scientific journal | Q5633421 |
P8375 | Crossref journal ID | 233408 |
P8903 | HAL journal ID | 107154 |
P236 | ISSN | 2156-5570 |
2158-107X | ||
P7363 | ISSN-L | 2156-5570 |
P856 | official website | http://bibpurl.oclc.org/web/51561 |
http://sites.google.com/site/ijacsa2010/ | ||
http://thesai.org/Publications/IJACSA | ||
P10283 | OpenAlex ID | V23629721 |
P7662 | Scilit journal ID | 652498 |
P1156 | Scopus source ID | 21100867241 |
P495 | country of origin | United States of America | Q30 |
P8875 | indexed in bibliographic review | Scopus | Q371467 |
P407 | language of work or name | English | Q1860 |
P123 | publisher | Science and Information Organization | Q30267116 |
P1813 | short name | IJACSA | |
P1476 | title | International Journal of Advanced Computer Science and Applications | |
International journal of advanced computer science & applications |
Q126405158 | 5G Enabled Technologies for Smart Education |
Q121738920 | A Block Cipher Involving a Key Bunch Matrix and an Additional Key Matrix, Supplemented with Modular Arithmetic Addition and supported by Key-based Substitution |
Q123122609 | A Block Cipher Involving a Key Bunch Matrix and an Additional Key Matrix, Supplemented with Xor Operation and Supported by Key-Based Permutation and Substitution |
Q121890850 | A Block Cipher Involving a Key and a Key Bunch Matrix, Supplemented with Key-Based Permutation and Substitution |
Q114368084 | A Blockchain-based Crowdsourced Task Assessment Framework using Smart Contract |
Q126853970 | A Built-in Criteria Analysis for Best IT Governance Framework |
Q110500161 | A Classification Javanese Letters Model using a Convolutional Neural Network with KERAS Framework |
Q114965792 | A Classification of Essential Factors for the Development and Implementation of Cyber Security Strategy in Public Sector Organizations |
Q114965829 | A Cluster-Based Mitigation Strategy Against Security Attacks in Wireless Sensor Networks |
Q114053797 | A Code Level Based Programmer Assessment and Selection Criterion Using Metric Tools |
Q113178689 | A Collaborative Filtering Recommender System Model for Recommending Intervention to Improve Elderly Well-being |
Q126007624 | A Comparative Study of Stereovision Algorithms |
Q126407524 | A Comparative Study of Supervised Machine Learning Techniques for Diagnosing Mode of Delivery in Medical Sciences |
Q121437370 | A Comparative Study of Twofish, Blowfish, and Advanced Encryption Standard for Secured Data Transmission |
Q113237329 | A Comparative Study on the Effect of Multiple Inheritance Mechanism in Java, C++, and Python on Complexity and Reusability of Code |
Q57607741 | A Comparative Usability Study on the Use of Auditory Icons to Support Virtual Lecturers in E-Learning Interfaces |
Q57722403 | A Comparative study of Arabic handwritten characters invariant feature |
Q114965959 | A Comprehensive Analysis on the Security Threats and their Countermeasures of IoT |
Q113237323 | A Comprehensive Evaluation of Cue-Words based Features and In-text Citations based Features for Citation Classification |
Q57895791 | A Computational Model of Extrastriate Visual Area MT on Motion Perception |
Q126008341 | A Computer Vision-based System for Surgical Waste Detection |
Q57977695 | A Conceptual Design Model for High Performance Hotspot Network Infrastructure (GRID WLAN) |
Q114845930 | A Cryptographic Technique for Communication among IoT Devices using Tiger192 and Whirlpool |
Q114845939 | A DNA Cryptographic Solution for Secured Image and Text Encryption |
Q113426322 | A Data Security Algorithm for the Cloud Computing based on Elliptic Curve Functions and Sha3 Signature |
Q114965768 | A Deep Transfer Learning Approach to Enhance Network Intrusion Detection Capabilities for Cyber Security |
Q125877480 | A Feasible Rural Education System |
Q126174779 | A Flood Forecasting Model based on Wireless Sensor and Actor Networks |
Q121299675 | A Format-Compliant Selective Encryption Scheme for Real-Time Video Streaming of the H.264/AVC |
Q114965865 | A Framework for Cloud Security Risk Management based on the Business Objectives of Organizations |
Q114845941 | A Framework for Detecting Botnet Command and Control Communication over an Encrypted Channel |
Q126841335 | A Framework for Hoax News Detection and Analyzer used Rule-based Methods |
Q114965988 | A Framework for an Effective Information Security Awareness Program in Healthcare |
Q122656238 | A Fresnelet-Based Encryption of Medical Images using Arnold Transform |
Q113178684 | A Fuzzy MCDM Approach for Structured Comparison of the Health Literacy Level of Hospitals |
Q114965859 | A Fuzzy Multi-Objective Covering-based Security Quantification Model for Mitigating Risk of Web based Medical Image Processing System |
Q114254075 | A Fuzzy Similarity Based Concept Mining Model for Text Classification |
Q110565913 | A Fuzzy based Model for Effort Estimation in Scrum Projects |
Q121410564 | A Generic Framework for Automated Quality Assurance of Software Models –Implementation of an Abstract Syntax Tree |
Q114966002 | A Generic Model for Assessing Multilevel Security-Critical Object-Oriented Programs |
Q125591915 | A Hybrid Document Features Extraction with Clustering based Classification Framework on Large Document Sets |
Q114965800 | A Hybrid Encryption Solution to Improve Cloud Computing Security using Symmetric and Asymmetric Cryptography Algorithms |
Q125623315 | A Japanese Tourism Recommender System with Automatic Generation of Seasonal Feature Vectors |
Q121943995 | A Key-Ordered Decisional Learning Parity with Noise (DLPN) Scheme for Public Key Encryption Scheme in Cloud Computing |
Q113426335 | A Knowledge-based Expert System for Supporting Security in Software Engineering Projects |
Q114053789 | A Machine Learning based Analytical Approach for Envisaging Bugs |
Q124829650 | A Meta Analysis of Attention Models on Legal Judgment Prediction System |
Q126242067 | A Meta-Model for Strategic Educational Goals |
Q126840869 | A Method for Designing Domain-Specific Document Retrieval Systems using Semantic Indexing |
Q126841631 | A Method for Segmentation of Vietnamese Identification Card Text Fields |
Q113237316 | A Method to Prevent SQL Injection Attack using an Improved Parameterized Stored Procedure |
Q126404429 | A Mobile Agent Team Works based on Load-Balancing Middleware for Distributed Computing Systems |
Q122214810 | A Modified Feistel Cipher Involving Modular Arithmetic Addition and Modular Arithmetic Inverse of a Key Matrix |
Q121033205 | A Modified Feistel Cipher Involving Substitution, Shifting of rows, Mixing of columns, XOR operation with a Key and Shuffling |
Q121461184 | A Modified Feistel Cipher Involving XOR Operation and Modular Arithmetic Inverse of a Key Matrix |
Q114965863 | A Multi-Layered Security Model for Learning Management System |
Q123357025 | A Multi-Threaded Symmetric Block Encryption Scheme Implementing PRNG for DES and AES Systems |
Q114966044 | A Multimodal Firefly Optimization Algorithm Based on Coulomb’s Law |
Q111097052 | A New Application Programming Interface and a Fortran-like Modeling Language for Evaluating Functions and Specifying Optimization Problems at Runtime |
Q114966038 | A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network |
Q123232377 | A New Key Generation Technique based on Neural Networks for Lightweight Block Ciphers |
Q122464056 | A New Message Encryption Method based on Amino Acid Sequences and Genetic Codes |
Q114856346 | A New Method to Build NLP Knowledge for Improving Term Disambiguation |
Q126407606 | A New Method to Find Image Recovery |
Q110565914 | A New Project Risk Management Model based on Scrum Framework and Prince2 Methodology |
Q114965891 | A New Security Model for Web Browser Local Storage |
Q114596115 | A New Shoulder Surfing and Mobile Key-Logging Resistant Graphical Password Scheme for Smart-Held Devices |
Q122485104 | A New Solution to Protect Encryption Keys when Encrypting Database at the Application Level |
Q122931405 | A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture |
Q114845932 | A Note on Time and Space Complexity of RSA and ElGamal Cryptographic Algorithms |
Q114965836 | A Novel ASCII Code-based Polybius Square Alphabet Sequencer as Enhanced Cryptographic Cipher for Cyber Security Protection (APSAlpS-3CS) |
Q114966057 | A Novel Adaptive Grey Verhulst Model for Network Security Situation Prediction |
Q126169822 | A Novel Approach for an Outdoor Oyster Mushroom Cultivation using a Smart IoT-based Adaptive Neuro Fuzzy Controller |
Q125408344 | A Novel Approach to Multi-Layer-Perceptron Training using Quadratic Interpolation Flower Pollination Neural Network on Non-Binary Datasets |
Q114965909 | A Novel Architecture for Information Security using Division and Pixel Matching Techniques |
Q121621035 | A Novel Block Cipher Involving a Key bunch Matrix and a Key-based Permutation and Substitution |
Q121456232 | A Novel Chaotic System for Text Encryption Optimized with Genetic Algorithm |
Q114966071 | A Novel Cloud Computing Security Model to Detect and Prevent DoS and DDoS Attack |
Q125422695 | A Novel Convolutional Neural Network Architecture for Pollen-Bearing Honeybee Recognition |
Q115358200 | A Novel E-Mail Network Evolution Model based on user Information |
Q115358193 | A Novel Evolving Sentimental Bag-of-Words Approach for Feature Extraction to Detect Misinformation |
Q122271286 | A Novel Feistel Cipher Involving a Bunch of Keys Supplemented with XOR Operation |
Q122145845 | A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition |
Q114965777 | A Novel Framework for Cloud based Virtual Machine Security by Change Management using Machine |
Q115358196 | A Novel Framework for Drug Synergy Prediction using Differential Evolution based Multinomial Random Forest |
Q123151698 | A Novel Framework for Modelling Wheelchairs under the Realm of Internet-of-Things |
Q126207528 | A Novel Framework for Semi-supervised Multiple-label Image Classification using Multi-stage CNN and Visual Attention Mechanism |
Q122537848 | A Novel Image Encryption Approach for Cloud Computing Applications |
Q123270154 | A Novel Image Encryption Supported by Compression Using Multilevel Wavelet Transform |
Q123147872 | A Novel Image Encryption using Memetic Differential Expansion based Modified Logistic Chaotic Map |
Q114053794 | A Novel Image Fusion Scheme using Wavelet Transform for Concealed Weapon Detection |
Q125854597 | A Novel Method for Anomaly Detection in the Internet of Things using Whale Optimization Algorithm |
Q126406591 | A Novel Method for Patients Identification in Emergency Cases using RFID based RADIO Technology |
Q122505250 | A Novel Prediction Model for Compiler Optimization with Hybrid Meta-Heuristic Optimization Algorithm |
Q121894593 | A Novel Secure Transposition Cipher Technique using Arbitrary Zigzag Patterns |
Q114965968 | A Novel Security Scheme based on Twofish and Discrete Wavelet Transform |
Q121179687 | A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix |
Q114965945 | A Portable Virtual LAB for Informatics Education using Open Source Software |
Q111822753 | A Prediction Error Nonlinear Difference Expansion Reversible Watermarking for Integrity and Authenticity of DICOM Medical Images |
Q126840525 | A Prediction-based Curriculum Analysis using the Modified Artificial Bee Colony Algorithm |
Q114965924 | A Proposal for A High Availability Architecture for VoIP Telephone Systems based on Open Source Software |
Q111519074 | A Proposed Approach for Image Compression based on Wavelet Transform and Neural Network |
Q125765569 | A Proposed Model for Improving the Performance of Knowledge Bases in Real-World Applications by Extracting Semantic Information |
Q114596117 | A Qualitative Comparison of NoSQL Data Stores |
Q114296690 | A Readiness Evaluation of Applying e-Government in the Society: Shall Citizens begin to Use it? |
