All Stories

  1. An interpretable neural network for robustly determining the location and number of cluster centers
  2. Towards Federated Learning and Multi-Access Edge Computing for Air Quality Monitoring: Literature Review and Assessment
  3. Intelligent Image and Video Analytics
  4. Multi-culture Sign Language Detection and Recognition Using Fine-tuned Convolutional Neural Network
  5. Contextual Sequence-to-Point Deep Learning for Household Energy Disaggregation
  6. Ensemble Multifeatured Deep Learning Models and Applications: A Survey
  7. A comprehensive survey and taxonomy of sign language research
  8. Improving Intrusion Detection for Imbalanced Network Traffic using Generative Deep Learning
  9. Utilizing motion and spatial features for sign language gesture recognition using cascaded CNN and LSTM models
  10. Soft computing and intelligent systems: Techniques and applications
  11. URLCam: Toolkit for malicious URL analysis and modeling
  12. Towards Hybrid Multimodal Manual and Non-Manual Arabic Sign Language Recognition: mArSL Database and Pilot Study
  13. Comparative analysis of feature extraction and fusion for blind authentication of digital images using chroma channels
  14. Clustering of Association Rules for Big Datasets using Hadoop MapReduce
  15. Combining Deep Learning and Multiresolution Analysis for Stock Market Forecasting
  16. Early and Late Fusion of Emojis and Text to Enhance Opinion Mining
  17. Feature analysis and prediction of antibiotic resistance using PCA-MLP with segments of N. gonorrhoeae bacteria’s DNA
  18. On DNA cryptography for secure data storage and transfer
  19. Evaluation of CNN Models with Transfer Learning for Recognition of Sign Language Alphabets with Complex Background
  20. Joint space representation and recognition of sign language fingerspelling using Gabor filter and convolutional neural network
  21. Statistical Gabor-Based Gait Recognition Using Region-Level Analysis
  22. Impact of Normalization on BiLSTM Based Models for Energy Disaggregation
  23. Empirical study on imbalanced learning of Arabic sentiment polarity with neural word embedding
  24. Soft computing and intelligent systems: techniques and applications
  25. Exploring Lattice-based Post-Quantum Signature for JWT Authentication: Review and Case Study
  26. A review of machine learning for big data analytics: bibliometric approach
  27. Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks
  28. Enhanced Video Analytics for Sentiment Analysis Based on Fusing Textual, Auditory and Visual Information
  29. Multi-Target Energy Disaggregation using Convolutional Neural Networks
  30. On Using Physical Based Intrusion Detection in SCADA Systems
  31. Parallel Association Rules Pruning Algorithm on Hadoop MapReduce
  32. Audio-Textual Arabic Dialect Identification for Opinion Mining Videos
  33. Benchmarking Open-Source Android Malware Detection Tools
  34. Overview and Case Study for Ransomware Classification Using Deep Neural Network
  35. Impact of Spectre/Meltdown Kernel Patches on Crypto-Algorithms on Windows Platforms
  36. Special issue on Neural Information Processing for Optimization and Applications
  37. Bibliography of digital image anti-forensics and anti-anti-forensics techniques
  38. Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and Applications
  39. Forecasting of Bahrain Stock Market with Deep Learning: Methodology and Case Study
  40. Multi-scale LPQ-DCT for Image Forgery Detection
  41. Using feature-level fusion for multimodal gender recognition for opinion mining videos
  42. Soft computing and intelligent systems: techniques and applications
  43. A multi-matching approximation algorithm for Symmetric Traveling Salesman Problem
  44. Multimodal Sentiment and Gender Classification for Video Logs
  45. Statistical Comparison of Opinion Spam Detectors in Social Media with Imbalanced Datasets
  46. Detection of Arabic Spam Tweets Using Word Embedding and Machine Learning
  47. Combining emojis with Arabic textual features for sentiment classification
  48. Emoji-Based Sentiment Analysis of Arabic Microblogs Using Machine Learning
  49. Evaluation of bidirectional LSTM for short-and long-term stock market prediction
  50. Imbalanced Sentiment Polarity Detection Using Emoji-Based Features and Bagging Ensemble
