Home > Published Issues > 2023 >
  • Fuzzy Based Butterfly Life Cycle Algorithm for Measuring Company's Growth Performance [Click]
  • Computer Vision-Based IoT Architecture for Post COVID-19 Preventive Measures [Click]
  • Philippines' Free Wi-Fi Roll-out Project: Safe or Not? [Click]
  • Gamelan Melody Generation Using LSTM Networks Controlled by Composition Meter Rules and Special Notes [Click]
  • A Vehicle Sensor Network for Real-Time Air Pollution Analysis [Click]
  • Intelligent Traffic Routing Algorithm for Wireless Sensor Networks in Agricultural Environment [Click]
  • Comparative Analysis of Machine Learning in Predicting the Treatment Status of COVID-19 Patients [Click]
  • An Optimized Machine Learning Approach for Coronary Artery Disease Detection [Click]
  • The New Collective Signature Schemes Based on Two Hard Problems Using Schnorr's Signature Standard [Click]
  • The Impact of Objectively Recorded Smartphone Usage and Emotional Intelligence on Problematic Internet Usage [Click]
  • An Automated Deep Learning Framework for Human Identity and Gender Detection [Click]
  • An Intelligent Arabic Model for Recruitment Fraud Detection Using Machine Learning [Click]
  • Energy Prediction for Mobile Sink Placement by Deep Maxout Network in WSN [Click]
  • Identification of Leaf Disease Using Machine Learning Algorithm for Improving the Agricultural System [Click]
  • Ensuring Cloud Data Security Using the Soldier Ant Algorithm [Click]
  • Analysis of Playing Positions in Tennis Match Videos to Assess Competition Using a Centroid Clustering Heatmap Prediction Technique [Click]
  • Algorithm for Safety Decisions in Social Media Feeds Using Personification Patterns [Click]
  • A Novel Distributed Machine Learning Model to Detect Attacks on Edge Computing Network [Click]
  • Face Detection in Close-up Shot Video Events Using Video Mining [Click]
  • Using IoT-Enabled RFID Smart Cards in an Indoor People-Movement Tracking System with Risk Assessment [Click]
  • Comparison of Machine Learning Algorithms for Spam Detection [Click]
  • A Novel Fuzzy-Based Thresholding Approach for Blood Vessel Segmentation from Fundus Image [Click]
  • Detection of Cookie Bomb Attacks in Cloud Computing Environment Monitored by SIEM [Click]
  • Client-Based Distributed Video Conferencing via WebRTC [Click]
  • A Comprehensive Survey on Finger Vein Biometric [Click]
  • Masked Face Detection and Recognition System Based on Deep Learning Algorithms [Click]
  • Clickbait Detection in Indonesian News Title with Gray Unbalanced Class Based on BERT [Click]
  • A Coloured Image Watermarking Based on Genetic K-Means Clustering Methodology [Click]
  • A Generational Cohort Comparison of Icon Selection Accuracy under Varying Conditions of Icon Entropy and Concreteness [Click]
  • Nonlinear Optimal Control Using Sequential Niching Differential Evolution and Parallel Workers [Click]
  • A Weighted Ensemble of VAR and LSTM for Multivariate Forecasting of Cloud Resource Usage [Click]
  • Balanced Truncation Approach for Unstable Continuous Systems Based on Mapping [Click]
  • Analysis of Ransomware Using Reverse Engineering Techniques to Develop Effective Countermeasures [Click]
  • Extractive Text Summarization for Indonesian News Article Using Ant System Algorithm [Click]
  • A Novel Approach to Forecast Crude Oil Prices Using Machine Learning and Technical Indicators [Click]
  • Forecasting Volatility in Generalized Autoregressive Conditional Heteroscedastic (GARCH) Model with Outliers [Click]
  • Corpus-Based Vocabulary List for Thai Language [Click]
  • Large-Scale Insect Pest Image Classification [Click]
  • Firefly with Levy Based Feature Selection with Multilayer Perceptron for Sentiment Analysis [Click]
  • Employee Reimbursement System for a Manufacturing Company [Click]
  • Parallel Software Encryption of AES Algorithm by Using CAM-Based Massive-Parallel SIMD Matrix Core for Mobile Accelerator [Click]
  • Breast Cancer Classification Using an Extreme Gradient Boosting Model with F-Score Feature Selection Technique [Click]
  • Development of an Electronic Nose for Harmful Gases with Prediction Modeling Using Machine Learning [Click]
  • Chronic Kidney Disease Prediction Using Machine Learning [Click]
  • Multi-class Classification Approach for Retinal Diseases [Click]
  • Spelling Check: A New Cognition-Inspired Sequence Learning Memory [Click]
  • An Approach for Person Detection along with Object Using Machine Learning [Click]
  • Automatic Diagnosis of Rice Leaves Diseases Using Hybrid Deep Learning Model [Click]
  • An Analysis and Comparison of Proprietary and Open-Source Software for Building E-commerce Website: A Case Study [Click]
  • A New Refined-TLBO Aided Bi-Generative Adversarial Network for Finger Vein Recognition [Click]
  • A Survey on DDoS Detection and Prevention Mechanism [Click]
  • Recommendation System of Food Package Using Apriori and FP-Growth Data Mining Methods [Click]
