


default search action
Innovations in Systems and Software Engineering, Volume 21
Volume 21, Number 1, March 2025
- Ashlesha Hota
, Subir Panja
, Amitava Nag
:
Lightweight CNN-based malware image classification for resource-constrained applications. 1-14 - Dipanwita Debnath
, Ranjita Das
, Partha Pakray, Ruzina Laskar:
Extractive single-document summarization using adaptive binary constrained multi-objective differential evaluation. 15-27 - Diganta Sengupta
, Subhash Mondal
, Anish De Kumar, Pretha Sur:
Classification of diabetic retinopathy using stacked machine learning approach on low resource dataset. 29-37 - Debajit Sarma, V. Kavyasree, Manas Kamal Bhuyan:
Two-stream fusion model using 3D-CNN and 2D-CNN via video-frames and optical flow motion templates for hand gesture recognition. 39-52 - Shankha Shubhra Sarkar
, Aryaman Kakad, Shashank Mouli Satapathy
:
FastRWDnet: implementation of novel real-time deep video denoising utilizing optimized FastDVDnet. 53-64 - Rohit Kumar Kasera
, Tapodhir Acharjee
:
Parking slot occupancy prediction using LSTM. 65-77 - Prasenjit Dhar
, K. Suganya Devi
, Satish Kumar Satti
, P. Srinivasan:
Efficient detection and partitioning of overlapped red blood cells using image processing approach. 79-91 - Srirupa Dasgupta, Mou Dutta
, Anindya Halder
, Abhinandan Khan
, Goutam Saha, Rajat Kumar Pal:
Computational analysis of gene expression data using bidirectional long short-term memory for disease diagnosis. 93-107 - Bidyut Bikash Borah
, Satyabrat Malla Bujar Baruah
, Debaraj Kakati, Soumik Roy:
CVD prediction on micro-controller: ECG morphology learning approach. 109-119 - Krishna Daripa
:
Spanning cactus existence in generalized Petersen graphs. 121-126 - Samarjit Roy
, Anwesha Mukherjee
, Debashis De:
IoHMT: a probabilistic event-sensitive music analytics framework for low resource internet of humanitarian musical things. 127-150 - Ananjan Maiti, Mahamuda Sultana, Suman Bhattacharya:
Detection of skin cancer through hybrid color features and soft voting ensemble classifier. 151-164 - Aparna Pramanik
, Chiranjit Changdar, Abhinandan Khan
, Snehamoy Chatterjee, Rajat Kumar Pal
, Sudip Kumar Sahana:
A 0-1 knapsack problem-based approach for solving open-pit mining problem with type-2 fuzzy parameters. 165-178 - N. Donald Jefferson Thabah
, Aiom Minnette Mitri, Goutam Saha, Arnab Kumar Maji
, Bipul Shyam Purkayastha:
A deep connection to Khasi language through pre-trained embedding. 179-193 - Rosy Swami, Prodipto Das
:
A new secure data retrieval system based on ECDH and hierarchical clustering with Pearson correlation. 195-205 - Sufal Das
:
LowEST: a low resource semantic text summarization method for big data. 207-214 - Mrinmoy Sadhukhan
, Pramita Bhattacherjee, Tamal Mondal
, Sudakshina Dasgupta
, Indrajit Bhattacharya:
Opinion classification at subtopic level from COVID vaccination-related tweets. 215-226 - Sourish Dhar
, Vishal Gour, Arnab Paul
:
Emotion recognition from lyrical text of Hindi songs. 227-235 - Jayati Mukherjee
, Sneha Mishra, Arjit Tomar, Vikas Kumar:
A low-cost hybrid handwritten Devanagari character classifier. 237-245 - Sudip Suklabaidya
, Indrani Das:
Comparative exploration of CNN model and transfer learning on fire image dataset. 247-256 - Neepa Biswas, Anindita Sarkar Mondal, Ari Kusumastuti
, Swati Saha, Kartick Chandra Mondal
:
Automated credit assessment framework using ETL process and machine learning. 257-270 - Soumen Maji
, Apurbalal Senapati, Arunendu Mondal
:
A study on hydrodynamics of rigid and emergent vegetated flows using machine learning approach. 271-278 - Jisha P. Jayan
, J. Satheeshkumar, T. Amudha:
Semantic role identification for Malayalam using machine learning approaches. 279-285 - Ruhul Amin Hazarika, Arnab Kumar Maji
, Debdatta Kandar, Prasun Chakrabarti, Tulika Chakrabarti, K. S. Jagannatha Rao, Jose Carvalho, Babak Kateb, Mohammad Nami:
An evaluation on changes in hippocampus size for cognitively normal, mild cognitive impairment, and Alzheimer's disease patients using fuzzy membership function. 287-301 - Sandipan Roy, Samit Bhanja, Abhishek Das:
AndyWar: an intelligent android malware detection using machine learning. 303-311 - Anandu M. Dharan, Debarka Mukhopadhyay:
A comprehensive survey on machine learning techniques to mobilize multi-camera network for smart surveillance. 313-332
Volume 21, Number 2, June 2025
- Nouhaila Hanbali, Ahmed El-Yahyaoui:
Advanced machine learning and deep learning approaches for fraud detection in mobile money transactions. 333-353 - Fatma Ellouze, Ghofrane Fersi, Mohamed Jmaiel:
Lightweight blockchain-based access control with efficient revocation for fog-enabled IoT. 355-379 - Huiyao Dong, Igor V. Kotenko:
Image analysis approach based on VAE-GAN for IoT malware detection in urban environments. 381-395 - Hicham Yzzogh
, Hafssa Benaboud
:
A comprehensive overview of machine learning for intrusion detection in software-defined networking. 397-419 - Salma Bradai, Amal Gassara, Khaled Taouil, Moez Hachicha, Ghayth Farhat:
Optimizing blockchain performance in multi-use case marketplaces. 421-435 - Hanan Khaled, Sherif M. Saif, Salwa M. Nassar, Mohamed Taher:
Feasibility of quantum-safe digital signature algorithms on cloud virtual machines. 437-451 - Habiba Hadri, Mourad Ouadou, Laila Chakour, Khalid Minaoui:
Sybil attack detection in vehicular ad hoc networks (VANETs): a comprehensive survey. 453-474 - Akram Idani, Yves Ledru, Germán Vega:
Formal model-driven security combining B-method and process algebra. 475-499 - Sushant Kumar Pandey
, Arya Haldar, Anil Kumar Tripathi:
Is deep learning good enough for software defect prediction? 501-516 - Akshaya Jagannadharao, Nicole Beckage, Dawn Nafus, Scott Chamberlin:
Timeshifting strategies for carbon-efficient long-running large language model training. 517-531 - Yagnesh Challagundla
, Trilok Sai Charan Tunuguntla, Sindhu Gayathri Tunuguntla, Nagaraju Devarakonda:
Convolutional neural network-based classifiers for liver tumor detection using computed tomography scans. 533-539 - Marc-Antoine Levasseur
, Mourad Badri:
Prioritizing unit tests using object-oriented metrics, centrality measures, and machine learning algorithms. 541-567 - Asieh Salehi Fathabadi
, Colin F. Snook
, Dana Dghaym, Thai Son Hoang
, Fahad Alotaibi, Michael J. Butler
:
Systematic hierarchical analysis of requirements for critical systems. 569-593 - Satya Prakash Nayak, Daniel Neider, Rajarshi Roy, Martin Zimmermann
:
Robust computation tree logic. 595-617 - Sanaz Sheikhi, Usama Mehmood, Stanley Bak, Scott A. Smolka, Scott D. Stoller:
The black-box simplex architecture for runtime assurance of multi-agent CPS. 619-634 - Baoluo Meng, Arjun Viswanathan, Saswata Paul, William Smith, Abha Moitra, Kit Siu, Michael Durling:
Attack-defense tree-based analysis and optimal defense synthesis for system design. 635-651 - Jacinto F. S. Reis, Alexandre Mota:
Improving Android app exploratory testing with UI test cases using code change analysis. 653-671 - Felipe Gorostiaga, César Sánchez:
General monitorability of totally ordered verdict domains. 673-686 - Mohammed Bekkouche:
A bounded constraint-based approach to aid in fault localization from a counterexample. 687-705 - Johan Arcile, Étienne André:
Zone extrapolations in parametric timed automata. 707-726 - Subhashis Chatterjee, Deepjyoti Saha
:
IT2F-SEDNN: an interval type-2 fuzzy logic-based stacked ensemble deep learning approach for early phase software dependability analysis. 727-746 - Abdul Waheed Dar, Sheikh Umar Farooq:
Handling class overlap and imbalance using overlap driven under-sampling with balanced random forest in software defect prediction. 747-767 - Anupama Kaushik, Kavita Sheoran, Ritvik Kapur, Nikhil Bhutani, Bhavesh Singh, Harsh Sharma:
SENSE: software effort estimation using novel stacking ensemble learning. 769-785 - K. L. Sailaja, P. Ramesh Kumar, Hitesh Sri Sai Kaushik Vezzu, K. V. Vishnu Vardhan:
Correction: Estimation and analysis of landslide occurrence by combining geographical and atmospheric study using U-Net model. 787

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.