All Stories

  1. Expertise-informed Bayesian convolutional neural network for oil production forecasting
  2. Theory guided Lagrange programming neural network for subsurface flow problems
  3. Embedded feature selection approach based on TSK fuzzy system with sparse rule base for high-dimensional classification problems
  4. First-Order Sparse TSK Nonstationary Fuzzy Neural Network Based on the Mean Shift Algorithm and the Group Lasso Regularization
  5. Spatiotemporal Particulate Matter Pollution Prediction Using Cloud-Edge Intelligence
  6. RF-Based Drone Detection with Deep Neural Network: Review and Case Study
  7. Theory-Guided Convolutional Neural Network with an Enhanced Water Flow Optimizer
  8. An interpretable neural network for robustly determining the location and number of cluster centers
  9. Towards Federated Learning and Multi-Access Edge Computing for Air Quality Monitoring: Literature Review and Assessment
  10. Effects of Face Image Degradation on Recognition with Vision Transformers: Review and Case Study
  11. Intelligent Image and Video Analytics
  12. Multi-culture Sign Language Detection and Recognition Using Fine-tuned Convolutional Neural Network
  13. Contextual Sequence-to-Point Deep Learning for Household Energy Disaggregation
  14. Ensemble Multifeatured Deep Learning Models and Applications: A Survey
  15. Two-Stage Face Detection and Anti-spoofing
  16. A comprehensive survey and taxonomy of sign language research
  17. Improving Intrusion Detection for Imbalanced Network Traffic using Generative Deep Learning
  18. Utilizing motion and spatial features for sign language gesture recognition using cascaded CNN and LSTM models
  19. Soft computing and intelligent systems: Techniques and applications
  20. URLCam: Toolkit for malicious URL analysis and modeling
  21. Towards Hybrid Multimodal Manual and Non-Manual Arabic Sign Language Recognition: mArSL Database and Pilot Study
  22. Comparative analysis of feature extraction and fusion for blind authentication of digital images using chroma channels
  23. Clustering of Association Rules for Big Datasets using Hadoop MapReduce
  24. Combining Deep Learning and Multiresolution Analysis for Stock Market Forecasting
  25. Early and Late Fusion of Emojis and Text to Enhance Opinion Mining
  26. Feature analysis and prediction of antibiotic resistance using PCA-MLP with segments of N. gonorrhoeae bacteria’s DNA
  27. On DNA cryptography for secure data storage and transfer
  28. Evaluation of CNN Models with Transfer Learning for Recognition of Sign Language Alphabets with Complex Background
  29. Joint space representation and recognition of sign language fingerspelling using Gabor filter and convolutional neural network
  30. Statistical Gabor-Based Gait Recognition Using Region-Level Analysis
  31. Impact of Normalization on BiLSTM Based Models for Energy Disaggregation
  32. Empirical study on imbalanced learning of Arabic sentiment polarity with neural word embedding
  33. Soft computing and intelligent systems: techniques and applications
  34. Exploring Lattice-based Post-Quantum Signature for JWT Authentication: Review and Case Study
  35. A review of machine learning for big data analytics: bibliometric approach
  36. Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks
  37. Enhanced Video Analytics for Sentiment Analysis Based on Fusing Textual, Auditory and Visual Information
  38. Multi-Target Energy Disaggregation using Convolutional Neural Networks
  39. On Using Physical Based Intrusion Detection in SCADA Systems
  40. Parallel Association Rules Pruning Algorithm on Hadoop MapReduce
  41. Audio-Textual Arabic Dialect Identification for Opinion Mining Videos
  42. Benchmarking Open-Source Android Malware Detection Tools
  43. Overview and Case Study for Ransomware Classification Using Deep Neural Network
  44. Impact of Spectre/Meltdown Kernel Patches on Crypto-Algorithms on Windows Platforms
  45. Special issue on Neural Information Processing for Optimization and Applications
  46. Bibliography of digital image anti-forensics and anti-anti-forensics techniques
  47. Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and Applications
  48. Forecasting of Bahrain Stock Market with Deep Learning: Methodology and Case Study
  49. Multi-scale LPQ-DCT for Image Forgery Detection
  50. Using feature-level fusion for multimodal gender recognition for opinion mining videos
  51. Soft computing and intelligent systems: techniques and applications
  52. A multi-matching approximation algorithm for Symmetric Traveling Salesman Problem
