


default search action
Innovations in Systems and Software Engineering, Volume 21
Volume 21, Number 1, March 2025
- Ashlesha Hota

, Subir Panja
, Amitava Nag
:
Lightweight CNN-based malware image classification for resource-constrained applications. 1-14 - Dipanwita Debnath

, Ranjita Das
, Partha Pakray, Ruzina Laskar:
Extractive single-document summarization using adaptive binary constrained multi-objective differential evaluation. 15-27 - Diganta Sengupta

, Subhash Mondal
, Anish De Kumar, Pretha Sur:
Classification of diabetic retinopathy using stacked machine learning approach on low resource dataset. 29-37 - Debajit Sarma, V. Kavyasree, Manas Kamal Bhuyan:

Two-stream fusion model using 3D-CNN and 2D-CNN via video-frames and optical flow motion templates for hand gesture recognition. 39-52 - Shankha Shubhra Sarkar

, Aryaman Kakad, Shashank Mouli Satapathy
:
FastRWDnet: implementation of novel real-time deep video denoising utilizing optimized FastDVDnet. 53-64 - Rohit Kumar Kasera

, Tapodhir Acharjee
:
Parking slot occupancy prediction using LSTM. 65-77 - Prasenjit Dhar

, K. Suganya Devi
, Satish Kumar Satti
, P. Srinivasan:
Efficient detection and partitioning of overlapped red blood cells using image processing approach. 79-91 - Srirupa Dasgupta, Mou Dutta

, Anindya Halder
, Abhinandan Khan
, Goutam Saha, Rajat Kumar Pal:
Computational analysis of gene expression data using bidirectional long short-term memory for disease diagnosis. 93-107 - Bidyut Bikash Borah

, Satyabrat Malla Bujar Baruah
, Debaraj Kakati, Soumik Roy:
CVD prediction on micro-controller: ECG morphology learning approach. 109-119 - Krishna Daripa

:
Spanning cactus existence in generalized Petersen graphs. 121-126 - Samarjit Roy

, Anwesha Mukherjee
, Debashis De:
IoHMT: a probabilistic event-sensitive music analytics framework for low resource internet of humanitarian musical things. 127-150 - Ananjan Maiti, Mahamuda Sultana, Suman Bhattacharya:

Detection of skin cancer through hybrid color features and soft voting ensemble classifier. 151-164 - Aparna Pramanik

, Chiranjit Changdar, Abhinandan Khan
, Snehamoy Chatterjee, Rajat Kumar Pal
, Sudip Kumar Sahana:
A 0-1 knapsack problem-based approach for solving open-pit mining problem with type-2 fuzzy parameters. 165-178 - N. Donald Jefferson Thabah

, Aiom Minnette Mitri, Goutam Saha, Arnab Kumar Maji
, Bipul Shyam Purkayastha:
A deep connection to Khasi language through pre-trained embedding. 179-193 - Rosy Swami, Prodipto Das

:
A new secure data retrieval system based on ECDH and hierarchical clustering with Pearson correlation. 195-205 - Sufal Das

:
LowEST: a low resource semantic text summarization method for big data. 207-214 - Mrinmoy Sadhukhan

, Pramita Bhattacherjee, Tamal Mondal
, Sudakshina Dasgupta
, Indrajit Bhattacharya:
Opinion classification at subtopic level from COVID vaccination-related tweets. 215-226 - Sourish Dhar

, Vishal Gour, Arnab Paul
:
Emotion recognition from lyrical text of Hindi songs. 227-235 - Jayati Mukherjee

, Sneha Mishra, Arjit Tomar, Vikas Kumar:
A low-cost hybrid handwritten Devanagari character classifier. 237-245 - Sudip Suklabaidya

, Indrani Das:
Comparative exploration of CNN model and transfer learning on fire image dataset. 247-256 - Neepa Biswas, Anindita Sarkar Mondal, Ari Kusumastuti

, Swati Saha, Kartick Chandra Mondal
:
Automated credit assessment framework using ETL process and machine learning. 257-270 - Soumen Maji

, Apurbalal Senapati, Arunendu Mondal
:
A study on hydrodynamics of rigid and emergent vegetated flows using machine learning approach. 271-278 - Jisha P. Jayan

, J. Satheeshkumar, T. Amudha:
Semantic role identification for Malayalam using machine learning approaches. 279-285 - Ruhul Amin Hazarika

