Advances in Computing and Data Sciences: 4th International Conference, ICACDS 2020, Valletta, Malta, April 24–25, 2020, Revised Selected Papers
暂无分享,去创建一个
Raquel Oliveira Prates | T. Washio | D. Ślęzak | J. Flusser | Simone Diniz Junqueira Barbosa | Phoebe Chen | A. Cuzzocrea | Xiaoyong Du | Orhun Kara | Ting Liu | K. Sivalingam | Xiaokang Yang | Junsong Yuan | R. Prates | T. Ören | Vipin Tyagi | Mayank Singh | P. K. Gupta | Gianluca Valentino Eds | V. Tyagi
[1] Edsger W. Dijkstra,et al. A note on two problems in connexion with graphs , 1959, Numerische Mathematik.
[2] G. F. Hughes,et al. On the mean accuracy of statistical pattern recognizers , 1968, IEEE Trans. Inf. Theory.
[3] William M. Rand,et al. Objective Criteria for the Evaluation of Clustering Methods , 1971 .
[4] Robert M. Haralick,et al. Textural Features for Image Classification , 1973, IEEE Trans. Syst. Man Cybern..
[5] Lotfi A. Zadeh,et al. Outline of a New Approach to the Analysis of Complex Systems and Decision Processes , 1973, IEEE Trans. Syst. Man Cybern..
[6] N. Otsu. A threshold selection method from gray level histograms , 1979 .
[7] David Sell. Word Meaning , 1976, Philosophy.
[8] C. Mallows,et al. A Method for Comparing Two Hierarchical Clusterings , 1983 .
[9] Barry W. Boehm,et al. Software Engineering Economics , 1993, IEEE Transactions on Software Engineering.
[10] M. Braga,et al. Exploratory Data Analysis , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[11] L. Liebovitch,et al. A fast algorithm to determine fractal dimensions by box counting , 1989 .
[12] S. Blackie,et al. Granulomatous Pneumocystis carinii pneumonia mimicking tuberculosis. , 1989, Archives of pathology & laboratory medicine.
[13] Stephen I. Gallant,et al. Perceptron-based learning algorithms , 1990, IEEE Trans. Neural Networks.
[14] Robert L. Mercer,et al. Class-Based n-gram Models of Natural Language , 1992, CL.
[15] Jim Gray,et al. Benchmark Handbook: For Database and Transaction Processing Systems , 1992 .
[16] P. Barnes,et al. Tuberculosis in patients with human immunodeficiency virus infection. How often does it mimic Pneumocystis carinii pneumonia? , 1992, Chest.
[17] Roberto Battiti,et al. Using mutual information for selecting features in supervised neural net learning , 1994, IEEE Trans. Neural Networks.
[18] Sargur N. Srihari,et al. Decision Combination in Multiple Classifier Systems , 1994, IEEE Trans. Pattern Anal. Mach. Intell..
[19] Matthias Jarke,et al. Requirements engineering in 2001: (virtually) managing a changing reality , 1994, Softw. Eng. J..
[20] B. S. Manjunath,et al. Multisensor Image Fusion Using the Wavelet Transform , 1995, CVGIP Graph. Model. Image Process..
[21] Ivar Jacobson,et al. Formalizing Use-Case Modeling , 1995, J. Object Oriented Program..
[22] David W. Aha,et al. A Comparative Evaluation of Sequential Feature Selection Algorithms , 1995, AISTATS.
[23] Yasuhito Suenaga. 3D measurement technologies for computer animation , 1996, Proceedings Computer Animation '96.
[24] Robert T. Hughes,et al. Expert judgement as an estimating method , 1996, Inf. Softw. Technol..
[25] Thomas G. Dietterich. Machine-Learning Research Four Current Directions , 1997 .
[26] Theo Mandel,et al. The Elements of User Interface Design , 1997 .
[27] Hartmut Vogler,et al. An approach for mobile agent security and fault tolerance using distributed transactions , 1997, Proceedings 1997 International Conference on Parallel and Distributed Systems.
[28] Andrew McCallum,et al. A comparison of event models for naive bayes text classification , 1998, AAAI 1998.
[29] Ron Kohavi,et al. Feature Selection for Knowledge Discovery and Data Mining , 1998 .
[30] G. Reza Kiani,et al. Marketing opportunities in the digital world , 1998, Internet Res..
[31] Michael T. Orchard,et al. Wavelet packet image coding using space-frequency quantization , 1998, IEEE Trans. Image Process..
[32] Zbigniew R. Struzik,et al. Measuring time series similarity through large singular features revealed with wavelet transformation , 1999, Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99.
[33] Steven K. Feiner,et al. Exploring MARS: developing indoor and outdoor user interfaces to a mobile augmented reality system , 1999, Comput. Graph..
[34] Kentaro Toyama,et al. Wallflower: principles and practice of background maintenance , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.
[35] Ada Wai-Chee Fu,et al. Efficient time series matching by wavelets , 1999, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337).
[36] Wayne Jansen,et al. NIST Special Publication 800-19 – Mobile Agent Security , 2000 .
[37] E. Candès,et al. Curvelets: A Surprisingly Effective Nonadaptive Representation for Objects with Edges , 2000 .
[38] Noam Chomsky,et al. New Horizons in the Study of Language and Mind: Language as a natural object , 2000 .
[39] Ulrich Güntzer,et al. Algorithms for association rule mining — a general survey and comparison , 2000, SKDD.
[40] Christos Faloutsos,et al. Fast Time Sequence Indexing for Arbitrary Lp Norms , 2000, VLDB.
[41] R. Lewis. An Introduction to Classification and Regression Tree (CART) Analysis , 2000 .
[42] F. E.,et al. A Relational Model of Data Large Shared Data Banks , 2000 .
[43] Tian Pu,et al. Contrast-based image fusion using the discrete wavelet transform , 2000 .
[44] B. Stoll,et al. Risk Factors and Opportunities for Prevention of Early-Onset Neonatal Sepsis: A Multicenter Case-Control Study , 1999, Pediatrics.
[45] Bruce H. Thomas,et al. ARQuake: an outdoor/indoor augmented reality first person application , 2000, Digest of Papers. Fourth International Symposium on Wearable Computers.
[46] A V Shekdar,et al. Health-care waste management in India. , 2001, Journal of environmental management.
[47] N. Canagarajah,et al. Wavelets for Image Fusion , 2001 .
[48] K. Steven,et al. Shared Decision Making , 2012, Onkologische Welt.
[49] Collin F. Baker,et al. Frame semantics for text understanding , 2001 .
[50] N. Jamil,et al. Face recognition using neural networks , 2001, Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century..
[51] T. Franquet. Imaging of pneumonia: trends and algorithms. , 2001, The European respiratory journal.
[52] Eamonn J. Keogh,et al. Dimensionality Reduction for Fast Similarity Search in Large Time Series Databases , 2001, Knowledge and Information Systems.
[53] Richard Adderley,et al. Police crime recording and investigation systems – A user’s view , 2001 .
[54] Andrew S. Tanenbaum,et al. Distributed systems: Principles and Paradigms , 2001 .
[55] Daniel Chandler,et al. Semiotics: The Basics , 2001 .
[56] Martin J. Shepperd,et al. Comparing Software Prediction Techniques Using Simulation , 2001, IEEE Trans. Software Eng..
[57] Harry Shum,et al. Real-time speech-driven 3D face animation , 2002, Proceedings. First International Symposium on 3D Data Processing Visualization and Transmission.
[58] Peter Auer,et al. The Nonstochastic Multiarmed Bandit Problem , 2002, SIAM J. Comput..
[59] Taghi M. Khoshgoftaar,et al. Can neural networks be easily interpreted in software cost estimation? , 2002, 2002 IEEE World Congress on Computational Intelligence. 2002 IEEE International Conference on Fuzzy Systems. FUZZ-IEEE'02. Proceedings (Cat. No.02CH37291).
[60] R. Jackendoff. Foundations of Language: Brain, Meaning, Grammar, Evolution , 2002 .
[61] David L. Mothersbaugh,et al. Effects of typographic factors in advertising‐based persuasion: A general model and initial empirical tests , 2002 .
[62] Chong-Ho Choi,et al. Input feature selection for classification problems , 2002, IEEE Trans. Neural Networks.
[63] Eamonn J. Keogh,et al. Locally adaptive dimensionality reduction for indexing large time series databases , 2001, SIGMOD '01.
[64] D.M. Mount,et al. An Efficient k-Means Clustering Algorithm: Analysis and Implementation , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[65] Lei Zhang,et al. Edge detection by scale multiplication in wavelet domain , 2002, Pattern Recognit. Lett..
[66] P. Cunningham,et al. Solutions to Instability Problems with Sequential Wrapper-based Approaches to Feature Selection , 2002 .
[67] Janko Calic,et al. Efficient key-frame extraction and video analysis , 2002, Proceedings. International Conference on Information Technology: Coding and Computing.
[68] Yajie Tian,et al. Handbook of face recognition , 2003 .
[69] T. Chorba,et al. Underestimation of infant mortality rates in one republic of the former Soviet Union. , 2003, Pediatrics.
[70] E. Brumberger,et al. The Rhetoric of Typography: The Persona of Typeface and Text , 2003 .
[71] David R. Karger,et al. Tackling the Poor Assumptions of Naive Bayes Text Classifiers , 2003, ICML.
[72] Isabelle Guyon,et al. An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..
[73] Jim Alves-Foss,et al. The use of encrypted functions for mobile agent security , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[74] Z. Zivkovic. Improved adaptive Gaussian mixture model for background subtraction , 2004, ICPR 2004.
[75] Cauligi S. Raghavendra,et al. Single-copy routing in intermittently connected mobile networks , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[76] Timothy F. Cootes,et al. Analysis of Features for Rigid Structure Vehicle Type Recognition , 2004, BMVC.
[77] Qiang Wang,et al. A dimensionality reduction technique for efficient similarity analysis of time series databases , 2004, CIKM '04.
[78] Julio Cesar Sampaio do Prado Leite,et al. Nonfunctional requirements: from elicitation to conceptual models , 2004, IEEE Transactions on Software Engineering.
[79] G. Anderson,et al. Mapping Grain Sorghum Yield Variability Using Airborne Digital Videography , 2000, Precision Agriculture.
[80] Stephen R. Anderson,et al. How Many Languages Are There in the World , 2004 .
[81] Antonio Torralba,et al. Modeling the Shape of the Scene: A Holistic Representation of the Spatial Envelope , 2001, International Journal of Computer Vision.
[82] Dimitrios Gunopulos,et al. INDEXING TIME-SERIES UNDER CONDITIONS OF NOISE , 2004 .
[83] Eamonn J. Keogh,et al. On the Need for Time Series Data Mining Benchmarks: A Survey and Empirical Demonstration , 2002, Data Mining and Knowledge Discovery.
[84] C. Faloutsos,et al. cient Similarity Search In Sequence Databases , 2004 .
[85] R. Sutton. Introduction: The challenge of reinforcement learning , 1992, Machine Learning.
[86] Rafael García,et al. Fusion of multispectral and panchromatic images using improved IHS and PCA mergers based on wavelet decomposition , 2004, IEEE Transactions on Geoscience and Remote Sensing.
[87] Harry Chen,et al. SOUPA: standard ontology for ubiquitous and pervasive applications , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[88] Axel Wismüller,et al. Cluster Analysis of Biomedical Image Time-Series , 2002, International Journal of Computer Vision.
[89] Te-Ming Tu,et al. A fast intensity-hue-saturation fusion technique with spectral adjustment for IKONOS imagery , 2004, IEEE Geoscience and Remote Sensing Letters.
[90] Robert V. Brill,et al. Applied Statistics and Probability for Engineers , 2004, Technometrics.
