All Stories

  1. A Hybrid Convolutional Neural Network-Bidirectional Long Short-Term Memory Approach for PPG-Based Stress Monitoring from Wrist Worn Wearables
  2. A review and critical analysis of multimodal datasets for emotional AI
  3. A Model Embedded with Development Patterns for Oilfield Production Forecasting
  4. RetailEye: Supervised Contrastive Learning with Compliance Matching for Retail Shelf Monitoring
  5. Household Appliance Identification Using Vision Transformers and Multimodal Data Fusion
  6. Exploring Curricular Synergy Between ACM CS2023 Knowledge Areas and the UN Sustainable Development Goals
  7. PSL-CFRT: A Benchmark Multi-View Dataset for Continuous Pakistani Sign Language Fingerspelling Recognition and Translation
  8. A Comparative Study on Face/Body-Based Lie Detection Using Convolutional Neural Networks
  9. G-SwinHAR: Swin Transformer for Smartphone-Based Human Activity Recognition Using Gramian Angular Field
  10. Enhanced Human Activity Recognition Using Mixture of Swin Transformers With Recurrence Plots of Triaxial Sensor Data
  11. Expertise-informed Bayesian convolutional neural network for oil production forecasting
  12. Theory guided Lagrange programming neural network for subsurface flow problems
  13. Embedded feature selection approach based on TSK fuzzy system with sparse rule base for high-dimensional classification problems
  14. First-Order Sparse TSK Nonstationary Fuzzy Neural Network Based on the Mean Shift Algorithm and the Group Lasso Regularization
  15. Spatiotemporal Particulate Matter Pollution Prediction Using Cloud-Edge Intelligence
  16. RF-Based Drone Detection with Deep Neural Network: Review and Case Study
  17. Theory-Guided Convolutional Neural Network with an Enhanced Water Flow Optimizer
  18. An interpretable neural network for robustly determining the location and number of cluster centers
  19. Towards Federated Learning and Multi-Access Edge Computing for Air Quality Monitoring: Literature Review and Assessment
  20. Effects of Face Image Degradation on Recognition with Vision Transformers: Review and Case Study
  21. Intelligent Image and Video Analytics
  22. Multi-culture Sign Language Detection and Recognition Using Fine-tuned Convolutional Neural Network
  23. Contextual Sequence-to-Point Deep Learning for Household Energy Disaggregation
  24. Ensemble Multifeatured Deep Learning Models and Applications: A Survey
  25. Two-Stage Face Detection and Anti-spoofing
  26. A comprehensive survey and taxonomy of sign language research
  27. Improving Intrusion Detection for Imbalanced Network Traffic using Generative Deep Learning
  28. Utilizing motion and spatial features for sign language gesture recognition using cascaded CNN and LSTM models
  29. Soft computing and intelligent systems: Techniques and applications
  30. URLCam: Toolkit for malicious URL analysis and modeling
  31. Towards Hybrid Multimodal Manual and Non-Manual Arabic Sign Language Recognition: mArSL Database and Pilot Study
  32. Comparative analysis of feature extraction and fusion for blind authentication of digital images using chroma channels
  33. Clustering of Association Rules for Big Datasets using Hadoop MapReduce
  34. Combining Deep Learning and Multiresolution Analysis for Stock Market Forecasting
  35. Early and Late Fusion of Emojis and Text to Enhance Opinion Mining
  36. Feature analysis and prediction of antibiotic resistance using PCA-MLP with segments of N. gonorrhoeae bacteria’s DNA
  37. On DNA cryptography for secure data storage and transfer
  38. Evaluation of CNN Models with Transfer Learning for Recognition of Sign Language Alphabets with Complex Background
  39. Joint space representation and recognition of sign language fingerspelling using Gabor filter and convolutional neural network
  40. Statistical Gabor-Based Gait Recognition Using Region-Level Analysis
  41. Impact of Normalization on BiLSTM Based Models for Energy Disaggregation
  42. Empirical study on imbalanced learning of Arabic sentiment polarity with neural word embedding
  43. Soft computing and intelligent systems: techniques and applications
  44. Exploring Lattice-based Post-Quantum Signature for JWT Authentication: Review and Case Study
  45. A review of machine learning for big data analytics: bibliometric approach
  46. Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks
  47. Enhanced Video Analytics for Sentiment Analysis Based on Fusing Textual, Auditory and Visual Information
  48. Multi-Target Energy Disaggregation using Convolutional Neural Networks
  49. On Using Physical Based Intrusion Detection in SCADA Systems
  50. Parallel Association Rules Pruning Algorithm on Hadoop MapReduce
  51. Audio-Textual Arabic Dialect Identification for Opinion Mining Videos
  52. Benchmarking Open-Source Android Malware Detection Tools
  53. Overview and Case Study for Ransomware Classification Using Deep Neural Network
  54. Impact of Spectre/Meltdown Kernel Patches on Crypto-Algorithms on Windows Platforms
