All Stories

  1. SERI: Stagnation-Based Extinction and Re-initialization Operator for Enhanced Evolutionary Optimization
  2. A Hybrid Convolutional Neural Network-Bidirectional Long Short-Term Memory Approach for PPG-Based Stress Monitoring from Wrist Worn Wearables
  3. A review and critical analysis of multimodal datasets for emotional AI
  4. A Model Embedded with Development Patterns for Oilfield Production Forecasting
  5. RetailEye: Supervised Contrastive Learning with Compliance Matching for Retail Shelf Monitoring
  6. Household Appliance Identification Using Vision Transformers and Multimodal Data Fusion
  7. Exploring Curricular Synergy Between ACM CS2023 Knowledge Areas and the UN Sustainable Development Goals
  8. PSL-CFRT: A Benchmark Multi-View Dataset for Continuous Pakistani Sign Language Fingerspelling Recognition and Translation
  9. A Comparative Study on Face/Body-Based Lie Detection Using Convolutional Neural Networks
  10. G-SwinHAR: Swin Transformer for Smartphone-Based Human Activity Recognition Using Gramian Angular Field
  11. Enhanced Human Activity Recognition Using Mixture of Swin Transformers With Recurrence Plots of Triaxial Sensor Data
  12. Expertise-informed Bayesian convolutional neural network for oil production forecasting
  13. Theory guided Lagrange programming neural network for subsurface flow problems
  14. Embedded feature selection approach based on TSK fuzzy system with sparse rule base for high-dimensional classification problems
  15. First-Order Sparse TSK Nonstationary Fuzzy Neural Network Based on the Mean Shift Algorithm and the Group Lasso Regularization
  16. Spatiotemporal Particulate Matter Pollution Prediction Using Cloud-Edge Intelligence
  17. RF-Based Drone Detection with Deep Neural Network: Review and Case Study
  18. Theory-Guided Convolutional Neural Network with an Enhanced Water Flow Optimizer
  19. An interpretable neural network for robustly determining the location and number of cluster centers
  20. Towards Federated Learning and Multi-Access Edge Computing for Air Quality Monitoring: Literature Review and Assessment
  21. Effects of Face Image Degradation on Recognition with Vision Transformers: Review and Case Study
  22. Intelligent Image and Video Analytics
  23. Multi-culture Sign Language Detection and Recognition Using Fine-tuned Convolutional Neural Network
  24. Contextual Sequence-to-Point Deep Learning for Household Energy Disaggregation
  25. Ensemble Multifeatured Deep Learning Models and Applications: A Survey
  26. Two-Stage Face Detection and Anti-spoofing
  27. A comprehensive survey and taxonomy of sign language research
  28. Improving Intrusion Detection for Imbalanced Network Traffic using Generative Deep Learning
  29. Utilizing motion and spatial features for sign language gesture recognition using cascaded CNN and LSTM models
  30. Soft computing and intelligent systems: Techniques and applications
  31. URLCam: Toolkit for malicious URL analysis and modeling
  32. Towards Hybrid Multimodal Manual and Non-Manual Arabic Sign Language Recognition: mArSL Database and Pilot Study
  33. Comparative analysis of feature extraction and fusion for blind authentication of digital images using chroma channels
  34. Clustering of Association Rules for Big Datasets using Hadoop MapReduce
  35. Combining Deep Learning and Multiresolution Analysis for Stock Market Forecasting
  36. Early and Late Fusion of Emojis and Text to Enhance Opinion Mining
  37. Feature analysis and prediction of antibiotic resistance using PCA-MLP with segments of N. gonorrhoeae bacteria’s DNA
  38. On DNA cryptography for secure data storage and transfer
  39. Evaluation of CNN Models with Transfer Learning for Recognition of Sign Language Alphabets with Complex Background
  40. Joint space representation and recognition of sign language fingerspelling using Gabor filter and convolutional neural network
  41. Statistical Gabor-Based Gait Recognition Using Region-Level Analysis
  42. Impact of Normalization on BiLSTM Based Models for Energy Disaggregation
  43. Empirical study on imbalanced learning of Arabic sentiment polarity with neural word embedding
  44. Soft computing and intelligent systems: techniques and applications
  45. Exploring Lattice-based Post-Quantum Signature for JWT Authentication: Review and Case Study
  46. A review of machine learning for big data analytics: bibliometric approach
  47. Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks
  48. Enhanced Video Analytics for Sentiment Analysis Based on Fusing Textual, Auditory and Visual Information
  49. Multi-Target Energy Disaggregation using Convolutional Neural Networks
  50. On Using Physical Based Intrusion Detection in SCADA Systems
  51. Parallel Association Rules Pruning Algorithm on Hadoop MapReduce
  52. Audio-Textual Arabic Dialect Identification for Opinion Mining Videos
  53. Benchmarking Open-Source Android Malware Detection Tools
  54. Overview and Case Study for Ransomware Classification Using Deep Neural Network
