Content
2024, Volume 11, Issue 3
- 85-98 Detection and localization of wrist fractures in x-ray imagery using deep learning teaching
by Haider Abdulbaqi Abbas Mohammed & Shaymaa Taha Ahmed & Rana Mohammed Hassan Zaki & Qusay Kanaan Kadhim - 99-117 Utilization of IoT and database system of central warehouse project in the pharmaceutical industry
by Edi Susanto & Alvindra Pratama & Dwi Novirani & Mugi Praseptiawan & Mira Musrini Barmawi & Rika Ampuh Hadiguna - 118-129 Locust-based genetic classifier for abnormality identification in brain
by Soundararajan Mohanalakshmi & Devaraj Rene Dev & Vallirathi Iyyadurai & Venkatachalam Revathi - 130-139 Overview of homomorphic encryption technology for data privacy
by Qiang Chen & Huixian Li & Suriyani Ariffin & Nur Atiqah Sia Abdullah
2024, Volume 11, Issue 2
- 58-72 A multi-attention residual integrated network with enhanced fireworks algorithm for remote sensing image classification
by Josephine Anitha Antony & Gladis Dennis - 73-84 Time optimization for simulation of PMD 3D camera
by Sangita Gautam Lade & Sanjesh Pawale & Aniket Patil
2024, Volume 11, Issue 1
- 1-15 Software reliability prediction using ensemble learning with random hyperparameter optimization
by Getachew Mekuria Habtemariam & Sudhir Kumar Mohapatra & Hussien Worku Seid - 16-29 Machine learning algorithms-based decision support model for diabetes
by Karthick Kanagarathinam & R Manikandan & T Sathish Kumar - 30-44 Enhancing skin lesion segmentation with U-Net++: Design, analysis, and performance evaluation
by Sheetal Nana Patil & Hitendra D Patil - 45-57 Cyber attacks on UAV networks: A comprehensive survey
by Ashish Mahalle & Sarika Khandelwal & Abhishek Dhore & Vishwajit Barbudhe & Vivek Waghmare
2023, Volume 10, Issue 4
- 136-149 Pneumonia and tuberculosis detection with chest x-ray images and medical records using deep learning techniques
by Sudhir Kumar Mohapatra & Mesfin Abebe & Lidia Mekuanint & Srinivas Prasad & Prasanta Kumar Bala & Sunil Kumar Dhala - 150-164 Whale optimization approach for early heart disease prediction based on FCM using DCNN
by Rajakumar Raja Aswathi & Kolappanpillai Pazhani Kumar & Bagavathiperumal Ramakrishnan - 165-181 Performance analysis of IoT networks in terrestrial environment utilizing LZW data compression technique
by Ankur Sisodia & Ajay Kumar Yadav - 182-198 Performance analysis of OFDM with variations in cyclic prefix and FFT lengths
by Yogita Dinkar Kapse & Shripad Pralhad Mohani - 199-213 Automated Alzheimer's disease diagnosis using radiomics feature extraction on magnetic resonance images
by T Manochandar & P Kumaraguru Diderot
2023, Volume 10, Issue 3
- 83-95 A secure and effective data aggregation in WSN for improved security and data privacy
by S Suma Christal Mary & K Murugeswari & S Jyothi Shri & N Senthamilarasi - 96-109 Image-based MRI detection of brain tumours using convolutional neural networks
by G Preethi & Thangamma NG & S Perumal Sankar & Md Abul Ala Walid & D Suganthi & K Deepthika - 110-121 Creating a deep learning model using a Swin Transformer and tree growth optimisation to classify brain tumour
by K Sankar & V Gokula Krishnan & S Sendil Kumar & P Pushpa & B Prathusha Laxmi - 122-136 Recurrent neural network implementation of digital integrated circuits to mitigate challenges in design verification
by Ming Keat Yeong & Eric Tatt Wei Ho
2023, Volume 10, Issue 2
- 28-39 An imperative role of studying existing battery datasets and algorithms for battery management system
by Gopal Krishna & Rajesh Singh & Anita Gehlot & Pardeep Singh & Sandeep Rana & Shaik Vaseem Akram & Kapil Joshi - 40-54 Bias field correction-based active contour model for region of interest extraction in digital image
by Nurul Ain Suraya Rosli & Abdul Kadir Jumaat & Mohd Azdi Maasar & Mohamed Faris Laham & Normahirah Nek Abd Rahman - 55-69 A review of few-shot image recognition using semantic information