  53. Multimodal Sentiment and Gender Classification for Video Logs
  54. Statistical Comparison of Opinion Spam Detectors in Social Media with Imbalanced Datasets
  55. Detection of Arabic Spam Tweets Using Word Embedding and Machine Learning
  56. Combining emojis with Arabic textual features for sentiment classification
  57. Emoji-Based Sentiment Analysis of Arabic Microblogs Using Machine Learning
  58. Evaluation of bidirectional LSTM for short-and long-term stock market prediction
  59. Imbalanced Sentiment Polarity Detection Using Emoji-Based Features and Bagging Ensemble
  60. Stock Market Forecast Using Multivariate Analysis with Bidirectional and Stacked (LSTM, GRU)
  61. Soft computing and intelligent systems: Techniques and applications
  62. Intrusion detection taxonomy and data preprocessing mechanisms
  63. Ant colony inspired method for reducing load imbalance in multiprocessor systems
  64. Anger Detection in Arabic Speech Dialogs
  65. Emojis-Based Sentiment Classification of Arabic Microblogs Using Deep Recurrent Neural Networks
  66. Image Splicing Forgery Detection Using DCT Coefficients with Multi-Scale LBP
  67. Automated gait-based gender identification using fuzzy local binary patterns with tuned parameters
  68. Hybrid multicriteria fuzzy classification of network traffic patterns, anomalies, and protocols
  69. Learning mechanisms for anomaly-based intruson detection: Updated review
  70. Searching Encrypted Data on the Cloud
  71. AdaBoost-based artificial neural network learning
  72. A more secure scheme for CAPTCHA-based authentication in cloud environment
  73. Critical review of static taint analysis of android applications for detecting information leakages
  74. Evaluating time and throughput at different modes of operation in AES algorithm
  75. Detection of Phishing Websites Based on Probabilistic Neural Networks and K-Medoids Clustering
  76. Special issue on soft computing and intelligent systems: Tools, techniques and applications
  77. A multiclass cascade of artificial neural network for network intrusion detection
  78. Evaluation of sequential adaptive testing with real-data simulation: A case study
  79. Hybrid Deep Learning for Sentiment Polarity Determination of Arabic Microblogs
  80. Silhouette-Based Gender Recognition in Smart Environments Using Fuzzy Local Binary Patterns and Support Vector Machines
  81. Using Word Embedding and Ensemble Learning for Highly Imbalanced Data Sentiment Analysis in Short Arabic Text
  82. Kernel-Based Fuzzy Local Binary Pattern for Gait Recognition
  83. Spam filtering framework for multimodal mobile communication based on dendritic cell algorithm
  84. Robust content authentication of gray and color images using lbp-dct markov-based features
  85. Selectivity estimation of extended XML query tree patterns based on prime number labeling and synopsis modeling
  86. Towards scalable rough set based attribute subset selection for intrusion detection using parallel genetic algorithm in MapReduce
  87. Known-plaintext attack and improvement of PRNG-based text encryption
  88. FLGBP: Improved Method for Gait Representation and Recognition
  89. Improving Information Security Practices through Computational Intelligence
  90. Multi-Kernel Fuzzy-Based Local Gabor Patterns for Gait Recognition
  91. Statistical Gabor-Based Gait Recognition Using Region-Level Analysis
  92. XHQE: A hybrid system for scalable selectivity estimation of XML queries
  93. SwiftEnc: Hybrid Cryptosystem with Hash-Based Dynamic Key Encryption
  94. MapReduce implementation for minimum reduct using parallel genetic algorithm
  95. Online prime labeling and generation of synopsis for XML query estimation
  96. Introduction to the special issue on Cognitive Radio Networks
  97. Anonymous Connections Based on Onion Routing: A Review and a Visualization Tool
  98. Boosting paraphrase detection through textual similarity metrics with abductive networks
  99. Dendritic Cell Algorithm for Mobile Phone Spam Filtering
  100. Detecting Cyber-Attacks on Wireless Mobile Networks Using Multicriterion Fuzzy Classifier with Genetic Attribute Selection
  101. Full-Reference Predictive Modeling of Subjective Image Quality Assessment with ANFIS
  102. Learning Rule for Linear Multilayer Feedforward ANN by Boosted Decision Stumps
  103. Improved selectivity estimator for XML queries based on structural synopsis
  104. A novel bio-inspired predictive model for spam filtering based on dendritic cell algorithm
  105. Biobjective NSGA-II for optimal spread spectrum watermarking of color frames: Evaluation study
