default search action
Ingénierie des Systèmes d'Information, Volume 26
Volume 26, Number 1, February 2021
- Marvin Chandra Wijaya, Zulisman Maksom, Muhammad Haziq Lim Abdullah:
A Brief of Review: Multimedia Authoring Tool Attributes. 1-11 - Amrendra Singh Yadav, Dharmender Singh Kushwaha:
Query Optimization in a Blockchain-Based Land Registry Management System. 13-21 - Sarra Cherbal, Imen Barouchi:
ZRR-P2P: Zone-Based Mechanism for Data Replication and Research Optimization in Unstructured P2P Systems. 23-32 - Battula V. Satish Babu, Kare Suresh Babu:
The Purview of Blockchain Appositeness in Computing Paradigms: A Survey. 33-46 - Paul Menounga Mbilong, Asmae Berhich, Imane Jebli, Asmae El Kassiri, Fatima-Zahra Belouadha:
Artificial Intelligence-Enabled and Period-Aware Forecasting COVID-19 Spread. 47-57 - Sara Daoudi, Chakib Mustapha Anouar Zouaoui, Miloud Chikr El-Mezouar, Nasreddine Taleb:
Parallelization of the K-Means++ Clustering Algorithm. 59-66 - Subbiah Siva Sankari, Chinnappan Jayakumar:
Opportunities and Challenges of Feature Selection Methods for High Dimensional Data: A Review. 67-77 - Samar Shaker Metwaly, Ahmed M. Abd El-Haleem, Osama M. El-Ghandour:
No-Regret Matching Game Algorithm for NOMA Based UAV-Assisted NB-IoT Systems. 79-85 - Sandeep Patalay, Madhusudhan Rao Bandlamudi:
Decision Support System for Stock Portfolio Selection Using Artificial Intelligence and Machine Learning. 87-93 - Gutta Srinivasa Rao, Atluri Srikrishna:
Image Pixel Contrast Enhancement Using Enhanced Multi Histogram Equalization Method. 95-101 - Adel Alti, Ahmed Almuhirat:
An Advanced IoT-Based Tool for Effective Employee Performance Evaluation in the Banking Sector. 103-108 - Avaneesh Kumar Yadav, Ashish Kumar Maurya, Ranvijay, Rama Shankar Yadav:
Extractive Text Summarization Using Recent Approaches: A Survey. 109-121 - Pushpalatha Kadavigere Nagaraj, Kshamitha Shobha Ravikumar, Mydugolam Sreenivas Kasyap, Medhini Hullumakki Srinivas Murthy, Jithin Paul:
Kannada to English Machine Translation Using Deep Neural Network. 123-127 - Iskander Belhaj Nasr, Kabil Jbeli, Abir Smiti:
E-Service Application: Online Donation to Help Fight COVID-19. 129-134 - Kanusu Srinivasa Rao, Sridhar Mandapati:
A Novel Image Encryption Using Parity Based Visual Cryptography. 135-142
Volume 26, Number 2, April 2021
- Abdelghani Bouziane, Djelloul Bouchiha, Redha Rebhi, Giulio Lorenzini, Noureddine Doumi, Younes Menni, Hijaz Ahmad:
ARALD: Arabic Annotation Using Linked Data. 143-149 - Maryam Khanian Najafabadi, Azlinah Mohamed, Madhavan A/l Balan Nair, Sayed Mojtaba Tabibian:
An Effective Collaborative User Model Using Hybrid Clustering Recommendation Methods. 151-158 - Vishal A. Meshram, Kailas Patil, Sahadeo D. Ramteke:
MNet: A Framework to Reduce Fruit Image Misclassification. 159-170 - Seiyedeh Maryam Hosseiny, Akram Isvand Rahmani, Morad Derakhshan, Robabe Fatahizadeh:
An Intrusion Detection System: Using a Grasshopper Algorithm. 171-177 - Devineni Gireesh Kumar, Aman Ganesh, Neerudi Bhoopal, Sankaranarayanan Saravanan, Madala Prameela, Dsnmrao, Idamakanti Kasireddy:
Evolutionary Algorithms for Real Time Engineering Problems: A Comprehensive Review. 179-190 - Prasenjit Das, Jay Kant Pratap Singh Yadav, Arun Kumar Yadav:
An Automated Tomato Maturity Grading System Using Transfer Learning Based AlexNet. 191-200 - Mohan Goud Kathi, Jakeer Hussain Shaik:
An Optimised Allotment and Tracking Using Django and Opencv. 201-209 - Raouf Belmahdi, Djamila Mechta, Saad Harous:
A Survey on Various Methods and Algorithms of Scheduling in Fog Computing. 211-224 - Annabathula Phani Sheetal, Giddaluru Lalitha, Arepalli Peda Gopi, Vejendla Lakshman Narayana:
Secured Data Transmission with Integrated Fault Reduction Scheduling in Cloud Computing. 225-230 - Satyanarayana Murthy Teki, Kuncham Venkata Sriharsha, Mohan Krishna Varma Nandimandalam:
A Diabetic Prediction System Based on Mean Shift Clustering. 231-235 - Moram Vishnu Vardhana Rao, Aparna Chaparala:
An Efficient Data Mining Technique for Structural Strength Monitoring System. 237-243
Volume 26, Number 3, June 2021
- Roohi Sille, Tanupriya Choudhury, Piyush Chauhan, Durgansh Sharma:
A Systematic Approach for Deep Learning Based Brain Tumor Segmentation. 245-254 - Nurul Najihah A'bas, Sarni Suhaila Rahim, Mohamad Lutfi Dolhalit, Wan Sazli Nasaruddin Saifudin, Nazreen Abdullasim, Shahril Parumo, Raja Norliza Raja Omar, Siti Zakiah Md Khair, Khavigpriyaa Kalaichelvam, Syazwan Izzat Noor Izhar:
Web Usability Testing on Diabetic Retinopathy Consultation System. 255-264 - Khoirul Anam, Beni Asyhar, Kundharu Saddhono, Bagus Wahyu Setyawan:
E-SIP: Website-Based Scheduling Information System to Increase the Effectivity of Lecturer's Performance and Learning Process. 265-273 - Shivaprasad Satla, Sadanandam Manchala:
Optimized Features Extraction from Spectral and Temporal Features for Identifying the Telugu Dialects by Using GMM and HMM. 275-283 - Nagaraju Devarakonda, Dasari Kavitha, Raviteja Kamarajugadda:
Escape the Traffic Congestion Using Brainstorming Optimization Algorithm and Density Peak Clustering. 285-293 - Imad Eddine Touahria, Abdallah Khababa:
A Component Based Framework to Enable Medical Devices Communication. 295-302 - Shilpa P. Khedkar, Aroul Canessane Ramalingam:
Classification and Analysis of Malicious Traffic with Multi-layer Perceptron Model. 303-310 - Praveen Kumar Yechuri, Suguna Ramadass:
Semantic Web Mining for Analyzing Retail Environment Using Word2Vec and CNN-FK. 311-318 - Jayakrishnan Anilakkad Raman, Vasanthi Varadharajan:
HoneyNetCloud Investigation Model, A Preventive Process Model for IoT Forensics. 319-327 - Kanusu Srinivasa Rao, Sridhar Mandapati:
A Tabu Search Algorithm for General Threshold Visual Cryptography Schemes. 329-335
Volume 26, Number 4, August 2021
- Mahmoud El-Tayeb, Ahmed Taha, Zaki Taha:
Streamed Video Reconstruction for Firefox Browser Forensics. 337-344 - Geeta Mahadeo Ambildhuke, Barnali Gupta Banik:
Transfer Learning Approach - An Efficient Method to Predict Rainfall Based on Ground-Based Cloud Images. 345-356 - Hanumantha Rao Sama, Vasanta Kumar. Vemuri, Venkata Siva Nageswara Hari Prasad Boppana:
Optimal Control Policy for a Two-Phase M/M/1 Unreliable Gated Queue under N-Policy with a Fuzzy Environment. 357-364 - Alyaa Hisham, Aya Ahmed, Mariam Khaled, Nour Abdullatif, Sally S. Kassem:
Modelling of Crime Record Management System Using Unified Modeling Language. 365-373 - Chabane Khentout, Khadidja Harbouche, Mahieddine Djoudi:
Learner to Learner Fuzzy Profiles Similarity Using a Hybrid Interaction Analysis Grid. 375-386 - Miguel Ángel Martínez Cruz, Dorantes Benavidez Humberto, Trejo Martínez Alfredo:
Optimization of Vehicle Flow Times in a Single Crossing System Through the Development of a Multi-Agent Platform. 387-392 - Katru Rama Rao, Naganjaneyulu Satuluri:
Permissioned Healthcare Blockchain System for Securing the EHRs with Privacy Preservation. 393-402 - Chirihane Gherbi:
Internet of Things and Heterogeneous Networks Technologies: Concepts, Challenges and Perspectives. 403-408 - Janu Arlinwibowo, Heri Retnawati, Badrun Kartowagiran:
Item Response Theory Utilization for Developing the Student Collaboration Ability Assessment Scale in STEM Classes. 409-415 - Indrajeet Kumar, Manish Kumar Mishra, Ritesh Kumar Mishra:
Performance Analysis of NOMA Downlink for Next- Generation 5G Network with Statistical Channel State Information. 417-423
Volume 26, Number 5, October 2021
- Asmae Berhich, Imane Jebli, Paul Menounga Mbilong, Asmae El Kassiri, Fatima-Zahra Belouadha:
Multiple Output and Multi-Steps Prediction of COVID-19 Spread Using Weather and Vaccination Data. 425-436 - Akhilesh Kumar Shrivas, Amit Kumar Dewangan, Samrendra Mohan Ghosh:
Robust Text Classifier for Classification of Spam E-Mail Documents with Feature Selection Technique. 437-444 - Abd Aziz, Bagus Wahyu Setyawan, Kundharu Saddhono:
Using Expert System Application to Diagnose Online Game Addiction in Junior High School Students: Case Study in Five Big City in Indonesia. 445-452 - Krishna Chythanya Nagaraju, Cherku Ramesh Kumar Reddy:
Reusable Component Retrieval from a Large Repository Using Word2Vec with Continuous Bag of Words. 453-460 - Kishore Babu Dasari, Nagaraju Devarakonda:
Detection of Different DDoS Attacks Using Machine Learning Classification Algorithms. 461-468 - Alaa Joukhadar, Nada Ghneim, Ghaida Rebdawi:
Impact of Using Bidirectional Encoder Representations from Transformers (BERT) Models for Arabic Dialogue Acts Identification. 469-475 - Kulumani Subramanian Chandrasekaran, Venkatachalam Mahalakshmi, Mallasamudram Ramanathan Anathapadmanabhan:
Forecasting Parameter Strategy Using Data Analytics in Supply Chain Management. 477-482 - RatnaKumari Challa, Kanusu Srinivasa Rao:
Hybrid Approach for Detection of Objects from Images Using Fisher Vector and PSO Based CNN. 483-489 - Azmi Fitriati, Subuh Anggoro, Sri Harmianto, Naelati Tubastuvi:
Kindfull-Digital Character Book Effectiveness: A User Satisfaction Approach. 491-500 - Anuj Kumar Singh, Sandeep Kumar, Shashi Bhushan, Pramod Kumar, Arun Vashishtha:
A Proportional Sentiment Analysis of MOOCs Course Reviews Using Supervised Learning Algorithms. 501-506 - Ferra Arik Tridalestari, Hanung Nindito Prasetyo, Wawa Wikusna:
How to Use Design Thinking on Trash Bank Process Modeling? 507-513
Volume 26, Number 6, December 2021
- Vibhor Sharma, Shashi Bhushan, Bhim Singh Boahar, Pramod Kumar, Anuj Kumar:
An Intelligent Approach for Protecting Privacy in Distributed Information Mining Using Secured Computation of Multiple Participating Sites. 515-522 - Sarvani Anandarao, Sweetlin Hemalatha Chellasamy:
Detection of Hot Topic in Tweets Using Modified Density Peak Clustering. 523-531 - Krittachai Boonsivanon, Worawat Sa-ngiamvibool:
A SIFT Description Approach for Non-Uniform Illumination and Other Invariants. 533-539 - Wiharto, Esti Suryani, Sigit Setyawan:
Framework Two-Tier Feature Selection on the Intelligence System Model for Detecting Coronary Heart Disease. 541-547 - Venkatasubramanian Srinivasan:
Detection of Black Hole Attack Using Honeypot Agent-Based Scheme with Deep Learning Technique on MANET. 549-557 - Battula Phijik, Chakunta Venkata Guru Rao:
Pragmatic Security-Aware Cross-Layer Design for Wireless Networks from Vampire Attacks. 559-567 - Badawi Badawi, Arif Nurudin, Muafi Muafi:
Consumer Conformity, Social Ties and EWOM in Digital Marketing. 569-576 - Jitendra Rajpurohit:
A Modified Jellyfish Search Optimizer with Opposition Based Learning and Biased Passive Swarm Motion. 577-584 - RatnaKumari Challa, VijayaKumari Gunta:
Towards the Construction of Reed-Muller Code Based Symmetric Key FHE. 585-590 - Annabathula Phani Sheetal, Kongara Ravindranath:
High Efficient Virtual Machine Migration Using Glow Worm Swarm Optimization Method for Cloud Computing. 591-597
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.