


default search action
ICCR 2022: Dubai, UAE
- 2022 International Conference on Cyber Resilience (ICCR), Dubai, United Arab Emirates, October 6-7, 2022. IEEE 2022, ISBN 978-1-6654-6122-1

- Turki Fahed Al Masaeid, Hamzah Elrehail

, Ayesha Kalim:
Educational technology partnerships and entrepreneurship education: the impact of technology on students' achievements. 1-5 - Sunil Kaushik, Akashdeep Bhardwaj, Ateeq Ur Rehman

, Salil Bharany, Saida Harguem
, Saigeeta Kukunuru, Ossma Ali Thawabeh:
Designing an MI-PCA based Agile Intrusion Detection System. 1-7 - Fatima Fayyaz, Taher M. Ghazal, Mohammed A. M. Afifi, Sagheer Abbas, Hussam M. N. Al Hamadi

:
Drones network security enhancement using smart based block-chain technology. 1-6 - Mufleh Amin Jarrah

, Tayseer M. AL Afaishat, Ghassan Issa Al Omari, Hamza Salim Khraim:
The mediating effect of attitudes on the relationship between e-learning adoption and business students' performance in Jordanian universities. 1-13 - Liaqat Ali, Nizar Sahawneh, Yousuf Agha, Saira Kanwal, Imran, Nouh Sabri Elmitwally

:
Activity Based Easy Learning Of PushDown Automata. 1-8 - Inturi Susmitha, Roseline J. Femila, Vinay Sivasamy

:
Detection of forest fire using support vector machine in comparison with random forest to measure accuracy, precision and recall. 1-6 - Mohammad A. K. Alsmairat, Noor Al-Ma'aitah, Ibrahim Alrafaty:

Modelling of Critical Success Factors Affecting the Adoption of Enterprise Resources Planning: A mediated Model. 1-10 - Mohammad Kamrul Hasan, Ma Junjie, A K. M. Ahasan Habib

, Abdullah Al Mamun, Taher M. Ghazal, Rashid A. Saeed:
IoT-Based Warehouse Management System. 1-6 - Saida Harguem

, Sunita Marwaha, Samar Noaman
, Naeem Ali
, Nasir Ali, Khadija Kanwal:
Influencing Factors of E-Learning Towards E-Learner's Satisfaction. 1-9 - Gurpartap Singh, Anup Lal Yadav

, Satbir S. Sehgal:
JavaScript Quiz Game. 1-5 - Sourav Verma

, Sonali Dash, Ankita Joshi
, Kavita:
A Detailed Study of Blockchain and dapps. 1-5 - Eric Khoo Jiun Hooi, Anazida Binti Zainal, Mohamad Nizam Kassim, Zaily Ayub:

Feature Encoding For High Cardinality Categorical Variables Using Entity Embeddings: A Case Study in Customs Fraud Detection. 1-5 - Tamer Mohamed, Amer Ibrahim, Tauqeer Faiz

, Waseem Alhasan
, Ayesha Atta, Vansh Mago, Muhammad Ahzam Ejaz, Salman Munir
:
Intelligent Hand Gesture Recognition System Empowered With CNN. 1-8 - Mys. Karthik Yasaswy, Arasu Sivagami, V. Suresh:

Vehicular Grounding Situation For Intelligent Transportation Administration Using AODV to Decrease the Round Trip in Urban and Semi Urban Using Smart Transport Techniques Comparing With Traffic Analysis Zone Networks. 1-6 - D. Pandy, R. Sharma, Suresh Sharma:

Simulation Comparison of Capacitance Voltage Characteristics in Nickel Oxide and Silicon dioxide-based MOS Capacitor. 1-5 - Ayushi, Damandeep Kaur

, Satbir S. Sehgal:
Agile Lifestyle of Development. 1-5 - D. Alaik Venu Madhav, A. Raja, Jayalakshmi Somasundaram:

Comparative Analysis on PAPR Reduction scheme by using Novel Enhanced Active Constellation Scheme with selective level mapping for OFDM based systems. 1-4 - Kirti Sharma, Kshamta, Ankita Joshi

:
API LED Connectivity Approach. 1-3 - Ghassan Issa Al Omari, Raed Ibrahim Ibrahim

