| Semantic Document Classification based on Strategies of Semantic Similarity Computation and Correlation Analysis |
| Shuo Yang, Ran Wei, Hengliang Tan and Jiao Du |
| Volume : 9 volume number : 13 pdf |
| Secure and Privacy-aware Data Collection Architecture Approach in Fog Node Based Distributed IoT Environment |
| Moussa WITTI and Dimitri KONSTANTAS |
| Volume : 9 volume number : 13 pdf |
| Quality Model to the Adaptive Guidance |
| Hamid Khemissa and Mourad Oussala |
| Volume : 9 volume number : 13 pdf |
| Quality Model to the Adaptive Guidance |
| Hamid Khemissa and Mourad Oussala |
| Volume : 9 volume number : 13 pdf |
| Quality Model to the Adaptive Guidance |
| Hamid Khemissa and Mourad Oussala |
| Volume : 9 volume number : 13 pdf |
| A Hybrid Model for Evacuation Simulation and Efficiency Optimization in Large Complex Buildings |
| Hao Yuan, Guo Yu, Yifan Ma, Jieneng Chen and Xiongda Chen |
| Volume : 9 volume number : 13 pdf |
| Collaborative and Fast Decryption Using Fog Computing and A Hidden Access Policy |
| Ahmed Saidi, Omar Nouali and Abdelouahab Amira |
| Volume : 9 volume number : 13 pdf |
| Upgrading Cloud Infrastructure – Challenges and Solutions |
| Andrei Petrescu and Mihai Carabas |
| Volume : 9 volume number : 13 pdf |
| An Intelligent Mobile Application to Manage College Database and Recommendation Using Data Mining |
| Yixuan Qi, Qi Lu, Yu Su and Fangyan Zhang |
| Volume : 9 volume number : 13 pdf |
| Automated Generation of Computer Graded Unit Testing-Based Programming Assessments for Education |
| Sébastien Combéfis and Guillaume de Moffarts |
| Volume : 9 volume number : 13 pdf |
| SFERANET: Automatic Generation of Football Highlights |
| Vincenzo Scotti, Licia Sbattella and Roberto Tedesco |
| Volume : 9 volume number : 13 pdf |
| AUTOMATION REGRESSION TESTING FOR SAS.AM WEBSITE |
| Harutyun Berberyan and Shahid Ali |
| Volume : 9 volume number : 13 pdf |
| TRIT: A Robust Tracker Based on Triplet Network |
| Peng Zou and Yunfei Cai |
| Volume : 9 volume number : 13 pdf |
| Prediction and Causality analysis of churn using deep learning |
| Muzaffar Shah, Darshan Adiga, Shabir Bhat and Viveka Vyeth |
| Volume : 9 volume number : 13 pdf |
| An Artificial Neural Network Approach for the Classification of Human Lower Back Pain |
| Shubham Sharma and Rene V.Mayorga |
| Volume : 9 volume number : 13 pdf |
| Cognitive Cities an Architectural Framework for the Cities of the Future |
| Cristiana Carvalho, Filipe Cabral Pinto, Isabel Borges, Gonçalo Machado and Ilídio Oliveira |
| Volume : 9 volume number : 13 pdf |
| Automated Music Making with Recurrent Neural Network |
| You Peng, Ariel Jiang and Qi Lu |
| Volume : 9 volume number : 13 pdf |
| Prediction of Workpiece Quality: An Application of Machine Learning in Manufacturing Industry |
| Günther Schuh, Paul Scholz, Sebastian Schorr, Durmus Harman, Matthias Möller, Jörg Heib and Dirk Bähre |
| Volume : 9 volume number : 13 pdf |
| A Facial Recognition-based Video Encryption Approach to Prevent Fakedeep Videos |
| Alex Liang, Yu Su and Fangyan Zhang |
| Volume : 9 volume number : 13 pdf |
| Token Bucket-based Throughput Constraining in Cross-layer Schedulers |
| Jeremy Van den Eynde and Chris Blondia |
| Volume : 9 volume number : 13 pdf |
| Measurement and Characterization of the Stationary Noise in Narrowband Power Line Communication |
| Raja Alaya and Rabah Attia |
| Volume : 9 volume number : 13 pdf |
| Educational Approach to the Internet of Things (IoT) Concepts and Applications |
| Rajeev Kanth, Tuomas Korpi, Arto Toppinen, Kimmo Myllymäki, Jatin Chaudhary and Jukka Heikkonen |
| Volume : 9 volume number : 13 pdf |
| Security Framework for IoT Devices against Cyber-attacks |
| Aliya Tabassum and Wadha Lebda |
| Volume : 9 volume number : 13 pdf |
| Hybrid Application Layer Protocol Design for IoT Environments |
| Erdal ÖZDO?AN and O.Ayhan ERDEM |
| Volume : 9 volume number : 13 pdf |
| Segmentation of Single and Overlapping Leaves by Extracting Appropriate Contours |
| Rafflesia Khan and Rameswar Debnath |
| Volume : 9 volume number : 13 pdf |
| Split Multi-Stage Vector Quantization Based Steganography for Secure Wideband Speech Coder |
| Merouane BOUZID and Bakkar LASKAR |
| Volume : 9 volume number : 13 pdf |
| Lane Detection for Prototype Autonomous Vehicle |
| Sertap Kamci, Dogukan Aksu and Muhammed Ali Aydin |
| Volume : 9 volume number : 13 pdf |
| Finding Maximal Localizable Region in Wireless Sensor Networks by Merging Rigid Clusters |
| Saroja Kanchi |
| Volume : 9 volume number : 13 pdf |
| Methodology to Evaluate WSN Simulators: Focusing on Energy Consumption Awareness |
| Michel Bakni, Luis Manuel Moreno Chac´on, Yudith Cardinale, Guillaume Terrasson and Octavian Curea |
| Volume : 9 volume number : 13 pdf |
| Public-Key Based Authentication Architecture for IoT Devices Using PUF |
| Haji Akhundov, Erik van der Sluis, Said Hamdioui and Mottaqiallah Taouil |
| Volume : 9 volume number : 13 pdf |
| Customized Garment Fashion Recommendation System using Data Mining Techniques |
| Shukla Sharma, Ludovic Koehl, Pascal Bruniaux and Xianyi Zeng |
| Volume : 9 volume number : 13 pdf |
| A Novel Machine Learning System for Sentiment Analysis and Extraction |
| Osama Mohammad Rababah and Nour Alokaily |
| Volume : 9 volume number : 13 pdf |