  51. Stock Market Forecast Using Multivariate Analysis with Bidirectional and Stacked (LSTM, GRU)
  52. Soft computing and intelligent systems: Techniques and applications
  53. Intrusion detection taxonomy and data preprocessing mechanisms
  54. Ant colony inspired method for reducing load imbalance in multiprocessor systems
  55. Anger Detection in Arabic Speech Dialogs
  56. Emojis-Based Sentiment Classification of Arabic Microblogs Using Deep Recurrent Neural Networks
  57. Image Splicing Forgery Detection Using DCT Coefficients with Multi-Scale LBP
  58. Automated gait-based gender identification using fuzzy local binary patterns with tuned parameters
  59. Hybrid multicriteria fuzzy classification of network traffic patterns, anomalies, and protocols
  60. Learning mechanisms for anomaly-based intruson detection: Updated review
  61. Searching Encrypted Data on the Cloud
  62. AdaBoost-based artificial neural network learning
  63. A more secure scheme for CAPTCHA-based authentication in cloud environment
  64. Critical review of static taint analysis of android applications for detecting information leakages
  65. Evaluating time and throughput at different modes of operation in AES algorithm
  66. Detection of Phishing Websites Based on Probabilistic Neural Networks and K-Medoids Clustering
  67. Special issue on soft computing and intelligent systems: Tools, techniques and applications
  68. A multiclass cascade of artificial neural network for network intrusion detection
  69. Evaluation of sequential adaptive testing with real-data simulation: A case study
  70. Hybrid Deep Learning for Sentiment Polarity Determination of Arabic Microblogs
  71. Silhouette-Based Gender Recognition in Smart Environments Using Fuzzy Local Binary Patterns and Support Vector Machines
  72. Using Word Embedding and Ensemble Learning for Highly Imbalanced Data Sentiment Analysis in Short Arabic Text
  73. Kernel-Based Fuzzy Local Binary Pattern for Gait Recognition
  74. Spam filtering framework for multimodal mobile communication based on dendritic cell algorithm
  75. Robust content authentication of gray and color images using lbp-dct markov-based features
  76. Selectivity estimation of extended XML query tree patterns based on prime number labeling and synopsis modeling
  77. Towards scalable rough set based attribute subset selection for intrusion detection using parallel genetic algorithm in MapReduce
  78. Known-plaintext attack and improvement of PRNG-based text encryption
  79. FLGBP: Improved Method for Gait Representation and Recognition
  80. Improving Information Security Practices through Computational Intelligence
  81. Multi-Kernel Fuzzy-Based Local Gabor Patterns for Gait Recognition
  82. Statistical Gabor-Based Gait Recognition Using Region-Level Analysis
  83. XHQE: A hybrid system for scalable selectivity estimation of XML queries
  84. SwiftEnc: Hybrid Cryptosystem with Hash-Based Dynamic Key Encryption
  85. MapReduce implementation for minimum reduct using parallel genetic algorithm
  86. Online prime labeling and generation of synopsis for XML query estimation
  87. Introduction to the special issue on Cognitive Radio Networks
  88. Anonymous Connections Based on Onion Routing: A Review and a Visualization Tool
  89. Boosting paraphrase detection through textual similarity metrics with abductive networks
  90. Dendritic Cell Algorithm for Mobile Phone Spam Filtering
  91. Detecting Cyber-Attacks on Wireless Mobile Networks Using Multicriterion Fuzzy Classifier with Genetic Attribute Selection
  92. Full-Reference Predictive Modeling of Subjective Image Quality Assessment with ANFIS
  93. Learning Rule for Linear Multilayer Feedforward ANN by Boosted Decision Stumps
  94. Improved selectivity estimator for XML queries based on structural synopsis
  95. A novel bio-inspired predictive model for spam filtering based on dendritic cell algorithm
  96. Biobjective NSGA-II for optimal spread spectrum watermarking of color frames: Evaluation study
  97. Impact of Stock Market Indices and Other Regional Exogenous Factors on Predictive Modeling of Border Traffic with Neural Network Models
  98. Combining spatial and DCT based Markov features for enhanced blind detection of image splicing
  99. Intrusion detection using a cascade of boosted classifiers (CBC)
