in Watermarking
Q120991984Encryption Algorithms Modeling in Detecting Man in the Middle Attack in Medical Organizations
Q123109868Encryption Algorithms for Color Images: A Brief Review of Recent Trends
Q121461918Encryption on Multimodal Biometric using Hyper Chaotic Method and Inherent Binding Technique
Q126404561Energy Balanced Two-level Clustering for Large-scale Wireless Sensor Networks based on the Gravitational Search Algorithm
Q126406112Energy Efficient Cluster Head Selection using Hybrid Squirrel Harmony Search Algorithm in WSN
Q114965915Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication
Q114965847Enhance the Security and Prevent Vampire Attack on Wireless Sensor Networks using Energy and Broadcasts Threshold Values
Q125920726Enhanced Link Redirection Interface for Secured Browsing using Web Browser Extensions
Q114965904Enhanced Physical Document Management using NFC with Verification for Security and Privacy
Q114965980Enhanced Security for Data Sharing in Multi Cloud Storage (SDSMC)
Q114845925Enhanced Security: Implementation of Hybrid Image Steganography Technique using Low-Contrast LSB and AES-CBC Cryptography
Q114596121Enhanced Textual Password Scheme for Better Security and Memorability
Q126841588Enhanced, Modified and Secured RSA Cryptosystem based on n Prime Numbers and Offline Storage for Medical Data Transmission via Mobile Phone
Q122642366Enhancement of Low-Light Image using Homomorphic Filtering, Unsharp Masking, and Gamma Correction
Q113237317Enhancement of Natural Language to SQL Query Conversion using Machine Learning Techniques
Q126841622Enhancement of Packet Delivery Ratio during Rain Attenuation for Long Range Technology
Q114965835Enhancement of Two-Tier ATM Security Mechanism: Towards Providing a Real-Time Solution for Network Issues
Q114966027Enhancing Wireless Sensor Network Security using Artificial Neural Network based Trust Model
Q122932239Enhancing the Secured Software Framework using Vulnerability Patterns and Flow Diagrams
Q113426298Enhancing the Security of Data Stored in the Cloud using customized Data Visualization Patterns
Q114965773Enhancing the Security of Digital Image Encryption using Diagonalize Multidimensional Nonlinear Chaotic System
Q126404742Enrichment Ontology with Updated user Data for Accurate Semantic Annotation
Q125968256Ensemble Deep Learning (EDL) for Cyber-bullying on Social Media
Q119821212Estimating Evapotranspiration using Machine Learning Techniques
Q114965940Ethical Issues and Related Considerations Involved with Artificial Intelligence and Autonomous Systems
Q121590492Evaluate Metadata of Sparse Matrix for SpMV on Shared Memory Architecture
Q114966000Evaluating Confidentiality Impact in Security Risk Scoring Models
Q114966043Evaluating Damage Potential in Security Risk Scoring Models
Q126410970Evaluating Programmed Artificial Insemination for Cattle Production
Q123321598Evaluating Software Quality Attributes using Analytic Hierarchy Process (AHP)
Q114965879Evaluating a Cloud Service using Scheduling Security Model (SSM)
Q108927719Evaluating and Comparing the Usability of Privacy in WhatsApp, Twitter, and Snapchat
Q115363425Evaluating the Accuracy of Models for Predicting the Speech Acceptability for Children with Cochlear Implants
Q114053787Evaluation Study of Elliptic Curve Cryptography Scalar Multiplication on Raspberry Pi4
Q114965790Evaluation of Data Center Network Security based on Next-Generation Firewall
Q114966084Evaluation of Data Security Measures in a Network Environment Towards Developing Cooperate Data Security Guidelines
Q123271801Evaluation of a Model Maximizing the Quality Value of Selected Software Components in a Library
Q114965916Experimental Evaluation of Security Requirements Engineering Benefits
Q113237325Experimentation for Modular Robot Simulation by Python Coding to Establish Multiple Configurations
Q113237331Explorative Study of SQL Injection Attacks and Mechanisms to Secure Web Application Database- A Review
Q125366391Exploring Alumni Data using Data Visualization Techniques
Q122905901Exploring Factors Associated with the Social Discrimination Experience of Children from Multicultural Families in South Korea by using Stacking with Non-linear Algorithm
Q114053796Exploring Mechanisms for Pattern Formation through Coupled Bulk-Surface PDEs in Case of Non-linear Reactions
Q114296692Exploring Saudi Citizens' Acceptance of Mobile Government Service
Q114368122Exploring the Potential of Mobile Crowdsourcing in the Sharing of Information on Items Prices
Q115514741Exponential Decay Function-Based Time-Aware Recommender System for e-Commerce Applications
Q121809039Eyes Based Eletric Wheel Chair Control System- - I (eye) can control Electric Wheel Chair -
Q122262987FPGA Based Cipher Design & Implementation of Recursive Oriented Block Arithmetic and Substitution Technique (ROBAST)
Q126406947Face Recognition on Low-Resolution Image using Multi Resolution Convolution Neural Network and Antialiasing Method
Q114965870Factors Contributing to the Success of Information Security Management Implementation
Q114965785Factors Impacting Users’ Compliance with Information Security Policies: An Empirical Study
Q114965780Factors Influencing the Adoption of Cyber Security Standards Among Public Listed Companies in Malaysia
Q126841556Faculty’s Social Media usage in Higher Education Embrace Change or Left Behind
Q119821189Failure Region Estimation of Linear Voltage Regulator using Model-based Virtual Sensing and Non-invasive Stability Measurement
Q125780562Fast Pasture Classification Method using Ground-based Camera and the Modified Green Red Vegetation Index (MGRVI)
Q125634306Fault Diagnosis Technology of Railway Signal Equipment based on Improved FP-Growth Algorithm
Q114965930Features and Potential Security Challenges for IoT Enabled Devices in Smart City Environment
Q114965759Federated Learning and its Applications for Security and Communication
Q114965798Feistel Network Assisted Dynamic Keying based SPN Lightweight Encryption for IoT Security
Q113178695Female Under-Representation in Computing Education and Industry - A Survey of Issues and Interventions
