31 | -- | 0 | Beatrice De Lazzari, Giuseppe Vannozzi, Valentina Camomilla. Combining Smartphone Inertial Sensors and Machine Learning Algorithms to Estimate Power Variables in Standing Long Jump |
32 | -- | 0 | Avisek Kundu, Seeboli Ghosh Kundu, Santosh Kumar Sahu, Nitesh Dhar Badgayan. Leveraging Azure Automated Machine Learning and CatBoost Gradient Boosting Algorithm for Service Quality Prediction in Hospitality |
33 | -- | 0 | Priya Mishra, Naveen Mishra, Dilip Kumar Choudhary, Prakash Pareek, Manuel J. C. S. Reis. Use of IoT with Deep Learning for Classification of Environment Sounds and Detection of Gases |
34 | -- | 0 | Christopher Henshaw, Jacob Dennis, Jonathan Nadzam, Alan J. Michaels. Number Recognition Through Color Distortion Using Convolutional Neural Networks |
35 | -- | 0 | Reem Abdelaziz Alshamsi, Isam Mashhour Al Jawarneh, Luca Foschini 0001, Antonio Corradi. ApproxGeoMap: An Efficient System for Generating Approximate Geo-Maps from Big Geospatial Data with Quality of Service Guarantees |
36 | -- | 0 | Ahmed Sharafeldeen, Justin Keowen, Ahmed Shaffie. Machine Learning Approaches for Speech-Based Alzheimer's Detection: A Comprehensive Survey |
37 | -- | 0 | Artyom M. Grigoryan, Alexis A. Gomez. Commutative Quaternion Algebra with Quaternion Fourier Transform-Based Alpha-Rooting Color Image Enhancement |
38 | -- | 0 | Adeel Ali, Mahmood Hussain Shah, Monika Foster, Mansour Naser Alraja. Cybercrime Resilience in the Era of Advanced Technologies: Evidence from the Financial Sector of a Developing Country |
39 | -- | 0 | Lazaros Moysis, Konstantinos Karasavvidis, Dimitris Kampelopoulos, Achilles D. Boursianis, Sotirios P. Sotiroudis, Spiridon Nikolaidis 0001, Christos K. Volos, Panagiotis G. Sarigiannidis, Mohammad Abdul Matin 0001, Sotirios K. Goudos. Identification of Greek Orthodox Church Chants Using Fuzzy Entropy |
40 | -- | 0 | Oksana Nikiforova, Kristaps Babris, Uldis Karlovs-Karlovskis, Marta Narigina, Andrejs Romanovs, Anita Jansone, Janis Grabis, Oscar Pastor 0001. Model Transformations Used in IT Project Initial Phases: Systematic Literature Review |
41 | -- | 0 | Abdullah Al Noman, Aaron Heuermann, Stefan A. Wiesner, Klaus-Dieter Thoben. A Review of Vessel Time of Arrival Prediction on Waterway Networks: Current Trends, Open Issues, and Future Directions |
42 | -- | 0 | Harshit Srivastava, Ravi Sankar. Redefining Event Detection and Information Dissemination: Lessons from X (Twitter) Data Streams and Beyond |
43 | -- | 0 | Kvitoslava Obelovska, Yaromyr Snaichuk, Oleh Liskevych, Stergios Aristoteles Mitoulis, Rostyslav Liskevych. Mitigation of Risks Associated with Distrustful Routers in OSPF Networks - An Enhanced Method |
44 | -- | 0 | Atsuki Matsui, Ryuto Ishibashi, Lin Meng. Optimizing Loss Functions for You Only Look Once Models: Improving Object Detection in Agricultural Datasets |
45 | -- | 0 | Ines Belhaj Messaoud, Ornwipa Thamsuwan. Heart Rate Variability-Based Stress Detection and Fall Risk Monitoring During Daily Activities: A Machine Learning Approach |
