The heart rate variability signal is a valuable tool for cardiovascular system diagnostics. Processing this signal detects arrhythmia during longterm cardiac monitoring. It is also analyzed to recognize abnormalities within the autonomic... more
One of the most important and critical factors in software projects is the proper cost estimation. This activity, which has to be done prior to the beginning of a project in the initial stage, always encounters several challenges and... more
In recent years, utilization of feature selection techniques has become an essential requirement for processing and model construction in different scientific areas. In the field of software project effort estimation, the need to apply... more
In recent years, utilization of feature selection techniques has become an essential requirement for processing and model construction in different scientific areas. In the field of software project effort estimation, the need to apply... more
Background and objective: Taking into consideration the critical importance of Sudden cardiac death (SCD), as it could be the first and the last heart condition to be diagnosed in a person while continuing to claim millions of lives... more
This study is aimed to apply statistical modelling approached to minimize risks software planning process by using fuzzy and stepwise approach. The fuzzy approach model’s accuracy slightly enhances than stepwise approach. However, all... more
Network Intrusion Detection is one of the most researched topics in the field of computer security. Hacktivists use sophisticated tools to launch numerous attacks that hamper the confidentiality, integrity and availability of computer... more
Due to the emerging technological advances, cyber-attacks continue to hamper information systems. The changing dimensionality of cyber threat landscape compel security experts to devise novel approaches to address the problem of network... more
Network data is expanding and that too at an alarming rate. Besides, the sophisticated attack tools used by hackers lead to capricious cyber threat landscape. Traditional models proposed in the field of network intrusion detection using... more
This study is aimed to apply statistical modelling approached to minimize risks software planning process by using fuzzy and stepwise approach. The fuzzy approach model’s accuracy slightly enhances than stepwise approach. However, all... more
Banking advertisements are important because they help target specific customers on subscribing to their packages or other deals by giving their current customers more fixed-term deposit offers. This is done through promotional... more
Sudden cardiac death (SCD) remains one of the top causes of high mortality rate. Early prediction of ventricular fibrillation (VF), and hence SCD, can improve the survival chance of a patient by enabling earlier treatment. Heart rate... more
The high volume of traffic across modern networks entails use of accurate and reliable automated tools for intrusion detection. The capacity for data mining and machine learning algorithms to learn rules from data are typically... more
In the software development field, software practitioners expend between 30% and 40% more effort than is predicted. Accordingly, researchers have proposed new models for estimating the development effort such that the estimations of these... more
Due to the emerging technological advances, cyber-attacks continue to hamper information systems. The changing dimensionality of cyber threat landscape compel security experts to devise novel approaches to address the problem of network... more
Biometric recognition systems have been attracted numerous researchers since they attempt to overcome the problems and factors weakening these systems including problems of obtaining images indeed not appearing the resolution or the... more
One of the most important and critical factors in software projects is the proper cost estimation. This activity, which has to be done prior to the beginning of a project in the initial stage, always encounters several challenges and... more
Networks are exposed to an increasing number of cyberattacks due to their vulnerabilities. So, cybersecurity strives to make networks as safe as possible, by introducing defense systems to detect any suspicious activities. However,... more
This paper deals with the problem of software effort estimation through the use of a new machine learning technique for producing reliable confidence measures in predictions. More specifically, we propose the use of Conformal Predictors... more
The efficiency effect of dye sensitized solar cell using different ratio of organic polymer doped titanium dioxide at different annealing process temperature
During the recent years, numerous endeavours have been made in the area of software development effort estimation for calculating the software costs in the preliminary development stages. These studies have resulted in the offering of a... more
The internet-based services undoubtedly led the worldwide revolution with exponential growth, but security breaches resulting personal digital asset losses which need for a comprehensive cybersecurity solution. Traditionally,... more
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are the most important protocols in complete protocol architecture. There are many types of attacks that can block the communication or reduce the performance of a... more
Feature selection has been recently used in the area of software engineering for improving the accuracy and robustness of software cost models. The idea behind selecting the most informative subset of features from a pool of available... more
Investigations show that millions of people all around the world die as the result of sudden cardiac death (SCD). There are several methods to early detection sudden cardiac deaths in machine learning. We need to propose suitable ways to... more
Network data is expanding and that too at an alarming rate. Besides, the sophisticated attack tools used by hackers lead to capricious cyber threat landscape. Traditional models proposed in the field of network intrusion detection using... more
This paper deals with the problem of software effort estimation through the use of a new machine learning technique for producing reliable confidence measures in predictions. More specifically, we propose the use of Conformal Predictors... more
Accurate software effort estimation has been a challenge for many software practitioners and project managers. Underestimation leads to disruption in the project's estimated cost and delivery. On the other hand, overestimation causes... more
Accurate software development effort estimation is critical to the success of software projects. Although many techniques and algorithmic models have been developed and implemented by practitioners, accurate software development effort... more
Accurate software effort estimation has been a challenge for many software practitioners and project managers. Underestimation leads to disruption in the project's estimated cost and delivery. On the other hand, overestimation causes... more