, Mazen Alomari, Mohammad Ali Al-Qudah:
The Impact of Emotional Intelligence on Transformational Leadership in the Jordanian Islamic banks. 1-11 - Aman Kumar Gupta, Sugandhi Midha, Vaibhav Uniyal:

Voice Controlled Personal Assistant. 1-3 - Vijayalakshmi R, B. Sudha, Maged Farouk, Gouher Ahmed:

An Empirical Study of Association Among Financial Literacy, Financial Attitude and Financial Behaviour of Gen - Z. 1-6 - Mys. Karthik Yasaswy, T. Manimegalai, Jayalakshmi Somasundaram:

Crop Yield Prediction in Agriculture Using Gradient Boosting Algorithm Compared with Random Forest. 1-4 - Srinidhi Vasudevan, Anna Piazza, Madeline Carr:

Qualitative Factors in Organizational Cyber Resilience. 1-5 - Mashary N. Alrasheedy

, Ravie Chandren Muniyandi, Fariza Fauzi:
Text-Based Emotion Detection and Applications: A Literature Review. 1-9 - Mohammad Salahat, Harish K. G. Nair

, Rasha Almajed
, Naila Samar Naz
, Aziz Ur Rehman
, Muhammad Sheraz Javeid:
Diagnosis Ovarian Cancer & Prostate Cancer using Mamdani System of Fuzzy Interface. 1-10 - Ahmad Asyraf Mustafar, Noor Faridatul Ainun Zainal, Tajul Azhar Mohd Tajul Ariffin, Siti Norul Huda Sheikh Abdullah, Kauthar Mohd Daud

, Yau Ti Dun:
Cyber-attack Group Representation based on Adversary Artifacts with Machine Learning. 1-6 - Taher M. Ghazal, Mohammad Kamrul Hasan, Amelia Natasya Abdul Wahab, Amer Ibrahim, Wasim Ahmad Khan, Neha Zulfiqar Raza, Ayesha Atta, Beenu Mago:

Towards Privacy Provisioning for Internet of Things (IoT). 1-7 - Atul Duvedi, Azhar Ashraf

, Shikha Uniyal Gairola:
A Comparitive Study on Routing Protocols: RIP, OSPF and EIGRP. 1-4 - Sami Ghoul, Rossilawati Sulaiman:

Imperceptible Image Steganography Technique Using a Novel PIT-Based Technique. 1-7 - Ketan, Shanu Khare, Maninder Kaur, Tarun Parashar:

Online Voting System. 1-7 - Shahan Yamin Siddiqui, Ali Sheraz Akram, Hafiz Muhammad Usama, Alaa M. Momani

, Nidal A. Al-Dmour
, Waleed T. Al-Sit:
Improved Hybrid Model for Phishing Detection by Using Machine Learning. 1-5 - A. Hareesh, K. Vidhya, V. Suresh:

Skin Lesion Classification in Dermoscopic Images with High Accuracy using Support Vector Machine Comparing with Random Forest Method. 1-6 - Abdulghader Abu Reemah A Abdullah

, Adamu Sa'ad Madaki, Ibrahim Mohamed, Nurhizam Safie Bin Mohd, Kamsuriah Ahmad:
The Impact of IT on Knowledge Sharing Environment and Management Practice. 1-7 - Neyara Radwan, Haitham M. Alzoubi, Nizar Sahawneh, Areej Fatima, Abdur Rehman

, Shan Khan:
An Intelligent Approach for Predicting Bankruptcy Empowered with Machine Learning Technique. 1-5 - Muhammad Arslan Aslam, Muhammad Zonain, Salman Muneer

, Omar Sattar, Mohammad Salahat, Muhammad Saleem
:
Neurological Disorder Detection Using OCT Scan Image of Eye. 1-13 - M. Chakradhar, Cyril Robinson Azariah J

, V. Suresh:
Simulation Comparison of Electrical Characterization in PZT and PVDF on Copper (Cu) substrate based MEMS piezoelectric harvester. 1-5 - Srinidhi Vasudevan:

DeFi: A risky business or silver bullet for SMEs? 1-5 - Ayesha Atta, Muhammad Adnan Khan