Q113178690Financial Literacy of SME Managers’ on Access to Finance and Performance: The Mediating Role of Financial Service Utilization
Q114254069Financial Market Prediction using Google Trends
Q114254074Financial Statement Fraud Detection using Text Mining
Q126410847Flooding and Oil Spill Disaster Relief using Sentinel of Remote Sensing Satellite Data
Q113264779Flower Pollination Algorithm for Feature Selection in Tweets Sentiment Analysis
Q115514744Forecasting Feature Selection based on Single Exponential Smoothing using Wrapper Method
Q114966085Forks impacts and motivations in free and open source projects
Q114965816Formal Verification of an Efficient Architecture to Enhance the Security in IoT
Q113237334Format SPARQL Query Results into HTML Report
Q110565912Framework for Applicability of Agile Scrum Methodology: A Perspective of Software Industry
Q114966081Free Open Source Software: FOSS Based GIS for Spatial Retrievals of Appropriate Locations for Ocean Energy Utilizing Electric Power Generation Plants
Q126659063From Poster to Mobile Calendar: An Event Reminder using Mobile OCR
Q123016155Fuzzy Based Evaluation of Software Quality Using Quality Models and Goal Models
Q126404810GPLDA: A Generalized Poisson Latent Dirichlet Topic Model
Q114965984GSM based Android Application: Appliances Automation and Security Control System using Arduino
Q56565517Gamification, Virality and Retention in Educational Online Platform
Q123145878Gaze Direction based Mobile Application for Quadriplegia Wheelchair Control System
Q121607522Genetic Behaviour of Zika Virus and Identification of Motif
Q114965854Geo Security using GPT Cryptosystem
Q114856336Grammatical Error Correction with Denoising Autoencoder
Q125295256Grid Based Processing of Satellite Images in GreenLand Platform
Q126410242HCAHF: A New Family of CA-based Hash Functions
Q126405586Handwritten Arabic Text Recognition using Principal Component Analysis and Support Vector Machines
Q125119370Hate Speech Detection in Twitter using Transformer Methods
Q126841377Haze Effects on Satellite Remote Sensing Imagery and their Corrections
Q126410741Heart Disease Prediction based on External Factors: A Machine Learning Approach
Q114966055Hidden Markov Models (HMMs) and Security Applications
Q122178091Hierarchical and Efficient Identity-bsed Encryption Against Side Channel Attacks
Q114965760High Capacity Image Steganography System based on Multi-layer Security and LSB Exchanging Method
Q121338974High Lightweight Encryption Standard (HLES) as an Improvement of 512-Bit AES for Secure Multimedia
Q114368097High Performance Computing in Resource Poor Settings: An Approach based on Volunteer Computing
Q126404300High Predictive Performance of Dynamic Neural Network Models for Forecasting Financial Time Series
Q114965828High-Security Image Steganography Technique using XNOR Operation and Fibonacci Algorithm
Q114965825Home Security System with Face Recognition based on Convolutional Neural Network
Q114965886How to Improve the IoT Security Implementing IDS/IPS Tool using Raspberry Pi 3B+
Q110500162Human Related-Health Actions Detection using Android Camera based on TensorFlow Object Detection API
Q126840678Hybrid Control of PV-FC Electric Vehicle using Lyapunov based Theory
Q114965775Hybrid Deep Neural Network Model for Detection of Security Attacks in IoT Enabled Environment
Q121011335Hybrid Encryption Algorithm for Information Security in Hadoop
Q122599776Hybrid Query by Humming and Metadata Search System (HQMS) Analysis over Diverse Features
Q56171632Hybrid Technique for Human Face Emotion Detection
Q126853716Hyperspectral Image Classification using Support Vector Machine with Guided Image Filter
Q114965770IAGA: Interference Aware Genetic Algorithm based VM Allocation Policy for Cloud Systems
Q123124926IMPLEMENTATION OF NODE ENERGY BASED ON ENCRYPTION KEYING
Q114856348IRS for Computer Character Sequences Filtration: a new software tool and algorithm to support the IRS at tokenization process
Q126405576Identification of People with Parkinson's Suspicions through Voice Signal Processing
Q110570124Identify and Classify Critical Success Factor of Agile Software Development Methodology Using Mind Map
Q122958180Identifying Community-Supported Technologies and Software Developments Concepts by K-means Clustering
Q57729087Identifying and Extracting Named Entities from Wikipedia Database Using Entity Infoboxes
Q123240656Image Encryption Enabling Chaotic Ergodicity with Logistic and Sine Map
Q121063240Image Encryption Technique based on the Entropy Value of a Random Block
Q122705684Image Enhancement Using Homomorphic Filtering and Adaptive Median Filtering for Balinese Papyrus (Lontar)
Q113074220Image Restoration based on Maximum Entropy Method with Parameter Estimation by Means of Annealing Method
Q125940102Image-based Onion Disease (Purple Blotch) Detection using Deep Convolutional Neural Network
Q114965899Images Steganography Approach Supporting Chaotic Map Technique for the Security of Online Transfer
Q126841210Immersive Technologies in Marketing: State of the Art and a Software Architecture Proposal
Q110565916Impact of Scrum and Tactic Workflow Management System on Organization Performance (A Study on Animation Studios in Pakistan)
Q114965927Impact of Security in QoS Signaling in NGN: Registration Study
Q110565910Impact of Story Point Estimation on Product using Metrics in Scrum Development Process
Q113426307Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm
Q123134430Implementation of ISS - IHAS (Information Security System-Information Hiding in Audio Signal) model with reference to proposed e-cipher Method
Q114596107Implementation of Password Hashing on Embedded Systems with Cryptographic Acceleration Unit
Q113426303Implementation of a Web System: Prevent Fraud Cases in Electronic Transactions
Q110565909Implementing Project Management Category Process Areas of CMMI Version 1.3 Using Scrum Practices, and Assets
Q114965932Implication of Genetic Algorithm in Cryptography to Enhance Security
