Abstract is missing.
- Modeling Students' Attention in the Classroom using EyetrackersNarayanan Veliyath, Pradipta De, Andrew A. Allen, Charles B. Hodges, Aniruddha Mitra. 2-9 [doi]
- Idiopathic Interstitial Pneumonias Medical Image Detection Using Deep Learning Techniques: A SurveyZhuoqi Sun, Selena He. 10-15 [doi]
- Applying Reinforcement Learning to Plan Manufacturing Material Handling Part 2: Experimentation and ResultsSwetha Govindaiah, Mikel D. Petty. 16-23 [doi]
- Heuristically Reducing the Cost of Correlation-based Feature SelectionKatherine E. Brown, Douglas A. Talbert. 24-30 [doi]
- Improving Performance of Convolutional Neural Networks via Feature EmbeddingTorumoy Ghoshal, Silu Zhang, Xin Dang, Dawn Wilkins, Yixin Chen. 31-38 [doi]
- Near-peer Led Workshops on Game Development for Broadening Participation and Diversity in ComputingWei Jin, Xin Xu. 39-45 [doi]
- STEM Hip-hop Pedagogy: A Meta-synthesis on Hip-hop Pedagogy STEM Interventions Tools for Underrepresented Minorities in K-12 EducationRobert Cummings, Brittany Chambers, Amber Reid, Kinnis Gosha. 46-52 [doi]
- Teaching Object-Oriented Recursive Data Structures: Simplifying the Definition and Implementation of the Data StructuresRodrigo A. Obando. 53-57 [doi]
- CBPKI: Cloud Blockchain-based Public Key InfrastructureBrian Khieu, Melody Moh. 58-63 [doi]
- Component-based Implementation of Cyberattack Simulation ModelsKatia P. Mayfield, Mikel D. Petty, Tymaine S. Whitaker, John A. Bland, Walter Alan Cantrell. 64-71 [doi]
- Mitigating Phishing Attacks: An OverviewAlex Sumner, Xiaohong Yuan. 72-77 [doi]
- Alpaca: Building Dynamic Cyber Ranges with Procedurally-Generated Vulnerability LatticesJoshua Eckroth, Kim Chen, Heyley Gatewood, Brandon Belna. 78-85 [doi]
- Intrusion Detection Using Big Data and Deep Learning TechniquesOsama Faker, Erdogan Dogdu. 86-93 [doi]
- Social Media Content Analytics beyond the Text: A Case Study of University Branding in InstagramShreya Desai, Meng Han. 94-101 [doi]
- Voice and Motion-based Control System: Proof-of-Concept Implementation on Robotics via Internet-of-Things TechnologiesSelena He, Aiju Zhang, Mingyuan Yan. 102-108 [doi]
- Adapting Financial Technology Standards to Blockchain PlatformsGabriel Bello, Alfredo J. Perez. 109-116 [doi]
- Randomized Load Balancing for Cloud Computing using Bacterial Foraging OptimizationZi Yan Zhang, Melody Moh. 117-124 [doi]
- Link-Local Multicast Name Resolution: An Implementation and EvaluationEric Gamess, Julio Garroz. 125-132 [doi]
- A Case Study of the Use of Design of Experiments Methods to Calibrate a Semi-automated Forces SystemKevin L. Foster, Mikel D. Petty. 133-140 [doi]
- Haptic Systems in User Interfaces: State of the Art SurveyFelix G. Hamza-Lup, Kyle Bergeron, Daniel Newton. 141-148 [doi]
- Hearthstone AI: Oops to Well PlayedDylan Wang, Teng-Sheng Moh. 149-154 [doi]
- Stereo-vision-based Collision Avoidance SimulationWenyu Zhu, Richard Chapman. 156-159 [doi]
- Research on Smoke Detection based on DenseNetXiquan Yang, Ying Sun. 160-163 [doi]
- An Empirical Study on Generalizations of the ReLU Activation FunctionChaity Banerjee, Tathagata Mukherjee, Eduardo Pasiliao Jr.. 164-167 [doi]
- Applying Reinforcement Learning to Plan Manufacturing Material Handling Part 1: Background and Formal Problem SpecificationSwetha Govindaiah, Mikel D. Petty. 168-171 [doi]
- An Attempt at Improving Density-based Clustering AlgorithmsDaniel Brown, Arialdis Japa, Yong Shi. 172-175 [doi]
- Deep Learning-based Model to Fight Against Ad Click FraudG. S. Thejas, Kianoosh G. Boroojeni, Kshitij Chandna, Isha Bhatia, S. S. Iyengar, N. R. Sunitha. 176-181 [doi]
- Boosting Recommendation Systems through an Offline Machine Learning Evaluation ApproachNelson Zange Tsaku, Sai Kosaraju. 182-185 [doi]
- Table of Contents Recognition in OCR Documents using Image-based Machine LearningSai Kosaraju, Nelson Zange Tsaku, Pritesh Patel, Tanju Bayramoglu, Girish Modgil, Mingon Kang. 186-189 [doi]
