| Tomographic SAR Inversion for Urban Reconstruction |
| Karima Hadj-Rabah, Faiza Hocine, Assia Kourgli and Aichouche Belhadj-Aissa, University of Sciences and Technology Houari Boumediene (USTHB), Algeria |
| Volume : 8 volume number : 17 pdf |
| A Pseudo-Splicing Algorithm for Partial Fingerprint Recognition Based on Sift |
| Zheng Zhu, Aiping Li, Rong Jiang, Yulu Qi, Dongyang Zhao and Yan Jia, National University of Defense Technology, China |
| Volume : 8 volume number : 17 pdf |
| A Post-Processing Method Based on Fully Connected CRFs for Chronic Wound Images Segmentation and Identification |
| Junnan Zhang and Hanyi Nie, National University of Defense Technology, China |
| Volume : 8 volume number : 17 pdf |
| Possibilities of Python Based Emotion Recognition |
| Primoz Podrzaj and Boris Kuster, University of Ljubljana, Slovenia |
| Volume : 8 volume number : 17 pdf |
| Phishing Detection from URLs by Using Neural Networks |
| Ozgur Koray Sahingoz, Saide Isilay Baykal and Deniz Bulut, Istanbul Kultur University, Turkey |
| Volume : 8 volume number : 17 pdf |
| ADAPTABASE - Adaptive Machine Learning Based Database Cross Technology Selection |
| Shay Horovitz, Alon Ben-Lavi, Refael Auerbach, Bar Brownshtein, Chen Hamdani and Ortal Yona, College of Management Academic Studies, Israel |
| Volume : 8 volume number : 17 pdf |
| Residential Load Profile Analysis Using Clustering Stability |
| Fang-Yi Chang1, Shu-Wei Lin1, Chia-Wei Tsai2 and Po-Chun Kuo2, 1Institute for Information Industry, Taiwan and 2Southern Taiwan University of Science and Technology, Taiwan |
| Volume : 8 volume number : 17 pdf |
| Cyber-Attacks on the Data Communication of Drones Monitoring Critical Infrastructure |
| Hadjer Benkraouda, Ezedin Barka and Khaled Shuaib, United Arab Emirates University, UAE |
| Volume : 8 volume number : 17 pdf |
| Android Malware Detection Using Machine Learning and Reverse Engineering |
| Michal Kedziora, Paulina Gawin, Michal Szczepanik and Ireneusz Jozwiak, Wroclaw University of Science and Technology, Poland |
| Volume : 8 volume number : 17 pdf |
| SAITE STORE 2.0: Experience Report on The Development of an Improved Version of a Digital Library Application |
| Ana Emilia Figueiredo de Oliveira1, Katherine Marjorie Mendonça de Assis1, Camila Santos de Castro e Lima1, Carla Galvão Spinillo2, Elza Bernardes Monier1, Maria de Fatima Oliveira Gatinho1 and Marcelo Henrique Monier Alves Junior1, 1Federal University of Maranhao, Brazil |
| Volume : 8 volume number : 17 pdf |
| Real-Time P2P Streaming Based on Playback Rate in MANETs |
| Chia-Cheng Hu1,2, Zhong-bao Liu2,3, Hong-Bo Zhou2 and Chong-JieZhang2, 1Yango University, China, 2Quanzhou University of Information Engineering, China and 3North University of China |
| Volume : 8 volume number : 17 pdf |
| MRI and CT Image Fusion Based Structure Preserving Filter |
| Qiaoqiao Li, Guoyue Chen, Xingguo Zhang, Kazuki Saruta and Yuki Terata, Akita Prefectural University, Japan |
| Volume : 8 volume number : 17 pdf |
| Anti-Virus Tools Analysis Using Deep Web Malwares |
| Igor Mishkovski1, Sanja Scepanovic2, Miroslav Mirchev1 and Sasho Gramatikov1, 1University Ss. Cyril and Methodius, Macedonia and 2Aalto University, Finland |
| Volume : 8 volume number : 17 pdf |
| Enhancing Computer Network Security Environment by Implementing the Six-Ware Network Security Framework (SWNSF) |
| Rudy Agus Gemilang Gultom, Tatan Kustana and Romie Oktovianus Bura, Indonesia Defense University, Indonesia |
| Volume : 8 volume number : 17 pdf |
| Scalable Dynamic Locality Sensitve Hashing for Structured Dataset on Main Memory and GPGPU Memory |
| Toan Nguyen Mau and Yasushi Inoguchi, JAIST Inoguchi Laboratory, Japan |
| Volume : 8 volume number : 17 pdf |
| A Network of Intelligent Proximity IoT Devices for Object Localization, Information Communication and Data Analytics Based on Crowdsourcing |
| Mike Qu1 and Yu Sun2, 1Northwood High School, USA and 2California State Polytechnic University, USA |
| Volume : 8 volume number : 17 pdf |