Advances in Computing and Data Sciences: 4th International Conference, ICACDS 2020, Valletta, Malta, April 24–25, 2020, Revised Selected Papers

As the population is increasing rapidly day by day the pollution level is also increasing significantly. Several campaigns like Swachh Bharat Abhiyaan (SBA) are aiming to reduce the pollution level. Our approach is to use computer vision technique to classify the garbage based on its severity. For this we have rated garbage on a scale of 1 to 5 with 5 as cleanest and 1 as the dirtiest. To achieve our aim, we have used Faster-RCNN Inception v2 model, and have procured an accuracy of 89.14% using SVM and 89.68% using CNN in detecting different classes of garbage.

[1]  Edsger W. Dijkstra,et al.  A note on two problems in connexion with graphs , 1959, Numerische Mathematik.

[2]  G. F. Hughes,et al.  On the mean accuracy of statistical pattern recognizers , 1968, IEEE Trans. Inf. Theory.

[3]  William M. Rand,et al.  Objective Criteria for the Evaluation of Clustering Methods , 1971 .

[4]  Robert M. Haralick,et al.  Textural Features for Image Classification , 1973, IEEE Trans. Syst. Man Cybern..

[5]  Lotfi A. Zadeh,et al.  Outline of a New Approach to the Analysis of Complex Systems and Decision Processes , 1973, IEEE Trans. Syst. Man Cybern..

[6]  N. Otsu A threshold selection method from gray level histograms , 1979 .

[7]  David Sell Word Meaning , 1976, Philosophy.

[8]  C. Mallows,et al.  A Method for Comparing Two Hierarchical Clusterings , 1983 .

[9]  Barry W. Boehm,et al.  Software Engineering Economics , 1993, IEEE Transactions on Software Engineering.

[10]  M. Braga,et al.  Exploratory Data Analysis , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[11]  L. Liebovitch,et al.  A fast algorithm to determine fractal dimensions by box counting , 1989 .

[12]  S. Blackie,et al.  Granulomatous Pneumocystis carinii pneumonia mimicking tuberculosis. , 1989, Archives of pathology & laboratory medicine.

[13]  Stephen I. Gallant,et al.  Perceptron-based learning algorithms , 1990, IEEE Trans. Neural Networks.

[14]  Robert L. Mercer,et al.  Class-Based n-gram Models of Natural Language , 1992, CL.

[15]  Jim Gray,et al.  Benchmark Handbook: For Database and Transaction Processing Systems , 1992 .

[16]  P. Barnes,et al.  Tuberculosis in patients with human immunodeficiency virus infection. How often does it mimic Pneumocystis carinii pneumonia? , 1992, Chest.

[17]  Roberto Battiti,et al.  Using mutual information for selecting features in supervised neural net learning , 1994, IEEE Trans. Neural Networks.

[18]  Sargur N. Srihari,et al.  Decision Combination in Multiple Classifier Systems , 1994, IEEE Trans. Pattern Anal. Mach. Intell..

[19]  Matthias Jarke,et al.  Requirements engineering in 2001: (virtually) managing a changing reality , 1994, Softw. Eng. J..

[20]  B. S. Manjunath,et al.  Multisensor Image Fusion Using the Wavelet Transform , 1995, CVGIP Graph. Model. Image Process..

[21]  Ivar Jacobson,et al.  Formalizing Use-Case Modeling , 1995, J. Object Oriented Program..

[22]  David W. Aha,et al.  A Comparative Evaluation of Sequential Feature Selection Algorithms , 1995, AISTATS.

[23]  Yasuhito Suenaga 3D measurement technologies for computer animation , 1996, Proceedings Computer Animation '96.

[24]  Robert T. Hughes,et al.  Expert judgement as an estimating method , 1996, Inf. Softw. Technol..

[25]  Thomas G. Dietterich Machine-Learning Research Four Current Directions , 1997 .

[26]  Theo Mandel,et al.  The Elements of User Interface Design , 1997 .

[27]  Hartmut Vogler,et al.  An approach for mobile agent security and fault tolerance using distributed transactions , 1997, Proceedings 1997 International Conference on Parallel and Distributed Systems.

[28]  Andrew McCallum,et al.  A comparison of event models for naive bayes text classification , 1998, AAAI 1998.

[29]  Ron Kohavi,et al.  Feature Selection for Knowledge Discovery and Data Mining , 1998 .

[30]  G. Reza Kiani,et al.  Marketing opportunities in the digital world , 1998, Internet Res..

[31]  Michael T. Orchard,et al.  Wavelet packet image coding using space-frequency quantization , 1998, IEEE Trans. Image Process..

[32]  Zbigniew R. Struzik,et al.  Measuring time series similarity through large singular features revealed with wavelet transformation , 1999, Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99.

[33]  Steven K. Feiner,et al.  Exploring MARS: developing indoor and outdoor user interfaces to a mobile augmented reality system , 1999, Comput. Graph..

[34]  Kentaro Toyama,et al.  Wallflower: principles and practice of background maintenance , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.

[35]  Ada Wai-Chee Fu,et al.  Efficient time series matching by wavelets , 1999, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337).

[36]  Wayne Jansen,et al.  NIST Special Publication 800-19 – Mobile Agent Security , 2000 .

[37]  E. Candès,et al.  Curvelets: A Surprisingly Effective Nonadaptive Representation for Objects with Edges , 2000 .

[38]  Noam Chomsky,et al.  New Horizons in the Study of Language and Mind: Language as a natural object , 2000 .

[39]  Ulrich Güntzer,et al.  Algorithms for association rule mining — a general survey and comparison , 2000, SKDD.

[40]  Christos Faloutsos,et al.  Fast Time Sequence Indexing for Arbitrary Lp Norms , 2000, VLDB.

[41]  R. Lewis An Introduction to Classification and Regression Tree (CART) Analysis , 2000 .

[42]  F. E.,et al.  A Relational Model of Data Large Shared Data Banks , 2000 .

[43]  Tian Pu,et al.  Contrast-based image fusion using the discrete wavelet transform , 2000 .

[44]  B. Stoll,et al.  Risk Factors and Opportunities for Prevention of Early-Onset Neonatal Sepsis: A Multicenter Case-Control Study , 1999, Pediatrics.

[45]  Bruce H. Thomas,et al.  ARQuake: an outdoor/indoor augmented reality first person application , 2000, Digest of Papers. Fourth International Symposium on Wearable Computers.

[46]  A V Shekdar,et al.  Health-care waste management in India. , 2001, Journal of environmental management.

[47]  N. Canagarajah,et al.  Wavelets for Image Fusion , 2001 .

[48]  K. Steven,et al.  Shared Decision Making , 2012, Onkologische Welt.

[49]  Collin F. Baker,et al.  Frame semantics for text understanding , 2001 .

[50]  N. Jamil,et al.  Face recognition using neural networks , 2001, Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century..

[51]  T. Franquet Imaging of pneumonia: trends and algorithms. , 2001, The European respiratory journal.

[52]  Eamonn J. Keogh,et al.  Dimensionality Reduction for Fast Similarity Search in Large Time Series Databases , 2001, Knowledge and Information Systems.

[53]  Richard Adderley,et al.  Police crime recording and investigation systems – A user’s view , 2001 .

[54]  Andrew S. Tanenbaum,et al.  Distributed systems: Principles and Paradigms , 2001 .

[55]  Daniel Chandler,et al.  Semiotics: The Basics , 2001 .

[56]  Martin J. Shepperd,et al.  Comparing Software Prediction Techniques Using Simulation , 2001, IEEE Trans. Software Eng..

[57]  Harry Shum,et al.  Real-time speech-driven 3D face animation , 2002, Proceedings. First International Symposium on 3D Data Processing Visualization and Transmission.

[58]  Peter Auer,et al.  The Nonstochastic Multiarmed Bandit Problem , 2002, SIAM J. Comput..

[59]  Taghi M. Khoshgoftaar,et al.  Can neural networks be easily interpreted in software cost estimation? , 2002, 2002 IEEE World Congress on Computational Intelligence. 2002 IEEE International Conference on Fuzzy Systems. FUZZ-IEEE'02. Proceedings (Cat. No.02CH37291).

[60]  R. Jackendoff Foundations of Language: Brain, Meaning, Grammar, Evolution , 2002 .

[61]  David L. Mothersbaugh,et al.  Effects of typographic factors in advertising‐based persuasion: A general model and initial empirical tests , 2002 .

[62]  Chong-Ho Choi,et al.  Input feature selection for classification problems , 2002, IEEE Trans. Neural Networks.

[63]  Eamonn J. Keogh,et al.  Locally adaptive dimensionality reduction for indexing large time series databases , 2001, SIGMOD '01.

[64]  D.M. Mount,et al.  An Efficient k-Means Clustering Algorithm: Analysis and Implementation , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[65]  Lei Zhang,et al.  Edge detection by scale multiplication in wavelet domain , 2002, Pattern Recognit. Lett..

[66]  P. Cunningham,et al.  Solutions to Instability Problems with Sequential Wrapper-based Approaches to Feature Selection , 2002 .

[67]  Janko Calic,et al.  Efficient key-frame extraction and video analysis , 2002, Proceedings. International Conference on Information Technology: Coding and Computing.

[68]  Yajie Tian,et al.  Handbook of face recognition , 2003 .

[69]  T. Chorba,et al.  Underestimation of infant mortality rates in one republic of the former Soviet Union. , 2003, Pediatrics.

[70]  E. Brumberger,et al.  The Rhetoric of Typography: The Persona of Typeface and Text , 2003 .

[71]  David R. Karger,et al.  Tackling the Poor Assumptions of Naive Bayes Text Classifiers , 2003, ICML.

[72]  Isabelle Guyon,et al.  An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..

[73]  Jim Alves-Foss,et al.  The use of encrypted functions for mobile agent security , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[74]  Z. Zivkovic Improved adaptive Gaussian mixture model for background subtraction , 2004, ICPR 2004.

[75]  Cauligi S. Raghavendra,et al.  Single-copy routing in intermittently connected mobile networks , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[76]  Timothy F. Cootes,et al.  Analysis of Features for Rigid Structure Vehicle Type Recognition , 2004, BMVC.

[77]  Qiang Wang,et al.  A dimensionality reduction technique for efficient similarity analysis of time series databases , 2004, CIKM '04.

[78]  Julio Cesar Sampaio do Prado Leite,et al.  Nonfunctional requirements: from elicitation to conceptual models , 2004, IEEE Transactions on Software Engineering.

[79]  G. Anderson,et al.  Mapping Grain Sorghum Yield Variability Using Airborne Digital Videography , 2000, Precision Agriculture.

[80]  Stephen R. Anderson,et al.  How Many Languages Are There in the World , 2004 .

[81]  Antonio Torralba,et al.  Modeling the Shape of the Scene: A Holistic Representation of the Spatial Envelope , 2001, International Journal of Computer Vision.

[82]  Dimitrios Gunopulos,et al.  INDEXING TIME-SERIES UNDER CONDITIONS OF NOISE , 2004 .

[83]  Eamonn J. Keogh,et al.  On the Need for Time Series Data Mining Benchmarks: A Survey and Empirical Demonstration , 2002, Data Mining and Knowledge Discovery.

[84]  C. Faloutsos,et al.  cient Similarity Search In Sequence Databases , 2004 .

[85]  R. Sutton Introduction: The challenge of reinforcement learning , 1992, Machine Learning.

[86]  Rafael García,et al.  Fusion of multispectral and panchromatic images using improved IHS and PCA mergers based on wavelet decomposition , 2004, IEEE Transactions on Geoscience and Remote Sensing.

[87]  Harry Chen,et al.  SOUPA: standard ontology for ubiquitous and pervasive applications , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[88]  Axel Wismüller,et al.  Cluster Analysis of Biomedical Image Time-Series , 2002, International Journal of Computer Vision.

[89]  Te-Ming Tu,et al.  A fast intensity-hue-saturation fusion technique with spectral adjustment for IKONOS imagery , 2004, IEEE Geoscience and Remote Sensing Letters.

[90]  Robert V. Brill,et al.  Applied Statistics and Probability for Engineers , 2004, Technometrics.