46 | -- | 0 | Polina Bobrova, Paolo Perego. The Development of User-Centric Design Guidelines for Web3 Applications: An Empirical Study |
47 | -- | 0 | Arturas Gulevskis, Konstantin Volkov. Computer Simulation and Speedup of Solving Heat Transfer Problems of Heating and Melting Metal Particles with Laser Radiation |
48 | -- | 0 | Daniela Oreni. From Data Surveying to the Geometrical Analysis of Historical Constructive Wooden Ceiling Structures: A Renaissance Villa in the North of Italy |
49 | -- | 0 | Harjinder Singh Lallie 0001, Andrew Thompson 0013, Elzbieta Titis, Paul Stephens. Analysing Cyber Attacks and Cyber Security Vulnerabilities in the University Sector |
50 | -- | 0 | Julian Velazquez, Ruben Machucho-Cadena, José Fidencio López Luna, Hiram Herrera-Rivas, Jorge-Arturo Hernández-Almazán. Modeling Mobile Applications for Proximity-Based Promotion Delivery to Shopping Centers Using Petri Nets |
51 | -- | 0 | Mohammed Ahmed Salem, Heng Siong Lim, Kah Seng Diong, Khaled A. Alaghbari, Charilaos C. Zarakovitis, Su Fong Chien. Electromagnetic Field-Aware Radio Resource Management for 5G and Beyond: A Survey |
52 | -- | 0 | Sven Franke, Christoph Pott, Jérôme Rutinowski, Markus Pauly, Christopher Reining, Alice Kirchheim. Can ChatGPT Solve Undergraduate Exams from Warehousing Studies? An Investigation |
53 | -- | 0 | Kaberi Naznin, Abdullah Al Mahmud 0001, Minh Thu Nguyen, Caslon Chua. ChatGPT Integration in Higher Education for Personalized Learning, Academic Writing, and Coding Tasks: A Systematic Review |
54 | -- | 0 | Christopher Jaus, Kaelyn Haynie, Michael Mulligan, Howie Fang. Practice and Research Optimization Environment in Python (PyPROE) |
55 | -- | 0 | Geeta Sandeep Nadella, Santosh Reddy Addula, Akhila Reddy Yadulla, Guna Sekhar Sajja, Mohan Meesala, Mohan Harish Maturi, Karthik Meduri, Hari Gonaygunta. Generative AI-Enhanced Cybersecurity Framework for Enterprise Data Privacy Management |
56 | -- | 0 | Alaa Kamal Yousif Dafhalla, Amira Elsir Tayfour Ahmed, Nada Mohamed Osman Sid Ahmed, Ameni Filali, Lutfieh S. Alhomed, Fawzia Awad Elhassan Ali, Asma Ibrahim Gamar Eldeen, Mohamed Elshaikh Elobaid, Tijjani Adam. High-Performance Data Throughput Analysis in Wireless Ad Hoc Networks for Smart Vehicle Interconnection |
57 | -- | 0 | Visal Vidhya, Diego Resende Faria. Real-Time Gaze Estimation Using Webcam-Based CNN Models for Human-Computer Interactions |
58 | -- | 0 | Bright Agbor Agbor, Bliss Utibe-Abasi Stephen, Philip Michael Asuquo, Uduak Onofiok Luke, Victor Anaga. Hybrid CNN-BiLSTM-DNN Approach for Detecting Cybersecurity Threats in IoT Networks |
59 | -- | 0 | Nuruzzaman Faruqui, Nidadavolu Venkat Durga Sai Siva Vara Prasad Raju, Shanmugasundaram Sivakumar, Nikhil Patel, Shinoy Vengaramkode Bhaskaran, Shapla Khanam, Touhid Bhuiyan. Gen-Optimizer: A Generative AI Framework for Strategic Business Cost Optimization |
60 | -- | 0 | Jhanvi Jheelan, Sameerchand Pudaruth. Using Deep Learning to Identify Deepfakes Created Using Generative Adversarial Networks |