by Liyong Guo & Erzam Marlisah & Hamidah Ibrahim & Noridayu Manshor - 70-82 Variational model with image denoising fitting term for boundary extraction of breast ultrasound images
by Nurdina Badrulhisam & Nurhuda Ismail & Abdul Kadir Jumaat & Mohd Azdi Maasar & Mohamed Faris Laham
2023, Volume 10, Issue 1
- 1-15 Increasing the radar cross section using phase array antenna in the body structure of miniature air-launched decoy platforms
by Ozge Bayri Otenkaya & Ahmet Gungor Pakfiliz - 16-27 An approach to preventing vehicular ad-hoc networks from malicious nodes based on blockchain
by Azath M & Vaishali Singh
2022, Volume 9, Issue 4
- 209-221 Adaptive Beamforming Model for 5G High Speed Networks using Millimeter Wave Communication in Uplink
by Indrabhan Borse & Hitendra Patil - 222-238 Buried Wire Detection and Clustering Algorithm with Ground Penetrating Radar
by Ozkan AKBULUT & Ahmet Gungor PAKFILIZ - 239-249 Multimodal Biometric Template Transformation Approach using a List Ranking Algorithm
by Ashoka Rajan R & Pon Bharathi A & Sarika A S & Vedha Vinodha D
2022, Volume 9, Issue 3
- 135-149 Detection and Recognition of Traffic Sign Boards using Random Forest Classifier
by B Jagadeesh & D. V. Vidhya Sree - 151-168 Design and Simulation of Grid-Connected Photovoltaic System’s Performance Analysis with Optimal Control of Maximum Power Point Tracking Based on Artificial Intelligence
by Faouzi Didi & Moustafa Sahnoune Chaouche - 169-180 Deep Learning Based Intrusion Prevention System in Vehicular Network
by Badugu Samatha & Thalakola Syamsundararao & Nagarjuna Karyemsetty - 181-199 Performance Analysis of 1x4 RMPA Array using Step Cut and DGS Techniques with Different Feed Techniques for LTE, Wi-Fi, WLAN and Military Communications
by B. Ashok Kumar & P. Mallikarjuna Rao & M Satyanarayana - 200-208 A Model for the Safety Risk Evaluation of Connected Car Network
by Thalakola Syamsundararao & Badugu Samatha & Praveen Kumar Pinjala & Nagarjuna Karyemsetty
2022, Volume 9, Issue 2
- 71-82 Hard Voting Meta Classifier for Disease Diagnosis using Mean Decrease in Impurity for Tree Models
by Ifra Altaf & Muheet Ahmed Butt & Majid Zaman - 83-95 A General Approach for Meeting Summarization: From Speech to Extractive Summarization
by Neslihan Akar & Metin Turan - 96-108 Machine Learning Based Network Traffic Predictive Analysis
by Sridevi Ponmalar P & Ayushi Kamboj & Vikram Shete & Harikrishnan R - 109-121 Performance Evaluation of Network Intrusion Detection System for Detecting Zero-Day Attacks: SNORT-XSS Algorithm
by Srinivas Mishra & Sateesh Kumar Pradhan & Subhendu Kumar Rath - 122-134 Smart Shopping Cart for Visually Impaired Individuals
by Vikram Shete & Ariz Shaikh & Rhea Sawant & Chetna Singh & Sridevi Ponmalar P & Harikrishnan R
2022, Volume 9, Issue 1
- 1-12 Numerical and Experimental Investigation of Meteorological Data Using Adaptive Linear M5 Model Tree for the Prediction of Rainfall
by Sheikh Amir Fayaz & Majid Zaman & Muheet Ahmed Butt - 13-29 Machine Learning and Deep Learning Based Phishing Websites Detection: The Current Gaps and Next Directions
by Kibreab Adane & Berhanu Beyene - 30-43 Gas Leakage Detection System with Alarming System
by Muhammad Ahmad Baballe & Mukhtar Ibrahim Bello - 44-54 VMD Based Image Quality Enhancement Using Multi Technology Fusion
by Lalit Mohan Satapathy & Pranati Das - 55-70 Proposing New Routing Protocol Based on Chaos Algorithm
by Ali Majdi
2021, Volume 8, Issue 2
- 27-40 Two-Stage Model with Rough Cluster and Salp Optimization Technique for Epistasis Detection
by S Priya & R Manavalan - 41-63 Real-Time Car Parking System Using Arduino Control
by Ahmed Raza Moshin & Maira Khalid & Muhammad Awais & Kinza Ahmad - 64-75 Automatic Gas Leakage Monitoring System Using MQ-5 Sensor
by Muhammad Ahmad Baballe & Usman Yusuf Magashi & Bello Ibrahim Garko & Abubakar Abdullahi Umar & Yunusa Rabiu Magaji & Munzali Surajo - 76-95 A Simple and Effective Methodology for Generating Bounded Solutions for the Set K-Covering and Set Variable K-Covering Problems: A Guide for or Practitioners