Q114368116Implicit and Explicit Knowledge Mining of Crowdsourced Communities: Architectural and Technology Verdicts
Q114965842Improved Security Particle Swarm Optimization (PSO) Algorithm to Detect Radio Jamming Attacks in Mobile Networks
Q114966066Improved Security of Audit Trail Logs in Multi-Tenant Cloud Using ABE Schemes
Q123237997Improvement of the Handover and Quality of Service on Software Defined Wireless Networks
Q121798409Improvement of the Vertical Handover Decision and Quality of Service in Heterogeneous Wireless Networks using Software Defined Network
Q114965791Improving Data Security using Compression Integrated Pixel Interchange Model with Efficient Encryption Technique
Q126404542Improving Gated Recurrent Unit Predictions with Univariate Time Series Imputation Techniques
Q123244116Improving Image Encryption Using 3D Cat Map and Turing Machine
Q114965805Improving Performance of ABAC Security Policies Validation using a Novel Clustering Approach
Q114596102Improving Privacy Preservation Approach for Healthcare Data using Frequency Distribution of Delicate Information
Q114965947Improving Security of the Telemedicine System for the Rural People of Bangladesh
Q114965892Improving Usable-Security of Web based Healthcare Management System through Fuzzy AHP
Q114966036Improvisation of Security aspect of Steganographic System by applying RSA Algorithm
Q123255753Increasing Randomization of Ciphertext in DNA Cryptography
Q126406832Indonesian Words Error Detection System using Nazief Adriani Stemmer Algorithm
Q111825745Indoor Navigation System based on Passive RFID Transponder with Digital Compass for Visually Impaired People
Q114965771Information Security Enhancement by Increasing Randomness of Stream Ciphers in GSM
Q114965952Information Security and Learning Content Management System (LCMS)
Q125858691Input Value Chain Affect Vietnamese Rice Yield: An Analytical Model Based on a Machine Learning Algorithm
Q113074226Instant Diacritics Restoration System for Sindhi Accent Prediction using N-Gram and Memory-Based Learning Approaches
Q126411033Integrated Methodological Framework for Digital Transformation Strategy Building (IMFDS)
Q126207433Integrated Methodology for Information Security Risk Management using ISO 27005:2018 and NIST SP 800-30 for Insurance Sector
Q123257314Integrating Regression Models and Climatological Data for Improved Precipitation Forecast in Southern India
Q108931926Intelligent Parallel Mixed Method Approach for Characterising Viral YouTube Videos in Saudi Arabia
Q114856343Intelligent Pedagogical Model with Kinesthetic-Static Immersion based on the Neuro-Linguistic Programming Approach (NLP)
Q114965967Intelligent Security for Phishing Online using Adaptive Neuro Fuzzy Systems
Q57728337International Journal of Advanced Computer Science and Applications
Q114965807Internet of Things (IoT) based Smart Vehicle Security and Safety System
Q126406298Internet of Things Cyber Attacks Detection using Machine Learning
Q114965815Internet of Things Security: A Review of Enabled Application Challenges and Solutions
Q126841005Interpolation of Single Beam Echo Sounder Data for 3D Bathymetric Model
Q113178683Investigate the Ensemble Model by Intelligence Analysis to Improve the Accuracy of the Classification Data in the Diagnostic and Treatment Interventions for Prostate Cancer
Q122721598Investigating OpenAI’s ChatGPT Potentials in Generating Chatbot's Dialogue for English as a Foreign Language Learning
Q126841155Investigating Social Media Utilization and Challenges in the Governmental Sector for Crisis Events
Q110570123Investigation of Adherence Degree of Agile Requirements Engineering Practices in Non-Agile Software Development Organizations
Q126404992Investigation of Different Modulation Formats for Extended Reach NG-PON2 using RSOA
Q114965809Investigation of Smart Home Security and Privacy: Consumer Perception in Saudi Arabia
Q113178686Involving American Schools in Enhancing Children’s Digital Literacy and Raising Awareness of Risks Associated with Internet Usage
Q110527776IoT-based Closed Algal Cultivation System with Vision System for Cell Count through ImageJ via Raspberry Pi
Q114965793IoT-based Cyber-security of Drones using the Naïve Bayes Algorithm
Q114053795JEPPY: An Interactive Pedagogical Agent to Aid Novice Programmers in Correcting Syntax Errors
Q126404167Joint Demographic Features Extraction for Gender, Age and Race Classification based on CNN
Q126854060JsonToOnto: Building Owl2 Ontologies from Json Documents
Q126405976KNN and SVM Classification for Chainsaw Sound Identification in the Forest Areas
Q123357183Key Schedule Algorithm using 3-Dimensional Hybrid Cubes for Block Cipher
Q114965795Kinematic Analysis for Trajectory Planning of Open-Source 4-DoF Robot Arm
Q126407029Knowledge Construction by Immersion in Virtual Reality Environments
Q126405913Knowledge based Soil Classification Towards Relevant Crop Production
Q125906058LASyM: A Learning Analytics System for MOOCs
Q122467772LEA-SIoT: Hardware Architecture of Lightweight Encryption Algorithm for Secure IoT on FPGA Platform
Q125263682LOD Explorer: Presenting the Web of Data
Q114965881LSSCW: A Lightweight Security Scheme for Cluster based Wireless Sensor Network
Q114856337LSTM, VADER and TF-IDF based Hybrid Sentiment Analysis Model
Q126840108Land use Detection in Nusajaya using Higher-Order Modified Geodesic Active Contour Model
Q114965979Learning Analytics in a Shared-Network Educational Environment: Ethical Issues and Countermeasures
Q114007352Learning Content Classification and Mapping Content to Synonymous Learners based on 2022 Augmented Verb List of Marzano and Kendall Taxonomy
Q114965821Legal Requirements towards Enhancing the Security of Medical Devices
Q124652006Level of Confidence in Software Effort Estimation by an Intelligent Fuzzy – Neuro - Genetic Approach
Q126854075Lexicon-based Bot-aware Public Emotion Mining and Sentiment Analysis of the Nigerian 2019 Presidential Election on Twitter
Q121030427Light but Effective Encryption Technique based on Dynamic Substitution and Effective Masking
Q114965832Lightweight Security Mechanism over MQTT Protocol for IoT Devices