  100. Network Intrusion Detection Using Multi-Criteria PROAFTN Classification
  101. Statistical Analysis of ML-Based Paraphrase Detectors with Lexical Similarity Metrics
  102. Effects of Using Average Annual Daily Traffic (AADT) with Exogenous Factors to Predict Daily Traffic
  103. A Multicriterion Fuzzy Classification Method with Greedy Attribute Selection for Anomaly-based Intrusion Detection
  104. Computational Intelligence in Smart Grids: Case Studies
  105. Abductive Learning Ensembles for Hand Shape Identification
  106. A Pareto-based hybrid multiobjective evolutionary approach for constrained multipath traffic engineering optimization in MPLS/GMPLS networks
  107. Detecting pixel-value differencing steganography using Levenberg-Marquardt neural network
  108. Enhanced Hand Shape Identification Using Random Forests
  109. Message from ISSR Workshop Chairs
  110. Automatic Identification Based on Hand Geometry and Probabilistic Neural Networks
  111. Evaluation of support vector machine with universal kernel for hand-geometry based identification
  112. Improved pixel value differencing steganography using logistic chaotic maps
  113. Abductive Neural Network Modeling for Hand Recognition Using Geometric Features
  114. Analysis and extraction of sentence-level paraphrase sub-corpus in CS education
  115. Fusion of Multiple Texture Representations for Palmprint Recognition Using Neural Networks
  116. High-Capacity Image Steganography Based on Overlapped Pixel Differences and Modulus Function
  117. Improved Personal Identification Using Face and Hand Geometry Fusion and Support Vector Machines
  118. A comparative study of PVD-based schemes for data hiding in digital images
  119. Comparing a class of dynamic model-based reinforcement learning schemes for handoff prioritization in mobile communication networks
  120. A reinforcement learning approach for sequential mastery testing
  121. An Adaptive Steganographic Method for Color Images Based on LSB Substitution and Pixel Value Differencing
  122. Using GMDH-based networks for improved spam detection and email feature analysis
  123. A bio-inspired image encryption algorithm based on chaotic maps
  124. A hierarchical GMDH-based polynomial neural network for handwritten numeral recognition using topological features
  125. ROUTING AND TRAFFIC MANAGEMENT
  126. Flow-based path selection for Internet traffic engineering with NSGA-II
  127. Offline Recognition of Handwritten Numeral Characters with Polynomial Neural Networks Using Topological Features
  128. Discovering classification rules for email spam filtering with an ant colony optimization algorithm
  129. The need for a unified framework for evaluating web cache replacement strategies
  130. Constructing optimal educational tests using GMDH-based item ranking and selection
  131. Construction and analysis of educational tests using abductive machine learning
  132. Spam filtering with abductive networks
  133. A fuzzy similarity approach for automated spam filtering
  134. Solving the minimum-cost constrained multipath routing with load balancing in MPLS networks using an evolutionary method
  135. Applications of genetic algorithms to optimal multilevel design of MPLS-based networks
  136. On Optimal Firewall Rule Ordering
  137. A Heuristic Approach for Firewall Policy Optimization
  138. Performance Comparison of CBT and PIM Multicast Routing Protocols over MPLS Networks
  139. A learning approach for prioritized handoff channel allocation in mobile multimedia networks
  140. REMOVING SOME HAZARDOUS HEAVY METAL ANIONS BY USING A NEW ANION EXCHANGER
  141. Obstacle avoidance and motion control for mobile robots
  142. Chaotic-Based and Biologically Inspired Cryptosystems for Secure Image Communication and Storage
  143. Computational Intelligence in Cryptology
  144. Computational Intelligence Paradigms:
  145. Computational Intelligence in Cryptology
  146. Computational Intelligence Paradigms
  147. A learning approach for call admission control with prioritized handoff in mobile multimedia networks
  148. Adaptive resource allocation with prioritized handoff in cellular mobile networks under QoS provisioning
  149. Autonomous call admission control with prioritized handoff in cellular networks