Mask RCNN for Human Motion and Actions Recognition<div>Intelligent and Secure Autofill System in Web Browsers</div><div>Synthesis Biometric Materials based on Cooperative among Graph Mining Techniques (DSA, WOA & gSpan-FBR) to Water Treatment</div><div>An Initial Parameter Search for Rapid Concept Drift Adaptation in Deep Neural Networks</div><div>A Comparison of Swarm Intelligence Algorithms Exploiting a Novel Neighbour Generation Technique</div><div>A Proposal for the Automatic detection of Skin Cancer Based on Image Characteristics of Shape, Colour, and Texture</div><div>Breast Cancer Detection in Infrared Thermal Images Using Convolutional Neural Networks: A Transfer Learning Approach </div><div>Implementation of a system for collecting and analyzing public and open access information from Brazilian federal legislative houses</div><div>Data Origination: Human-centered Approach for Design, Acquisition, and Utilization of Data</div><div>Coarse-Grained Genetic Algorithm for Flexible Job Scheduling Problem</div><div>Computer Vision and AI Improving the Lives of Physically Disabled by the means of Perceptual User Interfaces</div><div>Subspace guided collaborative clustering based on optimal transport</div><div>Exploring An automatic assessment-based features for clustering of students' academic performance</div><div>Quantum Semi Non-Negative Matrix Factorization</div><div>A New Genetic-Based Hyper-Heuristic Algorithm for Clustering Problem</div><div>LSTM vs. GRU for Arabic Machine Translation</div><div>Towards Lip Motion Based Speaking Mode Detection Using Residual Neural Networks</div><div>Reducing the Error Mapping of the Students’ Performance using Feature Selection</div><div>Spatial Graph Regularized Correlation Filters for Visual Object Tracking</div><div>3D Wireframe Model of Medical and Complex Images Using Cellular Logic Array Processing Techniques</div>Suspicious activity detection using Transfer learning based ResNet tracking from surveillance videos<div>Vehicle Detection in UAV Videos using CNN-SVM</div><div>Underwater moving object detection using GMG</div><div>Linear Dilation-Erosion Perceptron Trained Using a Convex-Concave Procedure</div><div>Smart Phone Sensor-Based Human Activity Recognition using Machine Learning Techniques</div><div>Wavelet Filtering for Limited-Angle and Low-Dose Computed Tomographic Reconstruction</div><div>Handwritten Signature Verification using Complex Wavelet Transform and Mutual Information based Kernel</div><div>Multi-Scale Oriented Basic Image Features Column for Handwritten Digit Recognition</div><div>Delving into Feature Maps: An Explanatory Analysis to Evaluate Weight Initialization</div><div>Historical Kannada Handwritten Character Recognition using Machine Learning Algorithm</div><div>Home Health Care Network Management Under Fuzzy Environment Using meta-heuristic algorithms</div><div>The Lagrangian Relaxation Approach for Home Health Care Problems </div><div>Study on Vision System for Disease Detection Using CNN and LabVIEW of an Agricultural Robot</div><div>An Autonomous Galactic Swarm Optimization Algorithm Supported by Hidden Markov Model</div><div>Machine Learning for Breast Cancer Diagnosis and Classification using hand-crafted features</div><div>Automatic Seeded Region Growing with Level Set Technique Used for Segmentation of Pancreas</div><div>Sustainability Considerations in the Product Design Using System Dynamics and Fuzzy Cognitive Maps </div><div>Dominant voiced speech segregation and noise reduction pre-processing module for hearing aids and speech processing applications</div><div>Forensic Analysis of Copy-Move Attack with Robust Duplication Detection</div><div>Feature selection approach based on a novel variant of hybrid differential evolution and PSO for sentiment classification</div><div>A Comparative Study for Fisheye Image Classification: SVM or DNN</div><div>A Survey on Applications of Modern Deep Learning Techniques in Team Sports Analytics</div><div>Describing Brachiopods shape based on fusion of Curvature and Fourier descriptors</div><div>Early diagnosis of Parkinson’s disease using LSTM: A Deep Learning Approach</div><div>Using the $K$-nn algorithm to segment a foetus brain MRI --- a case study</div><div>Design of a Closed Supply Chain with regards to the Social and Environmental Impacts under Uncertainty</div>Contour Method for Ultrasound Images<div>Unsupervised learning from data and learners</div><div>Using Microsoft Kinect v2 