by Bryan McNally & Yun Lu & Emre Shively-Ertas & Myung Soon Song & Francis J Vasko - 96-102 A Smart Shelf Design for Retail Store Real Time Inventory Management Automation
by Ozgur TAMER & Tunca KOKLU
2021, Volume 8, Issue 1
- 1-7 Activity Recognition and Creation of Web Service for Activity Recognition using Mobile Sensor Data using Azure Machine Learning Studio
by Muhammad Owais Raza & Nazia Pathan & Aqsa Umar & Raheem Bux - 8-13 Developing a Software Application for the Study and Learning of Linear a Script
by Argyro Mavridaki & Eleni Galiotou & Evangelos C Papakitsos - 14-26 Detection of Crossed Walls Security Alarm System against Invasion
by Muhammad Ahmad Baballe
2020, Volume 7, Issue 2
- 47-53 Investigating Factors Affecting the Adoption of Smartphone Technology by Elderly People In Iraq
by Fouad Abdulameer Salman & Aziz Bin Deraman - 54-61 Quality Assessment and Monitoring of Networks Using Passive Technique
by Abiola Olawale Ilori & Omoniyi Ajoke Gbadamosi & Oluwafemi Clement Adeusi - 62-72 Mobile Commerce Model Taking Advantage of a Near Field Communication (NFC)
by Akinyede Raphael Olufemi & Rotimi Abiodun Boluwade & Famodimu Oluwasefunmi Busola & Balogun Temitayo Elijah - 73-85 LMS Algorithm for Adaptive Transversal Equalization of a Linear Dispersive Communication Channel
by Farrukh Arslan - 86-95 An Overview of Advances in Image Colorization Using Computer Vision and Deep Learning Techniques
by Rashi Dhir & Meghna Ashok & Shilpa Gite
2020, Volume 7, Issue 1
- 1-11 Exploration of Intellectual Software Systems and Development of Conceptual Model
by Shafagat Mahmudova - 12-19 Cloud Security Vulnerabilities and Solution Model
by Shouket Ahmad Kouchay - 20-26 Dynamic Modelling of 3-RUS Spatial Parallel Robot Manipulator
by Nguyen Hong Quang & Nguyen Van Quyen & Do Trung Hai & Nguyen Nhu Hien - 27-37 Interactive Algorithms for the Verification of the Equality between Complex and Simplified Boolean-Algebra Expressions in Digital Decoders
by Tochukwu Arinze Ikwunne & Samuel Obiora Okide - 38-46 Smart Feature Fusion and Model for Human Detection
by Htet Htet Lin
2019, Volume 6, Issue 2
- 57-63 Stability Analysis of Type-2 Fuzzy Process Control Using LMI
by Manivasagam Rajendran & Prabhu Aruchunan - 64-75 A Review of Machine Learning Models for Software Cost Estimation
by Farrukh Arslan - 76-83 Exploring Internet of Thing on PCA Algorithm for Optimization of Facial Detection and Tracking
by Adeniji Kehinde & Awosika Olawoyin & Ajibade Adedayo & Onibonoje Moses - 84-91 A Survey on Sentiment Analysis Algorithms and Datasets
by Reena G Bhati - 92-96 Intensive Patient Monitoring Using LabVIEW
by Manivasagam Rajendran
2019, Volume 6, Issue 1
- 1-11 Development and Performance Analysis of Bisection Method-Based Optimal Path Length Algorithm for Terrestrial Microwave Link
by Kalu Constance - 12-23 Classification Ensemble Based Anomaly Detection in Network Traffic
by Ramiz M Alıguliyev & Makrufa Sh Hajirahimova - 24-34 Design of Automated Departmental Lecture Timetable System
by Etuh Emmanuel & Ajodoh Onoja Friday & Yusuf Serah Omolola - 35-44 Identification of Privacy and Security Risks of Internet of Things: An Empirical Investigation
by Muhammad Hamza & Muhammad Azeem Akbar & Muhammad Shafiq & Tahir Kamal & Ali Mahmoud Baddour - 45-56 An Examination of the Methods of Increasing Software Efficiency Based on Soft Computing Technology
by Shafagat Mahmudova
2018, Volume 5, Issue 2
- 20-24 Fault Tolerance in Real Time Distributed System
by Gajendra Sharma & Ankita Yadav - 25-30 A Survey on Efficient Power Management Using Smart Socket and IoT
by B Santhosh Kumar & R Cristin - 31-48 Development of Facilitated Participatory Spatial Information System for Selected Urban Management Services
by Ozuomba Simeon & Kalu Constance & Akpasam Joseph Ekanem - 49-56 Characterisation of Propagation Loss for a 3G Cellular Network in a Crowded Market Area Using CCIR Model