, Muhammad Asif, Ghassan F. Issa
, Raed A. Said, Tauqeer Faiz:
Classification of Skin Cancer empowered with convolutional neural network. 1-6 - D. Satyanarayana, Aisha Said Alasmi:

Detection and Mitigation of DDOS based Attacks using Machine Learning Algorithm. 1-5 - Aviral Jindal, Deepika

, Abhishek Joshi
:
Real-Time Drowsiness System Using Image Processing. 1-7 - Mubashra Mehmood, Noor Fatima, Abedallah Zaid Abualkishik, Umer Farooq

, Amer Ibrahim, Kakul Agha:
An Empirical Study Exploring the Factors of Stress Level among Doctors. 1-8 - Islahuddin Jalal, Khairul Azmi Abu Bakar, Zarina Shukur, Norleyza Jailani

:
Achieving liveness in validators' performance efficiency consensus (VPEC) based blockchain system using the Zakat principles. 1-5 - Sachin Kumar, Damandeep Kaur

, Anjum Parvez
:
Prediction of Prices Car Price Prediction with Machne Learning. 1-4 - Jyothi Swaroop, T. J. Nagalakshmi, S. Subash Sharma:

Girl Child Security System based on IOT Technology with GPS Tracker Comparing with Fuzzy Classifier Based Safety Device. 1-6 - Mafia Rasheed, Muhammad Adnan Khan

, Nouh Sabri Elmitwally
, Ghassan F. Issa
, Taher M. Ghazal, Hamza Alrababah
, Beenu Mago:
Heart Disease Prediction Using Machine Learning Method. 1-6 - Izza Ramzan, Fizza Ramzan, Muhammad Ibrahim, Naseem Abidi, Amer Hani Al-Kassem, Riktesh Srivastava:

Showrooming and Webrooming: Investigating the Consumer's Path to Purchase Intention. 1-11 - Atif Ali

, Khushboo Farid Khan Ghouri
, Hina Naseem, Tariq Rahim Soomro, Wathiq Mansoor, Alaa M. Momani
:
Battle of Deep Fakes: Artificial Intelligence Set to Become a Major Threat to the Individual and National Security. 1-5 - Barween Al Kurdi

, Hammad Raza, Salman Muneer
, Muhammad Bux Alvi
, Naseem Abidi, Muhammad Turki Alshurideh:
Estate Price Predictor for Multan City Townships Using Marching Learning. 1-5 - Aeshah Alhammad, Maryati Mohd. Yusof

, Dian Indrayani Jambari:
A Review of Cyber Threats to Medical Devices Integration with Electronic Medical Records. 1-6 - Rachid Alami

, Hamzah Elrehail
, Amro Alzghoul
:
Reducing cognitive dissonance in health care: Design of a new Positive psychology intervention tool to regulate professional stress among nurses. 1-8 - Nurdiana Jamal, Jasni Mohamad Zain:

A Review on Nature, Cybercrime and Best Practices of Digital Footprints. 1-6 - Gunasekhar Reddy Thummala, Radhika Baskar, N. Thiyaneswaran:

Prediction of Heart Disease Using Naive Bayes in Comparison with KNN Based on Accuracy. 1-4 - Shivam Singh, Shreya Bansal, Anjum Parvez

:
A Deep-Learning Method to Predicting Traffic Accidents Due to Drowse. 1-6 - Uzma Jafar, Mohd Juzaiddin Ab Aziz

, Zarina Shukur, Hafiz Adnan Hussain
:
A Cost-efficient and Scalable Framework for E-Voting System based on Ethereum Blockchain. 1-6 - Shahan Yamin Siddiqui, Muhammad Ubaid Ullah

, Aqsa Anwar, Alaa M. Momani
, Liaqat Ali, Mohammed Salahat:
Fusion Based Self Diagnosis Expert System Empowered with Leven-berg Marquardt Algorithm. 1-6 - Divyansh Singh, Reema Goyal, Anil Kumar Dixit:

Decentralize Smart Contract Voting System. 1-5 - Zina Ahmed Abohaia:

Challenges and Opportunities of Integrating, and Securing IoT technology in public places. 1-8 - Vaibhav Dalip, Anup Lal Yadav

, Ankita Joshi
:
Custom Analytics Module and Admin Panel for Websites built in PHP (Laravel). 1-4 - Mohammad Rustom Al Nasar, Iftikhar Nasir