, Arnab Kumar Maji
, Debdatta Kandar, Prasun Chakrabarti, Tulika Chakrabarti, K. S. Jagannatha Rao, Jose Carvalho, Babak Kateb, Mohammad Nami:
An evaluation on changes in hippocampus size for cognitively normal, mild cognitive impairment, and Alzheimer's disease patients using fuzzy membership function. 287-301 - Sandipan Roy

, Samit Bhanja, Abhishek Das
:
AndyWar: an intelligent android malware detection using machine learning. 303-311 - Anandu M. Dharan, Debarka Mukhopadhyay:

A comprehensive survey on machine learning techniques to mobilize multi-camera network for smart surveillance. 313-332
Volume 21, Number 2, June 2025
- Nouhaila Hanbali, Ahmed El-Yahyaoui:

Advanced machine learning and deep learning approaches for fraud detection in mobile money transactions. 333-353 - Fatma Ellouze, Ghofrane Fersi, Mohamed Jmaiel:

Lightweight blockchain-based access control with efficient revocation for fog-enabled IoT. 355-379 - Huiyao Dong

, Igor V. Kotenko:
Image analysis approach based on VAE-GAN for IoT malware detection in urban environments. 381-395 - Hicham Yzzogh

, Hafssa Benaboud
:
A comprehensive overview of machine learning for intrusion detection in software-defined networking. 397-419 - Salma Bradai, Amal Gassara, Khaled Taouil, Moez Hachicha, Ghayth Farhat:

Optimizing blockchain performance in multi-use case marketplaces. 421-435 - Hanan Khaled, Sherif M. Saif, Salwa M. Nassar, Mohamed Taher:

Feasibility of quantum-safe digital signature algorithms on cloud virtual machines. 437-451 - Habiba Hadri, Mourad Ouadou, Laila Chakour, Khalid Minaoui:

Sybil attack detection in vehicular ad hoc networks (VANETs): a comprehensive survey. 453-474 - Akram Idani, Yves Ledru, Germán Vega:

Formal model-driven security combining B-method and process algebra. 475-499 - Sushant Kumar Pandey

, Arya Haldar, Anil Kumar Tripathi:
Is deep learning good enough for software defect prediction? 501-516 - Akshaya Jagannadharao, Nicole Beckage, Dawn Nafus, Scott Chamberlin:

Timeshifting strategies for carbon-efficient long-running large language model training. 517-531 - Yagnesh Challagundla

, Trilok Sai Charan Tunuguntla, Sindhu Gayathri Tunuguntla, Nagaraju Devarakonda:
Convolutional neural network-based classifiers for liver tumor detection using computed tomography scans. 533-539 - Marc-Antoine Levasseur

, Mourad Badri:
Prioritizing unit tests using object-oriented metrics, centrality measures, and machine learning algorithms. 541-567 - Asieh Salehi Fathabadi

, Colin F. Snook
, Dana Dghaym, Thai Son Hoang
, Fahad Alotaibi, Michael J. Butler
:
Systematic hierarchical analysis of requirements for critical systems. 569-593 - Satya Prakash Nayak, Daniel Neider, Rajarshi Roy, Martin Zimmermann

:
Robust computation tree logic. 595-617 - Sanaz Sheikhi, Usama Mehmood

, Stanley Bak, Scott A. Smolka, Scott D. Stoller:
The black-box simplex architecture for runtime assurance of multi-agent CPS. 619-634 - Baoluo Meng, Arjun Viswanathan, Saswata Paul, William Smith, Abha Moitra, Kit Siu, Michael Durling:

Attack-defense tree-based analysis and optimal defense synthesis for system design. 635-651 - Jacinto F. S. Reis, Alexandre Mota:

Improving Android app exploratory testing with UI test cases using code change analysis. 653-671 - Felipe Gorostiaga, César Sánchez:

General monitorability of totally ordered verdict domains. 673-686 - Mohammed Bekkouche:

A bounded constraint-based approach to aid in fault localization from a counterexample. 687-705 - Johan Arcile, Étienne André:

Zone extrapolations in parametric timed automata. 707-726 - Subhashis Chatterjee, Deepjyoti Saha

:
IT2F-SEDNN: an interval type-2 fuzzy logic-based stacked ensemble deep learning approach for early phase software dependability analysis. 727-746 - Abdul Waheed Dar, Sheikh Umar Farooq:

Handling class overlap and imbalance using overlap driven under-sampling with balanced random forest in software defect prediction. 747-767 - Anupama Kaushik

