عنوان البحث | رابط البحث |
A Meta-Heuristic Method for Reassemble Bifragmented Intertwined JPEG Image Files in Digital Forensic Investigation | https://ieeexplore.ieee.org/abstract/document/10272244 |
A Comparison of Multi Class Support Vector Machine vs Deep Convolutional Neural Network for Brain Tumor Classification | https://ieeexplore.ieee.org/abstract/document/10295336 |
Intelligent Classification of JPEG files by Support Vector Machines with Content-based Feature Extraction | https://www.americaspg.com/articleinfo/18/show/2276 |
Javanese Script Single Letters Classification using GoogLeNet Architecture and Adam Optimizer Based on Convolutional Neural Networks (CNN) | https://ieeexplore.ieee.org/abstract/document/10295366 |
Trust Monitoring Framework for Effective Cooperation in Satellite Assisted UAVS Enabled VANETS | https://www.researchgate.net/profile/rabei-al-jawry/publication/374782002_trust_monitoring_framework_for_effective_cooperation_in_satellite_assisted_uavs_enabled_vanets/links/652f6fab6725c324011481e7/trust-monitoring-framework-for-effective-cooperation-in-satellite-assisted-uavs-enabled-vanets.pdf |
Connectivity Aware Energy Efficient Routing Protocol for UAVs Assisted Vehicular Ad-Hoc Networks | https://ieeexplore.ieee.org/abstract/document/10313206 |
Milkfish Freshness Classification Using Convolutional Neural Networks Based on Resnet50 Architecture | https://journal.upgris.ac.id/index.php/asset/article/view/17017 |
Robust Content Authentication and Tampering Detection of Arabic Text Transmitted Through Internet | https://ieeexplore.ieee.org/abstract/document/10351462 |
Symbiotic Organism Search Optimization with Deep Learning based Bite Mark Identification in Forensic Dentistry | https://ieeexplore.ieee.org/abstract/document/10351436 |
Improved Deep Learning with Metaheuristics Driven COVID-19 Diagnosis on Chest X-Ray Images | https://ieeexplore.ieee.org/abstract/document/10351403 |
Deep Learning Based Automated Gait Recognition for Robust Person Reidentification | https://ieeexplore.ieee.org/abstract/document/10351474 |
Exploiting COVID-19 Tweets for Sentiment Analysis Using Chameleon Optimization with Ensemble Learning | https://ieeexplore.ieee.org/abstract/document/10351385 |
Modified Snake Optimization Based Robust Steganography with Chaotic Encryption Scheme for Remote Sensing Imagery | https://ieeexplore.ieee.org/abstract/document/10351456 |
High PSNR Using Fibonacci Sequences in Classical Cryptography and Steganography Using LSB. | chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://inass.org/wp-content/uploads/2023/02/2023083146-2.pdf |
Hybrid Optimization with Enhanced QoS-based Path Selection in VANETs. | chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://inass.org/wp-content/uploads/2023/03/2023083106-2.pdf |
An Integration of Elephant Herding Optimization and Fruit Fly Optimized Algorithm for Energy Conserving in MANET | https://ieeexplore.ieee.org/abstract/document/10201697 |
Trust based Data Dissemination and Queue Management for Vehicular Communication Networks | https://ieeexplore.ieee.org/abstract/document/10201757 |
Improving Quality of Services of Fog Computing Through Efficient Work Flow Scheduling | https://ieeexplore.ieee.org/abstract/document/10183104 |
Improved Chicken Swarm Optimization with Zone-Based Epidemic Routing for Vehicular Networks | https://link.springer.com/chapter/10.1007/978-981-99-6702-5_34 |
An Application of Multilayer Perceptron for the Prediction of River Water Quality | https://link.springer.com/chapter/10.1007/978-981-99-3010-4_42 |
Medical Image Watermarking Using Slantlet Transform and Particle Swarm Optimization | https://link.springer.com/chapter/10.1007/978-981-99-3010-4_59 |
High-Level Deep Features and Convolutional Neural Network for Evaluating the Classification Performance of File Cluster Types | https://link.springer.com/chapter/10.1007/978-981-99-3315-0_1 |
Path Scheduling and Bandwidth Utilization for Urban Vehicular Adhoc Networks | https://www.researchgate.net/publication/374897678_Path_Scheduling_and_Bandwidth_Utilization_for_Urban_Vehicular_Adhoc_Networks |
Triple DES Cryptography Based on Hash Function and DSA for Digital Certificate Authentication | https://ieeexplore.ieee.org/abstract/document/9920438 |
Content-Based Feature Extraction and Extreme Learning Machine for Optimizing File Cluster Types Identification | https://link.springer.com/chapter/10.1007/978-3-030-98015-3_21 |
A model for predicting entrepreneurship intentions based on social cognitive theory and entrepreneurship characteristics | chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://digitalcommons.aaru.edu.jo/cgi/viewcontent.cgi?article=1307&context=isl |
A framework for analyzing the relationships between cancer patient satisfaction, nurse care, patient attitude, and nurse attitude in healthcare systems | https://link.springer.com/article/10.1007/s12652-020-02888-x |
Javanese Character Recognition Based on K-Nearest Neighbor and Linear Binary Pattern Features | https://kinetik.umm.ac.id/index.php/kinetik/article/view/1491 |
Testing Data Security Using a Vigenere Cipher Based on the QR Code | https://kinetik.umm.ac.id/index.php/kinetik/article/view/1734 |
Testing Data Security Using a Vigenere Cipher Based on the QR Code | https://kinetik.umm.ac.id/index.php/kinetik/article/view/1734 |