- Building a Blockchain Simulation using the Idris Programming LanguageQiutai Pan, Xenofon D. Koutsoukos. 190-193 [doi]
- Strategic Partnerships to Enhance Data Structures and Algorithms Instruction at HBCUsKinnis Gosha, Vinesh Kannan, Lee Morgan, Earl W. Huff Jr.. 194-197 [doi]
- Analyzing Awareness on Data PrivacyVernon Andrews. 198-201 [doi]
- Training a Neural Network Controlled Non-playing Character with Previous Output AwarenessMichael Weeks, David Binnion. 202-205 [doi]
- Understanding the Mobile Game App ActivityJhanvi Devangbhai Vyas, Meng Han. 206-209 [doi]
- Designing a Molecular Biology Serious Educational GameKatia P. Mayfield, Sara Cline, Adam Lewis, Joshua Brookover, Eric Day, William Kelley, Stewart Sparks III. 210-213 [doi]
- Applying Computer Vision to Track Tool Movement in an Automotive Assembly PlantEmily Turner, Landon Newberry, Sheridan Santinga, Jeff Gray, Sandeep Gopu, Jeffery Peoples, Jon Hobbs, Sanford White. 214-217 [doi]
- Fast Training of a Convolutional Neural Network for Brain MRI ClassificationZongjie Tu, Prabir Bhattacharya. 218-221 [doi]
- Utilization of Fuzzy Logic in CPU Scheduling in Various Computing EnvironmentsBailey Granam, Hala ElAarag. 222-225 [doi]
- Evaluating a Tactile Approach to Programming ScratchZirui Wang, Amber Wagner. 226-229 [doi]
- AI Powered Book Recommendation SystemErin Cho, Meng Han. 230-232 [doi]
- Translating JSON Data into Relational Data Using Schema-oblivious ApproachesRahwa Bahta, Mustafa Atay. 233-236 [doi]
- Why do App Reviews get Responded: A Preliminary Study of the Relationship between Reviews and Responses in Mobile AppsPhong Minh Vu, Tam The Nguyen, Tung Thanh Nguyen. 237-240 [doi]
- A Look at the Security and Privacy of Fitbit as a Health Activity TrackerJason Orlosky, Onyeka Ezenwoye, Heather Yates, Gina Besenyi. 241-244 [doi]
- High-level Specification and Modeling of Cyber-physical SystemsJosé M. Garrido. 245-248 [doi]
- ALPACA: Advanced Linguistic Pattern and Concept Analysis Framework for Software Engineering CorporaPhong Minh Vu, Tam The Nguyen, Tung Thanh Nguyen. 249-252 [doi]
- Code Search on Bytecode for Mobile App DevelopmentTam The Nguyen, Phong Minh Vu, Tung Thanh Nguyen. 253-256 [doi]
- An Empirical Study of Exception Handling Bugs and FixesTam The Nguyen, Phong Minh Vu, Tung Thanh Nguyen. 257-260 [doi]
- Spatio-temporal Super-resolution with Photographic and Depth Data using GANsSteffen Lim, Sams Khan, Matteo Alessandro, Kevin McFall. 262-263 [doi]
- Determining the Appeal of an Image Using Machine LearningJoe Potchen, Daemin Lee, Jason Wein, Leland Burns, Kyle Hedden. 264-265 [doi]
- Using Machine Learning to Convey Emotions During Requirements Elicitation InterviewsNorah Jean-Charles, Gregor Haas, Alex Drennan. 266-267 [doi]
- Comparing Performances of Graph Mining Algorithms to Detect MalwareNusrat Asrafi. 268-269 [doi]
- Reinforcement Learning Models for Abstractive Text SummarizationSergiu Buciumas. 270-271 [doi]
- Brain Butler: The Proactive Personal AssistantEthan Mines, Chris Crawford. 273-274 [doi]
- Recursive Online Class: Advanced Web Application Class Prototypes Online Educational ResourcesRich Halstead-Nussloch, Chelsee Dickson, Kathryn Greer, Shaheer Siddiqui, Ratna Dinakar Tumuluri. 275-276 [doi]
- Have Films Become More Visually Intense?Jon Miller, Christopher A. Healy. 277-278 [doi]
- Escape from the Python's Den: An Educational Game for Teaching Programming to Younger StudentsIlish Kane, Chuy-Thuy Pham, Adam Wade Lewis, Vanessa Miller. 279-280 [doi]
- Developing and Improving Risk Models using Machine-learning Based AlgorithmsYan Wang, Xuelei Sherry Ni. 281-282 [doi]
- Preserving Cameroon's Cultures and Traditions: Using App and Cloud ComputingRochelle Pacio, Nelly-Anne Shurri Ndikum, Russelle Steranova Kengne. 283-284 [doi]