, Tamer Mohamed, Nouh Sabri Elmitwally
, Mahmoud M. Al-Sakhnini
, Tayba Asgher:
Detection of Dengue Disease Empowered with Fused Machine Learning. 1-10 - Kamal Kishore, Shanu Khare, Vaibhav Uniyal, Sahil Verma

:
Performance and stability Comparison of React and Flutter: Cross-platform Application Development. 1-4 - GA. Uday Kiran, K. Chanthirasekaran

, N. Thiyaneswaran:
Design of Micro-Strip Patch Antenna using Metamaterial Substrate to improve the Directivity compared to FR4 Substrate. 1-7 - Umang Srivastava, Bhupinder Kaur, Amit Semwal

:
Blockchain Technology in Requisites of Openscience, Bigdata It's Applications. 1-4 - Karamath Ateeq, P. RamLal, Ossma Ali Thawabeh, Ahmad Arsalan

, Muhammad Burhan
, Muhammad Umar Nasir:
NABA: Novel Adaptive Broadcast Storm Avoidance in NDN and SDN based FANET. 1-5 - Muaadh Mukred

, Burkan Hawash, Mohammed Islam Nofal, Umi Asma' Mokhtar, Zawiyah Mohammad Yusof:
Big Data and Electronic Records Management Systems for Public Sector Organizations Competency. 1-7 - Tishya Shakya, R. Beaulah Jeyavathana, P. Kiran Kumar:

Improved Accuracy in Automatic Detection of Tuberculosis Disease from Lung CT images using Support Vector Machine Classifier over K-Nearest Neighbours Classifier. 1-5 - Nikhil Tyagi, Reema Goyal, Reeta Rautela:

Real Time Drowsiness Detection System. 1-3 - Tahir Alyas, Karamath Ateeq, Mohammed Alqahtani, Saigeeta Kukunuru, Nadia Tabassum, Rukshanda Kamran

:
Security Analysis for Virtual Machine Allocation in Cloud Computing. 1-9 - Muhammad Turki Alshurideh, Bader Y. Obeidat

, Vorobeva Victoria, Haitham M. Alzoubi, Areej Fatima, Amna Ilyas, Iqra Rustam:
A Systematic Literature Review of Security in 5G based Social Networks. 1-5 - Omar Kassem Khalil, Rasha Hasan:

Modeling the Influence of data amount on the response time of CRUD Operations under Oracle. 1-5 - Ahmad Mustafa Mohamad Al-Aboosi

, Siti Norul Huda Sheikh Abdullah, Mohd Zamri Murah, Ghassan Saleh Al-Dharhani
:
Cybersecurity Trends in Health Information Systems. 1-4 - Ala Abdelrazaq Alhammadi, Hussam M. N. Al Hamadi

, Chan Yeob Yeun, Ernesto Damiani:
A Cyber-Security Framework For Boiler of Steam Power Plant Using Simulation Data to Train Machine Learning Model. 1-9 - Mounir El Khatib, Afnan Ibrahim, Shamma Al Blooshi, Sara Almansoori, Ali El Khatib

:
Digital Transformation and Disruptive Technologies: Effect of 3D Printing on Managing Projects. 1-13 - Atif Ali

, Yasir Khan Jadoon, Zulqarnain Farid, Munir Ahmad, Naseem Abidi, Haitham M. Alzoubi, Ali A. Alzoubi:
The Threat of Deep Fake Technology to Trusted Identity Management. 1-5 - B. Sumanth, G. Ramkumar, Vinay Sivasamy

:
Bone Fracture Identification using ANN Algorithm and Comparing the Accuracy with SVM Algorithm. 1-5 - Aditya Thakkar, Kavita, Sonali Dash, Sanjeev Kumar Joshi:

Sorting Algorithm visualizer. 1-5 - Lukesh Singh, Shanu Khare, Anjum Parvez

, Sahil Verma
:
Research Paper on Path-finding Algorithm Visualizer. 1-4 - Utkarsh Raj, Navneet Kaur

, Babita Rawat:
English Algorithm Translation to C Program using Syntax Directed Translation Schema. 1-3 - Atif Ali