Q115149095 | A Recognition Method for Cassava Phytoplasma Disease (CPD) Real-Time Detection based on Transfer Learning Neural Networks |
Q126202903 | A Recommender System for Mobile Applications of Google Play Store |
Q114965781 | A Reliable Lightweight Trust Evaluation Scheme for IoT Security |
Q114965855 | A Review and Development Methodology of a LightWeight Security Model for IoT-based Smart Devices |
Q126024560 | A Review of Blockchain based Educational Projects |
Q125815958 | A Review of Fake News Detection Models: Highlighting the Factors Affecting Model Performance and the Prominent Techniques Used |
Q114966033 | A Review of Solutions for SDN-Exclusive Security Issues |
Q125100181 | A Review on Event-Based Epidemic Surveillance Systems that Support the Arabic Language |
Q114965902 | A Review on Security Issues and their Impact on Hybrid Cloud Computing Environment |
Q114053786 | A Review on Software Bug Localization Techniques using a Motivational Example |
Q114965896 | A Review on the Verification Approaches and Tools used to Verify the Correctness of Security Algorithms and Protocols |
Q114053785 | A Review-based Context-Aware Recommender Systems: Using Custom NER and Factorization Machines |
Q123198354 | A Risk Management Framework for Large Scale Scrum using Metadata Outer Request Management Methodology |
Q126841583 | A Robust Method for Diagnostic Energetic System with Bond Graph |
Q113237321 | A Robust Optimization Approach of SQL-to-SPARQL Query Rewriting |
Q114965839 | A Robust Scheme to Improving Security of Data using Graph Theory |
Q60686612 | A Robust System for Noisy Image Classification Combining Denoising Autoencoder and Convolutional Neural Network |
Q123194441 | A Secure Cloud Computing Architecture Using Homomorphic Encryption |
Q121567000 | A Secure Fog-cloud Architecture using Attribute-based Encryption for the Medical Internet of Things (MIoT) |
Q122942145 | A Secure Network Communication Protocol Based on Text to Barcode Encryption Algorithm |
Q126853762 | A Semantic Ontology for Disaster Trail Management System |
Q108926731 | A Sentiment Analysis of Egypt’s New Real Estate Registration Law on Facebook |
Q114965922 | A Serious Game for Healthcare Industry: Information Security Awareness Training Program for Hospital Universiti Kebangsaan Malaysia |
Q114965840 | A Service Scheduling Security Model for a Cloud Environment |
Q114368094 | A Service-Oriented Architecture for Optimal Service Selection and Positioning in Extremely Large Crowds |
Q113178693 | A Smartphone Intervention for Cycle Commuting |
Q126170626 | A Social Semantic Web based Conceptual Architecture of Disaster Trail Management System |
Q111925393 | A Software Framework for Self-Organized Flocking System Motion Coordination Research |
Q122872941 | A Study of Encryption for Multimedia Digital Audio Security |
Q114845927 | A Study of Security Impacts and Cryptographic Techniques in Cloud-based e-Learning Technologies |
Q114966047 | A Study to Investigate State of Ethical Development in E-Learning |
Q125762566 | A Survey of Automated Text Simplification |
Q114254072 | A Survey of Topic Modeling in Text Mining |
Q125623862 | A Survey on Blockchain Technology Concepts, Applications and Security |
Q114965858 | A Survey on Cloud Data Security using Image Steganography |
Q121942895 | A Survey on Image Encryption using Chaos-based Techniques |
Q114368104 | A Survey on Location Privacy-Preserving Mechanisms in Mobile Crowdsourcing |
Q121160823 | A Survey on Privacy Vulnerabilities in Permissionless Blockchains |
Q114966048 | A Survey on Security for Smartphone Device |
Q114254068 | A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks |
Q122642993 | A Survey on Tor Encrypted Traffic Monitoring |
Q123225353 | A Survey on the Cryptographic Encryption Algorithms |
Q113426378 | A Survey: Agent-based Software Technology Under the Eyes of Cyber Security, Security Controls, Attacks and Challenges |
Q121682042 | A Synchronous Stream Cipher Generator Based on Quadratic Fields (SSCQF) |
Q110570071 | A Systematic Literature Review of Success Factors and Barriers of Agile Software Development |
Q114965933 | A Systematic Review of Cyber Security and Classification of Attacks in Networks |
Q114053790 | A Systematic Study of Duplicate Bug Report Detection |
Q126404631 | A Systematic TRMA Protocol for Yielding Secure Environment for Authentication and Privacy Aspects |
Q126405821 | A Technical Guide for the RASP-FIT Tool |
Q114965958 | A Text based Authentication Scheme for Improving Security of Textual Passwords |
Q121432198 | A Topic Modeling Based Solution for Confirming Software Documentation Quality |
Q115018887 | A Trait-based Deep Learning Automated Essay Scoring System with Adaptive Feedback |
Q111823278 | A Type-2 Fuzzy in Image Extraction for DICOM Image |
Q114368087 | A Visual Analytics System for Route Planning and Emergency Crowd Evacuation |
Q113237305 | A new algorithm for detecting SQL injection attack in Web application |
Q113237340 | A new graph based text segmentation using Wikipedia for automatic text summarization |
Q114966063 | A survey on top security threats in cloud computing |
Q114368082 | A-SA SOS: A Mobile- and IoT-based Pre-hospital Emergency Service for the Elderly and Village Health Volunteers |
Q121902812 | ABJAD Arabic-Based Encryption |
Q108466903 | AHP-based Security Decision Making: How Intention and Intrinsic Motivation Affect Policy Compliance |
Q111996177 | Accessibility of Bulgarian Regional Museums Websites |
Q126404747 | Accurate Speech Emotion Recognition by using Brain-Inspired Decision-Making Spiking Neural Network |
Q126853855 | Achieving High Privacy Protection in Location-based Recommendation Systems |
Q122189555 | Acoustic Strength of Green Turtle and Fish Based on FFT Analysis |
Q126404839 | Activation and Spreading Sequence for Spreading Activation Policy Selection Method in Transfer Reinforcement Learning |
Q125465315 | Adaptive Balance Optimizer: A New Adaptive Metaheuristic and its Application in Solving Optimization Problem in Finance |
Q126411010 | Adaptive Cluster based Model for Fast Video Background Subtraction |
Q115237634 | Adaptive Error Detection Method for P300-based Spelling Using Riemannian Geometry |
Q41523241 | Adaptive e-learning using Genetic Algorithm and Sentiments Analysis in a Big Data System |
Q114254049 | Adopting Vulnerability Principle as the Panacea for Security Policy Monitoring |
Q123323261 | Advanced Steganography Algorithm using Encrypted secret message |
Q126406862 | Adverse Impacts of Social Networking Sites on Academic Result: Investigation, Cause Identification and Solution |
Q110512233 | Aesthetics Versus Readability of Source Code |
Q126407219 | Affective Educational Application of Fish Tank Hydroponics System |
Q57722351 | Agent-Based System for Efficient kNN Query Processing with Comprehensive Privacy Protection |
Q126007877 | Agent-based Managing for Grid Cloud System — Design and Prototypal Implementation |
Q110570078 | Agile Fitness of Software Companies in Bangladesh: An Empirical Investigation |
Q125925456 | Alzheimer’s Disease Detection using Neighborhood Components Analysis and Feature Selection |
Q121336497 | An Algorithm that Prevents SPAM Attacks using Blockchain |
Q120986915 | An Analysis of Encryption and Decryption Application by using One Time Pad Algorithm |
Q115363436 | An Approach for Teaching of National Languages and Cultures through ICT in Cameroon |
Q114053782 | An Architecture of Domain Independent and Extensible Intelligent Tutoring System based on Concept Dependencies and Subject Paths |
Q125801338 | An Augmented Reality Approach to Integrate Practical Activities in E-Learning Systems |
Q114596106 | An Authorization Framework for Preserving Privacy of Big Medical Data via Blockchain in Cloud Server |
Q110512234 | An Automated Framework for Detecting Change in the Source Code and Test Case Change Recommendation |
Q121628117 | An Automatic Cryptanalysis of Arabic Transposition Ciphers using Compression |
Q113178682 | An Early Intervention Technique for At-Risk Prediction of Higher Education Students in Cloud-based Virtual Learning Environment using Classification Algorithms during COVID-19 |
Q114965786 | An Effective Design of Model for Information Security Requirement Assessment |
Q114053791 | An Effective Solution to Count-to-Infinity Problem for both Complex and Linear Sub-Networks |
Q126404694 | An Efficient Algorithm to Find the Height of a Text Line and Overcome Overlapped and Broken Line Problem during Segmentation |
Q114965978 | An Efficient Approach for the Security Threats on Data Centers in IOT Environment |
Q122438789 | An Efficient Computational Method of Motif Finding in the Zika Virus Genome |
Q125882693 | An Efficient Feature Selection Approach for Intrusion Detection System using Decision Tree |
Q126407656 | An Efficient Method for Speeding up Large-Scale Data Transfer Process to Database: A Case Study |
Q124937353 | An Efficient Unusual Event Tracking in Video Sequence using Block Shift Feature Algorithm |
Q114846168 | An Empirical Comparison of Machine Learning Algorithms for Classification of Software Requirements |
Q123020067 | An Empirical Investigation on a Tool-Based Boilerplate Technique to Improve Software Requirement Specification Quality |
Q113264783 | An Enhanced Artificial Bee Colony: Naïve Bayes Technique for Optimizing Software Testing |
Q123281644 | An Enhanced Steganographic Model Based on DWT Combined with Encryption and Error Correction Techniques |
Q126840155 | An Enhanced Weighted Associative Classification Algorithm without Preassigned Weight based on Ranking Hubs |
Q111519075 | An Enhencment Medical Image Compression Algorithm Based on Neural Network |
Q114965923 | An Ensemble Approach to Big Data Security (Cyber Security) |
Q125972316 | An Ensemble of Arabic Transformer-based Models for Arabic Sentiment Analysis |
Q126846654 | An Evaluation of User Awareness for the Detection of Phishing Emails |
Q122987276 | An Image Encryption Technique based on Chaotic S-Box and Arnold Transform |
Q126840122 | An Immunity-based Error Containment Algorithm for Database Intrusion Response Systems |
Q121307639 | An Improved Homomorphic Encryption for Secure Cloud Data Storage |
Q114596110 | An Improved Time-Based One Time Password Authentication Framework for Electronic Payments |
Q114965956 | An Intelligent Security Approach using Game Theory to Detect DoS Attacks In IoT |
Q125352900 | An Internet-based Student Admission Screening System utilizing Data Mining |
Q114965797 | An Ontological Framework for Healthcare Web Applications Security |
Q114966074 | An Open Source P2P Encrypted Voip Application |
Q114965787 | An Open-source Wireless Platform for Real-time Water Quality Monitoring with Precise Global Positioning |
Q57607746 | An Optimized Analogy-Based Project Effort Estimation |
Q121174666 | An RGB Image Encryption Supported by Wavelet-based Lossless Compression |
Q113237335 | An SMS-SQL based On-board system to manage and query a database |
Q113178681 | An Urban Water Infrastructure Management System Design with Storm Water Intervention for Smart Cities |
Q57977659 | Analysis of Cloud Network Management Using Resource Allocation and Task Scheduling Services |
Q126404449 | Analysis of Multi-hop Wireless Sensor Networks using Probability Propagation Models |
Q114596113 | Analysis of Password and Salt Combination Scheme To Improve Hash Algorithm Security |
Q114965755 | Analysis of Privacy and Security Challenges in e-Health Clouds |
Q114966007 | Analysis of Security Requirements Engineering: Towards a Comprehensive Approach |
Q111897199 | Analysis of Software Deformity Prone Datasets with Use of AttributeSelectedClassifier |
Q114965846 | Analysis of an eHealth app: Privacy, Security and Usability |