, Kavita Sheoran, Ritvik Kapur, Nikhil Bhutani, Bhavesh Singh, Harsh Sharma:
SENSE: software effort estimation using novel stacking ensemble learning. 769-785 - K. L. Sailaja, P. Ramesh Kumar, Hitesh Sri Sai Kaushik Vezzu, K. V. Vishnu Vardhan:

Correction: Estimation and analysis of landslide occurrence by combining geographical and atmospheric study using U-Net model. 787
Volume 21, Number 3, September 2025
- Sunita Roy, Ranjan Mehera, Rajat Kumar Pal, Samir Kumar Bandyopadhyay:

Hyperparameter optimization for deep neural network models: a comprehensive study on methods and techniques. 789-800 - Satyajit De, Pratik Roy, Siddhartha Roy, Anil Bikash Chowdhury:

Optimization of time-dependent fuzzy multi-objective reliability redundancy allocation problem for n-stage series-parallel system. 801-811 - Nivedan Yakolli

, V. Anusha, Adnan Ahamed Khan, A. Shubhashree, Subarna Chatterjee
:
Enhancing the diagnosis of autism spectrum disorder using phenotypic, structural, and functional MRI data. 813-824 - Surya Majumder

, Adrija Bhattacharya
:
An automatic thaat and raga identification system using CNN-based models. 825-840 - Suparna Saha Biswas, Arpan Roy, Chayan Halder

, Kaushik Roy:
Personality analysis for handwritten documents: a case study with Bangla characters. 841-854 - Kaushiki Roy

, Subhadeep Saha, Debapriya Banik, Debotosh Bhattacharjee:
Nuclei-Net: a multi-stage fusion model for nuclei segmentation in microscopy images. 855-862 - Raunak Bag

, Mandira Roy
, Agostino Cortesi
, Nabendu Chaki:
Eliciting context-oriented NFR constraints and conflicts in robotic systems. 863-876 - Prabhsimran Singh, Younes Boubekeur, Gunter Mussbacher:

Detecting mistakes in a domain model: a comparison of three approaches. 877-899 - Vanessa Tietz

, Constantin Frey
, Andreas Waldvogel
, Julian Schoepf
, Björn Annighöfer
:
Why the use of domain-specific modeling in airworthy software requires new methods and how these might look like? (extended version). 901-921 - Saheed Popoola, Xin Zhao

, Jeff Gray, Antonio García-Domínguez:
Classifying changes to LabVIEW and simulink models via changeset metrics. 923-937 - Philipp Körner

, Florian Mager, Jan Roßbach:
A case for data-oriented specifications: simpler implementation of B tools and DSLs. 939-959 - Iulia Dragomir

, Carlos Redondo, Tiago Jorge, Laura Gouveia, Iulian Ober, Marius Bozga, Maxime Perrotin:
Specification and model-checking of space systems in the TASTE toolset. 961-984 - Asfand Yar

, Akram Idani, Yves Ledru, Simon Collart Dutilleul:
Visual animation of B specifications using executable DSLs. 985-1007 - Chitrak Biswas, Souvick Das

:
ARIA-QA: AI-agent based requirements inspection and analysis through question answering. 1009-1024 - Satyajit De

:
Optimization of time-dependent MORRAP for series-parallel system using improved NSGA-II in interval environment. 1025-1039 - Sonal Sonawane, Shubha Puthran:

Classification of functional and nonfunctional requirements based on convolutional neural network with flower pollination optimizer. 1041-1065 - Joy Bandopadhyay, Provas Kumar Roy:

Design and application of a novel Improved Fire Hawk Optimization technique-tuned ANFIS for optimal regulation of energy of a composite microgrid system. 1067-1089 - Songhui Yue

:
A Multimodal conceptual framework to achieve automated software evolution for context-rich intelligent applications. 1091-1105 - Sebastian Ebert

, Johannes Mey
, René Schöne
, Sebastian Götz
, Uwe Aßmann
:
Publisher Correction: Distributed Petri nets for model-driven verifiable robotic applications in ROS. 1107
Volume 21, Number 4, December 2025
- Subhasish Ghosh

, Jithin Ponduru, Mukesh Thatikonda, Amit Kr Mandal:
Leveraging machine learning for proactive detection and mitigation of Android RAT. 1109-1122 - Dipak Hrishi Das, Sourav Dey Roy

, Surajit Dey, Priya Saha, Mrinal Kanti Bhowmik:
A novel self-attention guided deep neural network for bruise segmentation using infrared imaging. 1123-1131 - Mousumi Bhattacharyya, Sadip Midya, Asmita Roy, Bhabani P. Sinha, Anupam Ghosh, John C. Kostelnick, Jonathan B. Thayn, Sri Jyothi Chinta, Koushik Sinha:

Designing optimal middle-mile network architecture for smart farming applications in rural areas. 1133-1142 - Reshma Roychoudhuri, Subhajit Datta, Subhashis Majumder:

More equal than others? Parity in developer interaction and its relation to bug resolution time. 1143-1155 - K. L. Sailaja, P. Ramesh Kumar, Hitesh Sri Sai Kaushik Vezzu, K. V. Vishnu Vardhan:

Estimation and analysis of landslide occurrence by combining geographical and atmospheric study using U-Net model. 1157-1165 - Chouhan Kumar Rath

, Amit Kr Mandal, Anirban Sarkar:
Dynamic provisioning of devices in microservices-based IoT applications using context-aware reinforcement learning. 1167-1180 - Rajeshwar Yadav, Raju Halder, Atul Thakur, Gourinath Banda:

SIRD-YOLO: an enhanced deep learning model for weapon detection using spatial interactions and diverse receptive fields. 1181-1197 - Nilanjana Adhikari

, Suman Bhattacharya
, Mahamuda Sultana
:
A modified ResNet152v2 framework for bird species classification. 1199-1212 - Rawan Alraddadi

, Mohammad R. Alshayeb:
An empirical evaluation of stacked generalization models for binary bug report classification. 1213-1228 - Kavita Sethia, Anjana Gosain, Jaspreeti Singh:

Comparative analysis of various fuzzy clustering algorithms for linearly and non-linearly separable data. 1229-1252 - Nirav M. Raja, Sudhir Vegad:

Anomaly detection in software-defined networking utilizing multi-verse deer hunting optimization enabled deep q-network for traffic flow rate prediction. 1253-1272 - Ruchin Gupta

:
Discovering smell relations between temporary field and design smells: an empirical analysis. 1273-1294 - Azaz Ahmed Kiani, Yaser Hafeez, Amber Sarwar Hashmi, Javed Iqbal

:
Towards variability process model for agile product line configuration engineering. 1295-1322 - Haley Massa

, Jeffrey Uhlmann
:
Access-adaptive priority search tree. 1323-1330 - Archana Sharma, Dharmveer Singh Rajpoot:

An adaptive anti-predatory algorithm-based model to enhance the efficiency of software effort estimation. 1331-1347 - Rania Mzid, Mohamed Abid:

Software architecture design for real-time control systems: how design patterns could help? 1349-1361 - Sushant Kumar Pandey

, Anil Kumar Tripathi:
SDC-estimator: an effectual software defect count estimation technique for the upcoming version of software project. 1363-1398 - Neetu Singh

, Sandeep Kumar Singh
:
Optimizing developer assignments in software bug repositories. 1399-1432 - Amber Sarwar Hashmi, Azaz Ahmed Kiani, Junaid Tariq, Huma Rauf, Yaser Hafeez, Fahad Burhan Ahmed:

An automated approach for requirement classification using machine learning. 1433-1443 - Hela Hakim, Asma Sellami

, Hanêne Ben-Abdallah
:
A multi-level measures-driven change impact analysis approach for prioritizing software requirement changes. 1445-1478 - Kartik Kaushik, Raju Halder, Samrat Mondal:

Analyzing Safety and Security of Solidity Smart Contracts via Semantics-Preserving Transcompilation. 1479-1498 - Pratham Majumder, Bhabani P. Sinha, Koushik Sinha:

Deep learning aided energy-efficient lossless video data transmission from IoVT visual sensors. 1499-1509 - Monali Sanyal, Suparna Dasgupta

, Rituparna Chaki, Soumyabrata Saha
:
Pseudo CNN: An Updated CNN Based Semi Supervised Learning Model for Leaf Disease Detection. 1511-1520 - Mandira Roy

, Novarun Deb, Agostino Cortesi
, Nabendu Chaki:
Mapping system requirements to emotional impact: a semi-automated approach. 1521-1542 - Phool Kumari, Arpita Srivastava, Ditipriya Sinha:

Converting tabular to image data to design IDS applying deep learning techniques. 1543-1557 - Sadip Midya, Asmita Roy, Mousumi Bhattacharyya, Bhabani P. Sinha, Koushik Sinha:

iMAHR: An Intelligent Multi-Access Hybrid Routing Scheme for Addressing Middle-Mile Connectivity Challenges in Rural Areas. 1559-1570

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














