Abstract is missing.
- Machine learning predictive analytics for player movement prediction in NBA: applications, opportunities, and challengesDembe Koi Stephanos, Ghaith Husari, Brian T. Bennett, Emma Stephanos. 2-8 [doi]
- Fast streaming translation using machine learning with transformerJiabao Qiu, Melody Moh, Teng-Sheng Moh. 9-16 [doi]
- Epileptic seizures classification in EEG using PCA based genetic algorithm through machine learningMd Khurram Monir Rabby, A. K. M. Kamrul Islam, Saeid Belkasim, Marwan U. Bikdash. 17-24 [doi]
- A bottom-up approach to creating a cyberattack model with fine grain componentsKatia P. Maxwell, Mikel D. Petty, C. Daniel Colvett, Walter Alan Cantrell. 25-32 [doi]
- Teaching a computer forensics courseFarha Ali. 33-39 [doi]
- Meta-analysis to study the impact of learning engagement strategies in introductory computer programming courses: a multi-institutional studyVijayalakshmi Ramasamy, Mourya Reddy Narasareddygari, Gursimran Walia, Andrew A. Allen, Debra M. Duke, James D. Kiper, Debra Lee Davis. 40-46 [doi]
- Comparison of algorithm learning tools to assist the education of alabama studentsBrian Willis, Eric Gamess, Gretchen Richards. 47-54 [doi]
- Evaluation of student collaboration on canvas LMS using educational data mining techniquesUrvashi Desai, Vijayalakshmi Ramasamy, James Kiper. 55-62 [doi]
- A survey of wireless network simulation and/or emulation software for use in higher educationTheodore A. Richards V, Eric Gamess, David Thornton. 63-70 [doi]
- Item based recommendation using matrix-factorization-like embeddings from deep networksVaidyanath Areyur Shanthakumar, Clark Barnett, Keith Warnick, Putu Ayu Sudyanti, Vitalii Gerbuz, Tathagata Mukherjee. 71-78 [doi]
- Testbed development for a novel approach towards high accuracy indoor localization with smartphonesYunshu Wang, Lee Easson, Feng Wang. 79-86 [doi]
- Game development workshops designed and delivered by peer mentors to increase student curiosity and interest in an introductory programming courseXin Xu, Wei Jin. 87-92 [doi]
- Characterizing networking performance and interrupt overhead of container overlay networksKun Suo, Yong Shi, Ahyoung Lee, Sabur Baidya. 93-99 [doi]
- A computer vision pipeline for automatic large-scale inventory trackingStephen Gregory, Utkarsh Singh, Jeff Gray, Jon Hobbs. 100-107 [doi]
- Detecting fabric density and weft distortion in woven fabrics using the discrete fourier transformBach Le, David Troendle, Byunghyun Jang. 108-113 [doi]
- Detection of local structures in images using local entropy informationTorumoy Ghoshal, Yixin Chen. 114-121 [doi]
- A three layer spatial-spectral hyperspectral image classification model using guided median filtersSemih Dinç, Luis Alberto Cueva Parra. 122-129 [doi]
- Application of back-translation: a transfer learning approach to identify ambiguous software requirementsIshan Mani Subedi, Maninder Singh, Vijayalakshmi Ramasamy, Gursimran Singh Walia. 130-137 [doi]
- Automated mapping of fault logs to SRS requirements using key-phrase extractionManinder Singh, Gursimran S. Walia. 138-145 [doi]
- Encoding feature models using mainstream JSON technologiesHazim Shatnawi, H. Conrad Cunningham. 146-153 [doi]
- Performance evaluation of a widely used implementation of the MQTT protocol with large payloads in normal operation and under a DoS attackEric Gamess, Trent N. Ford, Monica Trifas. 154-162 [doi]
- Wavelet transform-based feature extraction approach for epileptic seizure classificationMd Khurram Monir Rabby, A. K. M. Kamrul Islam, Saeid Belkasim, Marwan U. Bikdash. 164-169 [doi]
- Modification and complexity analysis of an incremental learning algorithm under the VPRS modelXuguang Chen. 170-174 [doi]
- An empirical study of thermal attacks on edge platformsJustin Duchatellier, Tyler Holmes, Kun Suo, Yong Shi. 175-179 [doi]
- Implementing a network intrusion detection system using semi-supervised support vector machine and random forestSandeep Shah, Pramita Sree Muhuri, Xiaohong Yuan, Kaushik Roy 0003, Prosenjit Chatterjee. 180-184 [doi]
- Verifying phishmon: a framework for dynamic webpage classificationJohn Tomaselli, Austin Willoughby, Jorge Vargas Amezcua, Emma Delehanty, Katherine Floyd, Damien Wright, Mark Lammers, Ron Vetter. 185-189 [doi]
- A study on students' views toward K-12 computer science teaching careerDan Chia-Tien Lo, Brian Robert Lawler. 190-193 [doi]
- Web-based 3D visualization system for anatomy online instructionEli MacLean, Felix G. Hamza-Lup, April Garrity, Casey Keck, Michelle Smith. 194-198 [doi]
- Analysis of students' database design skills in capstone projectsShuting Xu, Lissa F. Pollacia, Shuhua Lai. 199-203 [doi]
- An evaluation of continuous integration and delivery frameworks for classroom useJarred Light, Phil Pfeiffer, Brian Bennett. 204-208 [doi]
- Benefits of combining dimensional attention and working memory for partially observable reinforcement learning problemsNgozi Omatu, Joshua L. Phillips. 209-213 [doi]
- Toward a collision avoidance system based on the integration of technologiesCarlos Palacio, Eric Gamess. 214-218 [doi]
- Using cross-examples in viola-jones algorithm for thermal face detectionHong Tran, Chunhua Dong, Masoud Naghedolfeizi, Xiangyan Zeng. 219-223 [doi]
- A study of state-of-the-art energy saving on edgesKousalya Banka, Kun Suo, Yong Shi, Sabur Baidya. 224-228 [doi]
- Language agnostic model: detecting islamophobic content on social mediaHeena Khan, Joshua L. Phillips. 229-233 [doi]
- Sentiment analysis on COVID tweets using COVID-Twitter-BERT with auxiliary sentence approachHung-Yeh Lin, Teng-Sheng Moh. 234-238 [doi]
- Cross courses pedagogy development in data analyticsYi Ding, Hyesung Park, Shuhua Lai, Shuting Xu, Yaquan Xu. 240-242 [doi]
- Virtual app development for adolescents during COVID-19Kaylah Mackroy, Kinnis Gosha. 243-245 [doi]
- AirFlute: a virtual flute and tutoring systemKate Sanborn. 246-248 [doi]
- BallCaller: a computer vision line caller for tennisBryan Whitehurst. 249-251 [doi]