All Stories

  1. Cognitively Economical Heuristic for Multiple Sequence Alignment under Uncertainties
  2. Efficient Cancelable Template Generation Based on Signcryption and Bio Hash Function
  3. New approach for fingerprint recognition based on stylometric features with blockchain and cancellable biometric aspects
  4. A New Fuzzy Extension of the Simple WISP Method
  5. Implementation of Encryption and Data Hiding in E-Health Application
  6. The Possibility of Combining and Implementing Deep Neural Network Compression Methods
  7. Dental age assessment based on CBCT images using machine learning algorithms
  8. Automatic Image Caption Generation Based on Some Machine Learning Algorithms
  9. Ensemble Machine Learning Methods to Predict the Balancing of Ayurvedic Constituents in the Human Body
  10. Interoperability, Anonymity and Privacy Issues in Blockchain for Healthcare Systems
  11. Blockchain in the Pharmaceutical Industry for Better Tracking of Drugs with Architectures and Open Challenges
  12. Enhanced multimodal biometric recognition approach for smart cities based on an optimized fuzzy genetic algorithm
  13. A Single Valued Neutrosophic Extension of the Simple WISP Method
  14. Comparative Analysis of the Simple WISP and Some Prominent MCDM Methods: A Python Approach
  15. Preface
  16. Cybersecurity in 5G and IoT Networks
  17. The influence of electronic education on students of Islamic science
  18. A novel block encryption method based on Catalan random walks
  19. An approach to adding simple interface as security gateway architecture for IoT device
  20. Enhanced WSN Routing Protocol for Internet of Things to Process Multimedia Big Data
  21. A New Grey Approach for Using SWARA and PIPRECIA Methods in a Group Decision-Making Environment
  22. An Innovative Grey Approach for Group Multi-Criteria Decision Analysis Based on the Median of Ratings by Using Python
  23. Application of Delaunay Triangulation and Catalan Objects in Steganography
  24. The Importance of Implementing a Multimedia Application Created according to the ADDIE Instructional Design Model in Writing and Reading the Letters of the Alphabet / Važnost primjene multimedijske aplikacije stvorene prema ADDIE modelu za poučavanje p...
  25. Enhanced WSN Routing Protocol for Internet of Things to Process Multimedia Big Data
  26. A Novel Fingerprint Biometric Cryptosystem Based on Convolutional Neural Networks
  27. ENCRYPTION OF 3D PLANE IN GIS USING VORONOI-DELAUNAY TRIANGULATIONS AND CATALAN NUMBERS
  28. An Enhanced Anti-phishing Scheme to Detect Phishing Website
  29. Secure Remote User Authentication Scheme on Health Care, IoT and Cloud Applications: A Multilayer Systematic Survey
  30. A Novel Approach to Data Encryption Based on Matrix Computations
  31. Comparison of Ensemble Machine Learning Methods for Automated Classification of Focal and Non-Focal Epileptic EEG Signals
  32. Impact of Using Digital Tools in High School Mathematics: A Case Study in North Macedonia
  33. Cryptographic keys exchange model for smart city applications
  34. Memoization method for storing of minimum-weight triangulation of a convex polygon
  35. Implementation of Graham’s Scan Method for Triangulation of Non Convex Polygons in Java Netbeans Environment
  36. Computational Geometry Applications
  37. GENERATION OF CRYPTOGRAPHIC KEYS WITH ALGORITHM OF POLYGON TRIANGULATION AND CATALAN NUMBERS
  38. THE FEASIBILITY AND BENEFITS OF GPS TELEMETRY MONITORING SYSTEM IN MINING
  39. The Significance of Using Ict in Telemetric Monitoring, Process Weighing and Control of The Coal
  40. How information technology effected on the profitability of media
  41. Implementation of the transportation problem based on meta-heuristics approach method
  42. Digital repository to integration with learning content management system (LCMS)