  106. Impact of Stock Market Indices and Other Regional Exogenous Factors on Predictive Modeling of Border Traffic with Neural Network Models
  107. Combining spatial and DCT based Markov features for enhanced blind detection of image splicing
  108. Intrusion detection using a cascade of boosted classifiers (CBC)
  109. Network Intrusion Detection Using Multi-Criteria PROAFTN Classification
  110. Statistical Analysis of ML-Based Paraphrase Detectors with Lexical Similarity Metrics
  111. Effects of Using Average Annual Daily Traffic (AADT) with Exogenous Factors to Predict Daily Traffic
  112. A Multicriterion Fuzzy Classification Method with Greedy Attribute Selection for Anomaly-based Intrusion Detection
  113. Computational Intelligence in Smart Grids: Case Studies
  114. Abductive Learning Ensembles for Hand Shape Identification
  115. A Pareto-based hybrid multiobjective evolutionary approach for constrained multipath traffic engineering optimization in MPLS/GMPLS networks
  116. Detecting pixel-value differencing steganography using Levenberg-Marquardt neural network
  117. Enhanced Hand Shape Identification Using Random Forests
  118. Message from ISSR Workshop Chairs
  119. Automatic Identification Based on Hand Geometry and Probabilistic Neural Networks
  120. Evaluation of support vector machine with universal kernel for hand-geometry based identification
  121. Improved pixel value differencing steganography using logistic chaotic maps
  122. Abductive Neural Network Modeling for Hand Recognition Using Geometric Features
  123. Analysis and extraction of sentence-level paraphrase sub-corpus in CS education
  124. Fusion of Multiple Texture Representations for Palmprint Recognition Using Neural Networks
  125. High-Capacity Image Steganography Based on Overlapped Pixel Differences and Modulus Function
  126. Improved Personal Identification Using Face and Hand Geometry Fusion and Support Vector Machines
  127. A comparative study of PVD-based schemes for data hiding in digital images
  128. Comparing a class of dynamic model-based reinforcement learning schemes for handoff prioritization in mobile communication networks
  129. A reinforcement learning approach for sequential mastery testing
  130. An Adaptive Steganographic Method for Color Images Based on LSB Substitution and Pixel Value Differencing
  131. Using GMDH-based networks for improved spam detection and email feature analysis
  132. A bio-inspired image encryption algorithm based on chaotic maps
  133. A hierarchical GMDH-based polynomial neural network for handwritten numeral recognition using topological features
  134. ROUTING AND TRAFFIC MANAGEMENT
  135. Flow-based path selection for Internet traffic engineering with NSGA-II
  136. Offline Recognition of Handwritten Numeral Characters with Polynomial Neural Networks Using Topological Features
  137. Discovering classification rules for email spam filtering with an ant colony optimization algorithm
  138. The need for a unified framework for evaluating web cache replacement strategies
  139. Constructing optimal educational tests using GMDH-based item ranking and selection
  140. Construction and analysis of educational tests using abductive machine learning
  141. Spam filtering with abductive networks
  142. A fuzzy similarity approach for automated spam filtering
  143. Solving the minimum-cost constrained multipath routing with load balancing in MPLS networks using an evolutionary method
  144. Applications of genetic algorithms to optimal multilevel design of MPLS-based networks
  145. On Optimal Firewall Rule Ordering
  146. A Heuristic Approach for Firewall Policy Optimization
  147. Performance Comparison of CBT and PIM Multicast Routing Protocols over MPLS Networks
  148. A learning approach for prioritized handoff channel allocation in mobile multimedia networks
  149. REMOVING SOME HAZARDOUS HEAVY METAL ANIONS BY USING A NEW ANION EXCHANGER
  150. Obstacle avoidance and motion control for mobile robots
  151. Chaotic-Based and Biologically Inspired Cryptosystems for Secure Image Communication and Storage
  152. Computational Intelligence in Cryptology
  153. Computational Intelligence Paradigms:
  154. Computational Intelligence in Cryptology
  155. Computational Intelligence Paradigms
  156. A learning approach for call admission control with prioritized handoff in mobile multimedia networks
  157. Adaptive resource allocation with prioritized handoff in cellular mobile networks under QoS provisioning
  158. Autonomous call admission control with prioritized handoff in cellular networks