  55. Impact of Spectre/Meltdown Kernel Patches on Crypto-Algorithms on Windows Platforms
  56. Special issue on Neural Information Processing for Optimization and Applications
  57. Bibliography of digital image anti-forensics and anti-anti-forensics techniques
  58. Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and Applications
  59. Forecasting of Bahrain Stock Market with Deep Learning: Methodology and Case Study
  60. Multi-scale LPQ-DCT for Image Forgery Detection
  61. Using feature-level fusion for multimodal gender recognition for opinion mining videos
  62. Soft computing and intelligent systems: techniques and applications
  63. A multi-matching approximation algorithm for Symmetric Traveling Salesman Problem
  64. Multimodal Sentiment and Gender Classification for Video Logs
  65. Statistical Comparison of Opinion Spam Detectors in Social Media with Imbalanced Datasets
  66. Detection of Arabic Spam Tweets Using Word Embedding and Machine Learning
  67. Combining emojis with Arabic textual features for sentiment classification
  68. Emoji-Based Sentiment Analysis of Arabic Microblogs Using Machine Learning
  69. Evaluation of bidirectional LSTM for short-and long-term stock market prediction
  70. Imbalanced Sentiment Polarity Detection Using Emoji-Based Features and Bagging Ensemble
  71. Stock Market Forecast Using Multivariate Analysis with Bidirectional and Stacked (LSTM, GRU)
  72. Soft computing and intelligent systems: Techniques and applications
  73. Intrusion detection taxonomy and data preprocessing mechanisms
  74. Ant colony inspired method for reducing load imbalance in multiprocessor systems
  75. Anger Detection in Arabic Speech Dialogs
  76. Emojis-Based Sentiment Classification of Arabic Microblogs Using Deep Recurrent Neural Networks
  77. Image Splicing Forgery Detection Using DCT Coefficients with Multi-Scale LBP
  78. Automated gait-based gender identification using fuzzy local binary patterns with tuned parameters
  79. Hybrid multicriteria fuzzy classification of network traffic patterns, anomalies, and protocols
  80. Learning mechanisms for anomaly-based intruson detection: Updated review
  81. Searching Encrypted Data on the Cloud
  82. AdaBoost-based artificial neural network learning
  83. A more secure scheme for CAPTCHA-based authentication in cloud environment
  84. Critical review of static taint analysis of android applications for detecting information leakages
  85. Evaluating time and throughput at different modes of operation in AES algorithm
  86. Detection of Phishing Websites Based on Probabilistic Neural Networks and K-Medoids Clustering
  87. Special issue on soft computing and intelligent systems: Tools, techniques and applications
  88. A multiclass cascade of artificial neural network for network intrusion detection
  89. Evaluation of sequential adaptive testing with real-data simulation: A case study
  90. Editorial note: Smart Computing with Innovative Multimedia Technologies and Applications
  91. Hybrid Deep Learning for Sentiment Polarity Determination of Arabic Microblogs
  92. Silhouette-Based Gender Recognition in Smart Environments Using Fuzzy Local Binary Patterns and Support Vector Machines
  93. Using Word Embedding and Ensemble Learning for Highly Imbalanced Data Sentiment Analysis in Short Arabic Text
  94. Kernel-Based Fuzzy Local Binary Pattern for Gait Recognition
  95. Spam filtering framework for multimodal mobile communication based on dendritic cell algorithm
  96. Robust content authentication of gray and color images using lbp-dct markov-based features
  97. Selectivity estimation of extended XML query tree patterns based on prime number labeling and synopsis modeling
  98. Towards scalable rough set based attribute subset selection for intrusion detection using parallel genetic algorithm in MapReduce
  99. Known-plaintext attack and improvement of PRNG-based text encryption
  100. FLGBP: Improved Method for Gait Representation and Recognition
  101. Improving Information Security Practices through Computational Intelligence
  102. Multi-Kernel Fuzzy-Based Local Gabor Patterns for Gait Recognition
  103. Statistical Gabor-Based Gait Recognition Using Region-Level Analysis
  104. XHQE: A hybrid system for scalable selectivity estimation of XML queries
  105. SwiftEnc: Hybrid Cryptosystem with Hash-Based Dynamic Key Encryption
  106. MapReduce implementation for minimum reduct using parallel genetic algorithm
  107. Online prime labeling and generation of synopsis for XML query estimation
  108. Introduction to the special issue on Cognitive Radio Networks
  109. Anonymous Connections Based on Onion Routing: A Review and a Visualization Tool
  110. Boosting paraphrase detection through textual similarity metrics with abductive networks
  111. Dendritic Cell Algorithm for Mobile Phone Spam Filtering
  112. Detecting Cyber-Attacks on Wireless Mobile Networks Using Multicriterion Fuzzy Classifier with Genetic Attribute Selection
  113. Full-Reference Predictive Modeling of Subjective Image Quality Assessment with ANFIS