, Nafees Ahmed Somroo, Umer Farooq
, Muhammad Asif, Iman Akour, Wathiq Mansoor:
Smartphone Security Hardening: Threats to Organizational Security and Risk Mitigation. 1-12 - Odai Ali Ali Sharfadeen AL-Azazi, Azah Anir Norman, Norjihan Binti Abdul Ghani

:
Bring Your Own Device Information Security Policy Compliance Framework: A Systematic Literature Review and Bibliometric Analysis (2017-2022). 1-8 - Khaled Mohamed Kayed Alhyasat, Nahia Mourad, Omar Sattar, Faiz Rasool, Ali Sheraz Akram, Tayba Asgher:

Estimation of Virtual Trust on Driverless Cars using Type-1 Fuzzy logic. 1-11 - M. Muniteja, M. K. Mariam Bee, V. Suresh:

Detection and classification of Melanoma image of skin cancer based on Convolutional Neural Network and comparison with Coactive Neuro Fuzzy Inference System. 1-5 - Waleed T. Al-Sit, Karamath Ateeq, Syed Quadir Moinuddin, Shoukat Aslam, Abdur Rehman, Tayba Asgher, Ossma Ali Thawabeh:

Direct Trust in Cloud Computing Based on Fuzzy Logic. 1-6 - Aabhas Kumar, Damandep Kaur

, Abhishek Kumar Pathak:
VOICE ASSISTANT USING PYTHON. 1-4 - Kanhaiya Jee, Amanpreet Kaur

, Abhishek Joshi
:
Machine Learning in Healthcare Industry: An Analysis. 1-4 - Saira Kanwal, Muhammad Adnan Khan

, Areej Fatima, Mahmoud M. Al-Sakhnini
, Omar Sattar, Hamza Alrababah
:
IA2SKAbs: Intelligent automated and accurate system for classification of kidney abnormalities. 1-10 - Nidal A. Al-Dmour

, Mohammad Salahat, Harish K. G. Nair
, Nayab Kanwal, Muhammad Saleem
, Nauman Aziz:
Intelligence Skin Cancer Detection using IoT with a Fuzzy Expert System. 1-6 - Nikhil Barya, Azhar Ashraf, Maninder Kaur, Shikha Uniyal Gairola:

Classification and Analysis of Virtual Private Network. 1-5 - Swati Sharma, Shanu Khare, Vaibhav Uniyal, Sahil Verma

:
Hybrid Development in Flutter and its Widgits. 1-4 - Sunny Kumar, Sonali Dash, Lakshmipriya Vinjamuri

, Kavita:
Development of an Email System using Java and comparison with other Email Applications. 1-5 - S. Koti Niteesh Reddy, S. Prem Kumar, R. Karthikeyan:

Shape Based Feature Extraction for Currency recognition and compare the accuracy and sensitivity with ORB algorithm. 1-5 - Naman Thakur, Satnam Singh Saini, Abhishek Kumar Pathak:

Data Mining Model Framework for GTD (Global Terrorism Database). 1-5 - Kapil Joshi

, Richa Pandey, Salil Bharany, Ateeq Ur Rehman, Nasser Taleb, Deepak Kalra:
Customization of Bookkeeping system for Blockchain System Analysis: A Review. 1-5 - Anurag Sharma, Amanpreet Kaur

, Amit Semwal
:
Supervised and Unsupervised Prediction Application of Machine Learning. 1-5 - Mahdi Sahlabadi, Morteza Saberikamarposhti

, Ravie Chandren Muniyandi, Zarina Shukur:
Using Cycling 3D Chaotic Map and DNA Sequences for Introducing a Novel Algorithm for Color Image Encryption. 1-7 - Ashish Srivastava, Shreya Bansal, Satbir S. Sehgal:

Real-Time Based Driver's Drowsiness and Fatigue Detection System. 1-6 - Ghassan F. Issa

, Khaled Shaalan, Yara Shaalan
, Hafiza Afia Saeed, Noor Fatima, Abd Ur Rehman:
Brain Stroke Prediction Using ANN. 1-9 - Vaibhav Rathor, Navneet Kaur

, Reeta Rautela:
Employee Hiring using Machine Learning. 1-3 - Ahmad Firdaus, Ghassan Saleh Al-Dharhani