Q122903468Lightweight Symmetric Encryption Algorithm for Secure Database
Q114965868Lizard Cipher for IoT Security on Constrained Devices
Q126404811Local-Set Based-on Instance Selection Approach for Autonomous Object Modelling
Q115363433Localisation of Information and Communication Technologies in Cameroonian Languages and Cultures:Experience and Issues
Q113178688Logical Intervention in the Form of Work Breakdown Strategy using Object Constraint Language for e-Commerce Application
Q126840553MVC Frameworks Modernization Approach
Q119821199Machine Learning Approaches for Predicting the Severity Level of Software Bug Reports in Closed Source Projects
Q114254045Machine Learning Techniques for Sentiment Analysis of Code-Mixed and Switched Indian Social Media Text Corpus - A Comprehensive Review
Q125019347Machine Learning for Bioclimatic Modelling
Q114965834Malware Analysis in Web Application Security: An Investigation and Suggestion
Q110570122Managing Knowledge in Development of Agile Software
Q114007354Melody Difficulty Classification using Frequent Pattern and Inter-Notes Distance Analysis
Q126404966Memory-based Collaborative Filtering: Impacting of Common Items on the Quality of Recommendation
Q114596114Merge of X-ETL and XCube towards a Standard Hybrid Method for Designing Data Warehouses
Q123143630Meteosat Images Encryption based on AES and RSA Algorithms
Q126841553Method for Texture Mapping of In-Vehicle Camera Image in 3D Map Creation
Q121096309Metric-based Measurement and Selection for Software Product Quality Assessment: Qualitative Expert Interviews
Q114965901Microcontroller-based RFID, GSM and GPS for Motorcycle Security System
Q126840599Model for Time Series Imputation based on Average of Historical Vectors, Fitting and Smoothing
Q126841160Modeling Ant Colony Optimization for Multi-Agent based Intelligent Transportation System
Q114965851Modeling Network Security: Case Study of Email System
Q114368092Modelling an Indoor Crowd Monitoring System based on RSSI-based Distance
Q114965997Modern Authentication Techniques in Smart Phones: Security and Usability Perspective
Q126405711Modification of Manual Raindrops Type Observatory Ombrometer with Ultrasonic Sensor HC-SR04
Q114966086Modularity Index Metrics for Java-Based Open Source Software Projects
Q115514742Mono Camera-based Human Skeletal Tracking for Squat Exercise Abnormality Detection using Double Exponential Smoothing
Q110570070Motivators and Demotivators of Agile Software Development: Elicitation and Analysis
Q125886089Movie Rating Prediction using Ensemble Learning Algorithms
Q126841589Multi-Band and Multi-Parameter Reconfigurable Slotted Patch Antenna with Embedded Biasing Network
Q126410177Multi-Label Classification using an Ontology
Q121306766Multi-Level Encryption Framework
Q125760964Multi-Spectral Imaging for Fruits and Vegetables
Q114965783MultiStage Authentication to Enhance Security of Virtual Machines in Cloud Environment
Q114965869Mutual Authentication Security Scheme in Fog Computing
Q114254066NADA: New Arabic Dataset for Text Classification
Q114965907Networking Issues for Security and Privacy in Mobile Health Apps
Q126404266Neural Network-based Diabetic Type II High-Risk Prediction using Photoplethysmogram Waveform Analysis
Q113237324New Approach based on Model Driven Engineering for Processing Complex SPARQL Queries on Hive
Q123225767New Smart Encryption Approach based on Multidimensional Analysis Tools
Q123113870New Text Steganography Technique based on Multilayer Encoding with Format-Preserving Encryption and Huffman Coding
Q114965887New Transport Layer Security using Metaheuristics and New Key Exchange Protocol
Q114966035New mechanism for Cloud Computing Storage Security
Q114596120Noble Method for Data Hiding using Steganography Discrete Wavelet Transformation and Cryptography Triple Data Encryption Standard: DES
Q113074218Noise and Restoration of UAV Remote Sensing Images
Q114965772Non-Repudiation-based Network Security System using Multiparty Computation
Q114254052Novel Language Resources for Hindi: An Aesthetics Text Corpus and a Comprehensive Stop Lemma List
Q115237633Numerical Investigation on System of Ordinary Differential Equations Absolute Time Inference with Mathematica®
Q126841602Object Detection System to Help Navigating Visual Impairments
Q126405789Object Detection and Tracking using Deep Learning and Artificial Intelligence for Video Surveillance Applications
Q126407065On Developing an Integrated Family Mobile Application
Q125620091On State-of-the-art of POS Tagger, ‘Sandhi’ Splitter, ‘Alankaar’ Finder and ‘Samaas’ Finder for Indo-Aryan and Dravidian Languages
Q57607719Online Reputation Model Using Moving Window
Q126853995Ontology Learning from Relational Databases: Transforming Recursive Relationships to OWL2 Components
Q114368095Open Challenges for Crowd Density Estimation
Q114966091Open Source Software in Computer Science and IT Higher Education: A Case Study
Q114856345Opinion Mining and thought Pattern Classification with Natural Language Processing (NLP) Tools
Q126406207Optimal Global Threshold based on Two Dimension Otsu for Block Size Decision in Intra Prediction of H.264/AVC Coding
Q126030169Optimization Query Process of Mediators Interrogation Based On Combinatorial Storage
Q110570069Optimized Order of Software Testing Techniques in Agile Process – A Systematic Approach
Q114965789Organisational Information Security Management Maturity Model
Q123197922Organizational Digital Transformations and the Importance of Assessing Theoretical Frameworks such as TAM, TTF, and UTAUT: A Review
Q126407298Outlier Detection using Graphical and Nongraphical Functional Methods in Hydrology
Q125014463Overview of Service and Deployment Models Offered by Cloud Computing, based on International Standard ISO/IEC 17788
Q126853860Palm Vein Verification System based on Nonsubsampled Contourlet Transform
Q122873382Parallel Implementation of Bias Field Correction Fuzzy C-Means Algorithm for Image Segmentation
Q123269692Parallel Platform for Supporting Stream Ciphers Over Multi-core Processors
