Research Title
|
Research Link
|
A Meta-Heuristic Method for Reassemble Bifragmented Intertwined JPEG Image Files in Digital Forensic Investigation
|
https://ieeexplore.ieee.org/abstract/document/10272244
|
A Comparison of Multi Class Support Vector Machine vs Deep Convolutional Neural Network for Brain Tumor Classification
|
https://ieeexplore.ieee.org/abstract/document/10295336
|
Intelligent Classification of JPEG files by Support Vector Machines with Content-based Feature Extraction
|
https://www.americaspg.com/articleinfo/18/show/2276
|
Javanese Script Single Letters Classification using GoogLeNet Architecture and Adam Optimizer Based on Convolutional Neural Networks (CNN)
|
https://ieeexplore.ieee.org/abstract/document/10295366
|
Trust Monitoring Framework for Effective Cooperation in Satellite Assisted UAVS Enabled VANETS
|
https://www.researchgate.net/profile/rabei-al-jawry/publication/374782002_trust_monitoring_framework_for_effective_cooperation_in_satellite_assisted_uavs_enabled_vanets/links/652f6fab6725c324011481e7/trust-monitoring-framework-for-effective-cooperation-in-satellite-assisted-uavs-enabled-vanets.pdf
|
Connectivity Aware Energy Efficient Routing Protocol for UAVs Assisted Vehicular Ad-Hoc Networks
|
https://ieeexplore.ieee.org/abstract/document/10313206
|
Milkfish Freshness Classification Using Convolutional Neural Networks Based on Resnet50 Architecture
|
https://journal.upgris.ac.id/index.php/asset/article/view/17017
|
Robust Content Authentication and Tampering Detection of Arabic Text Transmitted Through Internet
|
https://ieeexplore.ieee.org/abstract/document/10351462
|
Symbiotic Organism Search Optimization with Deep Learning based Bite Mark Identification in Forensic Dentistry
|
https://ieeexplore.ieee.org/abstract/document/10351436
|
Improved Deep Learning with Metaheuristics Driven COVID-19 Diagnosis on Chest X-Ray Images
|
https://ieeexplore.ieee.org/abstract/document/10351403
|
Deep Learning Based Automated Gait Recognition for Robust Person Reidentification
|
https://ieeexplore.ieee.org/abstract/document/10351474
|
Exploiting COVID-19 Tweets for Sentiment Analysis Using Chameleon Optimization with Ensemble Learning
|
https://ieeexplore.ieee.org/abstract/document/10351385
|
Modified Snake Optimization Based Robust Steganography with Chaotic Encryption Scheme for Remote Sensing Imagery
|
https://ieeexplore.ieee.org/abstract/document/10351456
|
High PSNR Using Fibonacci Sequences in Classical Cryptography and Steganography Using LSB.
|
chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://inass.org/wp-content/uploads/2023/02/2023083146-2.pdf
|
Hybrid Optimization with Enhanced QoS-based Path Selection in VANETs.
|
chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://inass.org/wp-content/uploads/2023/03/2023083106-2.pdf
|
An Integration of Elephant Herding Optimization and Fruit Fly Optimized Algorithm for Energy Conserving in MANET
|
https://ieeexplore.ieee.org/abstract/document/10201697
|
Trust based Data Dissemination and Queue Management for Vehicular Communication Networks
|
https://ieeexplore.ieee.org/abstract/document/10201757
|
Improving Quality of Services of Fog Computing Through Efficient Work Flow Scheduling
|
https://ieeexplore.ieee.org/abstract/document/10183104
|
Improved Chicken Swarm Optimization with Zone-Based Epidemic Routing for Vehicular Networks
|
https://link.springer.com/chapter/10.1007/978-981-99-6702-5_34
|
An Application of Multilayer Perceptron for the Prediction of River Water Quality
|
https://link.springer.com/chapter/10.1007/978-981-99-3010-4_42
|
Medical Image Watermarking Using Slantlet Transform and Particle Swarm Optimization
|
https://link.springer.com/chapter/10.1007/978-981-99-3010-4_59
|
High-Level Deep Features and Convolutional Neural Network for Evaluating the Classification Performance of File Cluster Types
|
https://link.springer.com/chapter/10.1007/978-981-99-3315-0_1
|
Path Scheduling and Bandwidth Utilization for Urban Vehicular Adhoc Networks
|
https://www.researchgate.net/publication/374897678_Path_Scheduling_and_Bandwidth_Utilization_for_Urban_Vehicular_Adhoc_Networks
|
Triple DES Cryptography Based on Hash Function and DSA for Digital Certificate Authentication
|
https://ieeexplore.ieee.org/abstract/document/9920438
|
Content-Based Feature Extraction and Extreme Learning Machine for Optimizing File Cluster Types Identification
|
https://link.springer.com/chapter/10.1007/978-3-030-98015-3_21
|
A model for predicting entrepreneurship intentions based on social cognitive theory and entrepreneurship characteristics
|
chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://digitalcommons.aaru.edu.jo/cgi/viewcontent.cgi?article=1307&context=isl
|
A framework for analyzing the relationships between cancer patient satisfaction, nurse care, patient attitude, and nurse attitude in healthcare systems
|
https://link.springer.com/article/10.1007/s12652-020-02888-x
|
Javanese Character Recognition Based on K-Nearest Neighbor and Linear Binary Pattern Features
|
https://kinetik.umm.ac.id/index.php/kinetik/article/view/1491
|
Testing Data Security Using a Vigenere Cipher Based on the QR Code
|
https://kinetik.umm.ac.id/index.php/kinetik/article/view/1734
|
Testing Data Security Using a Vigenere Cipher Based on the QR Code
|
https://kinetik.umm.ac.id/index.php/kinetik/article/view/1734
|