Submissions from 2021
A novel deep neuroevolution-based image classification method to diagnose coronavirus disease (COVID-19), Sajad Ahmadian, Seyed Mohammad Jafar Jalali, Syed Mohammed Shamsul Islam, Abbas Khosravi, Ebrahim Fazli, and Saeid Nahavandi
ECU-IoHT: A dataset for analyzing cyberattacks in Internet of health things, Mohiuddin Ahmed, Surender Byreddy, Anush Nutakki, Leslie F. Sikos, and Paul Haskell-Dowland
A blockchain-based emergency message transmission protocol for cooperative VANET, Mohiuddin Ahmed, Nour Moustafa, A. F. M. S. Akhter, Imran Razzak, Ehsanuzzaman Surid, Adnan Anwar, A. F. M. S. Shah, and Ahmet Zengin
Deep learning versus spectral techniques for frequency estimation of single tones: Reduced complexity for software-defined radio and iot sensor communications, Hind R. Almayyali and Zahir M. Hussain
Deep learning control for digital feedback systems: Improved performance with robustness against parameter change, Nuha A. S. Alwan and Zahir M. Hussain
Frequency estimation from compressed measurements of a sinusoid in moving‐average colored noise, Nuha A. S. Alwan and Zahir M. Hussain
Infrequent pattern detection for reliable network traffic analysis using robust evolutionary computation, A. N. M. Bazlur Rashid, Mohiuddin Ahmed, and Al-Sakib K. Pathan
Cultural regulation of disruptive technologies: Lessons from orthodox religious communities, Tracey Dowdeswell and Nachshon (Sean) Goltz
Oriented to human autonomy Indian ethics, artificial intelligence, and driverless vehicles, Robert Geraci and Nachshon (Sean) Goltz
Indoor semantic scene understanding using 2D-3D fusion, Muraleekrishna Gopinathan, Giang Truong, and Jumana Abu-Khalaf
A new ensemble reinforcement learning strategy for solar irradiance forecasting using deep optimized convolutional neural network models, Seyed Mohammad J. Jalali, Mahdi Khodayar, Sajad Ahmadian, Miadreza Shafie-Khah, Abbas Khosravi, Syed Mohammed S. Islam, Saeid Nahavandi, and Joao P. S. Catalao
A fuzzy supply chain risk assessment approach using real-time disruption event data from Twitter, Naeem K. Janjua, Falak Nawaz, and Daniel D. Prior
Image aesthetics classification using deep features and image category, Hira Maqbool and Martin Masek
A genetic programming framework for novel behaviour discovery in air combat scenarios, Martin Masek, Chiou Peng Lam, Luke Kelly, Lyndon Benke, and Michael Papasimeon
Discovering optimal strategy in tactical combat scenarios through the evolution of behaviour trees, Martin Masek, Chiou Peng Lam, Luke Kelly, and Martin Wong
The open maritime traffic analysis dataset, Martin Masek, Chiou Peng Lam, Travis Rybicki, Jacob Snell, Daniel Wheat, Luke Kelly, damion Glassborow, and Cheryl Smith-Gander
3D morphable ear model: A complete pipeline from ear segmentation to statistical modeling, Md Mursalin, Syed Mohammed Shamsul Islam, and Syed Zulqarnain Gilani
Can i trust you? incorporating supplier trustworthiness into supplier selection criteria, Daniel D. Prior, Morteza Saberi, Naeem Khalid Janjua, and Ferry Jie
The negative impact of smartphone usage on nursing students: An integrative literature review, Lucie M. Ramjan, Yenna Salamonson, Sharryn Batt, Ariana Kong, Belinda McGrath, Gina Richards, David Roach, Peter Wall, and Ruth Crawford
Cooperative co-evolution and mapreduce: A review and new insights for large-scale optimisation, A. N.M.Bazlur Rashid and Tonmoy Choudhury
An evolutionary approach to balancing and disrupting real-time strategy games, Jacob Snell, Martin Masek, and Chiou Peng Lam
A secured message transmission protocol for vehicular ad hoc networks, A. F. M. Suaib Akhter, A. F. M. Shahen Shah, Mohiuddin Ahmed, Nour Moustafa, Unal Çavuşoğlu, and Ahmet Zengin
Machine learning based cybersecurity defense at the age of Industry 4.0, Sourabh K. Vishavnath, Adnan Anwar, and Mohiuddin Ahmed
Submissions from 2020
Deep learning: Hope or hype, Mohiuddin Ahmed and A. K. M. Najmul Islam
Blockchain: Can it be trusted?, Mohiuddin Ahmed and Al-Sakib Khan Pathan
False data injection attack (FDIA): An overview and new metrics for fair evaluation of its countermeasure, Mohiuddin Ahmed and Al-Sakib Khan Pathan
Improving data management and decision support systems in agriculture, Leisa Armstrong (Ed.)