[91] Syed Immamul Ansarullah,et al. Prediction of Heart Disease using Decision Tree a Data Mining Technique , 2004 .
[92] M. Mcmurdo,et al. Risk factors and risk assessment tools for falls in hospital in-patients: a systematic review. , 2004, Age and ageing.
[93] Alan R. Hevner,et al. Requirements-driven database systems benchmark method , 2005, Decis. Support Syst..
[94] Mohan M. Trivedi,et al. Performance characterization for Gaussian mixture model based motion detection algorithms , 2005, IEEE International Conference on Image Processing 2005.
[95] Alistair G. Sutcliffe,et al. Scenario-based assessment of nonfunctional requirements , 2005, IEEE Transactions on Software Engineering.
[96] Serge J. Belongie,et al. Recognizing Cars , 2005 .
[97] L. Baker,et al. Internet use and stigmatized illness. , 2005, Social science & medicine.
[98] C. Willmott,et al. Advantages of the mean absolute error (MAE) over the root mean square error (RMSE) in assessing average model performance , 2005 .
[99] Mark Billinghurst,et al. Designing augmented reality interfaces , 2005, COMG.
[100] Mehryar Mohri,et al. Multi-armed Bandit Algorithms and Empirical Evaluation , 2005, ECML.
[101] Abel G. Oliva,et al. Gist of a scene , 2005 .
[102] Shih-Fu Chang,et al. Columbia Photographic Images and Photorealistic Computer Graphics Dataset , 2005 .
[103] Lei Lei,et al. R-C4.5 decision tree model and its applications to health care dataset , 2005, Proceedings of ICSSSM '05. 2005 International Conference on Services Systems and Services Management, 2005..
[104] Siwei Lyu,et al. How realistic is photorealistic? , 2005, IEEE Transactions on Signal Processing.
[105] Bill Triggs,et al. Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[106] Christian Borgelt,et al. An implementation of the FP-growth algorithm , 2005 .
[107] Eamonn J. Keogh,et al. HOT SAX: efficiently finding the most unusual time series subsequence , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[108] Michael G. Madden,et al. Multi-Class and Single-Class Classification Approaches to Vehicle Model Recognition from Images , 2005 .
[109] Melanie Hilario,et al. Knowledge and Information Systems , 2007 .
[110] Ann,et al. Truth and method , 1994, Journal of Religion and Health.
[111] Li Wei,et al. SAXually Explicit Images: Finding Unusual Shapes , 2006, Sixth International Conference on Data Mining (ICDM'06).
[112] Per Runeson,et al. A survey of unit testing practices , 2006, IEEE Software.
[113] R. Hales,et al. A review of bipolar disorder in adults. , 2006, Psychiatry (Edgmont (Pa. : Township)).
[114] R. Nochai,et al. ARIMA MODEL FOR FORECASTING OIL PALM , 2006 .
[115] Eamonn J. Keogh,et al. Finding Unusual Medical Time-Series Subsequences: Algorithms and Applications , 2006, IEEE Transactions on Information Technology in Biomedicine.
[116] Harry Zhang,et al. A Fast Decision Tree Learning Algorithm , 2006, AAAI.
[117] Miao Qi-guang,et al. A Novel Image Fusion Method Using Contourlet Transform , 2006, 2006 International Conference on Communications, Circuits and Systems.
[118] Li Wei,et al. Experiencing SAX: a novel symbolic representation of time series , 2007, Data Mining and Knowledge Discovery.
[119] Dmitri Loguinov,et al. Load-Balancing Performance of Consistent Hashing: Asymptotic Analysis of Random Node Join , 2007, IEEE/ACM Transactions on Networking.
[120] Kurt Squire,et al. Augmented Reality Simulations on Handheld Computers , 2007 .
[121] Yi Liu,et al. The application of wavelet multiresolution technology in medical image analysis , 2007, 2007 International Conference on Wavelet Analysis and Pattern Recognition.
[122] Petrônio L. Braga,et al. Software Effort Estimation using Machine Learning Techniques with Robust Confidence Intervals , 2007, 7th International Conference on Hybrid Intelligent Systems (HIS 2007).
[123] Norman M. Sadeh,et al. Learning to detect phishing emails , 2007, WWW '07.
[124] Liu Bao-sheng. Novel image fusion algorithm with novel performance evaluation method , 2007 .
[125] Li Yi-jun,et al. Using Naïve Bayes Classifier to Distinguish Reviews from Non-review Documents in Chinese , 2007, 2007 International Conference on Management Science and Engineering.
[126] Yun Q. Shi,et al. Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[127] Antonio Bicchi,et al. Decentralized intrusion detection for secure cooperative multi-agent systems , 2007, 2007 46th IEEE Conference on Decision and Control.
[128] Mooi Choo Chuah,et al. ECG Anomaly Detection via Time Series Analysis , 2007, ISPA Workshops.
[129] Rick Archibald,et al. Feature Selection and Classification of Hyperspectral Images With Support Vector Machines , 2007, IEEE Geoscience and Remote Sensing Letters.
[130] Magne Jørgensen,et al. A Systematic Review of Software Development Cost Estimation Studies , 2007, IEEE Transactions on Software Engineering.
[131] Huan Liu,et al. Semi-supervised Feature Selection via Spectral Analysis , 2007, SDM.
[132] José Demisio Simões da Silva,et al. An investigation of artificial neural networks based prediction systems in software project management , 2008, J. Syst. Softw..
[133] Wei-Chiang Hong,et al. Rainfall forecasting by technological machine learning models , 2008, Appl. Math. Comput..
[134] Yvan Saeys,et al. Robust Feature Selection Using Ensemble Feature Selection Techniques , 2008, ECML/PKDD.
[135] Kevin Fu,et al. Security and Privacy for Implantable Medical Devices , 2008, IEEE Pervasive Comput..
[136] S. Malek,et al. Determining Percentage of Broken Rice by Using Image Analysis , 2008, CCTA.
[137] A. Ray. Waste Management in Developing Asia , 2008 .
[138] Hui Ding,et al. Querying and mining of time series data: experimental comparison of representations and distance measures , 2008, Proc. VLDB Endow..
[139] Saad D. Abulhab. Anatomy of an Arabetic Type Design , 2008 .
[140] Patrick Weber,et al. OpenStreetMap: User-Generated Street Maps , 2008, IEEE Pervasive Computing.
[141] Andrew Y. C. Nee,et al. Augmented reality for assembly guidance using a virtual interactive tool , 2008 .
[142] Claudio Gutierrez,et al. Survey of graph database models , 2008, CSUR.
[143] Clive Best. Web Mining for Open Source Intelligence , 2008, 2008 12th International Conference Information Visualisation.
[144] Maurice Milgram,et al. Multi-class Vehicle Type Recognition System , 2008, ANNPR.
[145] Kun-Chan Lan,et al. A Survey of Opportunistic Networks , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).
[146] Angelo Gargantini,et al. A semantic framework for metamodel-based languages , 2009, Automated Software Engineering.
[147] Yuanyan Tang,et al. Classification of 3D models for the 3D animation environments , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.
[148] Li Fei-Fei,et al. ImageNet: A large-scale hierarchical image database , 2009, CVPR.
[149] Amin Vahdat,et al. Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .
[150] Christopher Krügel,et al. Effective and Efficient Malware Detection at the End Host , 2009, USENIX Security Symposium.
[151] B. Venkataramani,et al. Performance Evaluation of Adhoc Networks with Different Multicast Routing Protocols and Mobility Models , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.
[152] J. Ott,et al. The ONE simulator for DTN protocol evaluation , 2009, SimuTools.
[153] A. J. Martin. Sensors and computing systems in smart clothing , 2009 .
[154] Nuno Constantino Castro,et al. Time Series Data Mining , 2009, Encyclopedia of Database Systems.
[155] Stephanie Henderson-Begg,et al. Using mobile phones to increase classroom interaction , 2009 .
[156] Meikang Qiu,et al. Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems , 2009, TODE.
[157] Ahmed M. Elgammal,et al. Introduction to computer vision and image understanding the special issue on video analysis , 2009, Comput. Vis. Image Underst..
[158] Liu Jiping,et al. An Algorithm of Shortest Path Based on Dijkstra for Huge Data , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.
[159] A. Arul Lawrence Selvakumar,et al. The Evaluation Report of SHA-256 Crypt Analysis Hash Function , 2009, 2009 International Conference on Communication Software and Networks.
[160] Susmitha Vekkot,et al. A Novel Architecture for Wavelet based Image Fusion , 2009 .
[161] Fei Yi,et al. Design and realization of 3D character animation engine , 2009, 2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology.
[162] N. L. Johnson,et al. Continuous Multivariate Distributions, Volume 1: Models and Applications , 2019 .
[163] Henry Been-Lirn Duh,et al. An integrated design flow in user interface and interaction for enhancing mobile AR gaming experiences , 2010, 2010 IEEE International Symposium on Mixed and Augmented Reality - Arts, Media, and Humanities.
[164] Gerard J. Holzmann,et al. SCRUB: a tool for code reviews , 2010, Innovations in Systems and Software Engineering.
[165] C. Saravanan,et al. Color Image to Grayscale Image Conversion , 2010, 2010 Second International Conference on Computer Engineering and Applications.
[166] Josep-Lluís Larriba-Pey,et al. Survey of Graph Database Performance on the HPC Scalable Graph Analysis Benchmark , 2010, WAIM Workshops.
[167] Kotagiri Ramamohanarao,et al. Layered Approach Using Conditional Random Fields for Intrusion Detection , 2010, IEEE Transactions on Dependable and Secure Computing.
[168] Marko A. Rodriguez,et al. Constructions from Dots and Lines , 2010, ArXiv.
[169] Josep-Lluís Larriba-Pey,et al. A Discussion on the Design of Graph Database Benchmarks , 2010, TPCTC.
[170] R. Brereton,et al. Support vector machines for classification and regression. , 2010, The Analyst.
[171] Zenglin Xu,et al. Discriminative Semi-Supervised Feature Selection Via Manifold Regularization , 2009, IEEE Transactions on Neural Networks.
[172] Fotis Liarokapis,et al. Using Augmented Reality as a Medium to Assist Teaching in Higher Education , 2010, Eurographics.
[173] Pan Hui,et al. An Energy-Efficient n-Epidemic Routing Protocol for Delay Tolerant Networks , 2010, 2010 IEEE Fifth International Conference on Networking, Architecture, and Storage.
[174] Liying Huang,et al. Film and television animation design based on Maya and AE , 2010, 2010 3rd International Congress on Image and Signal Processing.
[175] Bhupinder Verma,et al. Image processing techniques for grading & classification of rice , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).
[176] Tao Zhang,et al. Identifying photorealistic computer graphics using second-order difference statistics , 2010, 2010 Seventh International Conference on Fuzzy Systems and Knowledge Discovery.
[177] M Anbarasi,et al. ENHANCED PREDICTION OF HEART DISEASE WITH FEATURE SUBSET SELECTION USING GENETIC ALGORITHM , 2010 .
[178] Jian Ma,et al. A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..
[179] Léon Bottou,et al. Large-Scale Machine Learning with Stochastic Gradient Descent , 2010, COMPSTAT.
[180] Matthew Turk,et al. Car-Rec: A real time car recognition system , 2011, 2011 IEEE Workshop on Applications of Computer Vision (WACV).
[181] C. Tucker,et al. Historical Perspectives on AVHRR NDVI and Vegetation Drought Monitoring , 2011 .
[182] Anderson Rocha,et al. Vision of the unseen: Current trends and challenges in digital image and video forensics , 2011, CSUR.
[183] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[184] Deirdre Wilson. Parallels and differences in the treatment of metaphor in relevance theory and cognitive linguistics , 2011 .
[185] Eric S. Kyper,et al. ARIMA Modeling with Intervention to Forecast and Analyze Chinese Stock Prices , 2011 .
