.- Intelligent Systems.
.- Skeleton-based action recognition based on dynamic - adaptive spatial graph convolution neural network.
.- Pre-trained Intra- and Inter-framework: An Efficient Approach for Cocktail Party Effect.
.- A Comparison of Frequent Itemset Mining Algorithms in Distributed File Systems Using PySpark: A-Priori versus PCY.
.- Improved Greedy Algorithms for the Set Covering Problem.
.- Blockchain-Based Detection of Unauthorized Data Modification in Database.
.- A Secure Identity-based Schnorr Multi-Signature Scheme.
.- An approach for enhancing Ripe Tomato Classification and Counting by using Deep Learning and SAHI image Processing.
.- Performance Evaluation of NSGA-II Evolutionary Algorithm on ZCAT Test Problems with pymoo.
.- Game Theory Approaches for Pok´emon AI Battle Simulation.
.- LOC-based Instruction Selection for Statistical Root Cause Analysis.
.- A Performance Study of Hashing Techniques Used in Bloom-Filters-Based Automatic Bus Ticketing Systems.
.- Digital document signing solution without PKI infrastructure for small and medium enterprises.
.- Tail-Diffusion: Simulation Scenarios in Finance with Denoising Diffusion Models and Tail Risk Analysis.
.- Impact Of Knowledge Management System On Competitive Advantage In Small And Medium Enterprises.
.- Option pricing problems in the Heston Model using Discretization and Neural Networks.
.- Intelligent Tutoring Systems for Personalized Mathematics Learning: A TPACK Perspective.
.- Comparison of Decision Tree and K-Nearest Neighbor for Ad Click Prediction.
.- Predicting The Likelihood of Discontinuing Banking Services Using Probabilistic Graphical Models.
.- Internet of Things.
.- Joint Caching, Transmission Mode Selection, and Phase-shift Optimization for Video Multicasting in UAV-mounted IRS-assisted
Edge Content Delivery Networks.
.- A Weighted-Sum Approach for Multi-Objective Optimization of Strong Barrier Coverage in IoT Heterogeneous Wireless Sensor Networks.
.- Efficient FPGA-Based Hardware Noise Filtering and Real-time Motion Detection Using RE200B Sensor on Trion T8 BGA81.
.- BiAS: Transforming Cyber Defense - A Deep Learning Approach for APT Detection.
.- Applying virtualization technology in PLC Experiment course with VMWare ESXi hypervisor.
.- Temporal Pattern Image-Based Approach for Automotive Intrusion Detection on STM32 Embedded Platform.
.- Teaching C++ with pleasure in Multimedia by developing a virtual park learning environment.