  114. Learning Rule for Linear Multilayer Feedforward ANN by Boosted Decision Stumps
  115. Improved selectivity estimator for XML queries based on structural synopsis
  116. A novel bio-inspired predictive model for spam filtering based on dendritic cell algorithm
  117. Biobjective NSGA-II for optimal spread spectrum watermarking of color frames: Evaluation study
  118. Impact of Stock Market Indices and Other Regional Exogenous Factors on Predictive Modeling of Border Traffic with Neural Network Models
  119. Combining spatial and DCT based Markov features for enhanced blind detection of image splicing
  120. Intrusion detection using a cascade of boosted classifiers (CBC)
  121. Network Intrusion Detection Using Multi-Criteria PROAFTN Classification
  122. Statistical Analysis of ML-Based Paraphrase Detectors with Lexical Similarity Metrics
  123. Effects of Using Average Annual Daily Traffic (AADT) with Exogenous Factors to Predict Daily Traffic
  124. A Multicriterion Fuzzy Classification Method with Greedy Attribute Selection for Anomaly-based Intrusion Detection
  125. Computational Intelligence in Smart Grids: Case Studies
  126. Abductive Learning Ensembles for Hand Shape Identification
  127. A Pareto-based hybrid multiobjective evolutionary approach for constrained multipath traffic engineering optimization in MPLS/GMPLS networks
  128. Detecting pixel-value differencing steganography using Levenberg-Marquardt neural network
  129. Enhanced Hand Shape Identification Using Random Forests
  130. Message from ISSR Workshop Chairs
  131. Automatic Identification Based on Hand Geometry and Probabilistic Neural Networks
  132. Evaluation of support vector machine with universal kernel for hand-geometry based identification
  133. Improved pixel value differencing steganography using logistic chaotic maps
  134. Abductive Neural Network Modeling for Hand Recognition Using Geometric Features
  135. Analysis and extraction of sentence-level paraphrase sub-corpus in CS education
  136. Fusion of Multiple Texture Representations for Palmprint Recognition Using Neural Networks
  137. High-Capacity Image Steganography Based on Overlapped Pixel Differences and Modulus Function
  138. Improved Personal Identification Using Face and Hand Geometry Fusion and Support Vector Machines
  139. A comparative study of PVD-based schemes for data hiding in digital images
  140. Comparing a class of dynamic model-based reinforcement learning schemes for handoff prioritization in mobile communication networks
  141. A reinforcement learning approach for sequential mastery testing
  142. An Adaptive Steganographic Method for Color Images Based on LSB Substitution and Pixel Value Differencing
  143. Using GMDH-based networks for improved spam detection and email feature analysis
  144. A bio-inspired image encryption algorithm based on chaotic maps
  145. A hierarchical GMDH-based polynomial neural network for handwritten numeral recognition using topological features
  146. ROUTING AND TRAFFIC MANAGEMENT
  147. Flow-based path selection for Internet traffic engineering with NSGA-II
  148. Offline Recognition of Handwritten Numeral Characters with Polynomial Neural Networks Using Topological Features
  149. Discovering classification rules for email spam filtering with an ant colony optimization algorithm
  150. The need for a unified framework for evaluating web cache replacement strategies
  151. Constructing optimal educational tests using GMDH-based item ranking and selection
  152. Construction and analysis of educational tests using abductive machine learning
  153. Spam filtering with abductive networks
  154. A fuzzy similarity approach for automated spam filtering
  155. Solving the minimum-cost constrained multipath routing with load balancing in MPLS networks using an evolutionary method
  156. Applications of genetic algorithms to optimal multilevel design of MPLS-based networks
  157. On Optimal Firewall Rule Ordering
  158. A Heuristic Approach for Firewall Policy Optimization
  159. Performance Comparison of CBT and PIM Multicast Routing Protocols over MPLS Networks
  160. A learning approach for prioritized handoff channel allocation in mobile multimedia networks
  161. PREPARATION AND CHARACTERIZATION OF SAWDUST/N-METHYLOLACRYLAMIDE/METHACRYLIC ACID CATION EXCHANGE COMPOSITES
  162. REMOVING SOME HAZARDOUS HEAVY METAL ANIONS BY USING A NEW ANION EXCHANGER
  163. Obstacle avoidance and motion control for mobile robots
  164. Chaotic-Based and Biologically Inspired Cryptosystems for Secure Image Communication and Storage
  165. Computational Intelligence in Cryptology
  166. Computational Intelligence Paradigms:
  167. Computational Intelligence in Cryptology
  168. Computational Intelligence Paradigms
  169. A learning approach for call admission control with prioritized handoff in mobile multimedia networks
  170. Adaptive resource allocation with prioritized handoff in cellular mobile networks under QoS provisioning
  171. Autonomous call admission control with prioritized handoff in cellular networks