Concurrent design of control software and configuration of hardware for robot swarms under economic constraints Published Sep 30, 2019 Authors Salman, Muhammad Ligot, Antoine Birattari, Mauro
The importance of behavioral data to identify online fake reviews for tourism businesses: a systematic review Published Sep 23, 2019 Authors Reyes-Menendez, Ana Saura, Jose Ramon Filipe, Ferrão
A systematic review on hand gesture recognition techniques, challenges and applications Published Sep 16, 2019 Authors Yasen, Mais Jusoh, Shaidah
A split-and-transfer flow based entropic centrality Published Sep 16, 2019 Authors Oggier, Frédérique Phetsouvanh, Silivanxay Datta, Anwitaman
Randomized routing of virtual machines in IaaS data centers Published Sep 2, 2019 Authors Khani, Hadi Khanmirza, Hamed
Security durability assessment through fuzzy analytic hierarchy process Published Sep 2, 2019 Authors Agrawal, Alka Zarour, Mohammad Alenezi, Mamdouh Kumar, Rajeev Khan, Raees Ahmad
DeepMoney: counterfeit money detection using generative adversarial networks Published Sep 2, 2019 Authors Ali, Toqeer Jan, Salman Alkhodre, Ahmad Nauman, Mohammad Amin, Muhammad Siddiqui, Muhammad Shoaib
GWRA: grey wolf based reconstruction algorithm for compressive sensing signals Published Sep 2, 2019 Authors Aziz, Ahmed Singh, Karan Elsawy, Ahmed Osamy, Walid Khedr, Ahmed M.