[186] Wei Zhou,et al. Towards 3D Communications: Real Time Emotion Driven 3D Virtual Facial Animation , 2011, 2011 Workshop on Digital Media and Digital Content Management.
[187] Shih-Chung Kang,et al. Use of Tangible and Augmented Reality Models in Engineering Graphics Courses , 2011 .
[188] Eleftherios Kayafas,et al. Vehicle model recognition from frontal view image measurements , 2011, Comput. Stand. Interfaces.
[189] Sherali Zeadally,et al. Impact of denial of service solutions on network quality of service , 2011, Secur. Commun. Networks.
[190] José M. Bioucas-Dias,et al. An Augmented Lagrangian Approach to the Constrained Optimization Formulation of Imaging Inverse Problems , 2009, IEEE Transactions on Image Processing.
[191] Nick Pears,et al. Automatic make and model recognition from frontal images of cars , 2011, 2011 8th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).
[192] Carsten Willems,et al. Automatic analysis of malware behavior using machine learning , 2011, J. Comput. Secur..
[193] Wei-Yin Loh,et al. Classification and regression trees , 2011, WIREs Data Mining Knowl. Discov..
[194] J. Ardila. Meaning in Language. An Introduction to Semantics and Pragmatics , 2011 .
[195] Yongkang Wong,et al. Patch-based probabilistic image quality assessment for face selection and improved video-based face recognition , 2011, CVPR 2011 WORKSHOPS.
[196] Wang-Q Lim,et al. Compactly supported shearlets are optimally sparse , 2010, J. Approx. Theory.
[197] George Karabatis,et al. Discrete wavelet transform-based time series analysis and mining , 2011, CSUR.
[198] H. Taskinen,et al. Occupational exposure to chemicals and reproductive health , 2011 .
[199] Tak-Chung Fu,et al. A review on time series data mining , 2011, Eng. Appl. Artif. Intell..
[200] N Ravia Shabnam Parveen,et al. Detection of Pneumonia in chest X-ray images. , 2011, Journal of X-ray science and technology.
[201] E. S. Gedraite,et al. Investigation on the effect of a Gaussian Blur in image filtering and segmentation , 2011, Proceedings ELMAR-2011.
[202] Zhongke Wu,et al. Rapid 3D Human Modeling and Animation Based on Sketch and Motion Database , 2011, 2011 Workshop on Digital Media and Digital Content Management.
[203] G. Marx,et al. Technological Innovations in Crime Prevention and Policing. A Review of the Research on Implementation and Impact , 2011 .
[204] Xia San-ao,et al. Application of Maya in film 3D animation design , 2011, 2011 3rd International Conference on Computer Research and Development.
[205] Yang Xiang,et al. Malware Variant Detection Using Similarity Search over Sets of Control Flow Graphs , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[206] Jesús Alcalá-Fdez,et al. KEEL Data-Mining Software Tool: Data Set Repository, Integration of Algorithms and Experimental Analysis Framework , 2011, J. Multiple Valued Log. Soft Comput..
[207] Klaus Wehrle,et al. Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..
[208] Jaydip Sen,et al. Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .
[209] Sheng Zhan,et al. Simulation of real water in 3D animation , 2011, 2011 International Conference on Multimedia Technology.
[210] Stephen P. Boyd,et al. Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..
[211] Uma Mudenagudi,et al. A Study on Keyframe Extraction Methods for Video Summary , 2011, 2011 International Conference on Computational Intelligence and Communication Networks.
[212] Pedro Antonio Gutiérrez,et al. MELM-GRBF: A modified version of the extreme learning machine for generalized radial basis function neural networks , 2011, Neurocomputing.
[213] Kevin Fu,et al. They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.
[214] L. Pinto,et al. Pulmonary tuberculosis masquerading as community acquired pneumonia , 2011 .
[215] B. B. Meshram,et al. Content based video retrieval systems , 2012, ArXiv.
[216] Hassan Basri,et al. Solid waste bin level detection using gray level co-occurrence matrix feature extraction approach. , 2012, Journal of environmental management.
[217] Ying Wei,et al. A Fully Automatic Method for Lung Parenchyma Segmentation and Repairing , 2013, Journal of Digital Imaging.
[218] M. P. Parsai,et al. Different Image Fusion Techniques –A Critical Review , 2012 .
[219] Tim Menzies,et al. On the Value of Ensemble Effort Estimation , 2012, IEEE Transactions on Software Engineering.
[220] Hugues Bersini,et al. A Survey on Filter Techniques for Feature Selection in Gene Expression Microarray Analysis , 2012, IEEE/ACM Transactions on Computational Biology and Bioinformatics.
[221] Wentong Li,et al. Estimating conversion rate in display advertising from past erformance data , 2012, KDD.
[222] G. Geetha,et al. MULTIFOCUS IMAGE FUSION USING MULTIRESOLUTION APPROACH WITH BILATERAL GRADIENT BASED SHARPNESS CRITERION , 2012 .
[223] H. Rott,et al. Understanding Fiction: Knowledge and Meaning in Literature , 2012 .
[224] Chintan K. Modi,et al. NON-DESTRUCTIVE QUALITY ANALYSIS OF INDIAN GUJARAT-17 ORYZA SATIVA SSP INDICA(RICE) USING IMAGE PROCESSING , 2012 .
[225] Suleyman Gokhun Tanyer. The Cumulative Distribution Function for a finite data set , 2012, 2012 20th Signal Processing and Communications Applications Conference (SIU).
[226] John Berry,et al. Non-Latin scripts: from metal to digital type , 2012 .
[227] Yuting Su,et al. Detection of video transcoding for digital forensics , 2012, 2012 International Conference on Audio, Language and Image Processing.
[228] Tanupriya Choudhury,et al. An Approach to Improve Task Scheduling in a Decentralized Cloud Computing Environment , 2012 .
[229] Silvio Savarese,et al. Comparing image classification methods: K-nearest-neighbor and support-vector-machines , 2012 .
[230] G. Kirubavathi Venkatesh,et al. HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural Network , 2012, WISTP.
[231] S. Brunak,et al. Mining electronic health records: towards better research applications and clinical care , 2012, Nature Reviews Genetics.
[232] Kazuyuki Murase,et al. A new hybrid ant colony optimization algorithm for feature selection , 2012, Expert Syst. Appl..
[233] Yong Hu,et al. Systematic literature review of machine learning based software development effort estimation models , 2012, Inf. Softw. Technol..
[234] A. Dixit,et al. Need of Securing Migrating Crawling Agent , Remote Platform and the Data Collection , 2012 .
[235] Wang Rangding,et al. Classifying computer generated graphics and natural image based on image contour information , 2012 .
[236] Hong Zhu,et al. Unifying the Semantics of Models and Meta-Models in the Multi-Layered UML Meta-Modelling Hierarchy , 2012, Int. J. Softw. Informatics.
[237] Harish S. Gujjar,et al. A Method for Identification of Basmati Rice grain of India and Its Quality Using Pattern Classification , 2012 .
[238] Gary C. Kessler. Advancing the Science of Digital Forensics , 2012, Computer.
[239] Naomi Ehrich Leonard,et al. Towards optimization of a human-inspired heuristic for solving explore-exploit problems , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[240] Shinya Fukumoto,et al. Interactive 3D Animation System for Web3D , 2012, 2012 IEEE International Conference on Multimedia and Expo Workshops.
[241] Ch.Hima Bindu,et al. Performance Analysis Of Multi Source Fused Medical Images Using Multiresolution Transforms , 2012 .
[242] M. Turcsányi-Szabó,et al. Augmented Reality in Education , 2018, Handbook of Mobile Teaching and Learning.
[243] K. Gowen,et al. Young adults with mental health conditions and social networking websites: seeking tools to build community. , 2012, Psychiatric rehabilitation journal.
[244] V. K. Banga,et al. Grading Of Rice Grains By Image Processing , 2012 .
[245] Sulabha S. Apte,et al. Improved Study of Heart Disease Prediction System using Data Mining Classification Techniques , 2012 .
[246] Haiyan Wu,et al. A Clustering Method Based on K-Means Algorithm , 2012 .
[247] Janet Wiles,et al. Parameter-Free Search of Time-Series Discord , 2013, Journal of Computer Science and Technology.
[248] Attila Tanács,et al. Car recognition from frontal images in mobile environment , 2013, 2013 8th International Symposium on Image and Signal Processing and Analysis (ISPA).
[249] Pertti Saariluoma,et al. How user experience is understood? , 2013, 2013 Science and Information Conference.
[250] Mahmoud O. Elish. Assessment of voting ensemble for estimating software development effort , 2013, 2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM).
[251] Atul Kumar Pandey,et al. A Heart Disease Prediction Model Using Decision Tree , 2013 .
[252] Lauren E. Libero,et al. Identification of neural connectivity signatures of autism using machine learning , 2013, Front. Hum. Neurosci..
[253] Alberto Bacchelli,et al. Expectations, outcomes, and challenges of modern code review , 2013, 2013 35th International Conference on Software Engineering (ICSE).
[254] Harpreet Kaur,et al. Classification and Grading Rice Using Multi-Class SVM , 2013 .
[255] Indah Soesanti,et al. Computer Aided Diagnosis for lung tuberculosis identification based on thoracic X-ray , 2013, 2013 International Conference on Information Technology and Electrical Engineering (ICITEE).
[256] L. D. Dhinesh Babu,et al. Honey bee behavior inspired load balancing of tasks in cloud computing environments , 2013, Appl. Soft Comput..
[257] Michael Braun,et al. Online Display Advertising: Modeling the Effects of Multiple Creatives and Individual Impression Histories , 2013, Mark. Sci..
[258] C. Luo,et al. Application of SARIMA Model in Cucumber Price Forecast , 2013, ICRA 2013.
[259] S. Mohamed Mansoor Roomi,et al. A Review of Face Recognition Methods , 2013, Int. J. Pattern Recognit. Artif. Intell..
[260] Arun Prakash Agrawal,et al. Comparative analysis of Relational and Graph databases , 2013 .
[261] Kousik Dasgupta,et al. A Genetic Algorithm (GA) based Load Balancing Strategy for Cloud Computing , 2013 .
[262] Shannon Marcoon,et al. HEART score to further risk stratify patients with low TIMI scores. , 2013, Critical pathways in cardiology.
[263] William W. Cohen,et al. Natural Language Models for Predicting Programming Comments , 2013, ACL.
[264] Cheng-Chi Lee,et al. Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks , 2013, Multimedia Systems.
[265] Leonor Teixeira,et al. Software Effort Estimation with Multiple Linear Regression: Review and Practical Application , 2013, J. Inf. Sci. Eng..
[266] A. Wierzbicka. Imprisoned in English: The Hazards of English as a Default Language , 2013 .
[267] Andrzej Glowacz,et al. The efficient real- and non-real-time make and model recognition of cars , 2013, Multimedia Tools and Applications.
[268] Arputharaj Kannan,et al. Intelligent feature selection and classification techniques for intrusion detection in networks: a survey , 2013, EURASIP Journal on Wireless Communications and Networking.
[269] D. S. Bedi,et al. Image Fusion Techniques and Quality Assessment Parameters for Clinical Diagnosis: A Review , 2013 .
[270] Alimuddin Zumla,et al. WHO's 2013 global report on tuberculosis: successes, threats, and opportunities , 2013, The Lancet.
[271] Wei Lu,et al. Mining Botnet Behaviors on the Large-Scale Web Application Community , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.
[272] Ben Shneiderman,et al. Designing The User Interface , 2013 .
[273] Huaikou Miao,et al. A Selenium based approach to automatic test script generation for refactoring JavaScript code , 2013, 2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS).
[274] Dhanashree S. Medhekar,et al. Heart Disease Prediction System using Naive Bayes , 2013 .
