Most Popular Papers *
Surveying Machine Learning in Cyberattack Datasets: A Comprehensive Analysis
Azhar F. Al-zubidi, Alaa Kadhim Farhan, and El-Sayed M. El-Kenawy
FOXANN: A Method for Boosting Neural Network Performance
Mahmood A. Jumaah, Yossra H. Ali, Tarik A. Rashid, and S. Vimal
Face Mask Detection Based on Deep Learning: A Review
Shahad Fadhil Abbas, Shaimaa Hameed Shaker, and Firas. A. Abdullatif
A Novel Approach to Generate Dynamic S-Box for Lightweight Cryptography Based on the 3D Hindmarsh Rose Model
Ala'a Talib Khudhair, Abeer Tariq Maolood, and Ekhlas Khalaf Gbashi
A Comprehensive Analysis of Deep Learning and Swarm Intelligence Techniques to Enhance Vehicular Ad-hoc NETwork Performance
Hussein K. Abdul Atheem, Israa T. Ali, and Faiz A. Al Alawy
Unraveling the Versatility and Impact of Multi-Objective Optimization: Algorithms, Applications, and Trends for Solving Complex Real-World Problems
Noor A. Rashed, Yossra H. Ali, Tarik A. Rashid, and A. Salih
The Robust Digital Video Watermarking Methods: A Comparative Study
Ebtehal Talib, Abeer Salim Jamil, Nidaa Flaih Hassan, and Muhammad Ehsan Rana
Optimization of Resources Allocation using Evolutionary Deep Learning
Sanaa Ali Jabber, Soukaena H. Hashem, and Shatha H. Jafer
Strangeness Detection from Crowded Video Scenes by Hand-Crafted and Deep Learning Features
Ali A. Hussan, Shaimaa H. Shaker, and Akbas Ezaldeen Ali
* Based on the average number of full-text downloads per day since the paper was posted.
» Updated as of 09/16/24.