1 | -- | 17 | Acheme David Ijegwa, Vincent Olufunke Rebecca, Folorunso Olusegun, Olusola Olasunkanmi Isaac. A Predictive Stock Market Technical Analysis Using Fuzzy Logic |
18 | -- | 30 | Robert Koch, Mario Golling, Gabi Dreo Rodosek. A Revised Attack Taxonomy for a New Generation of Smart Attacks |
31 | -- | 37 | Manar M. F. Donia, Aliaa A. A. Youssif, Atallah Hashad. Spontaneous Facial Expression Recognition Based on Histogram of Oriented Gradients Descriptor |
38 | -- | 48 | John W. Lounsbury, Eric Sundstrom, Jacob J. Levy, Lucy W. Gibson. Distinctive Personality Traits of Information Technology Professionals |
49 | -- | 57 | Ma'moun A. Al-smadi, Obaida M. Al-hazaimeh, Nouh Alhindawi, Sofyan M. A. Hayajneh. A Dual Curvature Shell Phased Array Simulation for Delivery of High Intensity Focused Ultrasound |
58 | -- | 66 | Yijian Liu, Weixing Qian, Liming Di. Design and Analysis of Bayesian Model Predictive Controller |
67 | -- | 80 | Zamshed I. Chowdhury, Md. Istiaque Rahaman, Shahriar I. Chowdhury. Autonomous Monitoring of River Level with Real Time Event Prediction |
81 | -- | 91 | Saleem Z. Ramadan. Using Genetic Algorithm to Find the Optimal Shopping Policy for 1-out-of-n Active-Redundancy Series Systems under Budget Constraint |
92 | -- | 101 | Gui-Sen Xu, Yuan-Biao Zhang, Yi Lin, Yu-Jian Lin, Xin-Guang Lv. Research on Fragments Reassembly Based on Feature of Chinese Character and Template Matching |
102 | -- | 124 | Laith A. Alsulaiman, Waleed A. Alrodhan. Information Privacy Status in Saudi Arabia |