[275] Nikhilesh Dholakia,et al. Virtuality as place and process , 2013 .
[276] Chris Piech,et al. Deconstructing disengagement: analyzing learner subpopulations in massive open online courses , 2013, LAK '13.
[277] Helmut Krcmar,et al. Big Data , 2014, Wirtschaftsinf..
[278] Jugal K. Kalita,et al. MIFS-ND: A mutual information-based feature selection method , 2014, Expert Syst. Appl..
[279] Yuan Wang,et al. Modeling and Application Research on Customer Churn Warning System Based in Big Data Era , 2014, MUE 2014.
[280] Anand Singh Jalal,et al. A framework for key frame extraction from surveillance video , 2014, 2014 International Conference on Computer and Communication Technology (ICCCT).
[281] Amit Chhabra,et al. Improved J48 Classification Algorithm for the Prediction of Diabetes , 2014 .
[282] Niels Pinkwart,et al. Predicting MOOC Dropout over Weeks Using Machine Learning Methods , 2014, EMNLP 2014.
[283] Abdolreza Hatamlou,et al. Heart: a novel optimization algorithm for cluster analysis , 2014, Progress in Artificial Intelligence.
[284] Bhagyashree Subhash Mahale,et al. Rice quality analysis using image processing techniques , 2014, International Conference for Convergence for Technology-2014.
[285] Andrew P. Martin,et al. Threat-Based Security Analysis for the Internet of Things , 2014, 2014 International Workshop on Secure Internet of Things.
[286] D. Bates,et al. Big data in health care: using analytics to identify and manage high-risk and high-cost patients. , 2014, Health affairs.
[287] Zety Marlia Zainal Abidin,et al. Face recognition for security efficiency in managing and monitoring visitors of an organization , 2014, 2014 International Symposium on Biometrics and Security Technologies (ISBAST).
[288] Domagoj Vrgoc,et al. Querying Graphs with Data , 2016, J. ACM.
[289] Nishu Singla. Motion Detection Based on Frame Difference Method , 2014 .
[290] Gediminas Adomavicius,et al. Data mining for censored time-to-event data: a Bayesian network model for predicting cardiovascular risk from electronic health record data , 2014, Data Mining and Knowledge Discovery.
[291] Hussein Zedan,et al. A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..
[292] Ferat Sahin,et al. A survey on feature selection methods , 2014, Comput. Electr. Eng..
[293] Yogesh V. Joshi,et al. Attributing Conversions in a Multichannel Online Marketing Environment : An Empirical Model and a Field Experiment , 2014 .
[294] Jinan Fiaidhi,et al. The Next Step for Learning Analytics , 2014, IT Prof..
[295] Y. Kurucu,et al. Crop Type Classification Using Vegetation Indices of RapidEye Imagery , 2014 .
[296] Muhammad Fraz,et al. Mid-level-Representation Based Lexicon for Vehicle Make and Model Recognition , 2014, 2014 22nd International Conference on Pattern Recognition.
[297] G. Elwyn,et al. Naturally Occurring Peer Support through Social Media: The Experiences of Individuals with Severe Mental Illness Using YouTube , 2014, PloS one.
[298] Witold Pedrycz,et al. Human-Centric Decision-Making Models for Social Sciences , 2013, Human-Centric Decision-Making Models for Social Sciences.
[299] Morteza Nikooghadam,et al. Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems , 2014, Journal of Medical Systems.
[300] Megha R. Siddagangappa,et al. Classification and Quality Analysis of Food Grains , 2014 .
[301] Sundaresan Jayaraman,et al. Wearables: Fundamentals, advancements, and a roadmap for the future , 2021, Wearable Sensors.
[302] Noor Christoph,et al. Augmented reality in medical education? , 2014, Perspectives on Medical Education.
[303] Phayung Meesad,et al. Fast K-Means Clustering for Very Large Datasets Based on MapReduce Combined with a New Cutting Method , 2014, KSE.
[304] K. Pramod,et al. Soft Computing Models for the Predictive Grading of Childhood Autism- A Comparative Study , 2014 .
[305] P. Lambin,et al. Decoding tumour phenotype by noninvasive imaging using a quantitative radiomics approach , 2014, Nature Communications.
[306] Aderemi Oluyinka Adewumi,et al. Stock Price Prediction Using the ARIMA Model , 2014, 2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation.
[307] Clement J. McDonald,et al. Automatic Tuberculosis Screening Using Chest Radiographs , 2014, IEEE Transactions on Medical Imaging.
[308] David Schwartz,et al. The Ripple Protocol Consensus Algorithm , 2014 .
[309] Diana Göhringer,et al. Using JSON to manage communication between services in the Internet of Things , 2014, 2014 9th International Symposium on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC).
[310] Ran Bi. Effects of typographic variables on attitude measures in reading bilingual brands , 2014 .
[311] K. L. Shunmuganathan,et al. Overview of mobile agent security issues — Solutions , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).
[312] Quoc V. Le,et al. Sequence to Sequence Learning with Neural Networks , 2014, NIPS.
[313] Antonio Pescapè,et al. On the Integration of Cloud Computing and Internet of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.
[314] Sukhvir Kaur,et al. Quality Analysis of Indian Basmati Rice Grains Using Digital Image Processing-A Review , 2014 .
[315] John R. Schott,et al. Landsat-8 Thermal Infrared Sensor (TIRS) Vicarious Radiometric Calibration , 2014, Remote. Sens..
[316] Sung Bum Pan,et al. Automatic lung segmentation for large-scale medical image management , 2016, Multimedia Tools and Applications.
[317] Weizhong Zhao,et al. Topic modeling for cluster analysis of large biological and medical datasets , 2014, BMC Bioinformatics.
[318] Yu-Gang Jiang,et al. A relative similarity based method for interactive patient risk prediction , 2014, Data Mining and Knowledge Discovery.
[319] Alejandro Zunino,et al. An empirical comparison of botnet detection methods , 2014, Comput. Secur..
[320] Rui Zheng,et al. Quick search algorithms based on ethnic facial image database , 2014, 2014 IEEE 5th International Conference on Software Engineering and Service Science.
[321] Zahir Tari,et al. A Survey of Clustering Algorithms for Big Data: Taxonomy and Empirical Analysis , 2014, IEEE Transactions on Emerging Topics in Computing.
[322] S. P. Ghrera,et al. Pixel-Based Image Forgery Detection: A Review , 2014 .
[323] Amit Yerpude,et al. Classification of Basmati Rice Grain Variety using Image Processing and Principal Component Analysis , 2014, ArXiv.
[324] S Abirami.,et al. Analysis of Rice Granules using Image Processing and Neural Network Pattern Recognition Tool , 2014 .
[325] Ryan S. Baker,et al. Educational Data Mining and Learning Analytics , 2014 .
[326] A. Daif,et al. Review current CRM architectures and introducing new adapted architecture to Big Data , 2015, 2015 International Conference on Computing, Communication and Security (ICCCS).
[327] Wenpeng Yin,et al. Convolutional Neural Network for Paraphrase Identification , 2015, NAACL.
[328] Prateek Pandey,et al. A fuzzy decision making approach for analogy detection in new product forecasting , 2015, J. Intell. Fuzzy Syst..
[329] M. Tech. Review on Existing Load Balancing Techniques of Cloud Computing , 2015 .
[330] Girish N. Nadkarni,et al. Incorporating temporal EHR data in predictive models for risk stratification of renal function deterioration , 2014, J. Biomed. Informatics.
[331] Ikechukwu Nwobodo. Cloud Computing: A Detailed Relationship to Grid and Cluster Computing , 2015 .
[332] Dit-Yan Yeung,et al. Temporal Models for Predicting Student Dropout in Massive Open Online Courses , 2015, 2015 IEEE International Conference on Data Mining Workshop (ICDMW).
[333] Jina Varghese,et al. An Algorithmic Approach for General Video Summarization , 2015, 2015 Fifth International Conference on Advances in Computing and Communications (ICACC).
[334] Gautam Bandyopadhyay,et al. Gold Price Forecasting Using ARIMA Model , 2015 .
[335] Yifei Zhang,et al. A novel approach of lung segmentation on chest CT images using graph cuts , 2015, Neurocomputing.
[336] Luis Miguel Bergasa,et al. Expert video-surveillance system for real-time detection of suspicious behaviors in shopping malls , 2015, Expert Syst. Appl..
[337] Thomas Brox,et al. U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.
[338] Abhay Kumar Singh,et al. A survey on congestion control mechanisms in packet switch networks , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.
[339] Kang Li,et al. Big data gathering and mining pipelines for CRM using open-source , 2015, 2015 IEEE International Conference on Big Data (Big Data).
[340] James Bailey,et al. Identifying At-Risk Students in Massive Open Online Courses , 2015, AAAI.
[341] El-Sayed M. El-Horbaty,et al. Intelligent cloud algorithms for load balancing problems: A survey , 2015, 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS).
[342] Jasjit S. Suri,et al. Automatic Lung Segmentation Using Control Feedback System: Morphology and Texture Paradigm , 2015, Journal of Medical Systems.
[343] Rahul Kumar,et al. Footprint Recognition with Principal Component Analysis and Independent Component Analysis , 2015 .
[344] Kayvan Najarian,et al. Big Data Analytics in Healthcare , 2015, BioMed research international.
[345] Sadique Sheik,et al. Reservoir computing compensates slow response of chemosensor arrays exposed to fast varying gas concentrations in continuous monitoring , 2015 .
[346] Sridha Sridharan,et al. An Efficient and Robust System for Multiperson Event Detection in Real-World Indoor Surveillance Scenes , 2015, IEEE Transactions on Circuits and Systems for Video Technology.
[347] A. Aditya,et al. A Comparative Study of Different Static and Dynamic Load Balancing Algorithm in Cloud Computing with Special Emphasis on Time Factor , 2015 .
[348] Hai-Cheng Chu,et al. The Cooperation Mechanism of Multi-agent Systems with Respect to Big Data from Customer Relationship Management Aspect , 2015, ACIIDS.
[349] Lei Zhu,et al. Parallel Key Frame Extraction for Surveillance Video Service in a Smart City , 2015, PloS one.
[350] Mahdi Fazeli,et al. Proposing a load balancing method based on Cuckoo Optimization Algorithm for energy management in cloud computing infrastructures , 2015, 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO).
[351] R. A. Karthika. PROVIDING PASSWORD SECURITY BY SALTED PASSWORD HASHING USING BCRYPT ALGORITHM , 2015 .
[352] M. P. Rajath Kumar,et al. Artificial neural networks for face recognition using PCA and BPNN , 2015, TENCON 2015 - 2015 IEEE Region 10 Conference.
[353] Khaled Ghédira,et al. th International Conference on Knowledge Based and Intelligent Information and Engineering Systems Agent ’ s security during communication in mobile agents system , 2015 .
[354] Abdelaziz El Fazziki,et al. Social intelligence framework: Extracting and analyzing opinions for social CRM , 2015, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).
[355] Yong Tang,et al. Vehicle detection and recognition for intelligent traffic surveillance system , 2017, Multimedia Tools and Applications.
[356] Tianqi Chen,et al. Empirical Evaluation of Rectified Activations in Convolutional Network , 2015, ArXiv.
[357] Mudita Singhal,et al. Supervised and Unsupervised methods to detect Insider Threat from Enterprise Social and Online Activity Data , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[358] R. Agarwal,et al. WASTE MANAGEMENT INITIATIVES IN INDIA FOR HUMAN WELL BEING , 2015 .
[359] R.Priya nka. Face Recognition Based on Principal Component Analysis and Linear Discriminant Analysis , 2015 .
[360] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[361] Gerd Gigerenzer,et al. The power of simplicity: a fast-and-frugal heuristics approach to performance science , 2015, Front. Psychol..