Advances in artificial intelligence (AI) for more effective decision making in agriculture, Leisa Armstrong, N. Gandhi, P. Taechatanasat, and Dean Diepeveen
Deep learning meets malware detection: An investigation, Biozid Bostami and Mohiuddin Ahmed
The clash of empires: Regulating technological threats to civil society, Tracey Leigh Dowdeswell and Nachshon Goltz
From the tree of knowledge and the golem of Prague to kosher autonomous cars: The ethics of artificial intelligence through jewish eyes, Nachshon Goltz, John Zeleznikow, and Tracey Dowdeswell
A progressive weighted average weight optimisation ensemble technique for fruit and vegetable classification, Khurram Hameed, Douglas Chai, and Alexander Rassau
A sample weight and adaboost CNN-based coarse to fine classification of fruit and vegetables at a supermarket self-checkout, Khurram Hameed, Douglas Chai, and Alexander Rassau
Quantifying the need for supervised machine learning in conducting live forensic analysis of emergent configurations (ECO) in IoT environments, Victor R. Kebande, Richard A. Ikuesan, Nickson M. Karie, Sadi Alawadi, Kim-Kwang Raymond Choo, and Arafat Al-Dhaqm
Performances of the LBP based algorithm over CNN models for detecting crops and weeds with similar morphologies, Vi Nguyen Thanh Le, Selam Ahderom, and Kamal Alameh
Simulation of biomedical signals and images using Monte Carlo methods for training of deep learning networks, Navid Mavaddat, Selam Ahderom, Valentina Tiporlini, and Kamal Alameh
SAM-SoS: A stochastic software architecture modeling and verification approach for complex System-of-Systems, Ahmad Mohsin, Naeem Khalid Janjua, Syed M. S. Islam, and Muhammad Ali Babar
Model synthesis and stochastic automated verification of systems-of-systems dynamic architectures, Ahmad Mohsin, Naeem K. Janjua, Martin Masek, and Valdemar V. G. Neto
From evidence to proof: Social network analysis in Italian criminal courts of justice, Roberto Musotto
The online crime-terror nexus: Using booter services (stressers) to weaponize data?, Roberto Musotto and David S. Wall
Dynamic QoS-aware cloud service selection using best-worst method and timeslot weighted satisfaction scores, Falak Nawaz and Naeem K. Janjua
Taxonomy of Industry 4.0 research: Mapping scholarship and industry insights, Dashi Nazarov and Anton Klarin
Detecting deviations from activities of daily living routines using kinect depth maps and power consumption data, Hossein Pazhoumand-Dar, Leisa J. Armstrong, and Amiya Kumar Tripathy
Quantifiable isovist and graph-based measures for automatic evaluation of different area types in virtual terrain generation, Andrew Pech, Chiou Peng Lam, and Martin Masek
Facial soft tissue norms in Caucasians using an innovative three-dimensional approach, Anand Ponnusamy, Mithran S. Goonewardene, Ajmal Mian, Peter Eastwood, Alethea Rea, and Syed Islam
Making the Information Technology (IT) business alignment works: a framework of IT-based competitive strategy, Ira Puspitasari and Ferry Jie
A novel penalty-based wrapper objective function for feature selection in big data using cooperative co-evolution, A.N.M. Bazlur Rashid, Mohiuddin Ahmed, Leslie F. Sikos, and Paul Haskell-Dowland
Cooperative co-evolution for feature selection in big data with random feature grouping, A.N.M. Bazlur Rashid, Mohiuddin Ahmed, Leslie F. Sikos, and Paul Haskell-Dowland
Vision to language: Methods, metrics and datasets, Naeha Sharif, Uzair Nadeem, Syed A. A. Shah, Mohammed Bennamoun, and Wei Liu
Knowledge representation to support partially automated honeypot analysis based on Wireshark packet capture files, Leslie F. Sikos
Data science in cybersecurity and cyberthreat intelligence, Leslie F. Sikos and Kim-Kwang Raymond Choo
Provenance-aware knowledge representation: A survey of data models and contextualized knowledge graphs, Leslie F. Sikos and Dean Philp
Submissions from 2019
Intelligent big data summarization for rare anomaly detection, Mohiuddin Ahmed
Trust in Computational Intelligence systems: A case study in public perceptions, Keeley Crockett, Sean Goltz, Matt Garratt, and Annabel Latham
A machine learning case study with limited data for prediction of carbon fiber mechanical properties, Gelayol Golkarnarenji, Minoo Naebe, Khashayar Badii, Abbas S. Milani, Reza N. Jazar, and Hamid Khayyam
A survey of the general public’s views on the ethics of using AI in education, Annabel Latham and Sean Goltz
Evolving behaviour trees for automated discovery of novel combat strategy in real-time strategy wargames, Martin Masek, Chiou Peng Lam, Luke Kelly, and Martin Wong
The influence of extrinsic and intrinsic variables on children’s reading frequency and attitudes: An exploration using an artificial neural network, Saiyidi Mat Roni and Margaret Kristin Merga
Proactive management of SLA violations by capturing relevant external events in a Cloud of Things environment, Falak Nawaz, Omar Hussain, Farookh Khadeer Hussain, Naeem Khalid Janjua, Morteza Saberi, and Elizabeth Chang
PERCEPTUS: Predictive complex event processing and reasoning for IoT-enabled supply chain, Falak Nawaz, Naeem Khalid Janjua, and Omar Khadeer Hussain
Service description languages in cloud computing: State-of-the-art and research issues, Falak Nawaz, Ahmad Mohsin, and Naeem Khalid Janjua
Demonstration of optical wireless communications using spatial modulation with signal space diversity, Tingting Song, Ke Wang, Ampalavanapillai Nirmalathas, Christina Lim, Elaine Wong, and Kamal Alameh
Superpixel-guided two-view deterministic geometric model fitting, Guobao Xiao, Hanzi Wang, Yan Yan, and David Suter