Q122258384 | Analyzing the Efficiency of Text-to-Image Encryption Algorithm |
Q115018881 | Analyzing the Relationship between the Personality Traits and Drug Consumption (Month-based user Definition) using Rough Sets Theory |
Q113178692 | Analyzing the Social Awareness in Autistic Children Trained through Multimedia Intervention Tool using Data Mining |
Q114965895 | Android Security Development: SpywareDetection, Apps Secure Level and Data Encryption Improvement |
Q122283391 | Anomaly Detection using Network Metadata |
Q114965820 | Anti-Molestation: An IoT based Device for Women’s Self-Security System to Avoid Unlawful Activities |
Q125964858 | Application of Artificial Intelligence-Genetic Algorithms to Select Stock Portfolios in the Asian Markets |
Q126410763 | Application of Computer-Aided to Improve Industrial Productivity in Cement Factories by using a Novel Design of Quantitative Conveyor |
Q123339475 | Application of Homomorphic Encryption on Neural Network in Prediction of Acute Lymphoid Leukemia |
Q119821183 | Application of Random Forest Regression with Hyper-parameters Tuning to Estimate Reference Evapotranspiration |
Q120964177 | Applying Cellular Automata for Simulating and Assessing Urban Growth Scenario Based in Nairobi, Kenya |
Q73606063 | Arabic Cursive Characters Distributed Recognition using the DTW Algorithm on BOINC: Performance Analysis |
Q125910593 | Arabic Location Named Entity Recognition for Tweets using a Deep Learning Approach |
Q125874750 | Architecture Considerations for Big Data Management |
Q114368114 | Arijo: Location-Specific Data Crowdsourcing Web Application as a Curriculum Supplement |
Q113264786 | Artificial Bee Colony Algorithm Optimization for Video Summarization on VSUMM Dataset |
Q123129373 | Artificial Intelligence-based Detection of Fava Bean Rust Disease in Agricultural Settings: An Innovative Approach |
Q121752994 | Assessing Architectural Sustainability during Software Evolution using Package-Modularization Metrics |
Q114965776 | Assessing and Proposing Countermeasures for Cyber-Security Attacks |
Q114965794 | Assessment of Emotion in Online News based on Kansei Approach for National Security |
Q121364748 | Attribute-based Encryption for Fine-Grained Access Control on Secure Hybrid Clouds |
Q114053784 | Augmented System for Food Crops Production in Agricultural Supply Chain using Blockchain Technology |
Q114965844 | Authentication using Robust Primary PIN (Personal Identification Number), Multifactor Authentication for Credit Card Swipe and Online Transactions Security |
Q126840331 | Automatic Classification of Academic and Vocational Guidance Questions using Multiclass Neural Network |
Q114856344 | Automatic Structured Abstract for Research Papers Supported by Tabular Format using NLP |
Q126410948 | Automatically Extract Vertebra and Compute the Cobb Angle based on Spine’s Features and Adaptive ASMs in Posteroanterior Radiographs |
Q114965750 | Automating the Shaping of Metadata Extracted from a Company Website with Open Source Tools |
Q122914814 | Autonomous Control of Eye Based Electric Wheel Chair with Obstacle Avoidance and Shortest Path Findings Based on Dijkstra Algorithm |
Q114966041 | Awareness Training Transfer and Information Security Content Development for Healthcare Industry |
Q114965861 | Awareness of Ethical Issues when using an e-Learning System |
Q113426319 | BCSM: A BlockChain-based Security Manager for Big Data |
Q113237318 | BERT+vnKG: Using Deep Learning and Knowledge Graph to Improve Vietnamese Question Answering System |
Q114965823 | BOTNETs: A Network Security Issue |
Q122680697 | BREPubSub: A Secure Publish-Subscribe Model using Blockchain and Re-encryption for IoT Data Sharing Management |
Q126406126 | Best-Choice Topology: An Optimized Array-based Maximum Finder |
Q125291900 | Big Data Strategy |
Q114596116 | Bio-inspired Think-and-Share Optimization for Big Data Provenance in Wireless Sensor Networks |
Q126854014 | Bioinspired Immune System for Intrusions Detection System in Self Configurable Networks |
Q125405841 | Bird Image Classification using Convolutional Neural Network Transfer Learning Architectures |
Q124857406 | Black Sea Catchment Observation System as a Portal for GEOSS Community |
Q122269868 | Blind Turing-Machines: Arbitrary Private Computations from Group Homomorphic Encryption |
Q114596105 | Blockchain Privacy Data Access Control Method Based on Cloud Platform Data |
Q121890294 | Blockchain Traffic Offence Demerit Points Smart Contracts: Proof of Work |
Q126190419 | Blockchain and Internet of Things for Business Process Management: Theory, Challenges, and Key Success Factors |
Q125566840 | Blockchain in Insurance: Exploratory Analysis of Prospects and Threats |
Q111992660 | Bootstrapping Domain Knowledge Exploration using Conceptual Mapping of Wikipedia |
Q125262124 | BrainNet-7: A CNN Model for Diagnosing Brain Tumors from MRI Images based on an Ablation Study |
Q125588997 | Building Regional Capacities for GEOSS and INSPIRE: a journey in the Black Sea Catchment |
Q126404884 | BulkSort: System Design and Parallel Hardware Implementation Considerations |
Q121197742 | CDRA: A Community Detection based Routing Algorithm for Link Failure Recovery in Software Defined Networks |
Q113237310 | CISE: Community Engagement of CEB Cloud Ecosystem in Box |
Q114368100 | CREeLS: Crowdsourcing based Requirements Elicitation for eLearning Systems |
Q114965860 | Cancelable Face Template Protection using Transform Features for Cyberworld Security |
Q113426367 | Capturing Software Security Practices using CBR: Three Case Studies |
Q126410603 | Cardiovascular Disease Diagnosis: A Machine Learning Interpretation Approach |
Q126044737 | Causal Impact Analysis on Android Market |
Q114965942 | Challenges in Designing Ethical Rules for Infrastructures in Internet of Vehicles |
Q126410680 | Classification Performance of Violence Content by Deep Neural Network with Monarch Butterfly Optimization |
Q126853847 | Classification of Arabic Writing Styles in Ancient Arabic Manuscripts |
Q126840509 | Classification of People who Suffer Schizophrenia and Healthy People by EEG Signals using Deep Learning |
Q114966050 | Cloud CRM: State-of-the-Art and Security Challenges |
Q114965953 | Cloud Computing Environment and Security Challenges: A Review |
Q114965888 | Cloud Security based on the Homomorphic Encryption |
Q114965905 | Cloud Server Security using Bio-Cryptography |
Q125359781 | Cloud based Forecast of Municipal Solid Waste Growth using AutoRegressive Integrated Moving Average Model: A Case Study for Bengaluru |
Q126407429 | Cloud-Edge Network Data Processing based on User Requirements using Modify MapReduce Algorithm and Machine Learning Techniques |
Q123162222 | Cloud-based Secure Healthcare Framework by using Enhanced Ciphertext Policy Attribute-Based Encryption Scheme |
Q126405274 | Clustering Analysis for Malware Behavior Detection using Registry Data |
Q57929435 | Clustering based Max-Min Scheduling in Cloud Environment |
Q126411062 | Clustering based Privacy Preserving of Big Data using Fuzzification and Anonymization Operation |
Q114596109 | Code Optimizations for Parallelization of Programs using Data Dependence Identifier |
Q125563098 | Collaborative Editing over Opportunistic Networks: State of the Art and Challenges |
Q110570074 | Collaborative Integrated Model in Agile Software Development (MDSIC/MDSIC–M)-Case Study and Practical Advice |
Q114966059 | Community Perception of the Security and Acceptance of Mobile Banking Services in Bahrain: An Empirical Study |
Q126853869 | Comparative Analysis between a Photovoltaic System with Two-Axis Solar Tracker and One with a Fixed Base |
Q114965778 | Comparative Analysis of National Cyber Security Strategies using Topic Modelling |
Q57607718 | Comparative Analysis of Online Rating Systems |
Q114965819 | Comparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practice |
Q110570075 | Comparative Study between Lean Six Sigma and Lean-Agile for Quality Software Requirement |
Q114856339 | Comparative Study of Truncating and Statistical Stemming Algorithms |
Q110565915 | Comparison of Agile Method and Scrum Method with Software Quality Affecting Factors |
Q114053792 | Comparison of Item Difficulty Estimates in a Basic Statistics Test using ltm and CTT Software Packages in R |
Q122973074 | Compiler Optimization Prediction with New Self-Improved Optimization Model |
Q111519073 | Comprehensive Analysis of Flow Incorporated Neural Network based Lightweight Video Compression Architecture |
Q114053788 | Comprehensive Study on Machine Learning Techniques for Software Bug Prediction |
Q114966069 | Computer Ethics in the Semantic Web Age |
Q114965803 | Computing Academics’ Perceived Level of Awareness and Exposure to Software Engineering Code of Ethics: A Case Study of a South African University of Technology |
Q125975462 | Concentrated Solar Power Site Suitability using GIS-MCDM Technique taken UAE as a Case Study |
Q114965827 | Conceptual Model for Connected Vehicles Safety and Security using Big Data Analytics |
Q114966061 | Contemplation of Effective Security Measures in Access Management from Adoptability Perspective |
Q114966089 | Context Switching Semaphore with Data Security Issues using Self-healing Approach |
Q111822536 | Contribution to the Improvement of Cryptographic Protection Methods for Medical Images in DICOM Format through a Combination of Encryption Method |
Q121667248 | Controlling a Wheelchair using a Brain Computer Interface based on User Controlled Eye Blinks |
Q113074225 | Convex Hybrid Restoration and Segmentation Model for Color Images |
Q126405405 | Convolutional Neural Network Considering Physical Processes and its Application to Diatom Detection |
Q114965913 | Cookies and Sessions: A Study of what they are, how they can be Stolen and a Discussion on Security |
Q114596122 | Creating and Protecting Password: A User Intention |
Q114368111 | Crowd Counting Mapping to make a Decision |
Q114368119 | Crowd Mobility Analysis using WiFi Sniffers |
Q114368102 | Crowd-Generated Data Mining for Continuous Requirements Elicitation |
Q123155277 | Crypto-Steganographic LSB-based System for AES-Encrypted Data |
Q56568444 | Cryptocurrency Mining – Transition to Cloud |
Q122263790 | Cryptography using Random Rc4 Stream Cipher on SMS for Android-Based Smartphones |
Q114965774 | Customer Satisfaction with Digital Wallet Services: An Analysis of Security Factors |
Q114965831 | Cyber Security Defence Policies: A Proposed Guidelines for Organisations Cyber Security Practices |
Q114965946 | Cyber-Security Incidents: A Review Cases in Cyber-Physical Systems |
Q113237315 | Cyberattacks and Vociferous Implications on SECS/GEM Communications in Industry 4.0 Ecosystem |
Q114966062 | Cyberspace Forensics Readiness and Security Awareness Model |
Q124900982 | DBTechVoc: A POS-tagged Vocabulary of Tokens and Lemmata of the Database Technical Domain |
Q126841455 | Data Augmentation to Stabilize Image Caption Generation Models in Deep Learning |
Q111896879 | Data Backup Approach using Software-defined Wide Area Network |
Q114966064 | Data Center Governance Information Security Compliance Assessment Based on the Cobit Framework |
Q66677643 | Data Citation Service for Wikipedia Articles |
Q114965920 | Data Governance Cloud Security Checklist at Infrastructure as a Service (IaaS) |
Q114965754 | Data Recovery Comparative Analysis using Open-based Forensic Tools Source on Linux |
Q113426316 | Data Security Awareness in Online Learning |
Q114966039 | Data Security Using Cryptography and Steganography Techniques |
Q114966045 | Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions |
Q114965788 | Data Security: A New Symmetric Cryptosystem based on Graph Theory |
Q114368109 | Decision Support System for Agriculture Industry using Crowd Sourced Predictive Analytics |