[362] C. K. Kumbharana,et al. Identification of Best Suitable Samples for Training Database for Face Recognition using Principal Component Analysis with Eigenface Method , 2015 .
[363] Daxin Tian,et al. A Dynamic and Self-Adaptive Network Selection Method for Multimode Communications in Heterogeneous Vehicular Telematics , 2015, IEEE Transactions on Intelligent Transportation Systems.
[364] Yier Jin,et al. Privacy and Security in Internet of Things and Wearable Devices , 2015, IEEE Transactions on Multi-Scale Computing Systems.
[365] O. Kuznetsov. Conceptual semantics , 2015, Scientific and Technical Information Processing.
[366] Yu Zhang,et al. An IoT electric business model based on the protocol of bitcoin , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.
[367] D. Mollura,et al. Segmentation and Image Analysis of Abnormal Lungs at CT: Current Approaches, Challenges, and Future Trends. , 2015, Radiographics : a review publication of the Radiological Society of North America, Inc.
[368] D. Wall,et al. Searching for a minimal set of behaviors for autism detection through feature selection-based machine learning , 2015, Translational Psychiatry.
[369] Ying LU,et al. Decision tree methods: applications for classification and prediction , 2015, Shanghai archives of psychiatry.
[370] Karamjit Bhatia,et al. Future of Face Recognition: A Review , 2015 .
[371] Bram van Ginneken,et al. Pulmonary Nodule Detection in CT Images: False Positive Reduction Using Multi-View Convolutional Networks , 2016, IEEE Transactions on Medical Imaging.
[372] Sakir Sezer,et al. N-opcode analysis for android malware classification and categorization , 2016, 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security).
[373] Reza Malekian,et al. A novel and secure IoT based cloud centric architecture to perform predictive analysis of users activities in sustainable health centres , 2017, Multimedia Tools and Applications.
[374] Shabnam Sharma,et al. Review of recent load balancing techniques in cloud computing and BAT algorithm variants , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).
[375] K. Zubair. The Rise and Decline of ArabuTamil Language for Tamil Muslims , 2016 .
[376] Mohammad Havaei,et al. HeMIS: Hetero-Modal Image Segmentation , 2016, MICCAI.
[377] F. Olleros,et al. Research Handbook on Digital Transformations , 2016 .
[378] Suad Alhojely,et al. Sentiment Analysis and Opinion Mining: A Survey , 2016 .
[379] Simant Prakoonwit,et al. Car make and model recognition under limited lighting conditions at night , 2017, Pattern Analysis and Applications.
[380] Abhirup Khanna,et al. Intelligent supply chain management system , 2016, 2016 International Conference on Advances in Computing and Communication Engineering (ICACCE).
[381] Tianqi Chen,et al. XGBoost: A Scalable Tree Boosting System , 2016, KDD.
[382] Sathiamoorthy Manoharan,et al. A Collaborative Code Review Platform for GitHub , 2016, 2016 21st International Conference on Engineering of Complex Computer Systems (ICECCS).
[383] Archana A. Savalgi,et al. Laplace Transformation based Cryptographic Technique in Network Security , 2016 .
[384] Matthias Mettler,et al. Blockchain technology in healthcare: The revolution starts here , 2016, 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom).
[385] Mohammad Hossein Moattar,et al. Robust Feature Selection from Microarray Data Based on Cooperative Game Theory and Qualitative Mutual Information , 2016, Adv. Bioinformatics.
[386] Luyao Xu,et al. Big Data Analytics toward Intelligent Mobile Service Provisions of Customer Relationship Management in e-Commerce , 2016 .
[387] Arun Sam Singh Selwyn Jebaraj. Implementing Electronic Health Records in New Zealand : A Critical Appraisal of Literature , 2016 .
[388] Jacob Y. H. Jou,et al. Cross-Language Comparison of the Persuasive Effects of Typeface Shapes: A Conceptual Framework , 2016 .
[389] IV CyrilHöschl,et al. Recognition of Images Degraded by Gaussian Blur , 2016, IEEE Transactions on Image Processing.
[390] George E. Sakr,et al. Comparing deep learning and support vector machines for autonomous waste sorting , 2016, 2016 IEEE International Multidisciplinary Conference on Engineering Technology (IMCET).
[391] Wolfgang Wahlster,et al. New Horizons for a Data-Driven Economy , 2016, Springer International Publishing.
[392] Dian Anggraini,et al. Comparison of accuracy level K-Nearest Neighbor algorithm and Support Vector Machine algorithm in classification water quality status , 2016, 2016 6th International Conference on System Engineering and Technology (ICSET).
[393] D. Barton,et al. Depression and the Link with Cardiovascular Disease , 2016, Front. Psychiatry.
[394] Keke Gai,et al. Optimal Big Data Sharing Approach for Tele-Health in Cloud Computing , 2016, 2016 IEEE International Conference on Smart Cloud (SmartCloud).
[395] Sebastian Ruder,et al. An overview of gradient descent optimization algorithms , 2016, Vestnik komp'iuternykh i informatsionnykh tekhnologii.
[396] Martin White,et al. Deep learning code fragments for code clone detection , 2016, 2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE).
[397] Ching-Hsien Hsu,et al. Efficient identity authentication and encryption technique for high throughput RFID system , 2016, Secur. Commun. Networks.
[398] Ammi Reddy Pulagam,et al. Automated Lung Segmentation from HRCT Scans with Diffuse Parenchymal Lung Diseases , 2016, Journal of Digital Imaging.
[399] Bhed Bahadur Bista. Improving Energy Consumption of Epidemic Routing in Delay Tolerant Networks , 2016, 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).
[400] Zhongfei Zhang,et al. DeepIntent: Learning Attentions for Online Advertising with Recurrent Neural Networks , 2016, KDD.
[401] Kem Z. K. Zhang,et al. Blockchain-based sharing services: What blockchain technology can contribute to smart cities , 2016, Financial Innovation.
[402] Andrew N. Smith,et al. Augmented Reality: Designing Immersive Experiences that Maximize Consumer Engagement , 2016 .
[403] Min Chen,et al. Smart Clothing: Connecting Human with Clouds and Big Data for Sustainable Health Monitoring , 2016, Mobile Networks and Applications.
[404] D. Wall,et al. Use of machine learning for behavioral distinction of autism and ADHD , 2016, Translational Psychiatry.
[405] Dan Wang,et al. TDS: Time-dependent sponsored data plan for wireless data traffic market , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[406] Ke Zhang,et al. 2016 Ieee International Conference on Big Data (big Data) Automated It System Failure Prediction: a Deep Learning Approach , 2022 .
[407] Prakash Veeraraghavan,et al. Elliptic Curve Based Cybersecurity Schemes for Publish-Subscribe Internet of Things , 2016, QSHINE.
[408] Tanupriya Choudhury,et al. Fog computing: Common security issues and proposed countermeasures , 2016, 2016 International Conference System Modeling & Advancement in Research Trends (SMART).
[409] Artde Donald Kin-Tak Lam,et al. A study on experimental teaching of 3D animation , 2016, 2016 International Conference on Applied System Innovation (ICASI).
[410] R. Chalmeta,et al. Social customer relationship management: taking advantage of Web 2.0 and Big Data technologies , 2016, SpringerPlus.
[411] Amir Dirin,et al. From Usability to User Experience in Mobile Learning Applications , 2016 .
[412] Alec Wolman,et al. MCDNN: An Approximation-Based Execution Framework for Deep Stream Processing Under Resource Constraints , 2016, MobiSys.
[413] Amarsinh Vidhate,et al. Routing in Delay Tolerant Network , 2016 .
[414] Divya Meena,et al. An approach to face detection and recognition , 2016, 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE).
[415] Piotr Zabawa. Context-Driven Meta-Modeling framework (CDMM-F) ‒ context role , 2016 .
[416] Rahul Telang,et al. What Is a Digital Cookie Worth , 2016 .
[417] Andrew Lippman,et al. MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).
[418] Antonio Pescapè,et al. Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..
[419] Russell Greiner,et al. Using Functional or Structural Magnetic Resonance Images and Personal Characteristic Data to Identify ADHD and Autism , 2016, PloS one.
[420] John J. Nay,et al. Application of machine learning to the prediction of vegetation health , 2016 .
[421] M. Anusha,et al. Big Data-Survey , 2016 .
[422] Xudong Ma,et al. Dynamic Android Malware Classification Using Graph-Based Representations , 2016, 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud).
[423] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[424] Muhammad Suryanegara,et al. Heart disease prediction system using k-Nearest neighbor algorithm with simplified patient's health parameters , 2016 .
[425] Siti Zuraida Maaruf,et al. Interactive Visual Art Education Pedagogical Module: Typography in Visual Communication , 2016 .
[426] Tamara Radivilova,et al. Dynamic load balancing algorithm of distributed systems , 2016, 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET).
[427] Kursat Cagiltay,et al. How Serif and Sans Serif Typefaces Influence Reading on Screen: An Eye Tracking Study , 2016, HCI.
[428] Min Chen,et al. Enhanced Fingerprinting and Trajectory Prediction for IoT Localization in Smart Buildings , 2016, IEEE Transactions on Automation Science and Engineering.
[429] Qiaoyan Wen,et al. A multi-level feature extraction technique to detect moble botnet , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).
[430] Xiao Hu,et al. Comparing machine learning clustering with latent class analysis on cancer symptoms' data , 2016, 2016 IEEE Healthcare Innovation Point-Of-Care Technologies Conference (HI-POCT).
[431] Abdelaziz El Fazziki,et al. Multi-agent framework for social CRM: Extracting and analyzing opinions , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).
[432] Abhirup Khanna,et al. Mobile cloud computing architecture for computation offloading , 2016, 2016 2nd International Conference on Next Generation Computing Technologies (NGCT).
[433] C. Helen Sulochana,et al. Automatic detection of pulmonary tuberculosis using image processing techniques , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[434] Takuya Sakamoto,et al. Fast imaging method for security systems using ultrawideband radar , 2016, IEEE Transactions on Aerospace and Electronic Systems.
[435] Anthony Skjellum,et al. A brief survey of Cryptocurrency systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[436] S. Sudha,et al. An automatic classification method for environment: Friendly waste segregation using deep learning , 2016, 2016 IEEE Technological Innovations in ICT for Agriculture and Rural Development (TIAR).
[437] Bowen Zhou,et al. Abstractive Text Summarization using Sequence-to-sequence RNNs and Beyond , 2016, CoNLL.
[438] Yeshvendra K. Singh,et al. Heart Disease Prediction System Using Random Forest , 2016 .
[439] Shazwani A. Nur,et al. Vehicle detection based on underneath vehicle shadow using edge features , 2016, 2016 6th IEEE International Conference on Control System, Computing and Engineering (ICCSCE).
[440] Ong Sing Goh,et al. A Review on Automatic Text Summarization Approaches , 2016, J. Comput. Sci..
[441] Ian Thomas. Using multi-armed bandit experimentation to optimise multichannel digital marketing campaigns , 2017 .
[442] Ronald M. Summers,et al. ChestX-ray: Hospital-Scale Chest X-ray Database and Benchmarks on Weakly Supervised Classification and Localization of Common Thorax Diseases , 2019, Deep Learning and Convolutional Neural Networks for Medical Imaging and Clinical Informatics.
[443] Qi Xia,et al. BBDS: Blockchain-Based Data Sharing for Electronic Medical Records in Cloud Environments , 2017, Inf..
[444] Nareli Cruz Cortés,et al. Feature selection to detect botnets using machine learning algorithms , 2017, 2017 International Conference on Electronics, Communications and Computers (CONIELECOMP).
[445] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..
[446] Meikang Qiu,et al. Enabling real-time information service on telehealth system over cloud-based big data platform , 2017, J. Syst. Archit..