[91]  Syed Immamul Ansarullah,et al.  Prediction of Heart Disease using Decision Tree a Data Mining Technique , 2004 .

[92]  M. Mcmurdo,et al.  Risk factors and risk assessment tools for falls in hospital in-patients: a systematic review. , 2004, Age and ageing.

[93]  Alan R. Hevner,et al.  Requirements-driven database systems benchmark method , 2005, Decis. Support Syst..

[94]  Mohan M. Trivedi,et al.  Performance characterization for Gaussian mixture model based motion detection algorithms , 2005, IEEE International Conference on Image Processing 2005.

[95]  Alistair G. Sutcliffe,et al.  Scenario-based assessment of nonfunctional requirements , 2005, IEEE Transactions on Software Engineering.

[96]  Serge J. Belongie,et al.  Recognizing Cars , 2005 .

[97]  L. Baker,et al.  Internet use and stigmatized illness. , 2005, Social science & medicine.

[98]  C. Willmott,et al.  Advantages of the mean absolute error (MAE) over the root mean square error (RMSE) in assessing average model performance , 2005 .

[99]  Mark Billinghurst,et al.  Designing augmented reality interfaces , 2005, COMG.

[100]  Mehryar Mohri,et al.  Multi-armed Bandit Algorithms and Empirical Evaluation , 2005, ECML.

[101]  Abel G. Oliva,et al.  Gist of a scene , 2005 .

[102]  Shih-Fu Chang,et al.  Columbia Photographic Images and Photorealistic Computer Graphics Dataset , 2005 .

[103]  Lei Lei,et al.  R-C4.5 decision tree model and its applications to health care dataset , 2005, Proceedings of ICSSSM '05. 2005 International Conference on Services Systems and Services Management, 2005..

[104]  Siwei Lyu,et al.  How realistic is photorealistic? , 2005, IEEE Transactions on Signal Processing.

[105]  Bill Triggs,et al.  Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[106]  Christian Borgelt,et al.  An implementation of the FP-growth algorithm , 2005 .

[107]  Eamonn J. Keogh,et al.  HOT SAX: efficiently finding the most unusual time series subsequence , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).

[108]  Michael G. Madden,et al.  Multi-Class and Single-Class Classification Approaches to Vehicle Model Recognition from Images , 2005 .

[109]  Melanie Hilario,et al.  Knowledge and Information Systems , 2007 .

[110]  Ann,et al.  Truth and method , 1994, Journal of Religion and Health.

[111]  Li Wei,et al.  SAXually Explicit Images: Finding Unusual Shapes , 2006, Sixth International Conference on Data Mining (ICDM'06).

[112]  Per Runeson,et al.  A survey of unit testing practices , 2006, IEEE Software.

[113]  R. Hales,et al.  A review of bipolar disorder in adults. , 2006, Psychiatry (Edgmont (Pa. : Township)).

[114]  R. Nochai,et al.  ARIMA MODEL FOR FORECASTING OIL PALM , 2006 .

[115]  Eamonn J. Keogh,et al.  Finding Unusual Medical Time-Series Subsequences: Algorithms and Applications , 2006, IEEE Transactions on Information Technology in Biomedicine.

[116]  Harry Zhang,et al.  A Fast Decision Tree Learning Algorithm , 2006, AAAI.

[117]  Miao Qi-guang,et al.  A Novel Image Fusion Method Using Contourlet Transform , 2006, 2006 International Conference on Communications, Circuits and Systems.

[118]  Li Wei,et al.  Experiencing SAX: a novel symbolic representation of time series , 2007, Data Mining and Knowledge Discovery.

[119]  Dmitri Loguinov,et al.  Load-Balancing Performance of Consistent Hashing: Asymptotic Analysis of Random Node Join , 2007, IEEE/ACM Transactions on Networking.

[120]  Kurt Squire,et al.  Augmented Reality Simulations on Handheld Computers , 2007 .

[121]  Yi Liu,et al.  The application of wavelet multiresolution technology in medical image analysis , 2007, 2007 International Conference on Wavelet Analysis and Pattern Recognition.

[122]  Petrônio L. Braga,et al.  Software Effort Estimation using Machine Learning Techniques with Robust Confidence Intervals , 2007, 7th International Conference on Hybrid Intelligent Systems (HIS 2007).

[123]  Norman M. Sadeh,et al.  Learning to detect phishing emails , 2007, WWW '07.

[124]  Liu Bao-sheng Novel image fusion algorithm with novel performance evaluation method , 2007 .

[125]  Li Yi-jun,et al.  Using Naïve Bayes Classifier to Distinguish Reviews from Non-review Documents in Chinese , 2007, 2007 International Conference on Management Science and Engineering.

[126]  Yun Q. Shi,et al.  Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[127]  Antonio Bicchi,et al.  Decentralized intrusion detection for secure cooperative multi-agent systems , 2007, 2007 46th IEEE Conference on Decision and Control.

[128]  Mooi Choo Chuah,et al.  ECG Anomaly Detection via Time Series Analysis , 2007, ISPA Workshops.

[129]  Rick Archibald,et al.  Feature Selection and Classification of Hyperspectral Images With Support Vector Machines , 2007, IEEE Geoscience and Remote Sensing Letters.

[130]  Magne Jørgensen,et al.  A Systematic Review of Software Development Cost Estimation Studies , 2007, IEEE Transactions on Software Engineering.

[131]  Huan Liu,et al.  Semi-supervised Feature Selection via Spectral Analysis , 2007, SDM.

[132]  José Demisio Simões da Silva,et al.  An investigation of artificial neural networks based prediction systems in software project management , 2008, J. Syst. Softw..

[133]  Wei-Chiang Hong,et al.  Rainfall forecasting by technological machine learning models , 2008, Appl. Math. Comput..

[134]  Yvan Saeys,et al.  Robust Feature Selection Using Ensemble Feature Selection Techniques , 2008, ECML/PKDD.

[135]  Kevin Fu,et al.  Security and Privacy for Implantable Medical Devices , 2008, IEEE Pervasive Comput..

[136]  S. Malek,et al.  Determining Percentage of Broken Rice by Using Image Analysis , 2008, CCTA.

[137]  A. Ray Waste Management in Developing Asia , 2008 .

[138]  Hui Ding,et al.  Querying and mining of time series data: experimental comparison of representations and distance measures , 2008, Proc. VLDB Endow..

[139]  Saad D. Abulhab Anatomy of an Arabetic Type Design , 2008 .

[140]  Patrick Weber,et al.  OpenStreetMap: User-Generated Street Maps , 2008, IEEE Pervasive Computing.

[141]  Andrew Y. C. Nee,et al.  Augmented reality for assembly guidance using a virtual interactive tool , 2008 .

[142]  Claudio Gutierrez,et al.  Survey of graph database models , 2008, CSUR.

[143]  Clive Best Web Mining for Open Source Intelligence , 2008, 2008 12th International Conference Information Visualisation.

[144]  Maurice Milgram,et al.  Multi-class Vehicle Type Recognition System , 2008, ANNPR.

[145]  Kun-Chan Lan,et al.  A Survey of Opportunistic Networks , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).

[146]  Angelo Gargantini,et al.  A semantic framework for metamodel-based languages , 2009, Automated Software Engineering.

[147]  Yuanyan Tang,et al.  Classification of 3D models for the 3D animation environments , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.

[148]  Li Fei-Fei,et al.  ImageNet: A large-scale hierarchical image database , 2009, CVPR.

[149]  Amin Vahdat,et al.  Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .

[150]  Christopher Krügel,et al.  Effective and Efficient Malware Detection at the End Host , 2009, USENIX Security Symposium.

[151]  B. Venkataramani,et al.  Performance Evaluation of Adhoc Networks with Different Multicast Routing Protocols and Mobility Models , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[152]  J. Ott,et al.  The ONE simulator for DTN protocol evaluation , 2009, SimuTools.

[153]  A. J. Martin Sensors and computing systems in smart clothing , 2009 .

[154]  Nuno Constantino Castro,et al.  Time Series Data Mining , 2009, Encyclopedia of Database Systems.

[155]  Stephanie Henderson-Begg,et al.  Using mobile phones to increase classroom interaction , 2009 .

[156]  Meikang Qiu,et al.  Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems , 2009, TODE.

[157]  Ahmed M. Elgammal,et al.  Introduction to computer vision and image understanding the special issue on video analysis , 2009, Comput. Vis. Image Underst..

[158]  Liu Jiping,et al.  An Algorithm of Shortest Path Based on Dijkstra for Huge Data , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.

[159]  A. Arul Lawrence Selvakumar,et al.  The Evaluation Report of SHA-256 Crypt Analysis Hash Function , 2009, 2009 International Conference on Communication Software and Networks.

[160]  Susmitha Vekkot,et al.  A Novel Architecture for Wavelet based Image Fusion , 2009 .

[161]  Fei Yi,et al.  Design and realization of 3D character animation engine , 2009, 2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology.

[162]  N. L. Johnson,et al.  Continuous Multivariate Distributions, Volume 1: Models and Applications , 2019 .

[163]  Henry Been-Lirn Duh,et al.  An integrated design flow in user interface and interaction for enhancing mobile AR gaming experiences , 2010, 2010 IEEE International Symposium on Mixed and Augmented Reality - Arts, Media, and Humanities.

[164]  Gerard J. Holzmann,et al.  SCRUB: a tool for code reviews , 2010, Innovations in Systems and Software Engineering.

[165]  C. Saravanan,et al.  Color Image to Grayscale Image Conversion , 2010, 2010 Second International Conference on Computer Engineering and Applications.

[166]  Josep-Lluís Larriba-Pey,et al.  Survey of Graph Database Performance on the HPC Scalable Graph Analysis Benchmark , 2010, WAIM Workshops.

[167]  Kotagiri Ramamohanarao,et al.  Layered Approach Using Conditional Random Fields for Intrusion Detection , 2010, IEEE Transactions on Dependable and Secure Computing.

[168]  Marko A. Rodriguez,et al.  Constructions from Dots and Lines , 2010, ArXiv.

[169]  Josep-Lluís Larriba-Pey,et al.  A Discussion on the Design of Graph Database Benchmarks , 2010, TPCTC.

[170]  R. Brereton,et al.  Support vector machines for classification and regression. , 2010, The Analyst.

[171]  Zenglin Xu,et al.  Discriminative Semi-Supervised Feature Selection Via Manifold Regularization , 2009, IEEE Transactions on Neural Networks.

[172]  Fotis Liarokapis,et al.  Using Augmented Reality as a Medium to Assist Teaching in Higher Education , 2010, Eurographics.

[173]  Pan Hui,et al.  An Energy-Efficient n-Epidemic Routing Protocol for Delay Tolerant Networks , 2010, 2010 IEEE Fifth International Conference on Networking, Architecture, and Storage.

[174]  Liying Huang,et al.  Film and television animation design based on Maya and AE , 2010, 2010 3rd International Congress on Image and Signal Processing.

[175]  Bhupinder Verma,et al.  Image processing techniques for grading & classification of rice , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).

[176]  Tao Zhang,et al.  Identifying photorealistic computer graphics using second-order difference statistics , 2010, 2010 Seventh International Conference on Fuzzy Systems and Knowledge Discovery.

[177]  M Anbarasi,et al.  ENHANCED PREDICTION OF HEART DISEASE WITH FEATURE SUBSET SELECTION USING GENETIC ALGORITHM , 2010 .

[178]  Jian Ma,et al.  A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..

[179]  Léon Bottou,et al.  Large-Scale Machine Learning with Stochastic Gradient Descent , 2010, COMPSTAT.

[180]  Matthew Turk,et al.  Car-Rec: A real time car recognition system , 2011, 2011 IEEE Workshop on Applications of Computer Vision (WACV).

[181]  C. Tucker,et al.  Historical Perspectives on AVHRR NDVI and Vegetation Drought Monitoring , 2011 .

[182]  Anderson Rocha,et al.  Vision of the unseen: Current trends and challenges in digital image and video forensics , 2011, CSUR.

[183]  Gaël Varoquaux,et al.  Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..

[184]  Deirdre Wilson Parallels and differences in the treatment of metaphor in relevance theory and cognitive linguistics , 2011 .