  55. Special issue on Neural Information Processing for Optimization and Applications
  56. Bibliography of digital image anti-forensics and anti-anti-forensics techniques
  57. Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and Applications
  58. Forecasting of Bahrain Stock Market with Deep Learning: Methodology and Case Study
  59. Multi-scale LPQ-DCT for Image Forgery Detection
  60. Using feature-level fusion for multimodal gender recognition for opinion mining videos
  61. Soft computing and intelligent systems: techniques and applications
  62. A multi-matching approximation algorithm for Symmetric Traveling Salesman Problem
  63. Multimodal Sentiment and Gender Classification for Video Logs
  64. Statistical Comparison of Opinion Spam Detectors in Social Media with Imbalanced Datasets
  65. Detection of Arabic Spam Tweets Using Word Embedding and Machine Learning
  66. Combining emojis with Arabic textual features for sentiment classification
  67. Emoji-Based Sentiment Analysis of Arabic Microblogs Using Machine Learning
  68. Evaluation of bidirectional LSTM for short-and long-term stock market prediction
  69. Imbalanced Sentiment Polarity Detection Using Emoji-Based Features and Bagging Ensemble
  70. Stock Market Forecast Using Multivariate Analysis with Bidirectional and Stacked (LSTM, GRU)
  71. Soft computing and intelligent systems: Techniques and applications
  72. Intrusion detection taxonomy and data preprocessing mechanisms
  73. Ant colony inspired method for reducing load imbalance in multiprocessor systems
  74. Anger Detection in Arabic Speech Dialogs
  75. Emojis-Based Sentiment Classification of Arabic Microblogs Using Deep Recurrent Neural Networks
  76. Image Splicing Forgery Detection Using DCT Coefficients with Multi-Scale LBP
  77. Automated gait-based gender identification using fuzzy local binary patterns with tuned parameters
  78. Hybrid multicriteria fuzzy classification of network traffic patterns, anomalies, and protocols
  79. Learning mechanisms for anomaly-based intruson detection: Updated review
  80. Searching Encrypted Data on the Cloud
  81. AdaBoost-based artificial neural network learning
  82. A more secure scheme for CAPTCHA-based authentication in cloud environment
  83. Critical review of static taint analysis of android applications for detecting information leakages
  84. Evaluating time and throughput at different modes of operation in AES algorithm
  85. Detection of Phishing Websites Based on Probabilistic Neural Networks and K-Medoids Clustering
  86. Special issue on soft computing and intelligent systems: Tools, techniques and applications
  87. A multiclass cascade of artificial neural network for network intrusion detection
  88. Evaluation of sequential adaptive testing with real-data simulation: A case study
  89. Editorial note: Smart Computing with Innovative Multimedia Technologies and Applications
  90. Hybrid Deep Learning for Sentiment Polarity Determination of Arabic Microblogs
  91. Silhouette-Based Gender Recognition in Smart Environments Using Fuzzy Local Binary Patterns and Support Vector Machines
  92. Using Word Embedding and Ensemble Learning for Highly Imbalanced Data Sentiment Analysis in Short Arabic Text
  93. Kernel-Based Fuzzy Local Binary Pattern for Gait Recognition
  94. Spam filtering framework for multimodal mobile communication based on dendritic cell algorithm
  95. Robust content authentication of gray and color images using lbp-dct markov-based features
  96. Selectivity estimation of extended XML query tree patterns based on prime number labeling and synopsis modeling
  97. Towards scalable rough set based attribute subset selection for intrusion detection using parallel genetic algorithm in MapReduce
  98. Known-plaintext attack and improvement of PRNG-based text encryption
  99. FLGBP: Improved Method for Gait Representation and Recognition
  100. Improving Information Security Practices through Computational Intelligence
  101. Multi-Kernel Fuzzy-Based Local Gabor Patterns for Gait Recognition
  102. Statistical Gabor-Based Gait Recognition Using Region-Level Analysis
  103. XHQE: A hybrid system for scalable selectivity estimation of XML queries
  104. SwiftEnc: Hybrid Cryptosystem with Hash-Based Dynamic Key Encryption
  105. MapReduce implementation for minimum reduct using parallel genetic algorithm
  106. Online prime labeling and generation of synopsis for XML query estimation
  107. Introduction to the special issue on Cognitive Radio Networks
  108. Anonymous Connections Based on Onion Routing: A Review and a Visualization Tool
  109. Boosting paraphrase detection through textual similarity metrics with abductive networks
  110. Dendritic Cell Algorithm for Mobile Phone Spam Filtering
  111. Detecting Cyber-Attacks on Wireless Mobile Networks Using Multicriterion Fuzzy Classifier with Genetic Attribute Selection
  112. Full-Reference Predictive Modeling of Subjective Image Quality Assessment with ANFIS
  113. Learning Rule for Linear Multilayer Feedforward ANN by Boosted Decision Stumps