  • Intelligent Fault Detection Based on Reinforcement Learning Technique on Distribution Networks [Click]
  • An Approach to Improving Intrusion Detection System Performance Against Low Frequent Attacks [Click]
  • Efficient FPGA-Based Convolutional Neural Network Implementation for Edge Computing [Click]
  • Three-Dimensional Convolutional Approaches for the Verification of Deepfake Videos: The Effect of Image Depth Size on Authentication Performance [Click]
  • Causal Inference and Conditional Independence Testing with RCoT [Click]
  • Automated Resource Management System Based upon Container Orchestration Tools Comparison [Click]
  • Advanced Real Time Embedded Book Braille System [Click]
  • Recommendation System with Content-Based Filtering in NFT Marketplace [Click]
  • An Efficient Model to Predict Network Packets in TVDC Using Machine Learning [Click]
  • A Model to Prevent Gray Hole Attack in Mobile Ad-Hoc Networks [Click]
  • Utilizing Word Index Approach with LSTM Architecture for Extracting Adverse Drug Reaction from Medical Reviews [Click]
  • Optimized Deep Neural Networks Audio Tagging Framework for Virtual Business Assistant [Click]
  • Crowdsensing: Assessment of Cognitive Fitness Using Machine Learning [Click]
  • DASS-21 Based Psychometric Prediction Using Advanced Machine Learning Techniques [Click]
  • Designing an Android Application for Electronic Booking in Health Clinics and Building Health Record System [Click]
  • Comparative Study on Model Skill of ERT and LSTM in Classifying Proper or Improper Execution of Free Throw, Jump Shot, and Layup Basketball Maneuvers [Click]
  • Evaluation of Illumination in 3D Scenes Based on Heat Maps Comparison [Click]
  • Fake News Detection in Social Media: Hybrid Deep Learning Approaches [Click]
  • Detecting Unusual Activities in Local Network Using Snort and Wireshark Tools [Click]
  • Intrusion Detection System in IoT Based on GA-ELM Hybrid Method [Click]
  • A Literature Review on the Pervasiveness of Ransomware Threats and Attacks in the Philippines [Click]
  • Empirical Evaluation of Machine Learning Performance in Forecasting Cryptocurrencies [Click]
  • k-Anonymity Based on Tuple Migration in Sharing Data [Click]
  • HASumRuNNer: An Extractive Text Summarization Optimization Model Based on a Gradient-Based Algorithm [Click]
  • Fusion of CNN-QCSO for Content Based Image Retrieval [Click]
  • Improvised Explosive Device Detection Using CNN With X-Ray Images [Click]
  • A Distributed Software Project Management Framework [Click]
  • Multi-speaker Speech Separation under Reverberation Conditions Using Conv-Tasnet [Click]
  • Towards Ideal and Efficient Recommendation Systems Based on the Five Evaluation Concepts Promoting Serendipity [Click]
  • Demystifying Blockchain: A Critical Analysis of Application Characteristics in Different Domains [Click]
  • Open Banking API Framework to Improve the Online Transaction between Local Banks in Egypt Using Blockchain Technology [Click]
  • Using Artificial Neural Network to Test Image Covert Communication Effect [Click]
  • Comparison of Shoulder Range of Motion Evaluation by Traditional and Semi-Automatic Methods [Click]
  • Authentication and Role-Based Authorization in Microservice Architecture: A Generic Performance-Centric Design [Click]
  • Data Mining for Managing and Using Online Information on Facebook [Click]
  • Improved Model to Detect Cancer from Cervical Histopathology Images by Optimizing Feature Selection and Ensemble Classifier [Click]
  • Advances in the Development of an Algorithm for Parametric Identification of Egyptian Hieroglyphs Using Artificial Vision [Click]
  • Linguistic Driven Feature Selection for Text Classification as Stop Word Replacement [Click]
  • Improving Performance of Fuzzy-Based Handoff for Spectrum Utilization in Cognitive Radio Network Using Particle Swarm Optimization [Click]
  • Malicious Agricultural IoT Traffic Detection and Classification: A Comparative Study of ML Classifiers [Click]
  • Improved Opinion Mining for Unstructured Data Using Machine Learning Enabling Business Intelligence [Click]
  • Part-of-Speech (POS) Tagging for Standard Brunei Malay: A Probabilistic and Neural-Based Approach [Click]
  • Deep Image: An Efficient Image-Based Deep Conventional Neural Network Method for Android Malware Detection [Click]
  • An Effective Time-Sharing Switch Migration Scheme for Load Balancing in Software Defined Networking [Click]
  • Sentiment Analysis of Amazon Product Reviews by Supervised Machine Learning Models [Click]
  • PWMStem: A Corpus-Based Suffix Identification and Stripping Algorithm for Multi-lingual Stemming [Click]
  • A Simple and Effective Evaluation Method for Fault-Tolerant Routing Methods in Network-on-Chips [Click]
  • Maximum Overlap Discrete Transform (MODT)—Gaussian Kernel Radial Network (GKRN) Model for Epileptic Seizure Detection from EEG Signals [Click]