FCNNMD: A Novel Fusion Method based on Convolutional Neural Network for Malware Detection |
Jing Zhang and Yu Wen |
Volume : 10 volume number : 6 pdf |
Trusted Computing in Data Science: Viable Countermeasure in Risk Management Plan |
Uchechukwu Emejeamara, Udochukwu Nwoduh and Andrew Madu |
Volume : 10 volume number : 6 pdf |
Grant-free SAFE-SCMA Based on Detection of Unknown Abnormal Codebooks |
Hanyuan Huang, Tao Li and Hui Zhao |
Volume : 10 volume number : 6 pdf |
Parking Assistance Display with Estimated Parking Space Using Stereo Vision |
Chi-Cheng Cheng, Chi-Cheng Lee, and Jyun-Han Huang |
Volume : 10 volume number : 6 pdf |
Melanoma Detection in Histopathological Images using Deep Learning |
Salah Alheejawi, Richard Berendt, Naresh Jha and Mrinal Mandal |
Volume : 10 volume number : 6 pdf |
The Parallel HTM Spatial Pooler with Actor Model |
Damir Dobric, Andreas Pech, Bogdan Ghita and Thomas Wennekers |
Volume : 10 volume number : 6 pdf |
A 3D Simulation for the Feedback Loop between Orbital Debris and Future Space Activities and Economy |
Qianyu Liu, Emmanuel Reyes and Yu Sun, |
Volume : 10 volume number : 6 pdf |
REBD: A Conceptual Framework for Big Data Requirements Engineering |
Sandhya Rani Kourla, Eesha Putti and Mina Malek |
Volume : 10 volume number : 6 pdf |
Systematic Attack Surface Reduction for Deployed Sentiment Analysis Models |
Josh Kalin, David Noever and Gerry Dozie |
Volume : 10 volume number : 6 pdf |
Automation of Purchase Order in Microsoft Dynamics 365 by Deploying Selenium |
Vijay Biju and Shahid Ali |
Volume : 10 volume number : 6 pdf |