Q122609578 | Defects Prediction and Prevention Approaches for Quality Software Development |
Q114965938 | Defining Network Exposure Metrics in Security Risk Scoring Models |
Q123253419 | Design and Analysis of DNA Encryption and Decryption Technique based on Asymmetric Cryptography System |
Q113237312 | Design and Implementation of HSQL: A SQL-like language for Data Analysis in Distributed Systems |
Q114845935 | Design and Implementation of a Most Secure Cryptographic Scheme for Lightweight Environment using Elliptic Curve and Trigonohash Technique |
Q114845937 | Design and Implementation of a Strong and Secure Lightweight Cryptographic Hash Algorithm using Elliptic Curve Concept: SSLHA-160 |
Q126841507 | Design of Embedded Vision System based on FPGA-SoC |
Q121358764 | Design of Higher-Dimensional Hyperchaotic System based on Combined Control and its Encryption Application |
Q126853689 | Design of an Efficient Steganography Model using Lifting based DWT and Modified-LSB Method on FPGA |
Q114965992 | Design, Release, Update, Repeat: The Basic Process of a Security Protocol’s Evolution |
Q126410905 | Designing an Automated Intelligent e-Learning System to Enhance the Knowledge using Machine Learning Techniques |
Q126410583 | Detecting Fake Images on Social Media using Machine Learning |
Q125802023 | Detecting Public Sentiment of Medicine by Mining Twitter Data |
Q125627002 | Detection and Analysis of Oil Spill using Image Processing |
Q113237328 | Detection and Prevention of SQL Injection Attack by Dynamic Analyzer and Testing Model |
Q113237330 | Detection of SQL Injection Using a Genetic Fuzzy Classifier System |
Q114965758 | Determinants of Information Security Awareness and Behaviour Strategies in Public Sector Organizations among Employees |
Q114368126 | Determining Public Structure Crowd Evacuation Capacity |
Q115363431 | Developing A Model for Predicting the Speech Intelligibility of South Korean Children with Cochlear Implantation using a Random Forest Algorithm |
Q126854057 | Developing Agriculture Land Mapping using Rapid Application Development (RAD): A Case Study from Indonesia |
Q126411227 | Developing a Framework for Potential Candidate Selection |
Q125761128 | Developing a Mining Robot for Mars Exploitation: NASA Robotics Mining Competition (RMC) |
Q122070220 | Developing a New Hybrid Cipher Algorithm using DNA and RC4 |
Q126840272 | Developing an Algorithm for Securing the Biometric Data Template in the Database |
Q125615773 | Developing an Intelligent Framework for Improving the Quality of Service in the Government Organizations in the Kingdom of Saudi Arabia |
Q115363428 | Development Trends of Online-based Aural Rehabilitation Programs for Children with Cochlear Implant Coping with the Fourth Industrial Revolution and Implication in Speech-Language Pathology |
Q111898000 | Development of Architecture and Software Implementation of Deep Neural Network Models Repository for Spatial Data Analysis |
Q113426330 | Development of Mathematics Web-based Learning on Table Set-Up Activities |
Q126025560 | Development of Social Media GIS to Support Information Utilization from Normal Times to Disaster Outbreak Times |
Q121633710 | Development of a New Lightweight Encryption Algorithm |
Q114596103 | Differential Privacy Technology of Big Data Information Security based on ACA-DMLP |
Q123026853 | Digital Image Encryption using Composition of RaMSH-1 Map Transposition and Logistic Map Keystream Substitution |
Q114965971 | Digital Image Security: Fusion of Encryption, Steganography and Watermarking |
Q114965763 | Digital Learning Tools for Security Inductions in Mining Interns: A PLS-SEM Analysis |
Q114822057 | Digitization of Supply Chains as a Lever for Controlling Cash Flow Bullwhip: A Systematic Literature Review |
Q126841551 | Discovering Gaps in Saudi Education for Digital Health Transformation |
Q113074224 | Discrete Cosine Transformation based Image Data Compression Considering Image Restoration |
Q113426363 | DistB-SDoIndustry: Enhancing Security in Industry 4.0 Services based on Distributed Blockchain through Software Defined Networking-IoT Enabled Architecture |
Q126841127 | Distance based Sweep Nearest Algorithm to Solve Capacitated Vehicle Routing Problem |
Q126407649 | Distributed SDN Deployment in Backbone Networks for Low-Delay and High-Reliability Applications |
Q114965866 | Distributed Shadow Controllers based Moving Target Defense Framework for Control Plane Security |
Q114965934 | Divide and Conquer Approach for Solving Security and Usability Conflict in User Authentication |
Q114965802 | Drone Security: Issues and Challenges |
Q114966054 | Dual Security Testing Model for Web Applications |
Q121742971 | Dynamic Access Control Policy based on Blockchain and Machine Learning for the Internet of Things |
Q59386334 | Dynamic Evaluation and Visualisation of the Quality and Reliability of Sensor Data Sources |
Q114965796 | Dynamic Management of Security Policies in PrivOrBAC |
Q126405402 | Dynamic Performance of Synchronous Generator in Steam Power Plant |
Q113074227 | Dynamic path restoration for new call blocking versus handoff call blocking in heterogeneous network using buffers for QoS |
Q121874911 | Dynamics of Organizational Change |
Q56565525 | E-Learning Collaborative System for Practicing Foreign Languages with Native Speakers |
Q114596111 | EDES-ACM: Enigma Diagonal Encryption Standard Access Control Model for Data Security in Cloud Environment |
Q125623496 | Economic Development Efficiency Based on Tobit Model: Guided by Sustainable Development |
Q111822847 | Edge Detection on DICOM Image using Triangular Norms in Type-2 Fuzzy |
Q114965936 | Effect of Service Broker Policies and Load Balancing Algorithms on the Performance of Large Scale Internet Applications in Cloud Datacenters |
Q126840434 | Effective Methods to Improve the Educational Process of Medicine in Bulgaria |
Q57977697 | Effective Security Architecture for Virtualized Data Center Networks |
Q123220707 | Efficient Arnold and Singular Value Decomposition based Chaotic Image Encryption |
Q113237322 | Efficient Distributed SPARQL Queries on Apache Spark |
Q114254070 | Efficient Hybrid Semantic Text Similarity using Wordnet and a Corpus |
Q121344042 | Efficient Image Cipher using 2D Logistic Mapping and Singular Value Decomposition |
Q114254076 | Efficient Retrieval of Text for Biomedical Domain using Data Mining Algorithm |
Q114965811 | Efficient Security Model for RDF Files Used in IoT Applications |
Q114965808 | Efficient Security Solutions for IoT Devices |
Q126047997 | Efficient Weighted Edit Distance and N-gram Language Models to Improve Spelling Correction of Segmentation Errors |
Q126406140 | Embedded Mission Decision-Making based on Dynamic Decision Networks in SoPC Platform |
Q126404777 | Embedding Adaptation Levels within Intelligent Tutoring Systems for Developing Programming Skills and Improving Learning Efficiency |
Q126410917 | Embracing Localization Inaccuracy with a Single Beacon |
Q125699033 | Emergence of Unstructured Data and Scope of Big Data in Indian Education |
Q114053780 | Emergency Decision Model by Combining Preference Relations with Trapezoidal Pythagorean Fuzzy Probabilistic Linguistic Priority Weighted Averaging PROMETHEE Approach |
Q125894537 | Emotion Recognition on Multimodal with Deep Learning and Ensemble |
Q113178685 | Emotional Evocative User Interface Design for Lifestyle Intervention in Non-communicable Diseases using Kansei |
Q125845825 | Empirical Study on Intelligent Android Malware Detection based on Supervised Machine Learning |
Q126404404 | Employing Takaful Islamic Banking through State of the Art Blockchain: A Case Study |
Q124857408 | Enabling Efficient Discovery of and Access to Spatial Data Services |
Q121287330 | Encrypted Fingerprint into VoIP Systems using Cryptographic Key Generated by Minutiae Points |
Q121310671 | Encrypted Storage Method of Oral English Teaching Resources based on Cloud Platform |
Q121605455 | Encrypted With Fuzzy Compliment-Max-Product Matrix in Watermarking |
Q120991984 | Encryption Algorithms Modeling in Detecting Man in the Middle Attack in Medical Organizations |
Q123109868 | Encryption Algorithms for Color Images: A Brief Review of Recent Trends |
Q121461918 | Encryption on Multimodal Biometric using Hyper Chaotic Method and Inherent Binding Technique |
Q126404561 | Energy Balanced Two-level Clustering for Large-scale Wireless Sensor Networks based on the Gravitational Search Algorithm |
Q126406112 | Energy Efficient Cluster Head Selection using Hybrid Squirrel Harmony Search Algorithm in WSN |
Q114965915 | Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication |
Q114965847 | Enhance the Security and Prevent Vampire Attack on Wireless Sensor Networks using Energy and Broadcasts Threshold Values |
Q125920726 | Enhanced Link Redirection Interface for Secured Browsing using Web Browser Extensions |
Q114965904 | Enhanced Physical Document Management using NFC with Verification for Security and Privacy |
Q114965980 | Enhanced Security for Data Sharing in Multi Cloud Storage (SDSMC) |
Q114845925 | Enhanced Security: Implementation of Hybrid Image Steganography Technique using Low-Contrast LSB and AES-CBC Cryptography |
Q114596121 | Enhanced Textual Password Scheme for Better Security and Memorability |
Q126841588 | Enhanced, Modified and Secured RSA Cryptosystem based on n Prime Numbers and Offline Storage for Medical Data Transmission via Mobile Phone |
Q122642366 | Enhancement of Low-Light Image using Homomorphic Filtering, Unsharp Masking, and Gamma Correction |
Q113237317 | Enhancement of Natural Language to SQL Query Conversion using Machine Learning Techniques |
Q126841622 | Enhancement of Packet Delivery Ratio during Rain Attenuation for Long Range Technology |
Q114965835 | Enhancement of Two-Tier ATM Security Mechanism: Towards Providing a Real-Time Solution for Network Issues |
Q114966027 | Enhancing Wireless Sensor Network Security using Artificial Neural Network based Trust Model |
Q122932239 | Enhancing the Secured Software Framework using Vulnerability Patterns and Flow Diagrams |
Q113426298 | Enhancing the Security of Data Stored in the Cloud using customized Data Visualization Patterns |
Q114965773 | Enhancing the Security of Digital Image Encryption using Diagonalize Multidimensional Nonlinear Chaotic System |
Q126404742 | Enrichment Ontology with Updated user Data for Accurate Semantic Annotation |
Q125968256 | Ensemble Deep Learning (EDL) for Cyber-bullying on Social Media |
Q119821212 | Estimating Evapotranspiration using Machine Learning Techniques |
Q114965940 | Ethical Issues and Related Considerations Involved with Artificial Intelligence and Autonomous Systems |
Q121590492 | Evaluate Metadata of Sparse Matrix for SpMV on Shared Memory Architecture |
Q114966000 | Evaluating Confidentiality Impact in Security Risk Scoring Models |
Q114966043 | Evaluating Damage Potential in Security Risk Scoring Models |
Q126410970 | Evaluating Programmed Artificial Insemination for Cattle Production |
Q123321598 | Evaluating Software Quality Attributes using Analytic Hierarchy Process (AHP) |
Q114965879 | Evaluating a Cloud Service using Scheduling Security Model (SSM) |
Q108927719 | Evaluating and Comparing the Usability of Privacy in WhatsApp, Twitter, and Snapchat |
Q115363425 | Evaluating the Accuracy of Models for Predicting the Speech Acceptability for Children with Cochlear Implants |
Q114053787 | Evaluation Study of Elliptic Curve Cryptography Scalar Multiplication on Raspberry Pi4 |
Q114965790 | Evaluation of Data Center Network Security based on Next-Generation Firewall |
Q114966084 | Evaluation of Data Security Measures in a Network Environment Towards Developing Cooperate Data Security Guidelines |
Q123271801 | Evaluation of a Model Maximizing the Quality Value of Selected Software Components in a Library |