Q114887702Parkinson’s Disease Classification using Gaussian Mixture Models with Relevance Feature Weights on Vocal Feature Sets
Q115237632Partial Differential Equation (PDE) based Hybrid Diffusion Filters for Enhancing Noise Performance of Point of Care Ultrasound (POCUS) Images
Q123246792Partition Ciphering System: A Difficult Problem Based Encryption Scheme
Q114596104Password Systems: Problems and Solutions
Q114368091Pedestrian Crowd Detection and Segmentation using Multi-Source Feature Descriptors
Q114966018Pentaho and Jaspersoft: A Comparative Study of Business Intelligence Open Source Tools Processing Big Data to Evaluate Performances
Q114965882Performance Analysis of Acceleration Sensor for Movement Detection in Vehicle Security System
Q121327002Performance Analysis of Advanced IoT Encryption on Serialization Concept: Application Optimization Approach
Q126406528Performance Analysis of Network Intrusion Detection System using Machine Learning
Q114965906Performance Analysis of Open Source Solution "ntop" for Active and Passive Packet Analysis Relating to Application and Transport Layer
Q114965898Performance Analysis of Security Mechanism for Automotive Controller Area Network
Q126841542Performance Comparison of Collaborative-Filtering Approach with Implicit and Explicit Data
Q126093376Performance Evaluation of Affinity Propagation Approaches on Data Clustering
Q114965782Performance Evaluation of SNMPv1/2c/3 using Different Security Models on Raspberry Pi
Q114254047Personally Identifiable Information (PII) Detection in the Unstructured Large Text Corpus using Natural Language Processing and Unsupervised Learning Technique
Q113704151Plant Leaf Recognition using Shape based Features and Neural Network classifiers
Q126406848Power Quality Evaluation for Electrical Installation of Hospital Building
Q114966078Pre-Eminance of Open Source Eda Tools and Its Types in The Arena of Commercial Electronics
Q114053781Predicting Blocking Bugs with Machine Learning Techniques: A Systematic Review
Q124883497Predicting Cervical Cancer using Machine Learning Methods
Q114965949Predicting Fork Visibility Performance on Programming Language Interoperability in Open Source Projects
Q126125841Prediction of Oil Production through Linear Regression Model and Big Data Tools
Q126406837Predictive Control for Distributed Smart Street Light Network
Q113178687Preparing Graduates with Digital Literacy Skills Toward Fulfilling Employability Need in 4IR Era: A Review
Q122201578Privacy Impacts of Data Encryption on the Efficiency of Digital Forensics Technology
Q57922313Privacy Preserving Data Publishing: A Classification Perspective
Q123287112Privacy and Integrity Verification Model with Decentralized ABE and Double Encryption Storage Scheme
Q114965974Privacy and Security Mechanisms for eHealth Monitoring Systems
Q114965845Privacy, Security and Usability for IoT-enabled Weight Loss Apps
Q114596112Problem based Learning with Information and Communications Technology Support: An Experience in the Teaching-Learning of Matrix Algebra
Q126411214Problems Solving of Cell Subscribers based on Expert Systems Neural Networks
Q114368118Process Improvements for Crowdsourced Software Testing
Q114254071Processing the Text of the Holy Quran: a Text Mining Study
Q126840663Project Management Metamodel Construction Regarding IT Departments
Q126410319Proof of Credibility: A Blockchain Approach for Detecting and Blocking Fake News in Social Networks
Q126029988Proof-of-Review: A Review based Consensus Protocol for Blockchain Application
Q110570076Proposal of a Sustainable Agile Model for Software Development
Q121010005Proposed Hyperchaotic System for Image Encryption
Q121837912Proposed Secure Activity Diagram for Software Development
Q110565917Prototype of Web System for Organizations Dedicated to e-Commerce under the SCRUM Methodology
Q122618385Proxy Re-encryption Scheme based on the Timed-release in Edge Computing
Q114254067QTID: Quran Text Image Dataset
Q57977701QoS Parameters Investigations and Load Intensity Analysis, (A Case for Reengineered DCN)
Q114965951Quantifying Integrity Impacts in Security Risk Scoring Models
Q113237332Quantifying the Relationship between Hit Count Estimates and Wikipedia Article Traffic
Q114887703Quantitative Analysis of Healthy and Pathological Vocal Fold Vibrations using an Optical Flow based Waveform
Q124983530Query-Focused Multi-document Summarization Survey
Q122949893RC4 stream cipher and possible attacks on WEP
Q122917889RENTAKA: A Novel Machine Learning Framework for Crypto-Ransomware Pre-encryption Detection
Q121597527ROI Image Encryption using YOLO and Chaotic Systems
Q113426327Random and Sequence Workload for Web-Scale Architecture for NFS, GlusterFS and MooseFS Performance Enhancement
Q122411522Ransomware: Analysis of Encrypted Files
Q114368107Real Time Analysis of Crowd Behaviour for Automatic and Accurate Surveillance
Q117483289Real-Time Wildfire Detection and Alerting with a Novel Machine Learning Approach
Q113426353Recent Themes of Colombian Scientific Engineering Journals in Scopus
Q114966011Recovering and Tracing Links between Software Codes and Test Codes of the Open Source Projects
Q126840698Region-wise Ranking for One-Day International (ODI) Cricket Teams
Q114368121Representing Job Scheduling for Volunteer Grid Environment using Online Container Stowage
Q114965948Requirement Elicitation Techniques for Open Source Systems: A Review
Q114368080Research Efforts and Challenges in Crowd-based Requirements Engineering: A Review
Q126406802Research Trends in Surveillance through Sousveillance
Q113237306Research on Students' Course Selection Preference based on Collaborative Filtering Algorithm
Q126410247Resonance Mitigation and Performance Improvement in Distributed Generation based LCL Filtered Grid Connected Inverters
Q111822744Reversible Anonymization of DICOM Images using Cryptography and Digital Watermarking
Q123338166Reversible De-identification of Specific Regions in Biomedical Images and Secured Storage by Randomized Joint Encryption
Q122871205Review of Image Compression and Encryption Techniques