[185]  Eric S. Kyper,et al.  ARIMA Modeling with Intervention to Forecast and Analyze Chinese Stock Prices , 2011 .

[186]  Wei Zhou,et al.  Towards 3D Communications: Real Time Emotion Driven 3D Virtual Facial Animation , 2011, 2011 Workshop on Digital Media and Digital Content Management.

[187]  Shih-Chung Kang,et al.  Use of Tangible and Augmented Reality Models in Engineering Graphics Courses , 2011 .

[188]  Eleftherios Kayafas,et al.  Vehicle model recognition from frontal view image measurements , 2011, Comput. Stand. Interfaces.

[189]  Sherali Zeadally,et al.  Impact of denial of service solutions on network quality of service , 2011, Secur. Commun. Networks.

[190]  José M. Bioucas-Dias,et al.  An Augmented Lagrangian Approach to the Constrained Optimization Formulation of Imaging Inverse Problems , 2009, IEEE Transactions on Image Processing.

[191]  Nick Pears,et al.  Automatic make and model recognition from frontal images of cars , 2011, 2011 8th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).

[192]  Carsten Willems,et al.  Automatic analysis of malware behavior using machine learning , 2011, J. Comput. Secur..

[193]  Wei-Yin Loh,et al.  Classification and regression trees , 2011, WIREs Data Mining Knowl. Discov..

[194]  J. Ardila Meaning in Language. An Introduction to Semantics and Pragmatics , 2011 .

[195]  Yongkang Wong,et al.  Patch-based probabilistic image quality assessment for face selection and improved video-based face recognition , 2011, CVPR 2011 WORKSHOPS.

[196]  Wang-Q Lim,et al.  Compactly supported shearlets are optimally sparse , 2010, J. Approx. Theory.

[197]  George Karabatis,et al.  Discrete wavelet transform-based time series analysis and mining , 2011, CSUR.

[198]  H. Taskinen,et al.  Occupational exposure to chemicals and reproductive health , 2011 .

[199]  Tak-Chung Fu,et al.  A review on time series data mining , 2011, Eng. Appl. Artif. Intell..

[200]  N Ravia Shabnam Parveen,et al.  Detection of Pneumonia in chest X-ray images. , 2011, Journal of X-ray science and technology.

[201]  E. S. Gedraite,et al.  Investigation on the effect of a Gaussian Blur in image filtering and segmentation , 2011, Proceedings ELMAR-2011.

[202]  Zhongke Wu,et al.  Rapid 3D Human Modeling and Animation Based on Sketch and Motion Database , 2011, 2011 Workshop on Digital Media and Digital Content Management.

[203]  G. Marx,et al.  Technological Innovations in Crime Prevention and Policing. A Review of the Research on Implementation and Impact , 2011 .

[204]  Xia San-ao,et al.  Application of Maya in film 3D animation design , 2011, 2011 3rd International Conference on Computer Research and Development.

[205]  Yang Xiang,et al.  Malware Variant Detection Using Similarity Search over Sets of Control Flow Graphs , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[206]  Jesús Alcalá-Fdez,et al.  KEEL Data-Mining Software Tool: Data Set Repository, Integration of Algorithms and Experimental Analysis Framework , 2011, J. Multiple Valued Log. Soft Comput..

[207]  Klaus Wehrle,et al.  Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..

[208]  Jaydip Sen,et al.  Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .

[209]  Sheng Zhan,et al.  Simulation of real water in 3D animation , 2011, 2011 International Conference on Multimedia Technology.

[210]  Stephen P. Boyd,et al.  Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..

[211]  Uma Mudenagudi,et al.  A Study on Keyframe Extraction Methods for Video Summary , 2011, 2011 International Conference on Computational Intelligence and Communication Networks.

[212]  Pedro Antonio Gutiérrez,et al.  MELM-GRBF: A modified version of the extreme learning machine for generalized radial basis function neural networks , 2011, Neurocomputing.

[213]  Kevin Fu,et al.  They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.

[214]  L. Pinto,et al.  Pulmonary tuberculosis masquerading as community acquired pneumonia , 2011 .

[215]  B. B. Meshram,et al.  Content based video retrieval systems , 2012, ArXiv.

[216]  Hassan Basri,et al.  Solid waste bin level detection using gray level co-occurrence matrix feature extraction approach. , 2012, Journal of environmental management.

[217]  Ying Wei,et al.  A Fully Automatic Method for Lung Parenchyma Segmentation and Repairing , 2013, Journal of Digital Imaging.

[218]  M. P. Parsai,et al.  Different Image Fusion Techniques –A Critical Review , 2012 .

[219]  Tim Menzies,et al.  On the Value of Ensemble Effort Estimation , 2012, IEEE Transactions on Software Engineering.

[220]  Hugues Bersini,et al.  A Survey on Filter Techniques for Feature Selection in Gene Expression Microarray Analysis , 2012, IEEE/ACM Transactions on Computational Biology and Bioinformatics.

[221]  Wentong Li,et al.  Estimating conversion rate in display advertising from past erformance data , 2012, KDD.

[222]  G. Geetha,et al.  MULTIFOCUS IMAGE FUSION USING MULTIRESOLUTION APPROACH WITH BILATERAL GRADIENT BASED SHARPNESS CRITERION , 2012 .

[223]  H. Rott,et al.  Understanding Fiction: Knowledge and Meaning in Literature , 2012 .

[224]  Chintan K. Modi,et al.  NON-DESTRUCTIVE QUALITY ANALYSIS OF INDIAN GUJARAT-17 ORYZA SATIVA SSP INDICA(RICE) USING IMAGE PROCESSING , 2012 .

[225]  Suleyman Gokhun Tanyer The Cumulative Distribution Function for a finite data set , 2012, 2012 20th Signal Processing and Communications Applications Conference (SIU).

[226]  John Berry,et al.  Non-Latin scripts: from metal to digital type , 2012 .

[227]  Yuting Su,et al.  Detection of video transcoding for digital forensics , 2012, 2012 International Conference on Audio, Language and Image Processing.

[228]  Tanupriya Choudhury,et al.  An Approach to Improve Task Scheduling in a Decentralized Cloud Computing Environment , 2012 .

[229]  Silvio Savarese,et al.  Comparing image classification methods: K-nearest-neighbor and support-vector-machines , 2012 .

[230]  G. Kirubavathi Venkatesh,et al.  HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural Network , 2012, WISTP.

[231]  S. Brunak,et al.  Mining electronic health records: towards better research applications and clinical care , 2012, Nature Reviews Genetics.

[232]  Kazuyuki Murase,et al.  A new hybrid ant colony optimization algorithm for feature selection , 2012, Expert Syst. Appl..

[233]  Yong Hu,et al.  Systematic literature review of machine learning based software development effort estimation models , 2012, Inf. Softw. Technol..

[234]  A. Dixit,et al.  Need of Securing Migrating Crawling Agent , Remote Platform and the Data Collection , 2012 .

[235]  Wang Rangding,et al.  Classifying computer generated graphics and natural image based on image contour information , 2012 .

[236]  Hong Zhu,et al.  Unifying the Semantics of Models and Meta-Models in the Multi-Layered UML Meta-Modelling Hierarchy , 2012, Int. J. Softw. Informatics.

[237]  Harish S. Gujjar,et al.  A Method for Identification of Basmati Rice grain of India and Its Quality Using Pattern Classification , 2012 .

[238]  Gary C. Kessler Advancing the Science of Digital Forensics , 2012, Computer.

[239]  Naomi Ehrich Leonard,et al.  Towards optimization of a human-inspired heuristic for solving explore-exploit problems , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[240]  Shinya Fukumoto,et al.  Interactive 3D Animation System for Web3D , 2012, 2012 IEEE International Conference on Multimedia and Expo Workshops.

[241]  Ch.Hima Bindu,et al.  Performance Analysis Of Multi Source Fused Medical Images Using Multiresolution Transforms , 2012 .

[242]  M. Turcsányi-Szabó,et al.  Augmented Reality in Education , 2018, Handbook of Mobile Teaching and Learning.

[243]  K. Gowen,et al.  Young adults with mental health conditions and social networking websites: seeking tools to build community. , 2012, Psychiatric rehabilitation journal.

[244]  V. K. Banga,et al.  Grading Of Rice Grains By Image Processing , 2012 .

[245]  Sulabha S. Apte,et al.  Improved Study of Heart Disease Prediction System using Data Mining Classification Techniques , 2012 .

[246]  Haiyan Wu,et al.  A Clustering Method Based on K-Means Algorithm , 2012 .

[247]  Janet Wiles,et al.  Parameter-Free Search of Time-Series Discord , 2013, Journal of Computer Science and Technology.

[248]  Attila Tanács,et al.  Car recognition from frontal images in mobile environment , 2013, 2013 8th International Symposium on Image and Signal Processing and Analysis (ISPA).

[249]  Pertti Saariluoma,et al.  How user experience is understood? , 2013, 2013 Science and Information Conference.

[250]  Mahmoud O. Elish Assessment of voting ensemble for estimating software development effort , 2013, 2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM).

[251]  Atul Kumar Pandey,et al.  A Heart Disease Prediction Model Using Decision Tree , 2013 .

[252]  Lauren E. Libero,et al.  Identification of neural connectivity signatures of autism using machine learning , 2013, Front. Hum. Neurosci..

[253]  Alberto Bacchelli,et al.  Expectations, outcomes, and challenges of modern code review , 2013, 2013 35th International Conference on Software Engineering (ICSE).

[254]  Harpreet Kaur,et al.  Classification and Grading Rice Using Multi-Class SVM , 2013 .

[255]  Indah Soesanti,et al.  Computer Aided Diagnosis for lung tuberculosis identification based on thoracic X-ray , 2013, 2013 International Conference on Information Technology and Electrical Engineering (ICITEE).

[256]  L. D. Dhinesh Babu,et al.  Honey bee behavior inspired load balancing of tasks in cloud computing environments , 2013, Appl. Soft Comput..

[257]  Michael Braun,et al.  Online Display Advertising: Modeling the Effects of Multiple Creatives and Individual Impression Histories , 2013, Mark. Sci..

[258]  C. Luo,et al.  Application of SARIMA Model in Cucumber Price Forecast , 2013, ICRA 2013.

[259]  S. Mohamed Mansoor Roomi,et al.  A Review of Face Recognition Methods , 2013, Int. J. Pattern Recognit. Artif. Intell..

[260]  Arun Prakash Agrawal,et al.  Comparative analysis of Relational and Graph databases , 2013 .

[261]  Kousik Dasgupta,et al.  A Genetic Algorithm (GA) based Load Balancing Strategy for Cloud Computing , 2013 .

[262]  Shannon Marcoon,et al.  HEART score to further risk stratify patients with low TIMI scores. , 2013, Critical pathways in cardiology.

[263]  William W. Cohen,et al.  Natural Language Models for Predicting Programming Comments , 2013, ACL.

[264]  Cheng-Chi Lee,et al.  Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks , 2013, Multimedia Systems.

[265]  Leonor Teixeira,et al.  Software Effort Estimation with Multiple Linear Regression: Review and Practical Application , 2013, J. Inf. Sci. Eng..

[266]  A. Wierzbicka Imprisoned in English: The Hazards of English as a Default Language , 2013 .

[267]  Andrzej Glowacz,et al.  The efficient real- and non-real-time make and model recognition of cars , 2013, Multimedia Tools and Applications.

[268]  Arputharaj Kannan,et al.  Intelligent feature selection and classification techniques for intrusion detection in networks: a survey , 2013, EURASIP Journal on Wireless Communications and Networking.

[269]  D. S. Bedi,et al.  Image Fusion Techniques and Quality Assessment Parameters for Clinical Diagnosis: A Review , 2013 .

[270]  Alimuddin Zumla,et al.  WHO's 2013 global report on tuberculosis: successes, threats, and opportunities , 2013, The Lancet.

[271]  Wei Lu,et al.  Mining Botnet Behaviors on the Large-Scale Web Application Community , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[272]  Ben Shneiderman,et al.  Designing The User Interface , 2013 .

[273]  Huaikou Miao,et al.  A Selenium based approach to automatic test script generation for refactoring JavaScript code , 2013, 2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS).