[447] Bayu Adhi Tama,et al. Tree-based classifier ensembles for early detection method of diabetes: an exploratory study , 2019, Artificial Intelligence Review.
[448] Raphaël Féraud,et al. The non-stationary stochastic multi-armed bandit problem , 2017, International Journal of Data Science and Analytics.
[449] José Ramón Saura,et al. Understanding the Digital Marketing Environment with KPIs and Web Analytics , 2017, Future Internet.
[450] Luke Church,et al. Modern Code Review: A Case Study at Google , 2017, 2018 IEEE/ACM 40th International Conference on Software Engineering: Software Engineering in Practice Track (ICSE-SEIP).
[451] Jacob Whitehill,et al. MOOC Dropout Prediction: How to Measure Accuracy? , 2017, L@S.
[452] Anindya Iqbal,et al. SentiCR: A customized sentiment analysis tool for code review interactions , 2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[453] Junfeng Chen,et al. Global optimal hybrid geometric active contour for automated lung segmentation on CT images , 2017, Comput. Biol. Medicine.
[454] S. Giddings,et al. Miliary Tuberculosis Presenting with ARDS and Shock: A Case Report and Challenges in Current Management and Diagnosis , 2017, Case reports in critical care.
[455] Naveen K. Chilamkurti,et al. Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing , 2017, Mobile Networks and Applications.
[456] Maruf Pasha,et al. Survey of Machine Learning Algorithms for Disease Diagnostic , 2017 .
[457] Z. Obermeyer,et al. Individual differences in normal body temperature: longitudinal big data analysis of patient records , 2017, British Medical Journal.
[458] Sergey Gorinsky,et al. An advertising revenue model for access ISPs , 2017, 2017 IEEE Symposium on Computers and Communications (ISCC).
[459] Rawya Rizk,et al. Honey Bee Based Load Balancing in Cloud Computing , 2017, KSII Trans. Internet Inf. Syst..
[460] Philippe Dobbelaere,et al. Kafka versus RabbitMQ: A comparative study of two industry reference publish/subscribe implementations: Industry Paper , 2017, DEBS.
[461] Kilian Q. Weinberger,et al. Densely Connected Convolutional Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[462] Alexander Kraas,et al. On the Automated Derivation of Domain-Specific UML Profiles , 2017, ECMFA.
[463] Priya Rajendra Patil,et al. Automated Diagnosis of Heart Disease using Data Mining Techniques , 2017 .
[464] Vipin Tyagi,et al. Predictive Computing and Information Security , 2017, Springer Singapore.
[465] Jean-Philippe Thiran,et al. A Computer Vision System to Localize and Classify Wastes on the Streets , 2017, ICVS.
[466] Yun Sing Koh,et al. A Survey of Sequential Pattern Mining , 2017 .
[467] Tarek F. Abdelzaher,et al. DeepIoT: Compressing Deep Neural Network Structures for Sensing Systems with a Compressor-Critic Framework , 2017, SenSys.
[468] P. Deepalakshmi,et al. Server-based Dynamic Load Balancing , 2017, 2017 International Conference on Networks & Advances in Computational Technologies (NetACT).
[469] Mung Chiang,et al. Behavior-Based Grade Prediction for MOOCs Via Time Series Neural Networks , 2017, IEEE Journal of Selected Topics in Signal Processing.
[470] Min Chen,et al. Wearable 2.0: Enabling Human-Cloud Integration in Next Generation Healthcare Systems , 2017, IEEE Communications Magazine.
[471] Bram van den Bekerom. Using Machine Learning for Detection of Autism Spectrum Disorder , 2017 .
[472] Pāvels Gončarovs,et al. Data Analytics in CRM Processes: A Literature Review , 2017 .
[473] H. K. Homood. Lagrange Interpolation for Mobile Agent Connection Encryption , 2017 .
[474] Ali Farhadi,et al. YOLO9000: Better, Faster, Stronger , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[475] Monisha Singh,et al. Comparative Study of Open Source Automated Web Testing Tools: Selenium and Sahi , 2017 .
[476] Stathes Hadjiefthymiades,et al. Challenges and Opportunities of Waste Management in IoT-Enabled Smart Cities: A Survey , 2017, IEEE Transactions on Sustainable Computing.
[477] Dhanaraj Cheelu,et al. A comparative study of static and dynamic load balancing algorithms in cloud computing , 2017, 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS).
[478] Mohammad Rezaul Karim. Security for Mobile Agents and Platforms: Securing the Code and Protecting its Integrity , 2017 .
[479] Athanasios V. Vasilakos,et al. A Manufacturing Big Data Solution for Active Preventive Maintenance , 2017, IEEE Transactions on Industrial Informatics.
[480] Jacob Whitehill,et al. Delving Deeper into MOOC Student Dropout Prediction , 2017, ArXiv.
[481] Athanasios K. Tsakalidis,et al. Graph Community Discovery Algorithms in Neo4j with a Regularization-based Evaluation Metric , 2017, WEBIST.
[482] J. Rexce,et al. Classification of Milled Rice Using Image Processing , 2017 .
[483] Tanupriya Choudhury,et al. KAFKA: The modern platform for data management and analysis in big data domain , 2017, 2017 2nd International Conference on Telecommunication and Networks (TEL-NET).
[484] Ki-Il Kim,et al. A Survey on Real-Time Communications in Wireless Sensor Networks , 2017, Wirel. Commun. Mob. Comput..
[485] Adam Doupé,et al. Deep Android Malware Detection , 2017, CODASPY.
[486] Michal Madera,et al. A case study on machine learning model for code review expert system in software engineering , 2017, 2017 Federated Conference on Computer Science and Information Systems (FedCSIS).
[487] M. Shamim Hossain,et al. Localization Based on Social Big Data Analysis in the Vehicular Networks , 2017, IEEE Transactions on Industrial Informatics.
[488] Zachary A. Pardos,et al. Predictive Modelling of Student Behavior Using Granular Large-Scale Action Data , 2017 .
[489] S. Hollon,et al. The Healthy Activity Program (HAP), a lay counsellor-delivered brief psychological treatment for severe depression, in primary care in India: a randomised controlled trial , 2017, The Lancet.
[490] Taku Yamazaki,et al. PRIOR: Prioritized Forwarding for Opportunistic Routing , 2017, IEICE Trans. Commun..
[491] Waqar Mehmood,et al. Risk Aware and Quality Enriched Effort Estimation for Mobile Applications in Distributed Agile Software Development , 2017, J. Inf. Sci. Eng..
[492] Jan K. Woike,et al. FFTrees: A toolbox to create, visualize, and evaluate fast-and-frugal decision trees , 2017, Judgment and Decision Making.
[493] Amit Agarwal,et al. Adaptive mobile computation offloading for data stream applications , 2017, 2017 3rd International Conference on Advances in Computing,Communication & Automation (ICACCA) (Fall).
[494] Janis Grabis,et al. Using Data Analytics for Continuous Improvement of CRM Processes: Case of Financial Institution , 2017, ADBIS.
[495] Gaurav Pahwa,et al. Code review analysis of software system using machine learning techniques , 2017, 2017 11th International Conference on Intelligent Systems and Control (ISCO).
[496] Pablo Padilla,et al. Electromagnetic Near-Field Inhomogeneity Reduction for Image Acquisition Optimization in High-Resolution Multi-Channel Magnetic Resonance Imaging (MRI) Systems , 2017, IEEE Access.
[497] Ye Yu,et al. A Vehicle Logo Recognition Approach Based on Foreground-Background Pixel-Pair Feature , 2017, Trans. Edutainment.
[498] Jun Wang,et al. Display Advertising with Real-Time Bidding (RTB) and Behavioural Targeting , 2016, Found. Trends Inf. Retr..
[499] Andy Laws,et al. Machine learning approaches to predict learning outcomes in Massive open online courses , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).
[500] Abhishek Rairikar,et al. Heart disease prediction using data mining techniques , 2017, 2017 International Conference on Intelligent Computing and Control (I2C2).
[501] Rajesh Krishna Balan,et al. DeepMon: Mobile GPU-based Deep Learning Framework for Continuous Vision Applications , 2017, MobiSys.
[502] S. French,et al. Decision trees in epidemiological research , 2017, Emerging Themes in Epidemiology.
[503] Gianluca Stringhini,et al. Marmite: Spreading Malicious File Reputation Through Download Graphs , 2017, ACSAC.
[504] Mikko Valkama,et al. Wireless Energy Harvesting and Communications: Limits and Reliability , 2017, 2017 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).
[505] Abhishek Sharma,et al. Detection of pneumonia clouds in chest X-ray using image processing approach , 2017, 2017 Nirma University International Conference on Engineering (NUiCONE).
[506] Dusit Niyato,et al. A Hierarchical Game with Strategy Evolution for Mobile Sponsored Content/Service Markets , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[507] V. Cherian. Heart Disease Prediction Using Naïve Bayes Algorithm and Laplace Smoothing Technique , 2017 .
[508] Baofeng Su,et al. Significant Remote Sensing Vegetation Indices: A Review of Developments and Applications , 2017, J. Sensors.
[509] Seng Cheong Loke. Astronomical Image Acquisition Using an Improved Track and Accumulate Method , 2017, IEEE Access.
[510] Markus Kraft,et al. Blockchain technology in the chemical industry: Machine-to-machine electricity market , 2017 .
[511] Annamária R. Várkonyi-Kóczy,et al. A Load Balancing Algorithm for Resource Allocation in Cloud Computing , 2017 .
[512] Qi Dou. Multi-level Contextual 3D CNNs for False Positive Reduction in Pulmonary Nodule Detection , 2017 .
[513] V. Patel. Talking sensibly about depression , 2017, PLoS medicine.
[514] Min Chen,et al. Big-Data Analytics for Cloud, IoT and Cognitive Computing , 2017 .
[515] Jiangtao Wen,et al. The IoT electric business model: Using blockchain technology for the internet of things , 2016, Peer-to-Peer Networking and Applications.
[516] Luiz Sergio de Souza,et al. Total Data Quality Management and Total Information Quality Management Applied to Costumer Relationship Management , 2017, ICIME 2017.
[517] Min Chen,et al. Emotion Communication System , 2017, IEEE Access.
[518] Patricia Lago,et al. Research on Architecting Microservices: Trends, Focus, and Potential for Industrial Adoption , 2017, 2017 IEEE International Conference on Software Architecture (ICSA).
[519] Radha Poovendran,et al. Google's Cloud Vision API is Not Robust to Noise , 2017, 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA).
[520] Feifei Li,et al. DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning , 2017, CCS.
[521] M. Nikhil Kumar,et al. Prediction of Heart Diseases Using Data Mining and Machine Learning Algorithms and Tools , 2018 .
[522] Seyed Morteza Babamir,et al. A PSO‐based task scheduling algorithm improved using a load‐balancing technique for the cloud computing environment , 2018, Concurr. Comput. Pract. Exp..
[523] Siddharth Swarup Rautaray,et al. Assessment of Object Detection Using Deep Convolutional Neural Networks , 2018 .
[524] Ravi Tomar,et al. An Architectural View Towards Autonomic Cloud Computing , 2018 .
[525] Parth Jajoo,et al. Smart Garbage Management System , 2018, 2018 International Conference on Smart City and Emerging Technology (ICSCET).
[526] Usha Devi Gandhi,et al. A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of heart diseases , 2017, Comput. Electr. Eng..
[527] W.K.R. Perera,et al. A Review of Big Data Analytics for Customer Relationship Management , 2018, 2018 3rd International Conference on Information Technology Research (ICITR).
[528] Russell Greiner,et al. A general prediction model for the detection of ADHD and Autism using structural and functional MRI , 2018, PloS one.