Q114965916 | Experimental Evaluation of Security Requirements Engineering Benefits |
Q113237325 | Experimentation for Modular Robot Simulation by Python Coding to Establish Multiple Configurations |
Q113237331 | Explorative Study of SQL Injection Attacks and Mechanisms to Secure Web Application Database- A Review |
Q125366391 | Exploring Alumni Data using Data Visualization Techniques |
Q122905901 | Exploring Factors Associated with the Social Discrimination Experience of Children from Multicultural Families in South Korea by using Stacking with Non-linear Algorithm |
Q114053796 | Exploring Mechanisms for Pattern Formation through Coupled Bulk-Surface PDEs in Case of Non-linear Reactions |
Q114296692 | Exploring Saudi Citizens' Acceptance of Mobile Government Service |
Q114368122 | Exploring the Potential of Mobile Crowdsourcing in the Sharing of Information on Items Prices |
Q115514741 | Exponential Decay Function-Based Time-Aware Recommender System for e-Commerce Applications |
Q121809039 | Eyes Based Eletric Wheel Chair Control System- - I (eye) can control Electric Wheel Chair - |
Q122262987 | FPGA Based Cipher Design & Implementation of Recursive Oriented Block Arithmetic and Substitution Technique (ROBAST) |
Q126406947 | Face Recognition on Low-Resolution Image using Multi Resolution Convolution Neural Network and Antialiasing Method |
Q114965870 | Factors Contributing to the Success of Information Security Management Implementation |
Q114965785 | Factors Impacting Users’ Compliance with Information Security Policies: An Empirical Study |
Q114965780 | Factors Influencing the Adoption of Cyber Security Standards Among Public Listed Companies in Malaysia |
Q126841556 | Faculty’s Social Media usage in Higher Education Embrace Change or Left Behind |
Q119821189 | Failure Region Estimation of Linear Voltage Regulator using Model-based Virtual Sensing and Non-invasive Stability Measurement |
Q125780562 | Fast Pasture Classification Method using Ground-based Camera and the Modified Green Red Vegetation Index (MGRVI) |
Q125634306 | Fault Diagnosis Technology of Railway Signal Equipment based on Improved FP-Growth Algorithm |
Q114965930 | Features and Potential Security Challenges for IoT Enabled Devices in Smart City Environment |
Q114965759 | Federated Learning and its Applications for Security and Communication |
Q114965798 | Feistel Network Assisted Dynamic Keying based SPN Lightweight Encryption for IoT Security |
Q113178695 | Female Under-Representation in Computing Education and Industry - A Survey of Issues and Interventions |
Q113178690 | Financial Literacy of SME Managers’ on Access to Finance and Performance: The Mediating Role of Financial Service Utilization |
Q114254069 | Financial Market Prediction using Google Trends |
Q114254074 | Financial Statement Fraud Detection using Text Mining |
Q126410847 | Flooding and Oil Spill Disaster Relief using Sentinel of Remote Sensing Satellite Data |
Q113264779 | Flower Pollination Algorithm for Feature Selection in Tweets Sentiment Analysis |
Q115514744 | Forecasting Feature Selection based on Single Exponential Smoothing using Wrapper Method |
Q114966085 | Forks impacts and motivations in free and open source projects |
Q114965816 | Formal Verification of an Efficient Architecture to Enhance the Security in IoT |
Q113237334 | Format SPARQL Query Results into HTML Report |
Q110565912 | Framework for Applicability of Agile Scrum Methodology: A Perspective of Software Industry |
Q114966081 | Free Open Source Software: FOSS Based GIS for Spatial Retrievals of Appropriate Locations for Ocean Energy Utilizing Electric Power Generation Plants |
Q126659063 | From Poster to Mobile Calendar: An Event Reminder using Mobile OCR |
Q123016155 | Fuzzy Based Evaluation of Software Quality Using Quality Models and Goal Models |
Q126404810 | GPLDA: A Generalized Poisson Latent Dirichlet Topic Model |
Q114965984 | GSM based Android Application: Appliances Automation and Security Control System using Arduino |
Q56565517 | Gamification, Virality and Retention in Educational Online Platform |
Q123145878 | Gaze Direction based Mobile Application for Quadriplegia Wheelchair Control System |
Q121607522 | Genetic Behaviour of Zika Virus and Identification of Motif |
Q114965854 | Geo Security using GPT Cryptosystem |
Q114856336 | Grammatical Error Correction with Denoising Autoencoder |
Q125295256 | Grid Based Processing of Satellite Images in GreenLand Platform |
Q126410242 | HCAHF: A New Family of CA-based Hash Functions |
Q126405586 | Handwritten Arabic Text Recognition using Principal Component Analysis and Support Vector Machines |
Q125119370 | Hate Speech Detection in Twitter using Transformer Methods |
Q126841377 | Haze Effects on Satellite Remote Sensing Imagery and their Corrections |
Q126410741 | Heart Disease Prediction based on External Factors: A Machine Learning Approach |
Q114966055 | Hidden Markov Models (HMMs) and Security Applications |
Q122178091 | Hierarchical and Efficient Identity-bsed Encryption Against Side Channel Attacks |
Q114965760 | High Capacity Image Steganography System based on Multi-layer Security and LSB Exchanging Method |
Q121338974 | High Lightweight Encryption Standard (HLES) as an Improvement of 512-Bit AES for Secure Multimedia |
Q114368097 | High Performance Computing in Resource Poor Settings: An Approach based on Volunteer Computing |
Q126404300 | High Predictive Performance of Dynamic Neural Network Models for Forecasting Financial Time Series |
Q114965828 | High-Security Image Steganography Technique using XNOR Operation and Fibonacci Algorithm |
Q114965825 | Home Security System with Face Recognition based on Convolutional Neural Network |
Q114965886 | How to Improve the IoT Security Implementing IDS/IPS Tool using Raspberry Pi 3B+ |
Q110500162 | Human Related-Health Actions Detection using Android Camera based on TensorFlow Object Detection API |
Q126840678 | Hybrid Control of PV-FC Electric Vehicle using Lyapunov based Theory |
Q114965775 | Hybrid Deep Neural Network Model for Detection of Security Attacks in IoT Enabled Environment |
Q121011335 | Hybrid Encryption Algorithm for Information Security in Hadoop |
Q122599776 | Hybrid Query by Humming and Metadata Search System (HQMS) Analysis over Diverse Features |
Q56171632 | Hybrid Technique for Human Face Emotion Detection |
Q126853716 | Hyperspectral Image Classification using Support Vector Machine with Guided Image Filter |
Q114965770 | IAGA: Interference Aware Genetic Algorithm based VM Allocation Policy for Cloud Systems |
Q123124926 | IMPLEMENTATION OF NODE ENERGY BASED ON ENCRYPTION KEYING |
Q114856348 | IRS for Computer Character Sequences Filtration: a new software tool and algorithm to support the IRS at tokenization process |
Q126405576 | Identification of People with Parkinson's Suspicions through Voice Signal Processing |
Q110570124 | Identify and Classify Critical Success Factor of Agile Software Development Methodology Using Mind Map |
Q122958180 | Identifying Community-Supported Technologies and Software Developments Concepts by K-means Clustering |
Q57729087 | Identifying and Extracting Named Entities from Wikipedia Database Using Entity Infoboxes |
Q123240656 | Image Encryption Enabling Chaotic Ergodicity with Logistic and Sine Map |
Q121063240 | Image Encryption Technique based on the Entropy Value of a Random Block |
Q122705684 | Image Enhancement Using Homomorphic Filtering and Adaptive Median Filtering for Balinese Papyrus (Lontar) |
Q113074220 | Image Restoration based on Maximum Entropy Method with Parameter Estimation by Means of Annealing Method |
Q125940102 | Image-based Onion Disease (Purple Blotch) Detection using Deep Convolutional Neural Network |
Q114965899 | Images Steganography Approach Supporting Chaotic Map Technique for the Security of Online Transfer |
Q126841210 | Immersive Technologies in Marketing: State of the Art and a Software Architecture Proposal |
Q110565916 | Impact of Scrum and Tactic Workflow Management System on Organization Performance (A Study on Animation Studios in Pakistan) |
Q114965927 | Impact of Security in QoS Signaling in NGN: Registration Study |
Q110565910 | Impact of Story Point Estimation on Product using Metrics in Scrum Development Process |
Q113426307 | Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm |
Q123134430 | Implementation of ISS - IHAS (Information Security System-Information Hiding in Audio Signal) model with reference to proposed e-cipher Method |
Q114596107 | Implementation of Password Hashing on Embedded Systems with Cryptographic Acceleration Unit |
Q113426303 | Implementation of a Web System: Prevent Fraud Cases in Electronic Transactions |
Q110565909 | Implementing Project Management Category Process Areas of CMMI Version 1.3 Using Scrum Practices, and Assets |
Q114965932 | Implication of Genetic Algorithm in Cryptography to Enhance Security |
Q114368116 | Implicit and Explicit Knowledge Mining of Crowdsourced Communities: Architectural and Technology Verdicts |
Q114965842 | Improved Security Particle Swarm Optimization (PSO) Algorithm to Detect Radio Jamming Attacks in Mobile Networks |
Q114966066 | Improved Security of Audit Trail Logs in Multi-Tenant Cloud Using ABE Schemes |
Q123237997 | Improvement of the Handover and Quality of Service on Software Defined Wireless Networks |
Q121798409 | Improvement of the Vertical Handover Decision and Quality of Service in Heterogeneous Wireless Networks using Software Defined Network |
Q114965791 | Improving Data Security using Compression Integrated Pixel Interchange Model with Efficient Encryption Technique |
Q126404542 | Improving Gated Recurrent Unit Predictions with Univariate Time Series Imputation Techniques |
Q123244116 | Improving Image Encryption Using 3D Cat Map and Turing Machine |
Q114965805 | Improving Performance of ABAC Security Policies Validation using a Novel Clustering Approach |
Q114596102 | Improving Privacy Preservation Approach for Healthcare Data using Frequency Distribution of Delicate Information |
Q114965947 | Improving Security of the Telemedicine System for the Rural People of Bangladesh |
Q114965892 | Improving Usable-Security of Web based Healthcare Management System through Fuzzy AHP |
Q114966036 | Improvisation of Security aspect of Steganographic System by applying RSA Algorithm |
Q123255753 | Increasing Randomization of Ciphertext in DNA Cryptography |
Q126406832 | Indonesian Words Error Detection System using Nazief Adriani Stemmer Algorithm |
Q111825745 | Indoor Navigation System based on Passive RFID Transponder with Digital Compass for Visually Impaired People |
Q114965771 | Information Security Enhancement by Increasing Randomness of Stream Ciphers in GSM |
Q114965952 | Information Security and Learning Content Management System (LCMS) |
Q125858691 | Input Value Chain Affect Vietnamese Rice Yield: An Analytical Model Based on a Machine Learning Algorithm |
Q113074226 | Instant Diacritics Restoration System for Sindhi Accent Prediction using N-Gram and Memory-Based Learning Approaches |
Q126411033 | Integrated Methodological Framework for Digital Transformation Strategy Building (IMFDS) |
Q126207433 | Integrated Methodology for Information Security Risk Management using ISO 27005:2018 and NIST SP 800-30 for Insurance Sector |
Q123257314 | Integrating Regression Models and Climatological Data for Improved Precipitation Forecast in Southern India |
Q108931926 | Intelligent Parallel Mixed Method Approach for Characterising Viral YouTube Videos in Saudi Arabia |
Q114856343 | Intelligent Pedagogical Model with Kinesthetic-Static Immersion based on the Neuro-Linguistic Programming Approach (NLP) |
Q114965967 | Intelligent Security for Phishing Online using Adaptive Neuro Fuzzy Systems |
Q57728337 | International Journal of Advanced Computer Science and Applications |