[274]  Dhanashree S. Medhekar,et al.  Heart Disease Prediction System using Naive Bayes , 2013 .

[275]  Nikhilesh Dholakia,et al.  Virtuality as place and process , 2013 .

[276]  Chris Piech,et al.  Deconstructing disengagement: analyzing learner subpopulations in massive open online courses , 2013, LAK '13.

[277]  Helmut Krcmar,et al.  Big Data , 2014, Wirtschaftsinf..

[278]  Jugal K. Kalita,et al.  MIFS-ND: A mutual information-based feature selection method , 2014, Expert Syst. Appl..

[279]  Yuan Wang,et al.  Modeling and Application Research on Customer Churn Warning System Based in Big Data Era , 2014, MUE 2014.

[280]  Anand Singh Jalal,et al.  A framework for key frame extraction from surveillance video , 2014, 2014 International Conference on Computer and Communication Technology (ICCCT).

[281]  Amit Chhabra,et al.  Improved J48 Classification Algorithm for the Prediction of Diabetes , 2014 .

[282]  Niels Pinkwart,et al.  Predicting MOOC Dropout over Weeks Using Machine Learning Methods , 2014, EMNLP 2014.

[283]  Abdolreza Hatamlou,et al.  Heart: a novel optimization algorithm for cluster analysis , 2014, Progress in Artificial Intelligence.

[284]  Bhagyashree Subhash Mahale,et al.  Rice quality analysis using image processing techniques , 2014, International Conference for Convergence for Technology-2014.

[285]  Andrew P. Martin,et al.  Threat-Based Security Analysis for the Internet of Things , 2014, 2014 International Workshop on Secure Internet of Things.

[286]  D. Bates,et al.  Big data in health care: using analytics to identify and manage high-risk and high-cost patients. , 2014, Health affairs.

[287]  Zety Marlia Zainal Abidin,et al.  Face recognition for security efficiency in managing and monitoring visitors of an organization , 2014, 2014 International Symposium on Biometrics and Security Technologies (ISBAST).

[288]  Domagoj Vrgoc,et al.  Querying Graphs with Data , 2016, J. ACM.

[289]  Nishu Singla Motion Detection Based on Frame Difference Method , 2014 .

[290]  Gediminas Adomavicius,et al.  Data mining for censored time-to-event data: a Bayesian network model for predicting cardiovascular risk from electronic health record data , 2014, Data Mining and Knowledge Discovery.

[291]  Hussein Zedan,et al.  A comprehensive survey on vehicular Ad Hoc network , 2014, J. Netw. Comput. Appl..

[292]  Ferat Sahin,et al.  A survey on feature selection methods , 2014, Comput. Electr. Eng..

[293]  Yogesh V. Joshi,et al.  Attributing Conversions in a Multichannel Online Marketing Environment : An Empirical Model and a Field Experiment , 2014 .

[294]  Jinan Fiaidhi,et al.  The Next Step for Learning Analytics , 2014, IT Prof..

[295]  Y. Kurucu,et al.  Crop Type Classification Using Vegetation Indices of RapidEye Imagery , 2014 .

[296]  Muhammad Fraz,et al.  Mid-level-Representation Based Lexicon for Vehicle Make and Model Recognition , 2014, 2014 22nd International Conference on Pattern Recognition.

[297]  G. Elwyn,et al.  Naturally Occurring Peer Support through Social Media: The Experiences of Individuals with Severe Mental Illness Using YouTube , 2014, PloS one.

[298]  Witold Pedrycz,et al.  Human-Centric Decision-Making Models for Social Sciences , 2013, Human-Centric Decision-Making Models for Social Sciences.

[299]  Morteza Nikooghadam,et al.  Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems , 2014, Journal of Medical Systems.

[300]  Megha R. Siddagangappa,et al.  Classification and Quality Analysis of Food Grains , 2014 .

[301]  Sundaresan Jayaraman,et al.  Wearables: Fundamentals, advancements, and a roadmap for the future , 2021, Wearable Sensors.

[302]  Noor Christoph,et al.  Augmented reality in medical education? , 2014, Perspectives on Medical Education.

[303]  Phayung Meesad,et al.  Fast K-Means Clustering for Very Large Datasets Based on MapReduce Combined with a New Cutting Method , 2014, KSE.

[304]  K. Pramod,et al.  Soft Computing Models for the Predictive Grading of Childhood Autism- A Comparative Study , 2014 .

[305]  P. Lambin,et al.  Decoding tumour phenotype by noninvasive imaging using a quantitative radiomics approach , 2014, Nature Communications.

[306]  Aderemi Oluyinka Adewumi,et al.  Stock Price Prediction Using the ARIMA Model , 2014, 2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation.

[307]  Clement J. McDonald,et al.  Automatic Tuberculosis Screening Using Chest Radiographs , 2014, IEEE Transactions on Medical Imaging.

[308]  David Schwartz,et al.  The Ripple Protocol Consensus Algorithm , 2014 .

[309]  Diana Göhringer,et al.  Using JSON to manage communication between services in the Internet of Things , 2014, 2014 9th International Symposium on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC).

[310]  Ran Bi Effects of typographic variables on attitude measures in reading bilingual brands , 2014 .

[311]  K. L. Shunmuganathan,et al.  Overview of mobile agent security issues — Solutions , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).

[312]  Quoc V. Le,et al.  Sequence to Sequence Learning with Neural Networks , 2014, NIPS.

[313]  Antonio Pescapè,et al.  On the Integration of Cloud Computing and Internet of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.

[314]  Sukhvir Kaur,et al.  Quality Analysis of Indian Basmati Rice Grains Using Digital Image Processing-A Review , 2014 .

[315]  John R. Schott,et al.  Landsat-8 Thermal Infrared Sensor (TIRS) Vicarious Radiometric Calibration , 2014, Remote. Sens..

[316]  Sung Bum Pan,et al.  Automatic lung segmentation for large-scale medical image management , 2016, Multimedia Tools and Applications.

[317]  Weizhong Zhao,et al.  Topic modeling for cluster analysis of large biological and medical datasets , 2014, BMC Bioinformatics.

[318]  Yu-Gang Jiang,et al.  A relative similarity based method for interactive patient risk prediction , 2014, Data Mining and Knowledge Discovery.

[319]  Alejandro Zunino,et al.  An empirical comparison of botnet detection methods , 2014, Comput. Secur..

[320]  Rui Zheng,et al.  Quick search algorithms based on ethnic facial image database , 2014, 2014 IEEE 5th International Conference on Software Engineering and Service Science.

[321]  Zahir Tari,et al.  A Survey of Clustering Algorithms for Big Data: Taxonomy and Empirical Analysis , 2014, IEEE Transactions on Emerging Topics in Computing.

[322]  S. P. Ghrera,et al.  Pixel-Based Image Forgery Detection: A Review , 2014 .

[323]  Amit Yerpude,et al.  Classification of Basmati Rice Grain Variety using Image Processing and Principal Component Analysis , 2014, ArXiv.

[324]  S Abirami.,et al.  Analysis of Rice Granules using Image Processing and Neural Network Pattern Recognition Tool , 2014 .

[325]  Ryan S. Baker,et al.  Educational Data Mining and Learning Analytics , 2014 .

[326]  A. Daif,et al.  Review current CRM architectures and introducing new adapted architecture to Big Data , 2015, 2015 International Conference on Computing, Communication and Security (ICCCS).

[327]  Wenpeng Yin,et al.  Convolutional Neural Network for Paraphrase Identification , 2015, NAACL.

[328]  Prateek Pandey,et al.  A fuzzy decision making approach for analogy detection in new product forecasting , 2015, J. Intell. Fuzzy Syst..

[329]  M. Tech Review on Existing Load Balancing Techniques of Cloud Computing , 2015 .

[330]  Girish N. Nadkarni,et al.  Incorporating temporal EHR data in predictive models for risk stratification of renal function deterioration , 2014, J. Biomed. Informatics.

[331]  Ikechukwu Nwobodo Cloud Computing: A Detailed Relationship to Grid and Cluster Computing , 2015 .

[332]  Dit-Yan Yeung,et al.  Temporal Models for Predicting Student Dropout in Massive Open Online Courses , 2015, 2015 IEEE International Conference on Data Mining Workshop (ICDMW).

[333]  Jina Varghese,et al.  An Algorithmic Approach for General Video Summarization , 2015, 2015 Fifth International Conference on Advances in Computing and Communications (ICACC).

[334]  Gautam Bandyopadhyay,et al.  Gold Price Forecasting Using ARIMA Model , 2015 .

[335]  Yifei Zhang,et al.  A novel approach of lung segmentation on chest CT images using graph cuts , 2015, Neurocomputing.

[336]  Luis Miguel Bergasa,et al.  Expert video-surveillance system for real-time detection of suspicious behaviors in shopping malls , 2015, Expert Syst. Appl..

[337]  Thomas Brox,et al.  U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.

[338]  Abhay Kumar Singh,et al.  A survey on congestion control mechanisms in packet switch networks , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.

[339]  Kang Li,et al.  Big data gathering and mining pipelines for CRM using open-source , 2015, 2015 IEEE International Conference on Big Data (Big Data).

[340]  James Bailey,et al.  Identifying At-Risk Students in Massive Open Online Courses , 2015, AAAI.

[341]  El-Sayed M. El-Horbaty,et al.  Intelligent cloud algorithms for load balancing problems: A survey , 2015, 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS).

[342]  Jasjit S. Suri,et al.  Automatic Lung Segmentation Using Control Feedback System: Morphology and Texture Paradigm , 2015, Journal of Medical Systems.

[343]  Rahul Kumar,et al.  Footprint Recognition with Principal Component Analysis and Independent Component Analysis , 2015 .

[344]  Kayvan Najarian,et al.  Big Data Analytics in Healthcare , 2015, BioMed research international.

[345]  Sadique Sheik,et al.  Reservoir computing compensates slow response of chemosensor arrays exposed to fast varying gas concentrations in continuous monitoring , 2015 .

[346]  Sridha Sridharan,et al.  An Efficient and Robust System for Multiperson Event Detection in Real-World Indoor Surveillance Scenes , 2015, IEEE Transactions on Circuits and Systems for Video Technology.

[347]  A. Aditya,et al.  A Comparative Study of Different Static and Dynamic Load Balancing Algorithm in Cloud Computing with Special Emphasis on Time Factor , 2015 .

[348]  Hai-Cheng Chu,et al.  The Cooperation Mechanism of Multi-agent Systems with Respect to Big Data from Customer Relationship Management Aspect , 2015, ACIIDS.

[349]  Lei Zhu,et al.  Parallel Key Frame Extraction for Surveillance Video Service in a Smart City , 2015, PloS one.

[350]  Mahdi Fazeli,et al.  Proposing a load balancing method based on Cuckoo Optimization Algorithm for energy management in cloud computing infrastructures , 2015, 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO).

[351]  R. A. Karthika PROVIDING PASSWORD SECURITY BY SALTED PASSWORD HASHING USING BCRYPT ALGORITHM , 2015 .

[352]  M. P. Rajath Kumar,et al.  Artificial neural networks for face recognition using PCA and BPNN , 2015, TENCON 2015 - 2015 IEEE Region 10 Conference.

[353]  Khaled Ghédira,et al.  th International Conference on Knowledge Based and Intelligent Information and Engineering Systems Agent ’ s security during communication in mobile agents system , 2015 .

[354]  Abdelaziz El Fazziki,et al.  Social intelligence framework: Extracting and analyzing opinions for social CRM , 2015, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).

[355]  Yong Tang,et al.  Vehicle detection and recognition for intelligent traffic surveillance system , 2017, Multimedia Tools and Applications.

[356]  Tianqi Chen,et al.  Empirical Evaluation of Rectified Activations in Convolutional Network , 2015, ArXiv.

[357]  Mudita Singhal,et al.  Supervised and Unsupervised methods to detect Insider Threat from Enterprise Social and Online Activity Data , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[358]  R. Agarwal,et al.  WASTE MANAGEMENT INITIATIVES IN INDIA FOR HUMAN WELL BEING , 2015 .

[359]  R.Priya nka Face Recognition Based on Principal Component Analysis and Linear Discriminant Analysis , 2015 .

