|
Issue |
Title |
|
Vol 42, No 2 (2018) |
Persistent Homology and Machine Learning |
Abstract
PDF
|
Primož Škraba |
|
Vol 46, No 1 (2022) |
Personalized Health Framework for Visually Impaired |
Abstract
PDF
|
Megha Rathi, Shruti Sahu, Ankit Goel, Pramit Gupta |
|
Vol 41, No 2 (2017) |
Persons-In-Places: a Deep Features Based Approach for Searching a Specific Person in a Specific Location |
Abstract
PDF
|
Vinh-Tiep Nguyen, Thanh Duc Ngo, Minh-Triet Tran, Duy-Dinh Le, Duc Anh Duong |
|
Vol 39, No 3 (2015) |
PGO-DLLA: Parallel Grid Optimization by the Daddy Long-Legs Algorithm for Preventing Black Hole Attacks in MANETs |
Abstract
PDF
|
Khalil I. Ghathwan, Abdul Razak Yaakub |
|
Vol 43, No 2 (2019) |
Physical Match |
Abstract
PDF
|
Aaron E. Naiman, Eliav Farber, Yossi Stein |
|
Vol 36, No 1 (2012) |
Physics Markup Approaches Based on Geometric Algebra Representations |
Abstract
PDF
|
K-p. Yang, W. Zhang, F. Petry |
|
Vol 34, No 2 (2010) |
Piecemeal Journey to 'HALCYON' World of Computing: From Past Progress to Future Challenges |
Abstract
PDF
|
R. Seth, R. Kapoor, H. Al-Qaheri, S. Sanyal |
|
Vol 30, No 2 (2006) |
Plan Sharing: Showcasing Coordinated UAV Formation Flight |
Abstract
PDF
|
H. Hexmoor, S. Eluru, H. Sabaa |
|
Vol 34, No 2 (2010) |
Planning to Discover and Counteract Attacks |
Abstract
PDF
|
T. Kichkaylo, T. Ryutov, M.D. Orosz, R. Neches |
|
Vol 45, No 3 (2021) |
Possibilities for applying blockchain technology – a survey |
Abstract
PDF
|
Mimoza Mijoska, Blagoj Ristevski |
|
Vol 41, No 3 (2017) |
Power and limitations of formal methods for software fabrication: Thirty years later |
Abstract
PDF
|
Edgar Serna M., Alexei Serna A. |
|
Vol 45, No 7 (2021): Online-only issue |
Predicting Fraud in Mobile Money Transactions using Machine Learning: The Effects of Sampling Techniques on the Imbalanced Dataset |
Abstract
PDF
|
Francis Effirim Botchey, Zhen Qin, Kwesi Hughes-Lartey, Ernest Kwame Ampomah |
|
Vol 47, No 1 (2023) |
Predicting Students Performance Using Supervised Machine Learning Based on Imbalanced Dataset and Wrapper Feature Selection |
Abstract
PDF
|
Sadri Alija, Edmond Beqiri, Alaa Sahl Gaafar, Alaa Khalaf Hamoud |
|
Vol 44, No 4 (2020) |
Predicting the Causal Effect Relationship Between COPD and Cardio Vascular Diseases |
Abstract
PDF
|
Debjani Panda, Satya Ranjan Dash, Ratula Ray, Shantipriya Parida |
|
Vol 45, No 1 (2021) |
Prediction and Estimation of Book Borrowing in the Library: Machine learning |
Abstract
PDF
|
Jinbao Sun |
|
Vol 47, No 1 (2023) |
Prediction of Heart Disease Using Modified Hybrid Classifier |
Abstract
PDF
|
Rishabh Pipalwa, Dr. Abhijit Paul, Tamoghna Mukherjee |
|
Vol 47, No 5 (2023): Online-only issue |
Prediction of Heart Diseases Using Data Mining Algorithms |
Abstract
PDF
|
Karrar Al-Jammali |
|
Vol 31, No 4 (2007) |
Prediction of Missing Data for Ozone Concentrations using Support Vector Machines and Radial Basis Neural Networks |
Abstract
PDF
|
B. Mileva-Boshkoska, M. Stankovski |
|
Vol 42, No 1 (2018) |
Prediction of Sentiment from Macaronic Reviews |
Abstract
PDF
|
Sukhnandan Kaur Johal, Rajni Mohana |
|
Vol 43, No 4 (2019) |
Predictive Analytics On Big Data - An Overview |
Abstract
PDF
|
Gayathri Nagarajan, Dhinesh Babu L.D |
|
Vol 40, No 2 (2016) |
PrefWS3: Web services selection system based on semantics and user preferences |
Abstract
PDF
|
Benaboud Rohallah, Maamri Ramdane, Sahnoun Zaidi |
|
Vol 31, No 2 (2007) |
Preliminary Numerical Experiments in Multiobjective Optimization of a Metallurgical Production Process |
Abstract
PDF
|
B. Filipic, T. Tušar, E. Laitinen |
|
Vol 36, No 1 (2012) |
Privacy Aware Recommender Service using Multi-agent Middleware- an IPTV Network Scenario |
Abstract
PDF
|
A.M. Elmisery, D. Botvich |
|
Vol 44, No 2 (2020) |
Privacy Preserving Visual Log Service with Temporal Interval Query using Interval Tree-based Searchable Symmetric Encryption |
Abstract
PDF
|
Viet-An Pham, Dinh-Hieu Hoang, Huy-Hoang Chung-Nguyen, Mai-Khiem Tran, Minh-Triet Tran |
|
Vol 39, No 4 (2015) |
Privacy-preserving Cloud-based Personal Health Record System Using Attribute-based Encryption and Anonymous Multi-ReceiverIdentity-based Encryption |
Abstract
PDF
|
Changji Wang, Xilei Xu, Dongyuan Shi, Jian Fang |
|
851 - 875 of 1128 Items |
<< < 30 31 32 33 34 35 36 37 38 39 > >> |