Q114965928Review of Information Security Policy based on Content Coverage and Online Presentation in Higher Education
Q114965957Rising Issues in VANET Communication and Security: A State of Art Survey
Q114965918Risk Assessment Method for Insider Threats in Cyber Security: A Review
Q110565911Role of Requirements Elicitation & Prioritization to Optimize Quality in Scrum Agile Development
Q114966056Role of Security in Social Networking
Q113237307Rule-based Text Extraction for Multimodal Knowledge Graph
Q122914356SIT: A Lightweight Encryption Algorithm for Secure Internet of Things
Q114254046SMAD: Text Classification of Arabic Social Media Dataset for News Sources
Q114966058SOHO: Information Security Awareness in the Aspect of Contingency Planning
Q113426311SPKP: A Web-based Application System for Managing Mental Health in Higher Institution
Q120986918SQ-Framework for Improving Sustainability and Quality into Software Product and Process
Q113237319SQL to SPARQL Conversion for Direct RDF Querying
Q56135287SVD Based Image Processing Applications: State of The Art, Contributions and Research Challenges
Q126201404SVM Machine Learning Classifier to Automate the Extraction of SRS Elements
Q114965830Scalable Asymmetric Security Mechanism for Internet of Things
Q126841193Scalable Data Analytics Market Basket Model for Transactional Data Streams
Q126410153Scientific Text Sentiment Analysis using Machine Learning Techniques
Q110565907Scrum Method Implementation in a Software Development Project Management
Q114966040SecFHIR: A Security Specification Model for Fast Healthcare Interoperability Resources
Q121096238Secure Communication across the Internet by Encrypting the Data using Cryptography and Image Steganography
Q114966082Secure Digital Cashless Transactions with Sequence Diagrams and Spatial Circuits to Enhance the Information Assurance and Security Education
Q122200891Secure Encryption for Wireless Multimedia Sensors Network
Q121295916Secure Software Defined Networks Controller Storage using Intel Software Guard Extensions
Q110512235Secure Software Engineering: A Knowledge Modeling based Approach for Inferring Association between Source Code and Design Artifacts
Q123186286Secure and Privacy Preserving Mail Servers using Modified Homomorphic Encryption (MHE) Scheme
Q115514743Secured 6-Digit OTP Generation using B-Exponential Chaotic Map
Q113237313Secured SECS/GEM: A Security Mechanism for M2M Communication in Industry 4.0 Ecosystem
Q114845928Securing Images through Cipher Design for Cryptographic Applications
Q126840436Securing Informative Fuzzy Association Rules using Bayesian Network
Q114845934Securing Student Data Privacy using Modified Snake and Ladder Cryptographic Algorithm
Q114966079Security Analysis of Image Cryptosystem Using Stream Cipher Algorithm with Nonlinear Filtering Function
Q114965764Security Analysis on an Improved Anonymous Authentication Protocol for Wearable Health Monitoring Systems
Q114965806Security Aspects of Electronic Health Records and Possible Solutions
Q113426350Security Enhancement in Software Defined Networking (SDN): A Threat Model
Q114965937Security Improvement in Elliptic Curve Cryptography
Q114966060Security Issues Model on Cloud Computing: A Case of Malaysia
Q114965917Security Issues in Cloud Computing and their Solutions: A Review
Q114965822Security Issues in Near Field Communications (NFC)
Q113426372Security Issues in Software Defined Networking (SDN): Risks, Challenges and Potential Solutions
Q114965965Security Issues in the Internet of Things (IoT): A Comprehensive Study
Q114966065Security Issues of a Recent RFID Multi Tagging Protocol
Q114966073Security Policies for Securing Cloud Databases
Q121083367Security Provisions in Stream Ciphers Through Self Shrinking and Alternating Step Generator
Q114966004Security Risk Assessment of Cloud Computing Services in a Networked Environment
Q114966049Security Risk Scoring Incorporating Computers' Environment
Q114965885Security and Privacy Awareness: A Survey for Smartphone User
Q114966020Security and Privacy Issues in Ehealthcare Systems: Towards Trusted Services
Q114965991Security and Privacy Risks Awareness for Bring Your Own Device (BYOD) Paradigm
Q114965804Security and Threats of RFID and WSNs: Comparative Study
Q114965962Security in OpenFlow Enabled Cloud Environment
Q114965837Security of a New Hybrid Ciphering System
Q114965817Security, Privacy and Trust in IoMT Enabled Smart Healthcare System: A Systematic Review of Current and Future Trends
Q126853856Selection of Sensitive Buses using the Firefly Algorithm for Optimal Multiple Types of Distributed Generations Allocation
Q126406146Semantic Knowledge Transformation for Context-aware Heterogeneous Formalisms
Q126087605Semantic Searching and Ranking of Documents using Hybrid Learning System and WordNet
Q126841174Sentiment Analysis and Classification of Photos for 2-Generation Conversation in China
Q114966052Smart Cities: A Survey on Security Concerns
Q57977693Smart Grid Network Transmission Line RLC Modelling Using Random Power Line Synthesis Scheme
Q111925044SmartTS: A Component-Based and Model-Driven Approach to Software Testing in Robotic Software Ecosystem
Q114368105Smartphones-Based Crowdsourcing Approach for Installing Indoor Wi-Fi Access Points
Q113237326Smile Detection Tool using OpenCV-Python to Measure Response in Human-Robot Interaction with Animal Robot PARO
Q113426338Snowball Framework for Web Service Composition in SOA Applications
Q110570073Social Success Factors Affecting Implementation of Agile Software Development Methodologies in Software Industry of Pakistan: An Empirical Study
Q120868253Software Architecture Quality Measurement Stability and Understandability
Q126840656Software Architecture Solutions for the Internet of Things: A Taxonomy of Existing Solutions and Vision for the Emerging Research
Q114965998Software Defined Security Service Provisioning Framework for Internet of Things
Q123127278Software Design using Genetic Quality Components Search
Q111918867Software Ecosystem: Features, Benefits and Challenges