[360]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[361]  Gerd Gigerenzer,et al.  The power of simplicity: a fast-and-frugal heuristics approach to performance science , 2015, Front. Psychol..

[362]  C. K. Kumbharana,et al.  Identification of Best Suitable Samples for Training Database for Face Recognition using Principal Component Analysis with Eigenface Method , 2015 .

[363]  Daxin Tian,et al.  A Dynamic and Self-Adaptive Network Selection Method for Multimode Communications in Heterogeneous Vehicular Telematics , 2015, IEEE Transactions on Intelligent Transportation Systems.

[364]  Yier Jin,et al.  Privacy and Security in Internet of Things and Wearable Devices , 2015, IEEE Transactions on Multi-Scale Computing Systems.

[365]  O. Kuznetsov Conceptual semantics , 2015, Scientific and Technical Information Processing.

[366]  Yu Zhang,et al.  An IoT electric business model based on the protocol of bitcoin , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.

[367]  D. Mollura,et al.  Segmentation and Image Analysis of Abnormal Lungs at CT: Current Approaches, Challenges, and Future Trends. , 2015, Radiographics : a review publication of the Radiological Society of North America, Inc.

[368]  D. Wall,et al.  Searching for a minimal set of behaviors for autism detection through feature selection-based machine learning , 2015, Translational Psychiatry.

[369]  Ying LU,et al.  Decision tree methods: applications for classification and prediction , 2015, Shanghai archives of psychiatry.

[370]  Karamjit Bhatia,et al.  Future of Face Recognition: A Review , 2015 .

[371]  Bram van Ginneken,et al.  Pulmonary Nodule Detection in CT Images: False Positive Reduction Using Multi-View Convolutional Networks , 2016, IEEE Transactions on Medical Imaging.

[372]  Sakir Sezer,et al.  N-opcode analysis for android malware classification and categorization , 2016, 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security).

[373]  Reza Malekian,et al.  A novel and secure IoT based cloud centric architecture to perform predictive analysis of users activities in sustainable health centres , 2017, Multimedia Tools and Applications.

[374]  Shabnam Sharma,et al.  Review of recent load balancing techniques in cloud computing and BAT algorithm variants , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[375]  K. Zubair The Rise and Decline of ArabuTamil Language for Tamil Muslims , 2016 .

[376]  Mohammad Havaei,et al.  HeMIS: Hetero-Modal Image Segmentation , 2016, MICCAI.

[377]  F. Olleros,et al.  Research Handbook on Digital Transformations , 2016 .

[378]  Suad Alhojely,et al.  Sentiment Analysis and Opinion Mining: A Survey , 2016 .

[379]  Simant Prakoonwit,et al.  Car make and model recognition under limited lighting conditions at night , 2017, Pattern Analysis and Applications.

[380]  Abhirup Khanna,et al.  Intelligent supply chain management system , 2016, 2016 International Conference on Advances in Computing and Communication Engineering (ICACCE).

[381]  Tianqi Chen,et al.  XGBoost: A Scalable Tree Boosting System , 2016, KDD.

[382]  Sathiamoorthy Manoharan,et al.  A Collaborative Code Review Platform for GitHub , 2016, 2016 21st International Conference on Engineering of Complex Computer Systems (ICECCS).

[383]  Archana A. Savalgi,et al.  Laplace Transformation based Cryptographic Technique in Network Security , 2016 .

[384]  Matthias Mettler,et al.  Blockchain technology in healthcare: The revolution starts here , 2016, 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom).

[385]  Mohammad Hossein Moattar,et al.  Robust Feature Selection from Microarray Data Based on Cooperative Game Theory and Qualitative Mutual Information , 2016, Adv. Bioinformatics.

[386]  Luyao Xu,et al.  Big Data Analytics toward Intelligent Mobile Service Provisions of Customer Relationship Management in e-Commerce , 2016 .

[387]  Arun Sam Singh Selwyn Jebaraj Implementing Electronic Health Records in New Zealand : A Critical Appraisal of Literature , 2016 .

[388]  Jacob Y. H. Jou,et al.  Cross-Language Comparison of the Persuasive Effects of Typeface Shapes: A Conceptual Framework , 2016 .

[389]  IV CyrilHöschl,et al.  Recognition of Images Degraded by Gaussian Blur , 2016, IEEE Transactions on Image Processing.

[390]  George E. Sakr,et al.  Comparing deep learning and support vector machines for autonomous waste sorting , 2016, 2016 IEEE International Multidisciplinary Conference on Engineering Technology (IMCET).

[391]  Wolfgang Wahlster,et al.  New Horizons for a Data-Driven Economy , 2016, Springer International Publishing.

[392]  Dian Anggraini,et al.  Comparison of accuracy level K-Nearest Neighbor algorithm and Support Vector Machine algorithm in classification water quality status , 2016, 2016 6th International Conference on System Engineering and Technology (ICSET).

[393]  D. Barton,et al.  Depression and the Link with Cardiovascular Disease , 2016, Front. Psychiatry.

[394]  Keke Gai,et al.  Optimal Big Data Sharing Approach for Tele-Health in Cloud Computing , 2016, 2016 IEEE International Conference on Smart Cloud (SmartCloud).

[395]  Sebastian Ruder,et al.  An overview of gradient descent optimization algorithms , 2016, Vestnik komp'iuternykh i informatsionnykh tekhnologii.

[396]  Martin White,et al.  Deep learning code fragments for code clone detection , 2016, 2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE).

[397]  Ching-Hsien Hsu,et al.  Efficient identity authentication and encryption technique for high throughput RFID system , 2016, Secur. Commun. Networks.

[398]  Ammi Reddy Pulagam,et al.  Automated Lung Segmentation from HRCT Scans with Diffuse Parenchymal Lung Diseases , 2016, Journal of Digital Imaging.

[399]  Bhed Bahadur Bista Improving Energy Consumption of Epidemic Routing in Delay Tolerant Networks , 2016, 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).

[400]  Zhongfei Zhang,et al.  DeepIntent: Learning Attentions for Online Advertising with Recurrent Neural Networks , 2016, KDD.

[401]  Kem Z. K. Zhang,et al.  Blockchain-based sharing services: What blockchain technology can contribute to smart cities , 2016, Financial Innovation.

[402]  Andrew N. Smith,et al.  Augmented Reality: Designing Immersive Experiences that Maximize Consumer Engagement , 2016 .

[403]  Min Chen,et al.  Smart Clothing: Connecting Human with Clouds and Big Data for Sustainable Health Monitoring , 2016, Mobile Networks and Applications.

[404]  D. Wall,et al.  Use of machine learning for behavioral distinction of autism and ADHD , 2016, Translational Psychiatry.

[405]  Dan Wang,et al.  TDS: Time-dependent sponsored data plan for wireless data traffic market , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[406]  Ke Zhang,et al.  2016 Ieee International Conference on Big Data (big Data) Automated It System Failure Prediction: a Deep Learning Approach , 2022 .

[407]  Prakash Veeraraghavan,et al.  Elliptic Curve Based Cybersecurity Schemes for Publish-Subscribe Internet of Things , 2016, QSHINE.

[408]  Tanupriya Choudhury,et al.  Fog computing: Common security issues and proposed countermeasures , 2016, 2016 International Conference System Modeling & Advancement in Research Trends (SMART).

[409]  Artde Donald Kin-Tak Lam,et al.  A study on experimental teaching of 3D animation , 2016, 2016 International Conference on Applied System Innovation (ICASI).

[410]  R. Chalmeta,et al.  Social customer relationship management: taking advantage of Web 2.0 and Big Data technologies , 2016, SpringerPlus.

[411]  Amir Dirin,et al.  From Usability to User Experience in Mobile Learning Applications , 2016 .

[412]  Alec Wolman,et al.  MCDNN: An Approximation-Based Execution Framework for Deep Stream Processing Under Resource Constraints , 2016, MobiSys.

[413]  Amarsinh Vidhate,et al.  Routing in Delay Tolerant Network , 2016 .

[414]  Divya Meena,et al.  An approach to face detection and recognition , 2016, 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE).

[415]  Piotr Zabawa Context-Driven Meta-Modeling framework (CDMM-F) ‒ context role , 2016 .

[416]  Rahul Telang,et al.  What Is a Digital Cookie Worth , 2016 .

[417]  Andrew Lippman,et al.  MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).

[418]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[419]  Russell Greiner,et al.  Using Functional or Structural Magnetic Resonance Images and Personal Characteristic Data to Identify ADHD and Autism , 2016, PloS one.

[420]  John J. Nay,et al.  Application of machine learning to the prediction of vegetation health , 2016 .

[421]  M. Anusha,et al.  Big Data-Survey , 2016 .

[422]  Xudong Ma,et al.  Dynamic Android Malware Classification Using Graph-Based Representations , 2016, 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud).

[423]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[424]  Muhammad Suryanegara,et al.  Heart disease prediction system using k-Nearest neighbor algorithm with simplified patient's health parameters , 2016 .

[425]  Siti Zuraida Maaruf,et al.  Interactive Visual Art Education Pedagogical Module: Typography in Visual Communication , 2016 .

[426]  Tamara Radivilova,et al.  Dynamic load balancing algorithm of distributed systems , 2016, 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET).

[427]  Kursat Cagiltay,et al.  How Serif and Sans Serif Typefaces Influence Reading on Screen: An Eye Tracking Study , 2016, HCI.

[428]  Min Chen,et al.  Enhanced Fingerprinting and Trajectory Prediction for IoT Localization in Smart Buildings , 2016, IEEE Transactions on Automation Science and Engineering.

[429]  Qiaoyan Wen,et al.  A multi-level feature extraction technique to detect moble botnet , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).

[430]  Xiao Hu,et al.  Comparing machine learning clustering with latent class analysis on cancer symptoms' data , 2016, 2016 IEEE Healthcare Innovation Point-Of-Care Technologies Conference (HI-POCT).

[431]  Abdelaziz El Fazziki,et al.  Multi-agent framework for social CRM: Extracting and analyzing opinions , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[432]  Abhirup Khanna,et al.  Mobile cloud computing architecture for computation offloading , 2016, 2016 2nd International Conference on Next Generation Computing Technologies (NGCT).

[433]  C. Helen Sulochana,et al.  Automatic detection of pulmonary tuberculosis using image processing techniques , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[434]  Takuya Sakamoto,et al.  Fast imaging method for security systems using ultrawideband radar , 2016, IEEE Transactions on Aerospace and Electronic Systems.

[435]  Anthony Skjellum,et al.  A brief survey of Cryptocurrency systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[436]  S. Sudha,et al.  An automatic classification method for environment: Friendly waste segregation using deep learning , 2016, 2016 IEEE Technological Innovations in ICT for Agriculture and Rural Development (TIAR).

[437]  Bowen Zhou,et al.  Abstractive Text Summarization using Sequence-to-sequence RNNs and Beyond , 2016, CoNLL.

[438]  Yeshvendra K. Singh,et al.  Heart Disease Prediction System Using Random Forest , 2016 .

[439]  Shazwani A. Nur,et al.  Vehicle detection based on underneath vehicle shadow using edge features , 2016, 2016 6th IEEE International Conference on Control System, Computing and Engineering (ICCSCE).

[440]  Ong Sing Goh,et al.  A Review on Automatic Text Summarization Approaches , 2016, J. Comput. Sci..

[441]  Ian Thomas Using multi-armed bandit experimentation to optimise multichannel digital marketing campaigns , 2017 .

[442]  Ronald M. Summers,et al.  ChestX-ray: Hospital-Scale Chest X-ray Database and Benchmarks on Weakly Supervised Classification and Localization of Common Thorax Diseases , 2019, Deep Learning and Convolutional Neural Networks for Medical Imaging and Clinical Informatics.

[443]  Qi Xia,et al.  BBDS: Blockchain-Based Data Sharing for Electronic Medical Records in Cloud Environments , 2017, Inf..

[444]  Nareli Cruz Cortés,et al.  Feature selection to detect botnets using machine learning algorithms , 2017, 2017 International Conference on Electronics, Communications and Computers (CONIELECOMP).

[445]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[446]  Meikang Qiu,et al.  Enabling real-time information service on telehealth system over cloud-based big data platform , 2017, J. Syst. Archit..