, Zahian Ismail, Mohd Faizal Ab Razak:
The Summer Heat of Cryptojacking Season: Detecting Cryptojacking using Heatmap and Fuzzy. 1-5 - K. Tejasree, G. Gulothungan, R. Navaneethan:

Computational Model Based Approach to Analyze Calcium (Ca2+) Concentration Effects in Ventricular Cells for Action Potential Generation Using Euler Integration Method-A Simulation Study. 1-5 - Shivam, Sugandhi Midha, Bharti Ramola:

Cryptography in Network Security. 1-5 - Ali Lamjid, Khairul Akram Zainol Ariffin, Mohd Juzaiddin AB Aziz

, Nor Samsiah Sani:
Determine the optimal Hidden Layers and Neurons in the Generative Adversarial Networks topology for the Intrusion Detection Systems. 1-7 - Shubham Bhardwaj, Divya K

, Abhishek Kumar Pathak:
Real-Time Gesture Recognition System using CNN. 1-3 - Ritik Sharma, Sugandhi Midha, Amit Semwal

:
Predictive Analysis on Multimodal Medicare Application. 1-5 - H. Sudarsan Kumar Raju, M. Nalini

, P. Senthil Murugan:
Performance Analysis of Multi-objective Data Placement Technique and Sine Optimization Algorithm to Measure Prediction in Large Volume of Data Storage. 1-5 - Urooj Yousuf Khan, Tariq Rahim Soomro, Muhammad Nawaz Brohi:

iFogSim: A Tool for Simulating Cloud and Fog Applications. 1-5 - Ansh Jain, Gurinder Singh, Amit Semwal

:
Smart Attenedence System Using Face Recognition. 1-3 - Devansh Mehta, Sanjeev Kumar Joshi:

Hiding Information in images using LSBSteganography technique. 1-4 - Aqila Begum

, Sophia Rahaman
, Jesus Cuauhtemoc Tellez Gaytan
:
Fintech and Leverage Of Virtual Reality An Outlook From UAE. 1-7 - Mounir El Khatib, Sara Bin Khadim, Wadha Al Ketbi, Noura Hamad Al Kuwaiti, Ali El Khatib

:
Digital Transformation and Disruptive Technologies: Effect of Blockchain on Managing Construction Projects. 1-9 - Swasti Jain, Sonali Dash, Rajesh Deorari, Kavita:

Object Detection Using Coco Dataset. 1-4 - S. Mahesh, G. Ramkumar, K. Anjaneyulu:

Smart face detection and recognition in Pose variant images using Alexnet CNN compare accuracy with SVM. 1-4 - Liaqat Ali, Mahmoud M. Al-Sakhnini

, Deepak Kalra, Farheen Afzaal, Madiha Pervaiz, Muhammad Farrukh Khan:
Distributed Search Engine Query Optimization Using Artificial Neural Network. 1-5 - Priyanshu Sharma, Damandeep Kaur

, Bharti Ramola:
JavaScript API Deprecation Landscape: A Mining Study. 1-5 - Shardeep Kaur Sooch, Darpan Anand, Rajesh Deorari:

Brain Tumor detection with GLCM feature extraction and hybrid classification approach. 1-5 - Muhammad Sohail Munir

, Kausar Parveen, Umer Farooq
, Khaled Shaalan, Abedallah Zaid Abualkishik, Abdul Salam Mohammed:
Use of Different Machine Learning Algorithms for Hate Speech Detection. 1-7 - Gurpartap Singh, Anup Lal Yadav

, Satbir S. Sehgal:
Sign language recognition Using Python. 1-5 - O. Pavithra, G. Padmapriya

, R. Karthikeyan:
Prediction of Early Stage of Fatty Liver Disease in Patients using Logistic Regression and Naive Bayes Algorithm. 1-5 - D. Karthika, M. Deepika, Neyara Radwan, Amer Hani Al-Kassem:

Genetic Algorithm-Based Feature Selection and Self-Organizing Auto-Encoder (SOAE) For SNP Genomics Data Classification. 1-6 - Rounak Agarwala, Reema Goyal, Babita Rawat:

Implementation of EIGRP Using Packet Tracer. 1-4 - Muhammad Haziq Mohd Zainudin, Khairul Akram Zainol Ariffin, Dahlia Asyiqin Ahmad Zainaddin, Ahmad Tarmizi Abdul Ghani, Siti Norul Huda Sheikh Abdullah:

Cloud-based Data Extraction From Mobile Devices: A Preliminary Analysis. 1-5 - Mudit, K. Divya

, Sanjeev Kumar Joshi, Sahil Verma
:
Facial Expression Detection using Convolutional Neural Network. 1-5 - Md Meraj Ahmed, Navneet Kaur

, Shikha Uniyal Gairola:
Hospital Management System Based on IoT. 1-5 - Muhammad Tahir, Abdul Salam Mohammed, Sunita Marwaha, Mohit Vij, Yousaf Saeed, Muhammad Atif, Iqra Kanwal, Muhammad Hassan Ghulam Muhammad:

Wi-Fi Aided Home Energy Management System and AC Prediction through Temperature and Humidity Sensors. 1-9 - H. Sudarsan Kumar Raju, M. Nalini

, P. Senthil Murugan:
Classification of Large Data Storage using Sine Optimization Algorithm and Comparison of Accuracy in terms of Distributed Community Discovery Algorithm. 1-4 - N. Kamal Koushik, D. J. Gino Sinthia, P. Kiran Kumar:

Enhancing the Performance Accuracy of Student Monitoring System by Face Detection and Tracking in Classroom Environment using RNN over MTCNN Algorithms. 1-5 - Sakshi, Satnam Singh, Reeta Rautela:

Chatbot: A Bridge Between Technology and Learn. 1-3 - Dadithota Jaya Prakash Reddy, M. Gunasekaran, K. K. Shantha Sundari:

An Effective Approach for the Prediction of Car Loan Default Based-on Accuracy, Precision, Recall Using Extreme Logistic Regression Algorithm and K-Nearest Neighbors Algorithm on Financial Institution Loan Dataset. 1-5 - Faiza Khaliq, Muhammad Farhan Khan, Muhammad Sajid Farooq, Manas Ranjan Pradhan, Muhammad Asghar Khan, Tariq Rahim Somroo:

An Intelligent Model to Predict Pneumonia Using Deep Extreme Machine Learning: *Note: Sub-titles are not captured in Xplore and should not be used. 1-7 - Ahmed Hadi Ali AL-Jumaili

, Ravie Chandren Muniyandi, Mohammad Kamrul Hasan, Mandeep Jit Singh, Johnny Koh Siaw Paw:
Analytical Survey on the Security Framework of Cyber-Physical Systems for Smart Power System Networks. 1-8 - Manoj Mulkalla, Deepika

, Ankita Joshi
:
Predicting the Fare of a Flight Ticket with Machine Learning Algorithms. 1-5 - Saif E. A. Alnawayseh

, Waleed T. Al-Sit, Hamza Alrababah
, Nasir Shahzad Yasin, Mayraj Fatima, Nasir Mehmood:
Classification of White Blood Cells Empowered with Auto Encoder and CNN. 1-7 - Jehangir Arshad

, Ateeq Ur Rehman
, Shiza Gull Niazi, Deepak Kalra, Wathiq Mansoor:
A Review on Security Attacks and countermeasure in Home Area Network (HAN). 1-6 - Zhang Wenhua

, Wan Muhd Hazwan Azamuddin, Azana Hafizah Mohd Aman, Hasimi Sallehudin, Yanke Zhang:
Simulation cycle for network scenario based on AD-Campus solution. 1-5 - B. Shaik Tabrash, G. Anitha, O. R. Hemavathy:

Design of RF MEMS Series Switch using Different Switch Materials to Enhance the RF Performances at DC to 40 GHz 'ze. 1-7 - Varun Sapra, Mohammad Kamrul Hasan, Taher M. Ghazal, Akashdeep Bhardwaj, Salil Bharany, Munir Ahmad, Ateeq Ur Rehman

, Tamer Mohamed:
Privacy-based framework for Cyber Resilience of Healthcare based data for use with Machine Learning algorithms. 1-6 - Kumar Priyadarshini, Satnam Singh, Anil Kumar Dixit:

Recognition of Handwritten Digit Using Different Machine Learning Algorithms. 1-4 - Zhibo Zhang