Q114965807 | Internet of Things (IoT) based Smart Vehicle Security and Safety System |
Q126406298 | Internet of Things Cyber Attacks Detection using Machine Learning |
Q114965815 | Internet of Things Security: A Review of Enabled Application Challenges and Solutions |
Q126841005 | Interpolation of Single Beam Echo Sounder Data for 3D Bathymetric Model |
Q113178683 | Investigate the Ensemble Model by Intelligence Analysis to Improve the Accuracy of the Classification Data in the Diagnostic and Treatment Interventions for Prostate Cancer |
Q122721598 | Investigating OpenAI’s ChatGPT Potentials in Generating Chatbot's Dialogue for English as a Foreign Language Learning |
Q126841155 | Investigating Social Media Utilization and Challenges in the Governmental Sector for Crisis Events |
Q110570123 | Investigation of Adherence Degree of Agile Requirements Engineering Practices in Non-Agile Software Development Organizations |
Q126404992 | Investigation of Different Modulation Formats for Extended Reach NG-PON2 using RSOA |
Q114965809 | Investigation of Smart Home Security and Privacy: Consumer Perception in Saudi Arabia |
Q113178686 | Involving American Schools in Enhancing Children’s Digital Literacy and Raising Awareness of Risks Associated with Internet Usage |
Q110527776 | IoT-based Closed Algal Cultivation System with Vision System for Cell Count through ImageJ via Raspberry Pi |
Q114965793 | IoT-based Cyber-security of Drones using the Naïve Bayes Algorithm |
Q114053795 | JEPPY: An Interactive Pedagogical Agent to Aid Novice Programmers in Correcting Syntax Errors |
Q126404167 | Joint Demographic Features Extraction for Gender, Age and Race Classification based on CNN |
Q126854060 | JsonToOnto: Building Owl2 Ontologies from Json Documents |
Q126405976 | KNN and SVM Classification for Chainsaw Sound Identification in the Forest Areas |
Q123357183 | Key Schedule Algorithm using 3-Dimensional Hybrid Cubes for Block Cipher |
Q114965795 | Kinematic Analysis for Trajectory Planning of Open-Source 4-DoF Robot Arm |
Q126407029 | Knowledge Construction by Immersion in Virtual Reality Environments |
Q126405913 | Knowledge based Soil Classification Towards Relevant Crop Production |
Q125906058 | LASyM: A Learning Analytics System for MOOCs |
Q122467772 | LEA-SIoT: Hardware Architecture of Lightweight Encryption Algorithm for Secure IoT on FPGA Platform |
Q125263682 | LOD Explorer: Presenting the Web of Data |
Q114965881 | LSSCW: A Lightweight Security Scheme for Cluster based Wireless Sensor Network |
Q114856337 | LSTM, VADER and TF-IDF based Hybrid Sentiment Analysis Model |
Q126840108 | Land use Detection in Nusajaya using Higher-Order Modified Geodesic Active Contour Model |
Q114965979 | Learning Analytics in a Shared-Network Educational Environment: Ethical Issues and Countermeasures |
Q114007352 | Learning Content Classification and Mapping Content to Synonymous Learners based on 2022 Augmented Verb List of Marzano and Kendall Taxonomy |
Q114965821 | Legal Requirements towards Enhancing the Security of Medical Devices |
Q124652006 | Level of Confidence in Software Effort Estimation by an Intelligent Fuzzy – Neuro - Genetic Approach |
Q126854075 | Lexicon-based Bot-aware Public Emotion Mining and Sentiment Analysis of the Nigerian 2019 Presidential Election on Twitter |
Q121030427 | Light but Effective Encryption Technique based on Dynamic Substitution and Effective Masking |
Q114965832 | Lightweight Security Mechanism over MQTT Protocol for IoT Devices |
Q122903468 | Lightweight Symmetric Encryption Algorithm for Secure Database |
Q114965868 | Lizard Cipher for IoT Security on Constrained Devices |
Q126404811 | Local-Set Based-on Instance Selection Approach for Autonomous Object Modelling |
Q115363433 | Localisation of Information and Communication Technologies in Cameroonian Languages and Cultures:Experience and Issues |
Q113178688 | Logical Intervention in the Form of Work Breakdown Strategy using Object Constraint Language for e-Commerce Application |
Q126840553 | MVC Frameworks Modernization Approach |
Q119821199 | Machine Learning Approaches for Predicting the Severity Level of Software Bug Reports in Closed Source Projects |
Q114254045 | Machine Learning Techniques for Sentiment Analysis of Code-Mixed and Switched Indian Social Media Text Corpus - A Comprehensive Review |
Q125019347 | Machine Learning for Bioclimatic Modelling |
Q114965834 | Malware Analysis in Web Application Security: An Investigation and Suggestion |
Q110570122 | Managing Knowledge in Development of Agile Software |
Q114007354 | Melody Difficulty Classification using Frequent Pattern and Inter-Notes Distance Analysis |
Q126404966 | Memory-based Collaborative Filtering: Impacting of Common Items on the Quality of Recommendation |
Q114596114 | Merge of X-ETL and XCube towards a Standard Hybrid Method for Designing Data Warehouses |
Q123143630 | Meteosat Images Encryption based on AES and RSA Algorithms |
Q126841553 | Method for Texture Mapping of In-Vehicle Camera Image in 3D Map Creation |
Q121096309 | Metric-based Measurement and Selection for Software Product Quality Assessment: Qualitative Expert Interviews |
Q114965901 | Microcontroller-based RFID, GSM and GPS for Motorcycle Security System |
Q126840599 | Model for Time Series Imputation based on Average of Historical Vectors, Fitting and Smoothing |
Q126841160 | Modeling Ant Colony Optimization for Multi-Agent based Intelligent Transportation System |
Q114965851 | Modeling Network Security: Case Study of Email System |
Q114368092 | Modelling an Indoor Crowd Monitoring System based on RSSI-based Distance |
Q114965997 | Modern Authentication Techniques in Smart Phones: Security and Usability Perspective |
Q126405711 | Modification of Manual Raindrops Type Observatory Ombrometer with Ultrasonic Sensor HC-SR04 |
Q114966086 | Modularity Index Metrics for Java-Based Open Source Software Projects |
Q115514742 | Mono Camera-based Human Skeletal Tracking for Squat Exercise Abnormality Detection using Double Exponential Smoothing |
Q110570070 | Motivators and Demotivators of Agile Software Development: Elicitation and Analysis |
Q125886089 | Movie Rating Prediction using Ensemble Learning Algorithms |
Q126841589 | Multi-Band and Multi-Parameter Reconfigurable Slotted Patch Antenna with Embedded Biasing Network |
Q126410177 | Multi-Label Classification using an Ontology |
Q121306766 | Multi-Level Encryption Framework |
Q125760964 | Multi-Spectral Imaging for Fruits and Vegetables |
Q114965783 | MultiStage Authentication to Enhance Security of Virtual Machines in Cloud Environment |
Q114965869 | Mutual Authentication Security Scheme in Fog Computing |
Q114254066 | NADA: New Arabic Dataset for Text Classification |
Q114965907 | Networking Issues for Security and Privacy in Mobile Health Apps |
Q126404266 | Neural Network-based Diabetic Type II High-Risk Prediction using Photoplethysmogram Waveform Analysis |
Q113237324 | New Approach based on Model Driven Engineering for Processing Complex SPARQL Queries on Hive |
Q123225767 | New Smart Encryption Approach based on Multidimensional Analysis Tools |
Q123113870 | New Text Steganography Technique based on Multilayer Encoding with Format-Preserving Encryption and Huffman Coding |
Q114965887 | New Transport Layer Security using Metaheuristics and New Key Exchange Protocol |
Q114966035 | New mechanism for Cloud Computing Storage Security |
Q114596120 | Noble Method for Data Hiding using Steganography Discrete Wavelet Transformation and Cryptography Triple Data Encryption Standard: DES |
Q113074218 | Noise and Restoration of UAV Remote Sensing Images |
Q114965772 | Non-Repudiation-based Network Security System using Multiparty Computation |
Q114254052 | Novel Language Resources for Hindi: An Aesthetics Text Corpus and a Comprehensive Stop Lemma List |
Q115237633 | Numerical Investigation on System of Ordinary Differential Equations Absolute Time Inference with Mathematica® |
Q126841602 | Object Detection System to Help Navigating Visual Impairments |
Q126405789 | Object Detection and Tracking using Deep Learning and Artificial Intelligence for Video Surveillance Applications |
Q126407065 | On Developing an Integrated Family Mobile Application |
Q125620091 | On State-of-the-art of POS Tagger, ‘Sandhi’ Splitter, ‘Alankaar’ Finder and ‘Samaas’ Finder for Indo-Aryan and Dravidian Languages |
Q57607719 | Online Reputation Model Using Moving Window |
Q126853995 | Ontology Learning from Relational Databases: Transforming Recursive Relationships to OWL2 Components |
Q114368095 | Open Challenges for Crowd Density Estimation |
Q114966091 | Open Source Software in Computer Science and IT Higher Education: A Case Study |
Q114856345 | Opinion Mining and thought Pattern Classification with Natural Language Processing (NLP) Tools |
Q126406207 | Optimal Global Threshold based on Two Dimension Otsu for Block Size Decision in Intra Prediction of H.264/AVC Coding |
Q126030169 | Optimization Query Process of Mediators Interrogation Based On Combinatorial Storage |
Q110570069 | Optimized Order of Software Testing Techniques in Agile Process – A Systematic Approach |
Q114965789 | Organisational Information Security Management Maturity Model |
Q123197922 | Organizational Digital Transformations and the Importance of Assessing Theoretical Frameworks such as TAM, TTF, and UTAUT: A Review |
Q126407298 | Outlier Detection using Graphical and Nongraphical Functional Methods in Hydrology |
Q125014463 | Overview of Service and Deployment Models Offered by Cloud Computing, based on International Standard ISO/IEC 17788 |
Q126853860 | Palm Vein Verification System based on Nonsubsampled Contourlet Transform |
Q122873382 | Parallel Implementation of Bias Field Correction Fuzzy C-Means Algorithm for Image Segmentation |
Q123269692 | Parallel Platform for Supporting Stream Ciphers Over Multi-core Processors |
Q114887702 | Parkinson’s Disease Classification using Gaussian Mixture Models with Relevance Feature Weights on Vocal Feature Sets |
Q115237632 | Partial Differential Equation (PDE) based Hybrid Diffusion Filters for Enhancing Noise Performance of Point of Care Ultrasound (POCUS) Images |
Q123246792 | Partition Ciphering System: A Difficult Problem Based Encryption Scheme |
Q114596104 | Password Systems: Problems and Solutions |
Q114368091 | Pedestrian Crowd Detection and Segmentation using Multi-Source Feature Descriptors |
Q114966018 | Pentaho and Jaspersoft: A Comparative Study of Business Intelligence Open Source Tools Processing Big Data to Evaluate Performances |
Q114965882 | Performance Analysis of Acceleration Sensor for Movement Detection in Vehicle Security System |
Q121327002 | Performance Analysis of Advanced IoT Encryption on Serialization Concept: Application Optimization Approach |
Q126406528 | Performance Analysis of Network Intrusion Detection System using Machine Learning |
Q114965906 | Performance Analysis of Open Source Solution "ntop" for Active and Passive Packet Analysis Relating to Application and Transport Layer |
Q114965898 | Performance Analysis of Security Mechanism for Automotive Controller Area Network |
Q126841542 | Performance Comparison of Collaborative-Filtering Approach with Implicit and Explicit Data |
Q126093376 | Performance Evaluation of Affinity Propagation Approaches on Data Clustering |
Q114965782 | Performance Evaluation of SNMPv1/2c/3 using Different Security Models on Raspberry Pi |
Q114254047 | Personally Identifiable Information (PII) Detection in the Unstructured Large Text Corpus using Natural Language Processing and Unsupervised Learning Technique |
Q113704151 | Plant Leaf Recognition using Shape based Features and Neural Network classifiers |
Q126406848 | Power Quality Evaluation for Electrical Installation of Hospital Building |