[447]  Bayu Adhi Tama,et al.  Tree-based classifier ensembles for early detection method of diabetes: an exploratory study , 2019, Artificial Intelligence Review.

[448]  Raphaël Féraud,et al.  The non-stationary stochastic multi-armed bandit problem , 2017, International Journal of Data Science and Analytics.

[449]  José Ramón Saura,et al.  Understanding the Digital Marketing Environment with KPIs and Web Analytics , 2017, Future Internet.

[450]  Luke Church,et al.  Modern Code Review: A Case Study at Google , 2017, 2018 IEEE/ACM 40th International Conference on Software Engineering: Software Engineering in Practice Track (ICSE-SEIP).

[451]  Jacob Whitehill,et al.  MOOC Dropout Prediction: How to Measure Accuracy? , 2017, L@S.

[452]  Anindya Iqbal,et al.  SentiCR: A customized sentiment analysis tool for code review interactions , 2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE).

[453]  Junfeng Chen,et al.  Global optimal hybrid geometric active contour for automated lung segmentation on CT images , 2017, Comput. Biol. Medicine.

[454]  S. Giddings,et al.  Miliary Tuberculosis Presenting with ARDS and Shock: A Case Report and Challenges in Current Management and Diagnosis , 2017, Case reports in critical care.

[455]  Naveen K. Chilamkurti,et al.  Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing , 2017, Mobile Networks and Applications.

[456]  Maruf Pasha,et al.  Survey of Machine Learning Algorithms for Disease Diagnostic , 2017 .

[457]  Z. Obermeyer,et al.  Individual differences in normal body temperature: longitudinal big data analysis of patient records , 2017, British Medical Journal.

[458]  Sergey Gorinsky,et al.  An advertising revenue model for access ISPs , 2017, 2017 IEEE Symposium on Computers and Communications (ISCC).

[459]  Rawya Rizk,et al.  Honey Bee Based Load Balancing in Cloud Computing , 2017, KSII Trans. Internet Inf. Syst..

[460]  Philippe Dobbelaere,et al.  Kafka versus RabbitMQ: A comparative study of two industry reference publish/subscribe implementations: Industry Paper , 2017, DEBS.

[461]  Kilian Q. Weinberger,et al.  Densely Connected Convolutional Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[462]  Alexander Kraas,et al.  On the Automated Derivation of Domain-Specific UML Profiles , 2017, ECMFA.

[463]  Priya Rajendra Patil,et al.  Automated Diagnosis of Heart Disease using Data Mining Techniques , 2017 .

[464]  Vipin Tyagi,et al.  Predictive Computing and Information Security , 2017, Springer Singapore.

[465]  Jean-Philippe Thiran,et al.  A Computer Vision System to Localize and Classify Wastes on the Streets , 2017, ICVS.

[466]  Yun Sing Koh,et al.  A Survey of Sequential Pattern Mining , 2017 .

[467]  Tarek F. Abdelzaher,et al.  DeepIoT: Compressing Deep Neural Network Structures for Sensing Systems with a Compressor-Critic Framework , 2017, SenSys.

[468]  P. Deepalakshmi,et al.  Server-based Dynamic Load Balancing , 2017, 2017 International Conference on Networks & Advances in Computational Technologies (NetACT).

[469]  Mung Chiang,et al.  Behavior-Based Grade Prediction for MOOCs Via Time Series Neural Networks , 2017, IEEE Journal of Selected Topics in Signal Processing.

[470]  Min Chen,et al.  Wearable 2.0: Enabling Human-Cloud Integration in Next Generation Healthcare Systems , 2017, IEEE Communications Magazine.

[471]  Bram van den Bekerom Using Machine Learning for Detection of Autism Spectrum Disorder , 2017 .

[472]  Pāvels Gončarovs,et al.  Data Analytics in CRM Processes: A Literature Review , 2017 .

[473]  H. K. Homood Lagrange Interpolation for Mobile Agent Connection Encryption , 2017 .

[474]  Ali Farhadi,et al.  YOLO9000: Better, Faster, Stronger , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[475]  Monisha Singh,et al.  Comparative Study of Open Source Automated Web Testing Tools: Selenium and Sahi , 2017 .

[476]  Stathes Hadjiefthymiades,et al.  Challenges and Opportunities of Waste Management in IoT-Enabled Smart Cities: A Survey , 2017, IEEE Transactions on Sustainable Computing.

[477]  Dhanaraj Cheelu,et al.  A comparative study of static and dynamic load balancing algorithms in cloud computing , 2017, 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS).

[478]  Mohammad Rezaul Karim Security for Mobile Agents and Platforms: Securing the Code and Protecting its Integrity , 2017 .

[479]  Athanasios V. Vasilakos,et al.  A Manufacturing Big Data Solution for Active Preventive Maintenance , 2017, IEEE Transactions on Industrial Informatics.

[480]  Jacob Whitehill,et al.  Delving Deeper into MOOC Student Dropout Prediction , 2017, ArXiv.

[481]  Athanasios K. Tsakalidis,et al.  Graph Community Discovery Algorithms in Neo4j with a Regularization-based Evaluation Metric , 2017, WEBIST.

[482]  J. Rexce,et al.  Classification of Milled Rice Using Image Processing , 2017 .

[483]  Tanupriya Choudhury,et al.  KAFKA: The modern platform for data management and analysis in big data domain , 2017, 2017 2nd International Conference on Telecommunication and Networks (TEL-NET).

[484]  Ki-Il Kim,et al.  A Survey on Real-Time Communications in Wireless Sensor Networks , 2017, Wirel. Commun. Mob. Comput..

[485]  Adam Doupé,et al.  Deep Android Malware Detection , 2017, CODASPY.

[486]  Michal Madera,et al.  A case study on machine learning model for code review expert system in software engineering , 2017, 2017 Federated Conference on Computer Science and Information Systems (FedCSIS).

[487]  M. Shamim Hossain,et al.  Localization Based on Social Big Data Analysis in the Vehicular Networks , 2017, IEEE Transactions on Industrial Informatics.

[488]  Zachary A. Pardos,et al.  Predictive Modelling of Student Behavior Using Granular Large-Scale Action Data , 2017 .

[489]  S. Hollon,et al.  The Healthy Activity Program (HAP), a lay counsellor-delivered brief psychological treatment for severe depression, in primary care in India: a randomised controlled trial , 2017, The Lancet.

[490]  Taku Yamazaki,et al.  PRIOR: Prioritized Forwarding for Opportunistic Routing , 2017, IEICE Trans. Commun..

[491]  Waqar Mehmood,et al.  Risk Aware and Quality Enriched Effort Estimation for Mobile Applications in Distributed Agile Software Development , 2017, J. Inf. Sci. Eng..

[492]  Jan K. Woike,et al.  FFTrees: A toolbox to create, visualize, and evaluate fast-and-frugal decision trees , 2017, Judgment and Decision Making.

[493]  Amit Agarwal,et al.  Adaptive mobile computation offloading for data stream applications , 2017, 2017 3rd International Conference on Advances in Computing,Communication & Automation (ICACCA) (Fall).

[494]  Janis Grabis,et al.  Using Data Analytics for Continuous Improvement of CRM Processes: Case of Financial Institution , 2017, ADBIS.

[495]  Gaurav Pahwa,et al.  Code review analysis of software system using machine learning techniques , 2017, 2017 11th International Conference on Intelligent Systems and Control (ISCO).

[496]  Pablo Padilla,et al.  Electromagnetic Near-Field Inhomogeneity Reduction for Image Acquisition Optimization in High-Resolution Multi-Channel Magnetic Resonance Imaging (MRI) Systems , 2017, IEEE Access.

[497]  Ye Yu,et al.  A Vehicle Logo Recognition Approach Based on Foreground-Background Pixel-Pair Feature , 2017, Trans. Edutainment.

[498]  Jun Wang,et al.  Display Advertising with Real-Time Bidding (RTB) and Behavioural Targeting , 2016, Found. Trends Inf. Retr..

[499]  Andy Laws,et al.  Machine learning approaches to predict learning outcomes in Massive open online courses , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).

[500]  Abhishek Rairikar,et al.  Heart disease prediction using data mining techniques , 2017, 2017 International Conference on Intelligent Computing and Control (I2C2).

[501]  Rajesh Krishna Balan,et al.  DeepMon: Mobile GPU-based Deep Learning Framework for Continuous Vision Applications , 2017, MobiSys.

[502]  S. French,et al.  Decision trees in epidemiological research , 2017, Emerging Themes in Epidemiology.

[503]  Gianluca Stringhini,et al.  Marmite: Spreading Malicious File Reputation Through Download Graphs , 2017, ACSAC.

[504]  Mikko Valkama,et al.  Wireless Energy Harvesting and Communications: Limits and Reliability , 2017, 2017 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).

[505]  Abhishek Sharma,et al.  Detection of pneumonia clouds in chest X-ray using image processing approach , 2017, 2017 Nirma University International Conference on Engineering (NUiCONE).

[506]  Dusit Niyato,et al.  A Hierarchical Game with Strategy Evolution for Mobile Sponsored Content/Service Markets , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[507]  V. Cherian Heart Disease Prediction Using Naïve Bayes Algorithm and Laplace Smoothing Technique , 2017 .

[508]  Baofeng Su,et al.  Significant Remote Sensing Vegetation Indices: A Review of Developments and Applications , 2017, J. Sensors.

[509]  Seng Cheong Loke Astronomical Image Acquisition Using an Improved Track and Accumulate Method , 2017, IEEE Access.

[510]  Markus Kraft,et al.  Blockchain technology in the chemical industry: Machine-to-machine electricity market , 2017 .

[511]  Annamária R. Várkonyi-Kóczy,et al.  A Load Balancing Algorithm for Resource Allocation in Cloud Computing , 2017 .

[512]  Qi Dou Multi-level Contextual 3D CNNs for False Positive Reduction in Pulmonary Nodule Detection , 2017 .

[513]  V. Patel Talking sensibly about depression , 2017, PLoS medicine.

[514]  Min Chen,et al.  Big-Data Analytics for Cloud, IoT and Cognitive Computing , 2017 .

[515]  Jiangtao Wen,et al.  The IoT electric business model: Using blockchain technology for the internet of things , 2016, Peer-to-Peer Networking and Applications.

[516]  Luiz Sergio de Souza,et al.  Total Data Quality Management and Total Information Quality Management Applied to Costumer Relationship Management , 2017, ICIME 2017.

[517]  Min Chen,et al.  Emotion Communication System , 2017, IEEE Access.

[518]  Patricia Lago,et al.  Research on Architecting Microservices: Trends, Focus, and Potential for Industrial Adoption , 2017, 2017 IEEE International Conference on Software Architecture (ICSA).

[519]  Radha Poovendran,et al.  Google's Cloud Vision API is Not Robust to Noise , 2017, 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA).

[520]  Feifei Li,et al.  DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning , 2017, CCS.

[521]  M. Nikhil Kumar,et al.  Prediction of Heart Diseases Using Data Mining and Machine Learning Algorithms and Tools , 2018 .

[522]  Seyed Morteza Babamir,et al.  A PSO‐based task scheduling algorithm improved using a load‐balancing technique for the cloud computing environment , 2018, Concurr. Comput. Pract. Exp..

[523]  Siddharth Swarup Rautaray,et al.  Assessment of Object Detection Using Deep Convolutional Neural Networks , 2018 .

[524]  Ravi Tomar,et al.  An Architectural View Towards Autonomic Cloud Computing , 2018 .

[525]  Parth Jajoo,et al.  Smart Garbage Management System , 2018, 2018 International Conference on Smart City and Emerging Technology (ICSCET).

[526]  Usha Devi Gandhi,et al.  A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of heart diseases , 2017, Comput. Electr. Eng..

[527]  W.K.R. Perera,et al.  A Review of Big Data Analytics for Customer Relationship Management , 2018, 2018 3rd International Conference on Information Technology Research (ICITR).

[528]  Russell Greiner,et al.  A general prediction model for the detection of ADHD and Autism using structural and functional MRI , 2018, PloS one.