to record custom exercises for physical disability rehabilitation</div><div>Customer Churn Prediction using Deep Learning</div><div>The Fusion of Features for Detection of Cotton Wool Spots in Digital Fundus Images</div><div>Thyroid Nodule Cell Classification In Cytology Images Using Transfer Learning Approach</div><div>Deep Fusion Driven Semantic Segmentation for the Automatic Recognition of Concealed Contraband Items</div><div>Project comparison method supporting the participatory budget process - Poznan case study</div><div>Seeding initial population, in genetic algorithm for features selection</div><div>An Incremental Fuzzy Learning Approach for Online Classification of Data Streams</div><div>Depth Image Completion using Anisotropic Operators</div><div>Performance Analysis of Machine Learning Approaches for Prediction of Human Cardiac Complications</div><div>Acousto-Prosodic Delineation and Classification of Speech Disfluencies in Bilingual Children</div><div>Real-Time Traffic Sign Recognition and Classification using Deep Learning</div><div>Merits of Mixotrophic cultivation for microalgal biomass production</div><div>Deep Neural Network based Phishing Classification on a High-Risk URL Dataset</div><div>A Secure Bayesian Compressive Spectrum Sensing Technique Based Chaotic Matrix for Cognitive Radio Networks</div><div>Optimized machine learning techniques for IoT Cyber attacks Detection</div><div>Inadequacy of IT approaches to manage cyber security in ICS context</div><div>Trust-based intrusion detection for Multi Path OLSR protocol</div><div>Bitcoin Technology and its Security Challenges: A Research Survey</div><div>Zero Trust User Access & Identity Security in Smart Grid based SCADA Systems</div>Man-in-the-browser attacks against IoT devices: a study of smart homes<div>Scambaiting as a form of online video entertainment: An exploratory study</div><div>Create a hybrid algorithm by combining Hill and Ad-vanced Encryption Standard Algorithms to Enhance Ef-ficiency of RGB Image Encryption</div><div>An improved smart wheat health monitor for smart farming application using deep residual learning framework</div><div>A New Electronic Voting System based on elliptic curve in a Cloud Computing Environment</div><div>Investigation of stereo camera calibration based on Python</div><div>Study on the different types of neural networks to improve the classification of ransomwares</div><div>Quality of Service Evaluation with DSR (Dynamic Source Routing) protocol in the classroom ad hoc network of the New Generation of Digital Open Universities (DOUNG)</div><div>Detection of vulnerabilities related to permissions requests for Android apps using Machine Learning techniques</div><div>A New Approach to Detecting Bot Attack Activity Scenario</div><div>A Log-Based Method to Detect and Resolve Efficiently Conflicts in Access Control Policies</div><div>A Hybrid Policy Engineering Approach for Attribute-based Access Control (ABAC)</div><div>Anomaly Detection in the Internet of Things (IoT) by Using Articial Immune System</div><div>Agreement-Broker: Performance analysis using KNN, SVM, and ANN classifiers</div><div>Secret disclosure attacks on a recent ultralightweight mutual RFID authentication protocol for blockchain-enabled supply chains</div><div>A Novel Image Encryption Technique Using Multiple One Dimensional Chaotic Map</div><div>Use of cryptography for monetary issuance And securing financial transactions</div><div>MAAMSIC: Multimodal Authentication and Authorization Model For Security of IoT Communication via GSM Messaging in Sub-Saharan Africa </div><div>Towards a proactive system of DDoS attacks detection in the cloud</div><div>Edge Computing Enabled Technologies for Secure 6G Smart Environment - An overview</div>Secure QIM-based Image Watermarking in JPEG Compression Domain<div>Security and Privacy on IoMT</div><div>Biometric Template Protection using Deep Learning</div><div>Inner and outer race bearing defects of induction motor running at low speeds signal analysis with DWT </div><div>Transformation of PrivUML into XACML using QVT </div><div>Robust and Secure watermarking technique for e-health application</div><div>Emoji score and polarity evaluation using short name of emoji and expression sentiment </div><div>Dynamic and Decentralized Trust Management for the Internet of Things (IoT) paradigm</div><div>Comparison of Parental Control Systems for Blocking Advertisements on a Home Network</div><div><br></div>