  114. Improved selectivity estimator for XML queries based on structural synopsis
  115. A novel bio-inspired predictive model for spam filtering based on dendritic cell algorithm
  116. Biobjective NSGA-II for optimal spread spectrum watermarking of color frames: Evaluation study
  117. Impact of Stock Market Indices and Other Regional Exogenous Factors on Predictive Modeling of Border Traffic with Neural Network Models
  118. Combining spatial and DCT based Markov features for enhanced blind detection of image splicing
  119. Intrusion detection using a cascade of boosted classifiers (CBC)
  120. Network Intrusion Detection Using Multi-Criteria PROAFTN Classification
  121. Statistical Analysis of ML-Based Paraphrase Detectors with Lexical Similarity Metrics
  122. Effects of Using Average Annual Daily Traffic (AADT) with Exogenous Factors to Predict Daily Traffic
  123. A Multicriterion Fuzzy Classification Method with Greedy Attribute Selection for Anomaly-based Intrusion Detection
  124. Computational Intelligence in Smart Grids: Case Studies
  125. Abductive Learning Ensembles for Hand Shape Identification
  126. A Pareto-based hybrid multiobjective evolutionary approach for constrained multipath traffic engineering optimization in MPLS/GMPLS networks
  127. Detecting pixel-value differencing steganography using Levenberg-Marquardt neural network
  128. Enhanced Hand Shape Identification Using Random Forests
  129. Message from ISSR Workshop Chairs
  130. Automatic Identification Based on Hand Geometry and Probabilistic Neural Networks
  131. Evaluation of support vector machine with universal kernel for hand-geometry based identification
  132. Improved pixel value differencing steganography using logistic chaotic maps
  133. Abductive Neural Network Modeling for Hand Recognition Using Geometric Features
  134. Analysis and extraction of sentence-level paraphrase sub-corpus in CS education
  135. Fusion of Multiple Texture Representations for Palmprint Recognition Using Neural Networks
  136. High-Capacity Image Steganography Based on Overlapped Pixel Differences and Modulus Function
  137. Improved Personal Identification Using Face and Hand Geometry Fusion and Support Vector Machines
  138. A comparative study of PVD-based schemes for data hiding in digital images
  139. Comparing a class of dynamic model-based reinforcement learning schemes for handoff prioritization in mobile communication networks
  140. A reinforcement learning approach for sequential mastery testing
  141. An Adaptive Steganographic Method for Color Images Based on LSB Substitution and Pixel Value Differencing
  142. Using GMDH-based networks for improved spam detection and email feature analysis
  143. A bio-inspired image encryption algorithm based on chaotic maps
  144. A hierarchical GMDH-based polynomial neural network for handwritten numeral recognition using topological features
  145. ROUTING AND TRAFFIC MANAGEMENT
  146. Flow-based path selection for Internet traffic engineering with NSGA-II
  147. Offline Recognition of Handwritten Numeral Characters with Polynomial Neural Networks Using Topological Features
  148. Discovering classification rules for email spam filtering with an ant colony optimization algorithm
  149. The need for a unified framework for evaluating web cache replacement strategies
  150. Constructing optimal educational tests using GMDH-based item ranking and selection
  151. Construction and analysis of educational tests using abductive machine learning
  152. Spam filtering with abductive networks
  153. A fuzzy similarity approach for automated spam filtering
  154. Solving the minimum-cost constrained multipath routing with load balancing in MPLS networks using an evolutionary method
  155. Applications of genetic algorithms to optimal multilevel design of MPLS-based networks
  156. On Optimal Firewall Rule Ordering
  157. A Heuristic Approach for Firewall Policy Optimization
  158. Performance Comparison of CBT and PIM Multicast Routing Protocols over MPLS Networks
  159. A learning approach for prioritized handoff channel allocation in mobile multimedia networks
  160. PREPARATION AND CHARACTERIZATION OF SAWDUST/N-METHYLOLACRYLAMIDE/METHACRYLIC ACID CATION EXCHANGE COMPOSITES
  161. REMOVING SOME HAZARDOUS HEAVY METAL ANIONS BY USING A NEW ANION EXCHANGER
  162. Obstacle avoidance and motion control for mobile robots
  163. Chaotic-Based and Biologically Inspired Cryptosystems for Secure Image Communication and Storage
  164. Computational Intelligence in Cryptology
  165. Computational Intelligence Paradigms:
  166. Computational Intelligence in Cryptology
  167. Computational Intelligence Paradigms
  168. A learning approach for call admission control with prioritized handoff in mobile multimedia networks
  169. Adaptive resource allocation with prioritized handoff in cellular mobile networks under QoS provisioning
  170. Autonomous call admission control with prioritized handoff in cellular networks