Q114966078 | Pre-Eminance of Open Source Eda Tools and Its Types in The Arena of Commercial Electronics |
Q114053781 | Predicting Blocking Bugs with Machine Learning Techniques: A Systematic Review |
Q124883497 | Predicting Cervical Cancer using Machine Learning Methods |
Q114965949 | Predicting Fork Visibility Performance on Programming Language Interoperability in Open Source Projects |
Q126125841 | Prediction of Oil Production through Linear Regression Model and Big Data Tools |
Q126406837 | Predictive Control for Distributed Smart Street Light Network |
Q113178687 | Preparing Graduates with Digital Literacy Skills Toward Fulfilling Employability Need in 4IR Era: A Review |
Q122201578 | Privacy Impacts of Data Encryption on the Efficiency of Digital Forensics Technology |
Q57922313 | Privacy Preserving Data Publishing: A Classification Perspective |
Q123287112 | Privacy and Integrity Verification Model with Decentralized ABE and Double Encryption Storage Scheme |
Q114965974 | Privacy and Security Mechanisms for eHealth Monitoring Systems |
Q114965845 | Privacy, Security and Usability for IoT-enabled Weight Loss Apps |
Q114596112 | Problem based Learning with Information and Communications Technology Support: An Experience in the Teaching-Learning of Matrix Algebra |
Q126411214 | Problems Solving of Cell Subscribers based on Expert Systems Neural Networks |
Q114368118 | Process Improvements for Crowdsourced Software Testing |
Q114254071 | Processing the Text of the Holy Quran: a Text Mining Study |
Q126840663 | Project Management Metamodel Construction Regarding IT Departments |
Q126410319 | Proof of Credibility: A Blockchain Approach for Detecting and Blocking Fake News in Social Networks |
Q126029988 | Proof-of-Review: A Review based Consensus Protocol for Blockchain Application |
Q110570076 | Proposal of a Sustainable Agile Model for Software Development |
Q121010005 | Proposed Hyperchaotic System for Image Encryption |
Q121837912 | Proposed Secure Activity Diagram for Software Development |
Q110565917 | Prototype of Web System for Organizations Dedicated to e-Commerce under the SCRUM Methodology |
Q122618385 | Proxy Re-encryption Scheme based on the Timed-release in Edge Computing |
Q114254067 | QTID: Quran Text Image Dataset |
Q57977701 | QoS Parameters Investigations and Load Intensity Analysis, (A Case for Reengineered DCN) |
Q114965951 | Quantifying Integrity Impacts in Security Risk Scoring Models |
Q113237332 | Quantifying the Relationship between Hit Count Estimates and Wikipedia Article Traffic |
Q114887703 | Quantitative Analysis of Healthy and Pathological Vocal Fold Vibrations using an Optical Flow based Waveform |
Q124983530 | Query-Focused Multi-document Summarization Survey |
Q122949893 | RC4 stream cipher and possible attacks on WEP |
Q122917889 | RENTAKA: A Novel Machine Learning Framework for Crypto-Ransomware Pre-encryption Detection |
Q121597527 | ROI Image Encryption using YOLO and Chaotic Systems |
Q113426327 | Random and Sequence Workload for Web-Scale Architecture for NFS, GlusterFS and MooseFS Performance Enhancement |
Q122411522 | Ransomware: Analysis of Encrypted Files |
Q114368107 | Real Time Analysis of Crowd Behaviour for Automatic and Accurate Surveillance |
Q117483289 | Real-Time Wildfire Detection and Alerting with a Novel Machine Learning Approach |
Q113426353 | Recent Themes of Colombian Scientific Engineering Journals in Scopus |
Q114966011 | Recovering and Tracing Links between Software Codes and Test Codes of the Open Source Projects |
Q126840698 | Region-wise Ranking for One-Day International (ODI) Cricket Teams |
Q114368121 | Representing Job Scheduling for Volunteer Grid Environment using Online Container Stowage |
Q114965948 | Requirement Elicitation Techniques for Open Source Systems: A Review |
Q114368080 | Research Efforts and Challenges in Crowd-based Requirements Engineering: A Review |
Q126406802 | Research Trends in Surveillance through Sousveillance |
Q113237306 | Research on Students' Course Selection Preference based on Collaborative Filtering Algorithm |
Q126410247 | Resonance Mitigation and Performance Improvement in Distributed Generation based LCL Filtered Grid Connected Inverters |
Q111822744 | Reversible Anonymization of DICOM Images using Cryptography and Digital Watermarking |
Q123338166 | Reversible De-identification of Specific Regions in Biomedical Images and Secured Storage by Randomized Joint Encryption |
Q122871205 | Review of Image Compression and Encryption Techniques |
Q114965928 | Review of Information Security Policy based on Content Coverage and Online Presentation in Higher Education |
Q114965957 | Rising Issues in VANET Communication and Security: A State of Art Survey |
Q114965918 | Risk Assessment Method for Insider Threats in Cyber Security: A Review |
Q110565911 | Role of Requirements Elicitation & Prioritization to Optimize Quality in Scrum Agile Development |
Q114966056 | Role of Security in Social Networking |
Q113237307 | Rule-based Text Extraction for Multimodal Knowledge Graph |
Q122914356 | SIT: A Lightweight Encryption Algorithm for Secure Internet of Things |
Q114254046 | SMAD: Text Classification of Arabic Social Media Dataset for News Sources |
Q114966058 | SOHO: Information Security Awareness in the Aspect of Contingency Planning |
Q113426311 | SPKP: A Web-based Application System for Managing Mental Health in Higher Institution |
Q120986918 | SQ-Framework for Improving Sustainability and Quality into Software Product and Process |
Q113237319 | SQL to SPARQL Conversion for Direct RDF Querying |
Q56135287 | SVD Based Image Processing Applications: State of The Art, Contributions and Research Challenges |
Q126201404 | SVM Machine Learning Classifier to Automate the Extraction of SRS Elements |
Q114965830 | Scalable Asymmetric Security Mechanism for Internet of Things |
Q126841193 | Scalable Data Analytics Market Basket Model for Transactional Data Streams |
Q126410153 | Scientific Text Sentiment Analysis using Machine Learning Techniques |
Q110565907 | Scrum Method Implementation in a Software Development Project Management |
Q114966040 | SecFHIR: A Security Specification Model for Fast Healthcare Interoperability Resources |
Q121096238 | Secure Communication across the Internet by Encrypting the Data using Cryptography and Image Steganography |
Q114966082 | Secure Digital Cashless Transactions with Sequence Diagrams and Spatial Circuits to Enhance the Information Assurance and Security Education |
Q122200891 | Secure Encryption for Wireless Multimedia Sensors Network |
Q121295916 | Secure Software Defined Networks Controller Storage using Intel Software Guard Extensions |
Q110512235 | Secure Software Engineering: A Knowledge Modeling based Approach for Inferring Association between Source Code and Design Artifacts |
Q123186286 | Secure and Privacy Preserving Mail Servers using Modified Homomorphic Encryption (MHE) Scheme |
Q115514743 | Secured 6-Digit OTP Generation using B-Exponential Chaotic Map |
Q113237313 | Secured SECS/GEM: A Security Mechanism for M2M Communication in Industry 4.0 Ecosystem |
Q114845928 | Securing Images through Cipher Design for Cryptographic Applications |
Q126840436 | Securing Informative Fuzzy Association Rules using Bayesian Network |
Q114845934 | Securing Student Data Privacy using Modified Snake and Ladder Cryptographic Algorithm |
Q114966079 | Security Analysis of Image Cryptosystem Using Stream Cipher Algorithm with Nonlinear Filtering Function |
Q114965764 | Security Analysis on an Improved Anonymous Authentication Protocol for Wearable Health Monitoring Systems |
Q114965806 | Security Aspects of Electronic Health Records and Possible Solutions |
Q113426350 | Security Enhancement in Software Defined Networking (SDN): A Threat Model |
Q114965937 | Security Improvement in Elliptic Curve Cryptography |
Q114966060 | Security Issues Model on Cloud Computing: A Case of Malaysia |
Q114965917 | Security Issues in Cloud Computing and their Solutions: A Review |
Q114965822 | Security Issues in Near Field Communications (NFC) |
Q113426372 | Security Issues in Software Defined Networking (SDN): Risks, Challenges and Potential Solutions |
Q114965965 | Security Issues in the Internet of Things (IoT): A Comprehensive Study |
Q114966065 | Security Issues of a Recent RFID Multi Tagging Protocol |
Q114966073 | Security Policies for Securing Cloud Databases |
Q121083367 | Security Provisions in Stream Ciphers Through Self Shrinking and Alternating Step Generator |
Q114966004 | Security Risk Assessment of Cloud Computing Services in a Networked Environment |
Q114966049 | Security Risk Scoring Incorporating Computers' Environment |
Q114965885 | Security and Privacy Awareness: A Survey for Smartphone User |
Q114966020 | Security and Privacy Issues in Ehealthcare Systems: Towards Trusted Services |
Q114965991 | Security and Privacy Risks Awareness for Bring Your Own Device (BYOD) Paradigm |
Q114965804 | Security and Threats of RFID and WSNs: Comparative Study |
Q114965962 | Security in OpenFlow Enabled Cloud Environment |
Q114965837 | Security of a New Hybrid Ciphering System |
Q114965817 | Security, Privacy and Trust in IoMT Enabled Smart Healthcare System: A Systematic Review of Current and Future Trends |
Q126853856 | Selection of Sensitive Buses using the Firefly Algorithm for Optimal Multiple Types of Distributed Generations Allocation |
Q126406146 | Semantic Knowledge Transformation for Context-aware Heterogeneous Formalisms |
Q126087605 | Semantic Searching and Ranking of Documents using Hybrid Learning System and WordNet |
Q126841174 | Sentiment Analysis and Classification of Photos for 2-Generation Conversation in China |
Q114966052 | Smart Cities: A Survey on Security Concerns |
Q57977693 | Smart Grid Network Transmission Line RLC Modelling Using Random Power Line Synthesis Scheme |
Q111925044 | SmartTS: A Component-Based and Model-Driven Approach to Software Testing in Robotic Software Ecosystem |
Q114368105 | Smartphones-Based Crowdsourcing Approach for Installing Indoor Wi-Fi Access Points |
Q113237326 | Smile Detection Tool using OpenCV-Python to Measure Response in Human-Robot Interaction with Animal Robot PARO |
Q113426338 | Snowball Framework for Web Service Composition in SOA Applications |
Q110570073 | Social Success Factors Affecting Implementation of Agile Software Development Methodologies in Software Industry of Pakistan: An Empirical Study |
Q120868253 | Software Architecture Quality Measurement Stability and Understandability |
Q126840656 | Software Architecture Solutions for the Internet of Things: A Taxonomy of Existing Solutions and Vision for the Emerging Research |
Q114965998 | Software Defined Security Service Provisioning Framework for Internet of Things |
Q123127278 | Software Design using Genetic Quality Components Search |
Q111918867 | Software Ecosystem: Features, Benefits and Challenges |
Q114965810 | Software Engineering Ethics Competency Gap in Undergraduate Computing Qualifications within South African Universities of Technology |
Q122569611 | Software Quality Analysis for Halodoc Application using ISO 25010:2011 |
Q121832327 | Software Quality and Productivity Model for Small and Medium Enterprises |
Q113426389 | Software Security Requirements Gathering Instrument |
Q113426342 | Software Security Static Analysis False Alerts Handling Approaches |
Q122441914 | Software Vulnerabilities’ Detection by Analysing Application Execution Traces |
Q114856334 | Solving Semantic Problem of Phrases in NLP Using Universal Networking Language (UNL) |
Q121345121 | Solving for the RC4 stream cipher state register using a genetic algorithm |
Q114966076 | Spatial Domain Image Steganography based on Security and Randomization |
Q125055758 | Spatio-Temporal Features based Human Action Recognition using Convolutional Long Short-Term Deep Neural Network |