Q114965810Software Engineering Ethics Competency Gap in Undergraduate Computing Qualifications within South African Universities of Technology
Q122569611Software Quality Analysis for Halodoc Application using ISO 25010:2011
Q121832327Software Quality and Productivity Model for Small and Medium Enterprises
Q113426389Software Security Requirements Gathering Instrument
Q113426342Software Security Static Analysis False Alerts Handling Approaches
Q122441914Software Vulnerabilities’ Detection by Analysing Application Execution Traces
Q114856334Solving Semantic Problem of Phrases in NLP Using Universal Networking Language (UNL)
Q121345121Solving for the RC4 stream cipher state register using a genetic algorithm
Q114966076Spatial Domain Image Steganography based on Security and Randomization
Q125055758Spatio-Temporal Features based Human Action Recognition using Convolutional Long Short-Term Deep Neural Network
Q114596108Special Negative Database (SNDB) for Protecting Privacy in Big Data
Q114966077Spectrum Sharing Security and Attacks in CRNs: a Review
Q126841097Speculating on Speculative Execution
Q114887701Stacked Autoencoder based Feature Compression for Optimal Classification of Parkinson Disease from Vocal Feature Vectors using Immune Algorithms
Q114965941Standardization of Cloud Security using Mamdani Fuzzifier
Q114856335State-of-the-Art Approach to e-Learning with Cutting Edge NLP Transformers: Implementing Text Summarization, Question and Distractor Generation, Question Answering
Q126840379Static Analysis on Floating-Point Programs Dealing with Division Operations
Q114965873Statistical Analysis and Security Evaluation of Chaotic RC5-CBC Symmetric Key Block Cipher Algorithm
Q114856340Stemming Text-based Web Page Classification using Machine Learning Algorithms: A Comparison
Q113237309Stochastic Marine Predator Algorithm with Multiple Candidates
Q115018884Student’s Performance Prediction based on Personality Traits and Intelligence Quotient using Machine Learning
Q126840080Study of Cross-Platform Technologies for Data Delivery in Regional Web Surveys in the Education
Q56565520Study of Gamification Effectiveness in Online e-Learning Systems
Q123021788SuffixAligner: A Python-based Aligner for Long Noisy Reads
Q120970195Survey on Homomorphic Encryption and Address of New Trend
Q122424153Survey on Impact of Software Metrics on Software Quality
Q114966016Symbolism in Computer Security Warnings: Signal Icons & Signal Words
Q126410169System for Monitoring People with Disabilities in the Event of an Accident using Mobile Terminals
Q114965900Systematic Literature Review (SLR) of Resource Scheduling and Security in Cloud Computing
Q57406561Systematic Literature Review of Agile Scalability for Large Scale Projects
Q123250250Systematic Literature Review of Identifying Issues in Software Cost Estimation Techniques
Q114965893Systematic Review of Existing IoT Architectures Security and Privacy Issues and Concerns
Q114965812Systems Security Affectation with the Implementation of Quantum Computing
Q114368128Task Allocation Model for Rescue Disabled Persons in Disaster Area with Help of Volunteers
Q125982367The Application of Intelligent Evaluation Method with Deep Learning in Calligraphy Teaching
Q114596118The Coin Passcode: A Shoulder-Surfing Proof Graphical Password Authentication Model for Mobile Devices
Q123240436The Criteria for Software Quality in Information System: Rasch Analysis
Q125418711The Cross-Cultural Teaching Model of Foreign Literature Under the Application of Machine Learning Technology
Q114965921The Design and Evaluation of a User-Centric Information Security Risk Assessment and Response Framework
Q114296691The Development of Geographic Information System using Participatory GIS Concept of Spatial Management
Q114856338The Effect of Using Light Stemming for Arabic Text Classification
Q111901300The Effectiveness of CATA Software in Exploring the Significance of Modal Verbs in Large Data Texts
Q114856341The Effectiveness of Stemming in the Stylometric Authorship Attribution in Arabic
Q114965955The Ethical and Social Issues of Information Technology: A Case Study
Q110570072The Impact of Motivator and Demotivator Factors on Agile Software Development
Q119821178The Impact of Peer Code Review on Software Maintainability in Open-Source Software: A Case Study
Q57310198The Impact of Quantum Computing on Present Cryptography
Q114965766The Impact of Security and Payment Method On Consumers’ Perception of Marketplace in Saudi Arabia
Q126406474The Impact of using Social Network on Academic Performance by using Contextual and Localized Data Analysis of Facebook Groups
Q114368089The Internet of Things for Crowd Panic Detection
Q114965943The Proposed Model to Increase Security of Sensitive Data in Cloud Computing
Q114966067The Reality of Applying Security in Web Applications in Academia
Q114965824The Relationship of Trustworthiness and Ethical Value in the Healthcare System
Q126840238The Respondent’s Haptic on Academic Universities Websites of Pakistan Measuring Usability
Q114965818The Role of Electronic Means in Enhancing the Intellectual Security among Students at the University of Jordan
Q125446997Three on Three Optimizer: A New Metaheuristic with Three Guided Searches and Three Random Searches
Q120840035Timed-Release Certificateless Encryption
Q122214594Timed-Release Hierarchical Identity-Based Encryption
Q110512231To Generate the Ontology from Java Source Code
Q114368124Toward a Hybrid Approach for Crowd Simulation
Q114966072Toward an Effective Information Security Risk Management of Universities’ Information Systems Using Multi Agent Systems, Itil, Iso 27002,Iso 27005
Q110570068Towards A Broader Adoption of Agile Software Development Methods
Q125384802Towards A Framework for Multilayer Computing of Survivability
Q110565908Towards Agile Implementation of Test Maturity Model Integration (TMMI) Level 2 using Scrum Practices
Q114965756Towards Flexible Transparent Authentication System for Mobile Application Security
Q122519033Towards Privacy Preserving Commutative Encryption-Based Matchmaking in Mobile Social Network