61 | -- | 0 | Hannelore Sebestyen, Daniela Elena Popescu, Rodica Doina Zmaranda. A Literature Review on Security in the Internet of Things: Identifying and Analysing Critical Categories |
62 | -- | 0 | Muhammad Mohsin, Stefano Rovetta, Francesco Masulli, Alberto Cabri. Automated Disassembly of Waste Printed Circuit Boards: The Role of Edge Computing and IoT |
63 | -- | 0 | Edlir Spaho, Betim Çiço, Isak Shabani. IoT Integration Approaches into Personalized Online Learning: Systematic Review |
64 | -- | 0 | Farshad Rahimi Ghashghaei, Yussuf Ahmed, Nebrase Elmrabit, Mehdi Yousefi. Correction: Ghashghaei et al. Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution. Computers 2024, 13, 163 |
65 | -- | 0 | Andrés Martínez, Paul Arévalo. Distributed Peer-to-Peer Optimization Based on Robust Reinforcement Learning with Demand Response: A Review |
66 | -- | 0 | Dorothea S. Adamantiadou, Loukas Tsironis. Leveraging Artificial Intelligence in Project Management: A Systematic Review of Applications, Challenges, and Future Directions |
67 | -- | 0 | Fatma Yasmine Loumachi, Mohamed Chahine Ghanem, Mohamed Amine Ferrag. Advancing Cyber Incident Timeline Analysis Through Retrieval-Augmented Generation and Large Language Models |
68 | -- | 0 | Eloy López-Meneses, Pedro C. Mellado-Moreno, Celia Gallardo Herrerías, Noelia Pelícano-Piris. Educational Data Mining and Predictive Modeling in the Age of Artificial Intelligence: An In-Depth Analysis of Research Dynamics |
69 | -- | 0 | Leon Wiese, Lennart Hinz, Eduard Reithmeier, Philippe Korn, Michael A. Neuhaus. Detection of Surgical Instruments Based on Synthetic Training Data |
70 | -- | 0 | Dávid Tollner, Máté Zöldy. Road Type Classification of Driving Data Using Neural Networks |
71 | -- | 0 | Fahad Swilim Alqurashi, Muhammad Al-Hashimi, Mostafa Saleh, Osama Ahmed Abulnaja. Energy Implications of Mitigating Side-Channel Attacks on Branch Prediction |
72 | -- | 0 | Husam M. Alawadh, Amerah A. Alabrah, Talha Meraj, Hafiz Tayyab Rauf. Correction: Alawadh et al. English Language Learning via YouTube: An NLP-Based Analysis of Users' Comments. Computers 2023, 12, 24 |
73 | -- | 0 | Mehshan Ahmed Khan, Houshyar Asadi, Mohammad Reza Chalak Qazani, Adetokunbo Arogbonlo, Siamak Pedrammehr, Adnan Anwar, Hailing Zhou, Lei Wei 0002, Asim Bhatti, Sam Oladazimi, Burhan Khan, Saeid Nahavandi. Enhancing Cognitive Workload Classification Using Integrated LSTM Layers and CNNs for fNIRS Data Analysis |
74 | -- | 0 | Hadeel Mohammed, Mustafa Ibrahim, Ahmed Raoof, Amjad Jaleel Humaidi, Ayad Q. Al-Dujaili. Modified Ant Colony Optimization to Improve Energy Consumption of Cruiser Boundary Tour with Internet of Underwater Things |
75 | -- | 0 | Miguel Cabeleira, Carlos Vaz de Carvalho. Using Augmented Reality to Improve Touristic Efficacy |
76 | -- | 0 | Fayrouz Elsalmy, Nada Sherief, Walid M. Abdel Moez, Hany H. Ammar. Agile Gamification Risk Management Process: A Comprehensive Process for Identifying and Assessing Gamification Risks |