[529] Paramvir Bahl,et al. VideoEdge: Processing Camera Streams using Hierarchical Clusters , 2018, 2018 IEEE/ACM Symposium on Edge Computing (SEC).
[530] Tingting Yu,et al. Logics for Bisimulation and Divergence , 2018, FoSSaCS.
[531] Xinghao Jiang,et al. Computer Graphics Identification Combining Convolutional and Recurrent Neural Networks , 2018, IEEE Signal Processing Letters.
[532] Bohdan Pavlyshenko,et al. Using Stacking Approaches for Machine Learning Models , 2018, 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP).
[533] Michail N. Giannakos,et al. Big data analytics capabilities: a systematic literature review and research agenda , 2017, Information Systems and e-Business Management.
[534] Cenk Bircanoglu,et al. RecycleNet: Intelligent Waste Sorting Using Deep Neural Networks , 2018, 2018 Innovations in Intelligent Systems and Applications (INISTA).
[535] Lili He,et al. A Novel Transfer Learning Approach to Enhance Deep Neural Network Classification of Brain Functional Connectomes , 2018, Front. Neurosci..
[536] Amin S. Sayedi-Roshkhar. Real-Time Bidding in Online Display Advertising , 2018, Mark. Sci..
[537] Xuefeng Chen,et al. Key Frame Extraction of Surveillance Video based on Moving Object Detection and Image Similarity , 2018 .
[538] A. Arthy,et al. A Survey on Heart Disease Prediction Using Data Mining Techniques , 2018 .
[539] Amandeep Kaur,et al. HEART DISEASE PREDICTION USING DATA MINING TECHNIQUES: A SURVEY , 2018 .
[540] María Romero,et al. Vineyard water status estimation using multispectral imagery from an UAV platform and machine learning algorithms for irrigation scheduling management , 2018, Comput. Electron. Agric..
[541] Sebastian Olbrich,et al. Capabilities and Impediments to Leverage Customer Value from Data " A Case Study from the Automotive Industry , 2018, ICIS.
[542] Ausif Mahmood,et al. Enhanced Human Face Recognition Using LBPH Descriptor, Multi-KNN, and Back-Propagation Neural Network , 2018, IEEE Access.
[543] Scott D. Fleming,et al. CFar: A Tool to Increase Communication, Productivity, and Review Quality in Collaborative Code Reviews , 2018, CHI.
[544] Varun Ganapathi,et al. GritNet: Student Performance Prediction with Deep Learning , 2018, EDM.
[545] Jaakko Lehtinen,et al. Progressive Growing of GANs for Improved Quality, Stability, and Variation , 2017, ICLR.
[546] K. Hans,et al. Micronutrients in the life cycle: Requirements and sufficient supply , 2018, NFS Journal.
[547] Nimish Ukey,et al. Energy Based Recent Trends in Delay Tolerant Networks , 2018 .
[548] Stefan Plantikow,et al. Cypher: An Evolving Query Language for Property Graphs , 2018, SIGMOD Conference.
[549] Z. Elyusufi,et al. Customer profiling using CEP architecture in a Big Data context , 2018 .
[550] Zhongyuan Wang,et al. Smart Monitoring Cameras Driven Intelligent Processing to Big Surveillance Video Data , 2018, IEEE Transactions on Big Data.
[551] Jian Yang,et al. Demystifying Advertising Campaign for CPA Goal Optimization , 2018, WWW.
[552] Jie Li,et al. An Intelligent Garbage Bin Based on NB-IOT Research Mode , 2018, 2018 IEEE International Conference of Safety Produce Informatization (IICSPI).
[553] Cristina Cervello-Pastor,et al. An architecture for the 5G control plane based on SDN and data distribution service , 2018, 2018 Fifth International Conference on Software Defined Systems (SDS).
[554] Teddy Mantoro,et al. Multi-Faces Recognition Process Using Haar Cascades and Eigenface Methods , 2018, 2018 6th International Conference on Multimedia Computing and Systems (ICMCS).
[555] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[556] V. V. Yerigeri,et al. Rice Grain Quality Grading Using Digital Image Processing Techniques , 2018 .
[557] Niraj Singhal,et al. A reliability based approach for securing migrating crawlers , 2018 .
[558] Jiang Bian,et al. Big data hurdles in precision medicine and precision public health , 2018, BMC Medical Informatics and Decision Making.
[559] Josh Gardner,et al. Student success prediction in MOOCs , 2017, User Modeling and User-Adapted Interaction.
[560] Leïla Azouz Saïdane,et al. A Secure and Privacy-Preserving Solution for IoT over NDN Applied to E-health , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).
[561] Andy Brown,et al. Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection , 2018, Proceedings of the First Workshop on Machine Learning for Computing Systems.
[562] Nasrollah Moghadam Charkari,et al. Increasing Efficiency of Time Series Clustering by Dimension Reduction Techniques , 2018 .
[563] Kousik Dasgupta,et al. An Ant-Colony-Based Meta-Heuristic Approach for Load Balancing in Cloud Computing , 2021, Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing.
[564] Soad Almabdy,et al. Comparative Analysis of Relational and Graph Databases for Social Networks , 2018, 2018 1st International Conference on Computer Applications & Information Security (ICCAIS).
[565] Simon Foo,et al. Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissions , 2018, EURASIP J. Inf. Secur..
[566] Qi Cui. Identifying materials of photographic images and photorealistic computer generated graphics based on deep CNNs , 2018 .
[567] Narander Kumar,et al. Load Balancing Mechanism Using Fuzzy Row Penalty Method in Cloud Computing Environment , 2018 .
[568] J. Rojo-álvarez,et al. Using big data from Customer Relationship Management information systems to determine the client profile in the hotel sector , 2018, Tourism Management.
[569] Li Li,et al. Research on large data set clustering method based on MapReduce , 2018, Neural computing & applications (Print).
[570] V. Shanthi,et al. Parallel Clustering for Data Mining in CRM , 2019 .
[571] Manjusha Pandey,et al. Development of Policy Designing Technique by Analyzing Customer Behavior Through Big Data Analytics , 2018 .
[572] Christopher Brooks,et al. Replicating MOOC predictive models at scale , 2018, L@S.
[573] B. R. Chandavarkar,et al. Enhanced Last-Touch Interaction Attribution Model in Online Advertising , 2018, 2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER).
[574] Uma N Dulhare,et al. Prediction system for heart disease using Naive Bayes and particle swarm optimization , 2018 .
[575] Chotirat Ann Ratanamahatana,et al. A Dimensionality Reduction Technique for Time Series Classification Using Additive Representation , 2019 .
[576] B. Taylor,et al. Concepts for communication about risk in dementia care: A review of the literature , 2018, Dementia.
[577] Shivam Jindal,et al. Change in IT world with the evolution of social media using Big Data , 2018, 2018 International Conference on Communication, Computing and Internet of Things (IC3IoT).
[578] S. Fatima. Automated Tuberculosis Detection and Analysis Using CXR’s Images , 2018 .
[579] Manjusha Pandey,et al. Recognition of Telecom Customer’s Behavior as Data Product in CRM Big Data Environment , 2018 .
[580] Javid Taheri,et al. On Load Balancing for a Virtual and Distributed MME in the 5G Core , 2018, 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC).
[581] Andreas Gerstlauer,et al. DeepThings: Distributed Adaptive Deep Learning Inference on Resource-Constrained IoT Edge Clusters , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[582] Gur Amrit Pal Singh,et al. Performance analysis of various machine learning-based approaches for detection and classification of lung cancer in humans , 2019, Neural Computing and Applications.
[583] Davide Aloini,et al. Big Data-enabled Customer Relationship Management: A holistic approach , 2018, Inf. Process. Manag..
[584] T. Nisar,et al. Trains and Twitter: Firm generated content, consumer relationship management and message framing , 2018, Transportation Research Part A: Policy and Practice.
[585] Feng Gao,et al. Scalable and Privacy-Preserving Data Sharing Based on Blockchain , 2018, Journal of Computer Science and Technology.
[586] Zheng Qin,et al. Dalvik Opcode Graph Based Android Malware Variants Detection Using Global Topology Features , 2018, IEEE Access.
[587] Sergey P. Novikov,et al. Blockchain and Smart Contracts in a Decentralized Health Infrastructure , 2018, 2018 IEEE International Conference "Quality Management, Transport and Information Security, Information Technologies" (IT&QM&IS).
[588] Qinghua Zheng,et al. Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis , 2018, IEEE Transactions on Information Forensics and Security.
[589] Dirk Müller,et al. A time series clustering approach for Building Automation and Control Systems , 2019 .
[590] C. Srinilta,et al. Municipal Solid Waste Segregation with CNN , 2019, 2019 5th International Conference on Engineering, Applied Sciences and Technology (ICEAST).
[591] Leandro Pereira Garcia,et al. Risk factors for neonatal death in the capital city with the lowest infant mortality rate in Brazil. , 2018, Jornal de pediatria.
[592] Xiaodong Lin,et al. An Optimized Positive-Unlabeled Learning Method for Detecting a Large Scale of Malware Variants , 2019, 2019 IEEE Conference on Dependable and Secure Computing (DSC).
[593] Basem E. Elnaghi,et al. Osmotic Bio-Inspired Load Balancing Algorithm in Cloud Computing , 2019, IEEE Access.
[594] Friedhelm Schwenker,et al. A dataset of continuous affect annotations and physiological signals for emotion analysis , 2018, Scientific Data.
[595] Bruno Tuffin,et al. Wireless Service Providers Pricing Game in Presence of Possible Sponsored Data , 2019, 2019 15th International Conference on Network and Service Management (CNSM).
[596] Sara Khalid,et al. Machine Learning for Feature Selection and Cluster Analysis in Drug Utilisation Research , 2019, Current Epidemiology Reports.
[597] Pong C. Yuen,et al. On the Reconstruction of Face Images from Deep Face Templates , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[598] Boris Otto,et al. Reference Architecture framework for enhanced social media data analytics for Predictive Maintenance models , 2019, 2019 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC).
[599] Usman Qamar,et al. Using Blockchain for Electronic Health Records , 2019, IEEE Access.
[600] Tonya Meyrick,et al. Authenticating typography in cultural festival brand marks , 2019, 7th ICTVC 2019.
[601] Wanli Xing,et al. Dropout Prediction in MOOCs: Using Deep Learning for Personalized Intervention , 2019 .
[602] Yi-Fen Liu. I or We: The Persuasive Effects of Typeface Shapes: An Abstract , 2018, Developments in Marketing Science: Proceedings of the Academy of Marketing Science.
[603] Syeda Sumbul Hossain. Challenges and Mitigation Strategies in Reusing Requirements in Large-Scale Distributed Agile Software Development: A Survey Result , 2019, Advances in Intelligent Systems and Computing.
[604] Saiful Islam,et al. Context-Based News Headlines Analysis Using Machine Learning Approach , 2019, ICCCI.
[605] Yannick Prié,et al. Success prediction in MOOCs: A case study , 2019, EDM.
[606] David Allen,et al. Understanding Trolls with Efficient Analytics of Large Graphs in Neo4j , 2019, BTW.
[607] Wang Bao,et al. Integration of unsupervised and supervised machine learning algorithms for credit risk assessment , 2019, Expert Syst. Appl..
[608] Heng-Yi Li,et al. DeepReview: Automatic Code Review Using Deep Multi-instance Learning , 2019, PAKDD.
[609] Vipin Tyagi,et al. Methods to Distinguish Photorealistic Computer Generated Images from Photographic Images: A Review , 2019, ICACDS.
[610] Matthias Hillner. Time Consciousness in Relation to Emergent Typography , 2019, AHFE.
[611] M. Ambigavathi,et al. A Survey on Big Data in Healthcare Applications , 2020 .
[612] G. Hemantha Kumar,et al. Convolutional Neural Network with SVM for Classification of Animal Images , 2019, Lecture Notes in Electrical Engineering.