Q122206221Towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure
Q114965769Towards Security Awareness of Mobile Applications using Semantic-based Sentiment Analysis
Q114965862Towards Security Effectiveness Evaluation for Cloud Services Selection following a Risk-Driven Approach
Q114965935Towards Security as a Service to Protect the Critical Resources of Mobile Computing Devices
Q114254058Towards Understanding Internet of Things Security and its Empirical Vulnerabilities: A Survey
Q114965910Towards a Gateway-based Context-Aware and Self-Adaptive Security Management Model for IoT-based eHealth Systems
Q110565918Towards a New Metamodel Approach of Scrum, XP and Ignite Methods
Q126840849Towards a Prototype of a Low-Priced Domestic Incubator with Telemetry System for Premature Babies in Lima, Peru
Q57727048Towards the Design of a Chemical Textile Ontology
Q126406341Towards the Development of Collaborative Learning in Virtual Environments
Q122904877Towards the Development of a Brain Semi-controlled Wheelchair for Navigation in Indoor Environments
Q126406625Towards the Identification of Student Learning Communities using Centrality
Q111519072Transfer Learning based Performance Comparison of the Pre-Trained Deep Neural Networks
Q125292274Transfer Learning for Closed Domain Question Answering in COVID-19
Q114966083Transforming Conceptual Model into Logical Model for Temporal Data Warehouse Security: A Case Study
Q122207866Transforming Higher educational institution administration through ICT
Q114966090Transparent Data Encryption- Solution for Security of Database Contents
Q123330098Triple SV: A Bit Level Symmetric Block-Cipher Having High Avalanche Effect
Q114965931Trust and Security Concerns of Cloud Storage: An Indonesian Technology Acceptance
Q121626830Trust-based Key Management Conglomerate ElGamal Encryption for Data Aggregation Framework in WSN using Blockchain Technology
Q126410913UAV Path Planning for Civil Applications
Q122395946Ultra-key Space Domain for Image Encryption using Chaos-based Approach with DNA Sequence
Q114965852Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices
Q126405362Understanding Students’ Motivation and Learning Strategies to Redesign Massive Open Online Courses based on Persuasive System Development
Q125572132Understanding the Factors Affecting the Adoption of Green Computing in the Gulf Universities
Q123312386Unsupervised Feature Learning Methodology for Tree based Classifier and SVM to Classify Encrypted Traffic
Q114965838Usability Evaluation of Open Source Learning Management Systems
Q113178691Use of Technology and Financial Literacy on SMEs Practices and Performance in Developing Economies
Q113237327User-Defined Financial Functions for MS SQL Server
Q126840222Using Brain Imaging to Gauge Difficulties in Processing Ambiguous Text by Non-native Speakers
Q114053783Using Machine Learning Techniques to Predict Bugs in Classes: An Empirical Study
Q126853888Using Project-based Learning in a Hybrid e-Learning System Model
Q123218275VG4 Cipher: Digital Image Encryption Standard
Q118186172VHDL based Design of an Efficient Hearing Aid Filter using an Intelligent Variable-Bandwidth-Filter
Q114845926VIHS with ROTR Technique for Enhanced Light-Weighted Cryptographic System
Q119821168Validating the Usability Evaluation Model for Hearing Impaired Mobile Application
Q114965884Validation Policy Statement on the Digital Evidence Storage using First Applicable Algorithm
Q114007355Verb Sense Disambiguation by Measuring Semantic Relatedness between Verb and Surrounding Terms of Context
Q114845929Verifiable Homomorphic Encrypted Computations for Cloud Computing
Q120811558Verifiable Search Over Updatable Encrypted Data in Cloud Computing
Q126853780Virtual Reality Full Immersion Techniques for Enhancing Workers Performance, 20 years Later: A Review and a Reformulation
Q126112964Virtual Tourism and Digital Heritage: An Analysis of VR/AR Technologies and Applications
Q113426357Visibility and Ethical Considerations of Pakistani Universities Researchers on Google Scholar
Q126410276Visualising Image Data through Image Retrieval Concept using a Hybrid Technique: Songket Motif’s
Q110510897Visualizing Code Bad Smells
Q121989062Voice Scrambling Algorithm based on 3D Chaotic Map System (VSA3DCS) to Encrypt Audio Files
Q114254056Vulnerability Analysis of E-voting Application using Open Web Application Security Project (OWASP) Framework
Q126404178Vulnerable Road User Detection using YOLO v3
Q113237333WOLF: a Research Platform to Write NFC Secure Applications on Top of Multiple Secure Elements (With an Original SQL-Like Interface)
Q114596101Wavelet Multi Resolution Analysis based Data Hiding with Scanned Secrete Images
Q59385005Web 2.0 Technologies and Social Networking Security Fears in Enterprises
Q113237339Web Anomaly Misuse Intrusion Detection Framework for SQL Injection Detection
Q114965972Web Security: Detection of Cross Site Scripting in PHP Web Application using Genetic Algorithm
Q114965950Web Unique Method (WUM): An Open Source Blackbox Scanner for Detecting Web Vulnerabilities
Q123286963Wheelchair Control System based Eye Gaze
Q114368123Wiki-Based Stochastic Programming and Statistical Modeling System for the Cloud
Q126404444Winning the Polio War in Pakistan
Q114965939Wireless Body Area Network Security and Privacy Issue in E-Healthcare
Q114254073Wireless LAN Security Threats & Vulnerabilities
Q114965849WoT Communication Protocol Security and Privacy Issues
Q114053779Word by Word Labelling of Romanized Sindhi Text by using Online Python Tool
Q126406683Words Segmentation-based Scheme for Implicit Aspect Identification for Sentiments Analysis in English Text
Q114966068XML Schema-Based Minification for Communication of Security Information and Event Management (SIEM) Systems in Cloud Environments
Q111840864Zero-resource Multi-dialectal Arabic Natural Language Understanding
Q114966087e-Government Ethics : a Synergy of Computer Ethics, Information Ethics, and Cyber Ethics
Q126840214e-Learning Proposal Supported by Reasoning based on Instances of Learning Objects

Search more.