Q114596108 | Special Negative Database (SNDB) for Protecting Privacy in Big Data |
Q114966077 | Spectrum Sharing Security and Attacks in CRNs: a Review |
Q126841097 | Speculating on Speculative Execution |
Q114887701 | Stacked Autoencoder based Feature Compression for Optimal Classification of Parkinson Disease from Vocal Feature Vectors using Immune Algorithms |
Q114965941 | Standardization of Cloud Security using Mamdani Fuzzifier |
Q114856335 | State-of-the-Art Approach to e-Learning with Cutting Edge NLP Transformers: Implementing Text Summarization, Question and Distractor Generation, Question Answering |
Q126840379 | Static Analysis on Floating-Point Programs Dealing with Division Operations |
Q114965873 | Statistical Analysis and Security Evaluation of Chaotic RC5-CBC Symmetric Key Block Cipher Algorithm |
Q114856340 | Stemming Text-based Web Page Classification using Machine Learning Algorithms: A Comparison |
Q113237309 | Stochastic Marine Predator Algorithm with Multiple Candidates |
Q115018884 | Student’s Performance Prediction based on Personality Traits and Intelligence Quotient using Machine Learning |
Q126840080 | Study of Cross-Platform Technologies for Data Delivery in Regional Web Surveys in the Education |
Q56565520 | Study of Gamification Effectiveness in Online e-Learning Systems |
Q123021788 | SuffixAligner: A Python-based Aligner for Long Noisy Reads |
Q120970195 | Survey on Homomorphic Encryption and Address of New Trend |
Q122424153 | Survey on Impact of Software Metrics on Software Quality |
Q114966016 | Symbolism in Computer Security Warnings: Signal Icons & Signal Words |
Q126410169 | System for Monitoring People with Disabilities in the Event of an Accident using Mobile Terminals |
Q114965900 | Systematic Literature Review (SLR) of Resource Scheduling and Security in Cloud Computing |
Q57406561 | Systematic Literature Review of Agile Scalability for Large Scale Projects |
Q123250250 | Systematic Literature Review of Identifying Issues in Software Cost Estimation Techniques |
Q114965893 | Systematic Review of Existing IoT Architectures Security and Privacy Issues and Concerns |
Q114965812 | Systems Security Affectation with the Implementation of Quantum Computing |
Q114368128 | Task Allocation Model for Rescue Disabled Persons in Disaster Area with Help of Volunteers |
Q125982367 | The Application of Intelligent Evaluation Method with Deep Learning in Calligraphy Teaching |
Q114596118 | The Coin Passcode: A Shoulder-Surfing Proof Graphical Password Authentication Model for Mobile Devices |
Q123240436 | The Criteria for Software Quality in Information System: Rasch Analysis |
Q125418711 | The Cross-Cultural Teaching Model of Foreign Literature Under the Application of Machine Learning Technology |
Q114965921 | The Design and Evaluation of a User-Centric Information Security Risk Assessment and Response Framework |
Q114296691 | The Development of Geographic Information System using Participatory GIS Concept of Spatial Management |
Q114856338 | The Effect of Using Light Stemming for Arabic Text Classification |
Q111901300 | The Effectiveness of CATA Software in Exploring the Significance of Modal Verbs in Large Data Texts |
Q114856341 | The Effectiveness of Stemming in the Stylometric Authorship Attribution in Arabic |
Q114965955 | The Ethical and Social Issues of Information Technology: A Case Study |
Q110570072 | The Impact of Motivator and Demotivator Factors on Agile Software Development |
Q119821178 | The Impact of Peer Code Review on Software Maintainability in Open-Source Software: A Case Study |
Q57310198 | The Impact of Quantum Computing on Present Cryptography |
Q114965766 | The Impact of Security and Payment Method On Consumers’ Perception of Marketplace in Saudi Arabia |
Q126406474 | The Impact of using Social Network on Academic Performance by using Contextual and Localized Data Analysis of Facebook Groups |
Q114368089 | The Internet of Things for Crowd Panic Detection |
Q114965943 | The Proposed Model to Increase Security of Sensitive Data in Cloud Computing |
Q114966067 | The Reality of Applying Security in Web Applications in Academia |
Q114965824 | The Relationship of Trustworthiness and Ethical Value in the Healthcare System |
Q126840238 | The Respondent’s Haptic on Academic Universities Websites of Pakistan Measuring Usability |
Q114965818 | The Role of Electronic Means in Enhancing the Intellectual Security among Students at the University of Jordan |
Q125446997 | Three on Three Optimizer: A New Metaheuristic with Three Guided Searches and Three Random Searches |
Q120840035 | Timed-Release Certificateless Encryption |
Q122214594 | Timed-Release Hierarchical Identity-Based Encryption |
Q110512231 | To Generate the Ontology from Java Source Code |
Q114368124 | Toward a Hybrid Approach for Crowd Simulation |
Q114966072 | Toward an Effective Information Security Risk Management of Universities’ Information Systems Using Multi Agent Systems, Itil, Iso 27002,Iso 27005 |
Q110570068 | Towards A Broader Adoption of Agile Software Development Methods |
Q125384802 | Towards A Framework for Multilayer Computing of Survivability |
Q110565908 | Towards Agile Implementation of Test Maturity Model Integration (TMMI) Level 2 using Scrum Practices |
Q114965756 | Towards Flexible Transparent Authentication System for Mobile Application Security |
Q122519033 | Towards Privacy Preserving Commutative Encryption-Based Matchmaking in Mobile Social Network |
Q122206221 | Towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure |
Q114965769 | Towards Security Awareness of Mobile Applications using Semantic-based Sentiment Analysis |
Q114965862 | Towards Security Effectiveness Evaluation for Cloud Services Selection following a Risk-Driven Approach |
Q114965935 | Towards Security as a Service to Protect the Critical Resources of Mobile Computing Devices |
Q114254058 | Towards Understanding Internet of Things Security and its Empirical Vulnerabilities: A Survey |
Q114965910 | Towards a Gateway-based Context-Aware and Self-Adaptive Security Management Model for IoT-based eHealth Systems |
Q110565918 | Towards a New Metamodel Approach of Scrum, XP and Ignite Methods |
Q126840849 | Towards a Prototype of a Low-Priced Domestic Incubator with Telemetry System for Premature Babies in Lima, Peru |
Q57727048 | Towards the Design of a Chemical Textile Ontology |
Q126406341 | Towards the Development of Collaborative Learning in Virtual Environments |
Q122904877 | Towards the Development of a Brain Semi-controlled Wheelchair for Navigation in Indoor Environments |
Q126406625 | Towards the Identification of Student Learning Communities using Centrality |
Q111519072 | Transfer Learning based Performance Comparison of the Pre-Trained Deep Neural Networks |
Q125292274 | Transfer Learning for Closed Domain Question Answering in COVID-19 |
Q114966083 | Transforming Conceptual Model into Logical Model for Temporal Data Warehouse Security: A Case Study |
Q122207866 | Transforming Higher educational institution administration through ICT |
Q114966090 | Transparent Data Encryption- Solution for Security of Database Contents |
Q123330098 | Triple SV: A Bit Level Symmetric Block-Cipher Having High Avalanche Effect |
Q114965931 | Trust and Security Concerns of Cloud Storage: An Indonesian Technology Acceptance |
Q121626830 | Trust-based Key Management Conglomerate ElGamal Encryption for Data Aggregation Framework in WSN using Blockchain Technology |
Q126410913 | UAV Path Planning for Civil Applications |
Q122395946 | Ultra-key Space Domain for Image Encryption using Chaos-based Approach with DNA Sequence |
Q114965852 | Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices |
Q126405362 | Understanding Students’ Motivation and Learning Strategies to Redesign Massive Open Online Courses based on Persuasive System Development |
Q125572132 | Understanding the Factors Affecting the Adoption of Green Computing in the Gulf Universities |
Q123312386 | Unsupervised Feature Learning Methodology for Tree based Classifier and SVM to Classify Encrypted Traffic |
Q114965838 | Usability Evaluation of Open Source Learning Management Systems |
Q113178691 | Use of Technology and Financial Literacy on SMEs Practices and Performance in Developing Economies |
Q113237327 | User-Defined Financial Functions for MS SQL Server |
Q126840222 | Using Brain Imaging to Gauge Difficulties in Processing Ambiguous Text by Non-native Speakers |
Q114053783 | Using Machine Learning Techniques to Predict Bugs in Classes: An Empirical Study |
Q126853888 | Using Project-based Learning in a Hybrid e-Learning System Model |
Q123218275 | VG4 Cipher: Digital Image Encryption Standard |
Q118186172 | VHDL based Design of an Efficient Hearing Aid Filter using an Intelligent Variable-Bandwidth-Filter |
Q114845926 | VIHS with ROTR Technique for Enhanced Light-Weighted Cryptographic System |
Q119821168 | Validating the Usability Evaluation Model for Hearing Impaired Mobile Application |
Q114965884 | Validation Policy Statement on the Digital Evidence Storage using First Applicable Algorithm |
Q114007355 | Verb Sense Disambiguation by Measuring Semantic Relatedness between Verb and Surrounding Terms of Context |
Q114845929 | Verifiable Homomorphic Encrypted Computations for Cloud Computing |
Q120811558 | Verifiable Search Over Updatable Encrypted Data in Cloud Computing |
Q126853780 | Virtual Reality Full Immersion Techniques for Enhancing Workers Performance, 20 years Later: A Review and a Reformulation |
Q126112964 | Virtual Tourism and Digital Heritage: An Analysis of VR/AR Technologies and Applications |
Q113426357 | Visibility and Ethical Considerations of Pakistani Universities Researchers on Google Scholar |
Q126410276 | Visualising Image Data through Image Retrieval Concept using a Hybrid Technique: Songket Motif’s |
Q110510897 | Visualizing Code Bad Smells |
Q121989062 | Voice Scrambling Algorithm based on 3D Chaotic Map System (VSA3DCS) to Encrypt Audio Files |
Q114254056 | Vulnerability Analysis of E-voting Application using Open Web Application Security Project (OWASP) Framework |
Q126404178 | Vulnerable Road User Detection using YOLO v3 |
Q113237333 | WOLF: a Research Platform to Write NFC Secure Applications on Top of Multiple Secure Elements (With an Original SQL-Like Interface) |
Q114596101 | Wavelet Multi Resolution Analysis based Data Hiding with Scanned Secrete Images |
Q59385005 | Web 2.0 Technologies and Social Networking Security Fears in Enterprises |
Q113237339 | Web Anomaly Misuse Intrusion Detection Framework for SQL Injection Detection |
Q114965972 | Web Security: Detection of Cross Site Scripting in PHP Web Application using Genetic Algorithm |
Q114965950 | Web Unique Method (WUM): An Open Source Blackbox Scanner for Detecting Web Vulnerabilities |
Q123286963 | Wheelchair Control System based Eye Gaze |
Q114368123 | Wiki-Based Stochastic Programming and Statistical Modeling System for the Cloud |
Q126404444 | Winning the Polio War in Pakistan |
Q114965939 | Wireless Body Area Network Security and Privacy Issue in E-Healthcare |
Q114254073 | Wireless LAN Security Threats & Vulnerabilities |
Q114965849 | WoT Communication Protocol Security and Privacy Issues |
Q114053779 | Word by Word Labelling of Romanized Sindhi Text by using Online Python Tool |
Q126406683 | Words Segmentation-based Scheme for Implicit Aspect Identification for Sentiments Analysis in English Text |
Q114966068 | XML Schema-Based Minification for Communication of Security Information and Event Management (SIEM) Systems in Cloud Environments |
Q111840864 | Zero-resource Multi-dialectal Arabic Natural Language Understanding |
Q114966087 | e-Government Ethics : a Synergy of Computer Ethics, Information Ethics, and Cyber Ethics |
Q126840214 | e-Learning Proposal Supported by Reasoning based on Instances of Learning Objects |
Search more.