[529]  Paramvir Bahl,et al.  VideoEdge: Processing Camera Streams using Hierarchical Clusters , 2018, 2018 IEEE/ACM Symposium on Edge Computing (SEC).

[530]  Tingting Yu,et al.  Logics for Bisimulation and Divergence , 2018, FoSSaCS.

[531]  Xinghao Jiang,et al.  Computer Graphics Identification Combining Convolutional and Recurrent Neural Networks , 2018, IEEE Signal Processing Letters.

[532]  Bohdan Pavlyshenko,et al.  Using Stacking Approaches for Machine Learning Models , 2018, 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP).

[533]  Michail N. Giannakos,et al.  Big data analytics capabilities: a systematic literature review and research agenda , 2017, Information Systems and e-Business Management.

[534]  Cenk Bircanoglu,et al.  RecycleNet: Intelligent Waste Sorting Using Deep Neural Networks , 2018, 2018 Innovations in Intelligent Systems and Applications (INISTA).

[535]  Lili He,et al.  A Novel Transfer Learning Approach to Enhance Deep Neural Network Classification of Brain Functional Connectomes , 2018, Front. Neurosci..

[536]  Amin S. Sayedi-Roshkhar Real-Time Bidding in Online Display Advertising , 2018, Mark. Sci..

[537]  Xuefeng Chen,et al.  Key Frame Extraction of Surveillance Video based on Moving Object Detection and Image Similarity , 2018 .

[538]  A. Arthy,et al.  A Survey on Heart Disease Prediction Using Data Mining Techniques , 2018 .

[539]  Amandeep Kaur,et al.  HEART DISEASE PREDICTION USING DATA MINING TECHNIQUES: A SURVEY , 2018 .

[540]  María Romero,et al.  Vineyard water status estimation using multispectral imagery from an UAV platform and machine learning algorithms for irrigation scheduling management , 2018, Comput. Electron. Agric..

[541]  Sebastian Olbrich,et al.  Capabilities and Impediments to Leverage Customer Value from Data " A Case Study from the Automotive Industry , 2018, ICIS.

[542]  Ausif Mahmood,et al.  Enhanced Human Face Recognition Using LBPH Descriptor, Multi-KNN, and Back-Propagation Neural Network , 2018, IEEE Access.

[543]  Scott D. Fleming,et al.  CFar: A Tool to Increase Communication, Productivity, and Review Quality in Collaborative Code Reviews , 2018, CHI.

[544]  Varun Ganapathi,et al.  GritNet: Student Performance Prediction with Deep Learning , 2018, EDM.

[545]  Jaakko Lehtinen,et al.  Progressive Growing of GANs for Improved Quality, Stability, and Variation , 2017, ICLR.

[546]  K. Hans,et al.  Micronutrients in the life cycle: Requirements and sufficient supply , 2018, NFS Journal.

[547]  Nimish Ukey,et al.  Energy Based Recent Trends in Delay Tolerant Networks , 2018 .

[548]  Stefan Plantikow,et al.  Cypher: An Evolving Query Language for Property Graphs , 2018, SIGMOD Conference.

[549]  Z. Elyusufi,et al.  Customer profiling using CEP architecture in a Big Data context , 2018 .

[550]  Zhongyuan Wang,et al.  Smart Monitoring Cameras Driven Intelligent Processing to Big Surveillance Video Data , 2018, IEEE Transactions on Big Data.

[551]  Jian Yang,et al.  Demystifying Advertising Campaign for CPA Goal Optimization , 2018, WWW.

[552]  Jie Li,et al.  An Intelligent Garbage Bin Based on NB-IOT Research Mode , 2018, 2018 IEEE International Conference of Safety Produce Informatization (IICSPI).

[553]  Cristina Cervello-Pastor,et al.  An architecture for the 5G control plane based on SDN and data distribution service , 2018, 2018 Fifth International Conference on Software Defined Systems (SDS).

[554]  Teddy Mantoro,et al.  Multi-Faces Recognition Process Using Haar Cascades and Eigenface Methods , 2018, 2018 6th International Conference on Multimedia Computing and Systems (ICMCS).

[555]  Naveen K. Chilamkurti,et al.  Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..

[556]  V. V. Yerigeri,et al.  Rice Grain Quality Grading Using Digital Image Processing Techniques , 2018 .

[557]  Niraj Singhal,et al.  A reliability based approach for securing migrating crawlers , 2018 .

[558]  Jiang Bian,et al.  Big data hurdles in precision medicine and precision public health , 2018, BMC Medical Informatics and Decision Making.

[559]  Josh Gardner,et al.  Student success prediction in MOOCs , 2017, User Modeling and User-Adapted Interaction.

[560]  Leïla Azouz Saïdane,et al.  A Secure and Privacy-Preserving Solution for IoT over NDN Applied to E-health , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[561]  Andy Brown,et al.  Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection , 2018, Proceedings of the First Workshop on Machine Learning for Computing Systems.

[562]  Nasrollah Moghadam Charkari,et al.  Increasing Efficiency of Time Series Clustering by Dimension Reduction Techniques , 2018 .

[563]  Kousik Dasgupta,et al.  An Ant-Colony-Based Meta-Heuristic Approach for Load Balancing in Cloud Computing , 2021, Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing.

[564]  Soad Almabdy,et al.  Comparative Analysis of Relational and Graph Databases for Social Networks , 2018, 2018 1st International Conference on Computer Applications & Information Security (ICCAIS).

[565]  Simon Foo,et al.  Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissions , 2018, EURASIP J. Inf. Secur..

[566]  Qi Cui Identifying materials of photographic images and photorealistic computer generated graphics based on deep CNNs , 2018 .

[567]  Narander Kumar,et al.  Load Balancing Mechanism Using Fuzzy Row Penalty Method in Cloud Computing Environment , 2018 .

[568]  J. Rojo-álvarez,et al.  Using big data from Customer Relationship Management information systems to determine the client profile in the hotel sector , 2018, Tourism Management.

[569]  Li Li,et al.  Research on large data set clustering method based on MapReduce , 2018, Neural computing & applications (Print).

[570]  V. Shanthi,et al.  Parallel Clustering for Data Mining in CRM , 2019 .

[571]  Manjusha Pandey,et al.  Development of Policy Designing Technique by Analyzing Customer Behavior Through Big Data Analytics , 2018 .

[572]  Christopher Brooks,et al.  Replicating MOOC predictive models at scale , 2018, L@S.

[573]  B. R. Chandavarkar,et al.  Enhanced Last-Touch Interaction Attribution Model in Online Advertising , 2018, 2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER).

[574]  Uma N Dulhare,et al.  Prediction system for heart disease using Naive Bayes and particle swarm optimization , 2018 .

[575]  Chotirat Ann Ratanamahatana,et al.  A Dimensionality Reduction Technique for Time Series Classification Using Additive Representation , 2019 .

[576]  B. Taylor,et al.  Concepts for communication about risk in dementia care: A review of the literature , 2018, Dementia.

[577]  Shivam Jindal,et al.  Change in IT world with the evolution of social media using Big Data , 2018, 2018 International Conference on Communication, Computing and Internet of Things (IC3IoT).

[578]  S. Fatima Automated Tuberculosis Detection and Analysis Using CXR’s Images , 2018 .

[579]  Manjusha Pandey,et al.  Recognition of Telecom Customer’s Behavior as Data Product in CRM Big Data Environment , 2018 .

[580]  Javid Taheri,et al.  On Load Balancing for a Virtual and Distributed MME in the 5G Core , 2018, 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC).

[581]  Andreas Gerstlauer,et al.  DeepThings: Distributed Adaptive Deep Learning Inference on Resource-Constrained IoT Edge Clusters , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[582]  Gur Amrit Pal Singh,et al.  Performance analysis of various machine learning-based approaches for detection and classification of lung cancer in humans , 2019, Neural Computing and Applications.

[583]  Davide Aloini,et al.  Big Data-enabled Customer Relationship Management: A holistic approach , 2018, Inf. Process. Manag..

[584]  T. Nisar,et al.  Trains and Twitter: Firm generated content, consumer relationship management and message framing , 2018, Transportation Research Part A: Policy and Practice.

[585]  Feng Gao,et al.  Scalable and Privacy-Preserving Data Sharing Based on Blockchain , 2018, Journal of Computer Science and Technology.

[586]  Zheng Qin,et al.  Dalvik Opcode Graph Based Android Malware Variants Detection Using Global Topology Features , 2018, IEEE Access.

[587]  Sergey P. Novikov,et al.  Blockchain and Smart Contracts in a Decentralized Health Infrastructure , 2018, 2018 IEEE International Conference "Quality Management, Transport and Information Security, Information Technologies" (IT&QM&IS).

[588]  Qinghua Zheng,et al.  Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis , 2018, IEEE Transactions on Information Forensics and Security.

[589]  Dirk Müller,et al.  A time series clustering approach for Building Automation and Control Systems , 2019 .

[590]  C. Srinilta,et al.  Municipal Solid Waste Segregation with CNN , 2019, 2019 5th International Conference on Engineering, Applied Sciences and Technology (ICEAST).

[591]  Leandro Pereira Garcia,et al.  Risk factors for neonatal death in the capital city with the lowest infant mortality rate in Brazil. , 2018, Jornal de pediatria.

[592]  Xiaodong Lin,et al.  An Optimized Positive-Unlabeled Learning Method for Detecting a Large Scale of Malware Variants , 2019, 2019 IEEE Conference on Dependable and Secure Computing (DSC).

[593]  Basem E. Elnaghi,et al.  Osmotic Bio-Inspired Load Balancing Algorithm in Cloud Computing , 2019, IEEE Access.

[594]  Friedhelm Schwenker,et al.  A dataset of continuous affect annotations and physiological signals for emotion analysis , 2018, Scientific Data.

[595]  Bruno Tuffin,et al.  Wireless Service Providers Pricing Game in Presence of Possible Sponsored Data , 2019, 2019 15th International Conference on Network and Service Management (CNSM).

[596]  Sara Khalid,et al.  Machine Learning for Feature Selection and Cluster Analysis in Drug Utilisation Research , 2019, Current Epidemiology Reports.

[597]  Pong C. Yuen,et al.  On the Reconstruction of Face Images from Deep Face Templates , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[598]  Boris Otto,et al.  Reference Architecture framework for enhanced social media data analytics for Predictive Maintenance models , 2019, 2019 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC).

[599]  Usman Qamar,et al.  Using Blockchain for Electronic Health Records , 2019, IEEE Access.

[600]  Tonya Meyrick,et al.  Authenticating typography in cultural festival brand marks , 2019, 7th ICTVC 2019.

[601]  Wanli Xing,et al.  Dropout Prediction in MOOCs: Using Deep Learning for Personalized Intervention , 2019 .

[602]  Yi-Fen Liu I or We: The Persuasive Effects of Typeface Shapes: An Abstract , 2018, Developments in Marketing Science: Proceedings of the Academy of Marketing Science.

[603]  Syeda Sumbul Hossain Challenges and Mitigation Strategies in Reusing Requirements in Large-Scale Distributed Agile Software Development: A Survey Result , 2019, Advances in Intelligent Systems and Computing.

[604]  Saiful Islam,et al.  Context-Based News Headlines Analysis Using Machine Learning Approach , 2019, ICCCI.

[605]  Yannick Prié,et al.  Success prediction in MOOCs: A case study , 2019, EDM.

[606]  David Allen,et al.  Understanding Trolls with Efficient Analytics of Large Graphs in Neo4j , 2019, BTW.

[607]  Wang Bao,et al.  Integration of unsupervised and supervised machine learning algorithms for credit risk assessment , 2019, Expert Syst. Appl..

[608]  Heng-Yi Li,et al.  DeepReview: Automatic Code Review Using Deep Multi-instance Learning , 2019, PAKDD.

[609]  Vipin Tyagi,et al.  Methods to Distinguish Photorealistic Computer Generated Images from Photographic Images: A Review , 2019, ICACDS.

[610]  Matthias Hillner Time Consciousness in Relation to Emergent Typography , 2019, AHFE.

[611]  M. Ambigavathi,et al.  A Survey on Big Data in Healthcare Applications , 2020 .

[612]  G. Hemantha Kumar,et al.  Convolutional Neural Network with SVM for Classification of Animal Images , 2019, Lecture Notes in Electrical Engineering.