, Ernesto Damiani, Hussam M. N. Al Hamadi
, Chan Yeob Yeun, Fatma Taher:
Explainable Artificial Intelligence to Detect Image Spam Using Convolutional Neural Network. 1-5 - Fizza Ramzan, Izza Ramzan, Muhammad Ibrahim, Kiran Tangri, Amer Hani Al-Kassem, Mohammad Inairat, Sunita Marwaha, Mounir El Khatib:

Innovativeness and Involvement: An Unexpected Purchase Due to a Referral Behavior. 1-12 - Govind Sawhney, Gagandeep Kaur, Rajesh Deorari:

CSPM: A secure Cloud Computing Performance Management Model. 1-5 - Sriram AdiVishnu, V. Nagaraju, K. K. Shantha Sundari:

Harvesting Period Prediction Based on Stages of Mango Ripening Using CNN over Decision Tree. 1-4 - Avani Bhandari, Nanmaran R, Lakshmipriya Vinjamuri

:
The Impact of Artificial Intelligence on Global Trends. 1-6 - Ateeq Ur Rehman

, Jehangir Arshad
, Muhammad Tariq Sadiq
, Abdul Rehman, Munir Ahmad, Mohammad Kamrul Hasan, Hussam M. N. Al Hamadi
, Tauqeer Faiz:
Implementation of an Intelligent Animal Monitoring System Using Wireless Sensor Network and IoT Platform. 1-11 - Nurul Nuha Abdul Molok

, Zahidah Zulkifli, Mohamed Ridza Wahiddin:
Pendekar Siber: Empowering Young People to Combat Cyber Threats. 1-4 - MD Taammimul Haque, Amanpreet Kaur

, Tarun Parashar:
Drowsiness Detector Using Python For Reducing Accident. 1-5 - Tamer Mohamed Abdellatif, Raed A. Said, Taher M. Ghazal:

Understanding Dark Web: A Systematic Literature Review. 1-10 - Palak Dwivedi, Kshamta, Abhishek Joshi

:
ReactJS For Trading Applications. 1-7 - Pawanjot Kaur, Divya K

, Lakshmipriya Vinjamuri
:
An Application to Automate the Google Form Submission. 1-4 - Utkarsh Kaushal, Gurinder Singh, Tarun Parashar:

Responsive Webpage Using HTML CSS. 1-4 - Haitham M. Alzoubi, Nizar Sahawneh

, Ahmad Qasim AlHamad, Umar Malik, Ameer Majid, Ayesha Atta:
Analysis Of Cost Prediction In Medical Insurance Using Modern Regression Models. 1-10 - Raed A. Said, Hammad Raza, Salman Muneer

, Kamran Amjad, Abdul Salam Mohammed, Syed Shehryar Akbar, Muhammad Zonain, Muhammad Arslan Aslam:
Skin Cancer Detection and Classification Based on Deep Learning. 1-11 - Simranjeet Kaur, Anup Lal Yadav

, Abhishek Joshi
:
Real Time Object Detection. 1-5 - Muhamamd Saleem, Assma Khadim, Mayraj Fatima, Muhammad Asghar Khan

, Harish K. G. Nair
, Muhammad Asif:
ASSMA-SLM: Autonomous System for Smart Motor-Vehicles integrating Artificial and Soft Learning Mechanisms. 1-6 - Saida Harguem

, Zakariya Chabani, Samar Noaman
, Muhammad Amjad, Muhammad Bux Alvi
, Muhammad Asif, Muhammad Hassaan Mehmood, Amer Hani Al-Kassem:
Machine Learning Based Prediction of Stock Exchange on NASDAQ 100: A Twitter Mining Approach. 1-10 - Siti Baizura Mohd Yusof, Siti Norul Huda Sheikh Abdullah, Masnizah Mohd, Noridayu Adnan, Raja Jamilah Raja Yusof, Umi Asma' Mokhtar, Azah Anir Norman, Wan Fariza Paizi Fauzi:

The effectiveness of Women 4IR Cyber 3A #Aware, Avoid, Act Program in Malaysia. 1-5 - Bhavesh Kumar, Damandeep Kaur

, Bharti Ramola:
Voice Enabled Website. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