[613] Lin Wang,et al. Survey of Methods for Time Series Symbolic Aggregate Approximation , 2019, ICPCSEE.
[614] R. Gayathri,et al. Analysis of Heart Disease Prediction Using Various Machine Learning Techniques , 2019 .
[615] Ossama H. Embarak,et al. Hybrid Approach for Heart Disease Prediction Using Data Mining Techniques , 2019, EIDWT.
[616] Xinwang Liu,et al. K-Means Clustering With Incomplete Data , 2019, IEEE Access.
[617] Ming He,et al. Distinguish computer generated and digital images: A CNN solution , 2018, Concurr. Comput. Pract. Exp..
[618] Lili He,et al. Enhancing Diagnosis of Autism With Optimized Machine Learning Models and Personal Characteristic Data , 2019, Front. Comput. Neurosci..
[619] Tom F. Wilderjans,et al. Partitioning subjects based on high-dimensional fMRI data: comparison of several clustering methods and studying the influence of ICA data reduction in big data , 2019, Behaviormetrika.
[620] Rajkumar Buyya,et al. Hierarchical data fusion for Smart Healthcare , 2019, Journal of Big Data.
[621] Philip Howard,et al. A Study of Misinformation in WhatsApp groups with a focus on the Brazilian Presidential Elections. , 2019, WWW.
[622] Guillaume-Alexandre Bilodeau,et al. Domain-Specific Face Synthesis for Video Face Recognition From a Single Sample Per Person , 2018, IEEE Transactions on Information Forensics and Security.
[623] Vipin Tyagi,et al. Image Forgery Detection: Survey and Future Directions , 2019, Data, Engineering and Applications.
[624] Vipin Tyagi,et al. A copy-move image forgery detection technique based on Gaussian-Hermite moments , 2019, Multimedia Tools and Applications.
[625] Hongzhi Wang,et al. Predicting learning status in MOOCs using LSTM , 2018, ACM TUR-C.
[626] Madini O. Alassafi,et al. Real-Time Surveillance Through Face Recognition Using HOG and Feedforward Neural Networks , 2019, IEEE Access.
[627] H. Ayatollahi,et al. Predicting coronary artery disease: a comparison between two data mining algorithms , 2019, BMC Public Health.
[628] Gia Khanh Tran,et al. Revenue Model with Multi-Access Edge Computing for Cellular Network Architecture , 2019, 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN).
[629] R. Manikandan,et al. AN ANALYSIS OF GARBAGE MECHANISM FOR SMART CITIES , 2019 .
[630] J. Brandão,et al. The Italic Style: Understanding the Shape Through History , 2019, AHFE.
[631] Ji Wang,et al. Pretraining-Based Natural Language Generation for Text Summarization , 2019, CoNLL.
[632] Hajar Mousannif,et al. Reality mining and predictive analytics for building smart applications , 2019, Journal of Big Data.
[633] P. Mohamed Fathimal,et al. Smart Garbage Segregation & Management System Using Internet of Things(IoT) & Machine Learning(ML) , 2019, 2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT).
[634] Gavin Ambrose,et al. The dichotomic tension of experimental typography , 2019 .
[635] J. Bai,et al. A combined drought monitoring index based on multi-sensor remote sensing data and machine learning , 2019, Geocarto International.
[636] Wen Gao,et al. How to Assess the Quality of Compressed Surveillance Videos Using Face Recognition , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[637] Farhan Ahmed Siddiqui,et al. Graphic User Interface Design Principles for Designing Augmented Reality Applications , 2019, International Journal of Advanced Computer Science and Applications.
[638] D. Manjunath,et al. Sponsored Data with ISP Competition , 2019, 2019 31st International Teletraffic Congress (ITC 31).
[639] Zhu Han,et al. Virtual Core Network Resource Allocation in 5G Systems using Three-Sided Matching , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[640] Kunj Bihari Meena,et al. A Novel Method to Distinguish Photorealistic Computer Generated Images from Photographic Images , 2019, 2019 Fifth International Conference on Image Information Processing (ICIIP).
[641] Zheng Qin,et al. A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding , 2019, Comput. Secur..
[642] Abhishek Mishra,et al. Machine Learning in the AWS Cloud , 2019 .
[643] Vikas Tripathi,et al. A Framework for Analyzing the Exercise and Athletic Activities , 2019, 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom).
[644] Durga Prasad Mohapatra,et al. Validating object-oriented software at design phase by achieving MC/DC , 2019, Int. J. Syst. Assur. Eng. Manag..
[645] Channamma Patil,et al. Estimating the Optimal Number of Clusters k in a Dataset Using Data Depth , 2019, Data Science and Engineering.
[646] José Luis Rojo-Álvarez,et al. Entropic Statistical Description of Big Data Quality in Hotel Customer Relationship Management , 2019, Entropy.
[647] Qusay H. Mahmoud,et al. Research challenges and opportunities in blockchain and cryptocurrencies , 2019, Internet Technol. Lett..
[648] Selvaraj Kesavan,et al. An investigation on adaptive HTTP media streaming Quality-of-Experience (QoE) and agility using cloud media services , 2021, International Journal of Computers and Applications.
[649] Zhu Han,et al. Joint Sponsored and Edge Caching Content Service Market: A Game-Theoretic Approach , 2019, IEEE Transactions on Wireless Communications.
[650] Vijaya Kamble,et al. Smart Bin (Waste Segregation and Optimisation) , 2019, 2019 Amity International Conference on Artificial Intelligence (AICAI).
[651] Mariusz Kubanek,et al. Waste Classification System Using Image Processing and Convolutional Neural Networks , 2019, IWANN.
[652] Sandeep Kaushik,et al. Big data in healthcare: management, analysis and future prospects , 2019, Journal of Big Data.
[653] Ivaylo Atanasov,et al. Application Level User Traffic Control at the Mobile Network Edge , 2019, 2019 24th Conference of Open Innovations Association (FRUCT).
[654] David Lo,et al. Automatic Code Review by Learning the Revision of Source Code , 2019, AAAI.
[655] Anshu Sharma,et al. Heart Disease Prediction using KNN classification approach , 2019, International Journal of Computer Sciences and Engineering.
[656] P. Adatara,et al. Risk Factors Associated with Neonatal Sepsis: A Case Study at a Specialist Hospital in Ghana , 2019, TheScientificWorldJournal.
[657] Su Ruan,et al. A review: Deep learning for medical image segmentation using multi-modality fusion , 2019, Array.
[658] Hamada El Kabtane,et al. A machine learning-based methodology to predict learners' dropout, success or failure in MOOCs , 2019, Int. J. Web Inf. Syst..
[659] Soman K.P.,et al. Capsule Neural Networks and Visualization for Segregation of Plastic and Non-Plastic Wastes , 2019, 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS).
[660] Vittoria Marino,et al. Embracing AI and Big Data in customer journey mapping: from literature review to a theoretical framework , 2019, Innovative Marketing.
[661] Dermot Kerr,et al. Using Machine Learning Algorithms to Predict the Likelihood of Recurrent Falls in Older Adults , 2019, MLDM.
[662] Tao Huang,et al. Blockchain-based cloudlet management for multimedia workflow in mobile cloud computing , 2019, Multimedia Tools and Applications.
[663] Randomized Key-based GMO-BCS Image Encryption for Securing Medical Image , 2019, International Journal of Recent Technology and Engineering.
[664] Minlong Peng,et al. Cooperative Multimodal Approach to Depression Detection in Twitter , 2019, AAAI.
[665] Antonio Jiménez-Martín,et al. The Multi-Armed Bandit Problem under Delayed Rewards Conditions in Digital Campaign Management , 2019, 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT).
[666] Manjula K Shenoy,et al. Evaluating the satisfaction index using automated interaction service and customer knowledgebase: a big data approach to CRM , 2019, International Journal of Electronic Customer Relationship Management.
[667] Ching-Hsien Hsu,et al. Edge server placement in mobile edge computing , 2019, J. Parallel Distributed Comput..
[668] Okeke Stephen,et al. An Efficient Deep Learning Approach to Pneumonia Classification in Healthcare , 2019, Journal of healthcare engineering.
[669] Pushkar Kishore,et al. NITRSCT: A Software Security tool for collection and analysis of Kernel Calls , 2019, TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON).
[670] Jianwen Ma,et al. Remote Sensing Satellites for Digital Earth , 2019, Manual of Digital Earth.
[671] Rajendra Pamula,et al. An Effective Block-Chain Based Authentication Technique for Cloud Based IoT , 2020 .
[672] Vipin Tyagi,et al. A copy-move image forgery detection technique based on tetrolet transform , 2020, J. Inf. Secur. Appl..
[673] S. Malathi,et al. Exploration of an innovative geometric parameter based on performance enhancement for foot print recognition , 2020, J. Intell. Fuzzy Syst..
[674] V. R,et al. The Heart Disease Prediction by Using Random Forest Algorithm , 2020, International Journal of Pharmaceutical Research.
[675] Rosna P. Haroon,et al. Application of Big Data in Health Care with Patient Monitoring and Future Health Prediction , 2020 .
[676] Nobuyuki Kobayashi,et al. Crop classification using spectral indices derived from Sentinel-2A imagery , 2019, J. Inf. Telecommun..
[677] Andrew Hines,et al. 5G network slicing using SDN and NFV- A survey of taxonomy, architectures and future challenges , 2019, Comput. Networks.
[678] Surya Ganguli,et al. Statistical Mechanics of Deep Learning , 2020, Annual Review of Condensed Matter Physics.
[679] Sandhya Tarar,et al. Chronic Disease Prediction Using Deep Learning , 2020 .
[680] Mohamad Abu Ghazaleh,et al. Promoting a revamped CRM through Internet of Things and Big Data: an AHP-based evaluation , 2020 .
[681] Muhammad Imran,et al. Deep learning and big data technologies for IoT security , 2020, Comput. Commun..
[682] Cici Alexander,et al. Normalised difference spectral indices and urban land cover as indicators of land surface temperature (LST) , 2020, Int. J. Appl. Earth Obs. Geoinformation.
[683] Rodrigo N. Calheiros. Fog and Edge Computing: Challenges and Emerging Trends (Invited Talk) , 2020, Fog-IoT.
[684] Padma Mishra,et al. Proposed Model for Feature Extraction for Vehicle Detection , 2020 .
[685] Vipin Tyagi,et al. A hybrid copy-move image forgery detection technique based on Fourier-Mellin and scale invariant feature transforms , 2020, Multimedia Tools and Applications.
[686] Choong Seon Hong,et al. Edge-Computing-Enabled Smart Cities: A Comprehensive Survey , 2019, IEEE Internet of Things Journal.
[687] Jorge Caiado,et al. A fragmented-periodogram approach for clustering big data time series , 2020, Adv. Data Anal. Classif..
[688] I. Ciampitti,et al. Satellite-based soybean yield forecast: Integrating machine learning and weather data for improving crop yield prediction in southern Brazil , 2020 .
[689] Rajkumar Buyya,et al. HealthFog: An Ensemble Deep Learning based Smart Healthcare System for Automatic Diagnosis of Heart Diseases in Integrated IoT and Fog Computing Environments , 2019, Future Gener. Comput. Syst..
[690] Pantaleone Nespoli,et al. The Not Yet Exploited Goldmine of OSINT: Opportunities, Open Challenges and Future Trends , 2020, IEEE Access.
[691] Bibhudatta Sahoo,et al. MC/DC guided Test Sequence Prioritization using Firefly Algorithm , 2019, Evol. Intell..
[692] Anuj Srivastava,et al. Understanding Decision Tree Algorithm by using R Programming Language , 2022 .
[693] T. Choudhury,et al. Advance Survey of Mobile Ad-Hoc Network , 2022 .