[613]  Lin Wang,et al.  Survey of Methods for Time Series Symbolic Aggregate Approximation , 2019, ICPCSEE.

[614]  R. Gayathri,et al.  Analysis of Heart Disease Prediction Using Various Machine Learning Techniques , 2019 .

[615]  Ossama H. Embarak,et al.  Hybrid Approach for Heart Disease Prediction Using Data Mining Techniques , 2019, EIDWT.

[616]  Xinwang Liu,et al.  K-Means Clustering With Incomplete Data , 2019, IEEE Access.

[617]  Ming He,et al.  Distinguish computer generated and digital images: A CNN solution , 2018, Concurr. Comput. Pract. Exp..

[618]  Lili He,et al.  Enhancing Diagnosis of Autism With Optimized Machine Learning Models and Personal Characteristic Data , 2019, Front. Comput. Neurosci..

[619]  Tom F. Wilderjans,et al.  Partitioning subjects based on high-dimensional fMRI data: comparison of several clustering methods and studying the influence of ICA data reduction in big data , 2019, Behaviormetrika.

[620]  Rajkumar Buyya,et al.  Hierarchical data fusion for Smart Healthcare , 2019, Journal of Big Data.

[621]  Philip Howard,et al.  A Study of Misinformation in WhatsApp groups with a focus on the Brazilian Presidential Elections. , 2019, WWW.

[622]  Guillaume-Alexandre Bilodeau,et al.  Domain-Specific Face Synthesis for Video Face Recognition From a Single Sample Per Person , 2018, IEEE Transactions on Information Forensics and Security.

[623]  Vipin Tyagi,et al.  Image Forgery Detection: Survey and Future Directions , 2019, Data, Engineering and Applications.

[624]  Vipin Tyagi,et al.  A copy-move image forgery detection technique based on Gaussian-Hermite moments , 2019, Multimedia Tools and Applications.

[625]  Hongzhi Wang,et al.  Predicting learning status in MOOCs using LSTM , 2018, ACM TUR-C.

[626]  Madini O. Alassafi,et al.  Real-Time Surveillance Through Face Recognition Using HOG and Feedforward Neural Networks , 2019, IEEE Access.

[627]  H. Ayatollahi,et al.  Predicting coronary artery disease: a comparison between two data mining algorithms , 2019, BMC Public Health.

[628]  Gia Khanh Tran,et al.  Revenue Model with Multi-Access Edge Computing for Cellular Network Architecture , 2019, 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN).

[629]  R. Manikandan,et al.  AN ANALYSIS OF GARBAGE MECHANISM FOR SMART CITIES , 2019 .

[630]  J. Brandão,et al.  The Italic Style: Understanding the Shape Through History , 2019, AHFE.

[631]  Ji Wang,et al.  Pretraining-Based Natural Language Generation for Text Summarization , 2019, CoNLL.

[632]  Hajar Mousannif,et al.  Reality mining and predictive analytics for building smart applications , 2019, Journal of Big Data.

[633]  P. Mohamed Fathimal,et al.  Smart Garbage Segregation & Management System Using Internet of Things(IoT) & Machine Learning(ML) , 2019, 2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT).

[634]  Gavin Ambrose,et al.  The dichotomic tension of experimental typography , 2019 .

[635]  J. Bai,et al.  A combined drought monitoring index based on multi-sensor remote sensing data and machine learning , 2019, Geocarto International.

[636]  Wen Gao,et al.  How to Assess the Quality of Compressed Surveillance Videos Using Face Recognition , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[637]  Farhan Ahmed Siddiqui,et al.  Graphic User Interface Design Principles for Designing Augmented Reality Applications , 2019, International Journal of Advanced Computer Science and Applications.

[638]  D. Manjunath,et al.  Sponsored Data with ISP Competition , 2019, 2019 31st International Teletraffic Congress (ITC 31).

[639]  Zhu Han,et al.  Virtual Core Network Resource Allocation in 5G Systems using Three-Sided Matching , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[640]  Kunj Bihari Meena,et al.  A Novel Method to Distinguish Photorealistic Computer Generated Images from Photographic Images , 2019, 2019 Fifth International Conference on Image Information Processing (ICIIP).

[641]  Zheng Qin,et al.  A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding , 2019, Comput. Secur..

[642]  Abhishek Mishra,et al.  Machine Learning in the AWS Cloud , 2019 .

[643]  Vikas Tripathi,et al.  A Framework for Analyzing the Exercise and Athletic Activities , 2019, 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom).

[644]  Durga Prasad Mohapatra,et al.  Validating object-oriented software at design phase by achieving MC/DC , 2019, Int. J. Syst. Assur. Eng. Manag..

[645]  Channamma Patil,et al.  Estimating the Optimal Number of Clusters k in a Dataset Using Data Depth , 2019, Data Science and Engineering.

[646]  José Luis Rojo-Álvarez,et al.  Entropic Statistical Description of Big Data Quality in Hotel Customer Relationship Management , 2019, Entropy.

[647]  Qusay H. Mahmoud,et al.  Research challenges and opportunities in blockchain and cryptocurrencies , 2019, Internet Technol. Lett..

[648]  Selvaraj Kesavan,et al.  An investigation on adaptive HTTP media streaming Quality-of-Experience (QoE) and agility using cloud media services , 2021, International Journal of Computers and Applications.

[649]  Zhu Han,et al.  Joint Sponsored and Edge Caching Content Service Market: A Game-Theoretic Approach , 2019, IEEE Transactions on Wireless Communications.

[650]  Vijaya Kamble,et al.  Smart Bin (Waste Segregation and Optimisation) , 2019, 2019 Amity International Conference on Artificial Intelligence (AICAI).

[651]  Mariusz Kubanek,et al.  Waste Classification System Using Image Processing and Convolutional Neural Networks , 2019, IWANN.

[652]  Sandeep Kaushik,et al.  Big data in healthcare: management, analysis and future prospects , 2019, Journal of Big Data.

[653]  Ivaylo Atanasov,et al.  Application Level User Traffic Control at the Mobile Network Edge , 2019, 2019 24th Conference of Open Innovations Association (FRUCT).

[654]  David Lo,et al.  Automatic Code Review by Learning the Revision of Source Code , 2019, AAAI.

[655]  Anshu Sharma,et al.  Heart Disease Prediction using KNN classification approach , 2019, International Journal of Computer Sciences and Engineering.

[656]  P. Adatara,et al.  Risk Factors Associated with Neonatal Sepsis: A Case Study at a Specialist Hospital in Ghana , 2019, TheScientificWorldJournal.

[657]  Su Ruan,et al.  A review: Deep learning for medical image segmentation using multi-modality fusion , 2019, Array.

[658]  Hamada El Kabtane,et al.  A machine learning-based methodology to predict learners' dropout, success or failure in MOOCs , 2019, Int. J. Web Inf. Syst..

[659]  Soman K.P.,et al.  Capsule Neural Networks and Visualization for Segregation of Plastic and Non-Plastic Wastes , 2019, 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS).

[660]  Vittoria Marino,et al.  Embracing AI and Big Data in customer journey mapping: from literature review to a theoretical framework , 2019, Innovative Marketing.

[661]  Dermot Kerr,et al.  Using Machine Learning Algorithms to Predict the Likelihood of Recurrent Falls in Older Adults , 2019, MLDM.

[662]  Tao Huang,et al.  Blockchain-based cloudlet management for multimedia workflow in mobile cloud computing , 2019, Multimedia Tools and Applications.

[663]  Randomized Key-based GMO-BCS Image Encryption for Securing Medical Image , 2019, International Journal of Recent Technology and Engineering.

[664]  Minlong Peng,et al.  Cooperative Multimodal Approach to Depression Detection in Twitter , 2019, AAAI.

[665]  Antonio Jiménez-Martín,et al.  The Multi-Armed Bandit Problem under Delayed Rewards Conditions in Digital Campaign Management , 2019, 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT).

[666]  Manjula K Shenoy,et al.  Evaluating the satisfaction index using automated interaction service and customer knowledgebase: a big data approach to CRM , 2019, International Journal of Electronic Customer Relationship Management.

[667]  Ching-Hsien Hsu,et al.  Edge server placement in mobile edge computing , 2019, J. Parallel Distributed Comput..

[668]  Okeke Stephen,et al.  An Efficient Deep Learning Approach to Pneumonia Classification in Healthcare , 2019, Journal of healthcare engineering.

[669]  Pushkar Kishore,et al.  NITRSCT: A Software Security tool for collection and analysis of Kernel Calls , 2019, TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON).

[670]  Jianwen Ma,et al.  Remote Sensing Satellites for Digital Earth , 2019, Manual of Digital Earth.

[671]  Rajendra Pamula,et al.  An Effective Block-Chain Based Authentication Technique for Cloud Based IoT , 2020 .

[672]  Vipin Tyagi,et al.  A copy-move image forgery detection technique based on tetrolet transform , 2020, J. Inf. Secur. Appl..

[673]  S. Malathi,et al.  Exploration of an innovative geometric parameter based on performance enhancement for foot print recognition , 2020, J. Intell. Fuzzy Syst..

[674]  V. R,et al.  The Heart Disease Prediction by Using Random Forest Algorithm , 2020, International Journal of Pharmaceutical Research.

[675]  Rosna P. Haroon,et al.  Application of Big Data in Health Care with Patient Monitoring and Future Health Prediction , 2020 .

[676]  Nobuyuki Kobayashi,et al.  Crop classification using spectral indices derived from Sentinel-2A imagery , 2019, J. Inf. Telecommun..

[677]  Andrew Hines,et al.  5G network slicing using SDN and NFV- A survey of taxonomy, architectures and future challenges , 2019, Comput. Networks.

[678]  Surya Ganguli,et al.  Statistical Mechanics of Deep Learning , 2020, Annual Review of Condensed Matter Physics.

[679]  Sandhya Tarar,et al.  Chronic Disease Prediction Using Deep Learning , 2020 .

[680]  Mohamad Abu Ghazaleh,et al.  Promoting a revamped CRM through Internet of Things and Big Data: an AHP-based evaluation , 2020 .

[681]  Muhammad Imran,et al.  Deep learning and big data technologies for IoT security , 2020, Comput. Commun..

[682]  Cici Alexander,et al.  Normalised difference spectral indices and urban land cover as indicators of land surface temperature (LST) , 2020, Int. J. Appl. Earth Obs. Geoinformation.

[683]  Rodrigo N. Calheiros Fog and Edge Computing: Challenges and Emerging Trends (Invited Talk) , 2020, Fog-IoT.

[684]  Padma Mishra,et al.  Proposed Model for Feature Extraction for Vehicle Detection , 2020 .

[685]  Vipin Tyagi,et al.  A hybrid copy-move image forgery detection technique based on Fourier-Mellin and scale invariant feature transforms , 2020, Multimedia Tools and Applications.

[686]  Choong Seon Hong,et al.  Edge-Computing-Enabled Smart Cities: A Comprehensive Survey , 2019, IEEE Internet of Things Journal.

[687]  Jorge Caiado,et al.  A fragmented-periodogram approach for clustering big data time series , 2020, Adv. Data Anal. Classif..

[688]  I. Ciampitti,et al.  Satellite-based soybean yield forecast: Integrating machine learning and weather data for improving crop yield prediction in southern Brazil , 2020 .

[689]  Rajkumar Buyya,et al.  HealthFog: An Ensemble Deep Learning based Smart Healthcare System for Automatic Diagnosis of Heart Diseases in Integrated IoT and Fog Computing Environments , 2019, Future Gener. Comput. Syst..

[690]  Pantaleone Nespoli,et al.  The Not Yet Exploited Goldmine of OSINT: Opportunities, Open Challenges and Future Trends , 2020, IEEE Access.

[691]  Bibhudatta Sahoo,et al.  MC/DC guided Test Sequence Prioritization using Firefly Algorithm , 2019, Evol. Intell..

[692]  Anuj Srivastava,et al.  Understanding Decision Tree Algorithm by using R Programming Language , 2022 .

[693]  T. Choudhury,et al.  Advance Survey of Mobile Ad-Hoc Network , 2022 .