by Simeon Ozuomba & Enyenihi Johnson & Ngwu Chinyere Rosemary - 57-63 Stanford University Interim Propagation Loss Model for a Gmelina Arborea Tree-Lined Road
by Umana Sylvester Isreal & Nnamonso O Akpbio & Samuel Etaruwak Mbong - 64-73 Development of Web Application for University of Uyo Post UTME Examination Timetable
by Enyenihi Henry Johnson & Ngwu Chinyere Rosemary & Eduediuyai Dan
2018, Volume 5, Issue 1
- 1-11 A Security Scheme for Protecting Agent Societies
by Antonio Muñoz - 12-19 Survey of Image Processing Based Applications in AMR
by K Karthick & M Premkumar & R Manikandan & R Cristin
2017, Volume 4, Issue 2
- 38-53 PAPR Reduction Using Eight Factors Rotating Phase Shift Technique Based on Local Search Algorithm in OFDM
by Ali Kareem Nahar & Ahmed N Abdalla & Ali Y Jaber & Mohammed Moanes Ezzaldean - 54-80 Comprehensive Analysis & Performance Comparison of Clustering Algorithms for Big Data
by Anand Nayyar & Vikram Puri
2017, Volume 4, Issue 1
- 1-10 Computational Modeling of Multi-Purpose Amphibious Aircraft Be-103
by Iftikhar B Abbasov & V’iacheslav V Orekhov - 11-29 Solving Nonlinear Single-Unit Commitment Problem by Genetic Algorithm Based Clustering Technique
by M.A El-Shorbagy & A.A Mousa & M Farag - 30-37 Perturbation Functions for Compact Database
by Sergey I Vyatkin
2016, Volume 3, Issue 4
- 65-68 Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador
by Moisés Toapanta & Enrique Mafla & José Orizaga - 69-81 Path Loss Measurement and Modeling for Lagos State G.S.M Environments
by Shoewu O & Salau N.O & Ogunlewe A.O & Oborkhale L.I
2016, Volume 3, Issue 3
- 47-54 About the Calculation Method of the Coefficient that Shows Significance Extent of Geometric Characteristics in Determination of Racial and Ethnic Identity of Human
by Tofig Kazimov & Shafagat Mahmudova - 55-64 A Comprehensive Review of Semiconductor-Type Gas Sensors for Environmental Monitoring
by Anand Nayyar & Vikram Puri & Dac-Nhuong Le
2016, Volume 3, Issue 2
- 35-40 Lossless Image Compression and Decompression to Improve the PSNR and MSE Values Using Architecture
by S Kannadhasan & B Naveen Lingaesh & R Alagumanikandan - 41-46 Co-Development of Process Planning and Structural Configurations Considering Machine’s Accessibility in a Reconfigurable Setup
by Eram Asghar & Aamer Ahmad Baqai & Ramshah Ahmad Toor & Sara Ayub
2016, Volume 3, Issue 1
- 1-6 High Isolation Microstrip Mimo Antennas for Wlan Systems
by L Chouti & I Messaoudene & N Sahnoun & A Behloul & A Benghalia - 7-12 Generalized Quantum Key Distribution for WDM Router Applications
by N Djeffal & M Benslama & I Messaoudene - 13-24 Web Service Composition for E-Commerce Web Application
by Anis ISMAIL & Abd El Salam AL HAJJAR & Abdel Karim KASSEM - 25-34 To Convalesce Task Scheduling in a Decentralized Cloud Computing Environment
by Arun Sangwan & Gaurav Kumar & Sorabh Gupta
2015, Volume 2, Issue 4
- 71-76 Enhanced Isolation Mimo Antenna with DGS Structures for Long Term Evolution Systems
by I Messaoudene & M. A Belhocine & S Aidel & N Djeffal
2015, Volume 2, Issue 3
- 65-70 Current Trends in Software Engineering Research
by Gayatri Vijiyan
2015, Volume 2, Issue 2
- 39-46 A Detailed Analysis of Software Cost Estimation Using Cosmic-FFP
by Gaurav Kumar & Pradeep Kumar Bhatia - 47-64 Received Signal Strength in a Macrocell in Lagos Environs Using Finite Element Method
by Shoewu O & Makanjuola N.T & Akinyemi L.A & Ogunlewe A.O
2015, Volume 2, Issue 1
- 1-21 Some Relations on Gegenbauer Matrix Polynomials
by Ayman Shehata - 22-38 Classification and Identification of Risk Management Techniques for Mitigating Risks with Factor Analysis Technique in Software Risk Management
by Abdelrafe Elzamly & Burairah Hussin
2014, Volume 1, Issue 1
- 1-18 Quasi 3d Refined Simulation of Flow and Pollutant Transport in the Yangtze River
by Li-ren Yu - 19-30 Web Pages Categorization Based on Classification & Outlier Analysis through FSVM
by Geeta R.B & Shobha R.B & Shashikumar G Totad & Prasad Reddy PVGD