Abstract is missing.
- Community Opinion Network Maximization for Mining Top K Seed Social Network UsersChristie I. Ezeife, Mayank Semwal. 3-16 [doi]
- Taxonomy for an Automated Sleep Stage ScoringNabin Shrestha, Salma Hameedi, Rami S. Alkhawaldeh, Omar Hisham Rasheed Al-Sadoon. 17-29 [doi]
- Convolutional Neural Networks Based Classification of MammogramsNguyen Hoang Phuong, Ha Manh Toan, Dao Van Tu, Nguyen Khac-Dung, Nguyen Van Thi, Ngo Le Lam, Anh Nguyen 0002. 30-43 [doi]
- Finding Insights in Florida Voter ParticipationJoyner Johnson, Adhithyan Rangarajan, Thomas Hunt, Payal Agarwal, Mahmoud Elbatouty, Karthikeyan Umapathy, Dan Richard, Leah Nash. 44-55 [doi]
- Supervised Learning-Based Indoor Positioning System Using WiFi FingerprintsBasem Suleiman, Ali Anaissi, Yuhuan Xiao, Waheeb Yaqub, Anuradha Samkham Raju, Widad Alyassine. 56-71 [doi]
- Comparing Ensemble Learning Techniques on Data Transmission Reduction for IoT SystemsAhmad Salah, Mahmoud Bekhit, Asma Musabah Alkalbani, Mohamed A. Mohamed, Nur Indah Lestari, Ahmed Fathalla. 72-85 [doi]
- Machine Learning Technique for Data Fusion and Cognitive Load Classification Using an Eye TrackerAaron Collins, Prarthana Pillai, Balakumar Balasingam, Arunita Jaekel. 86-95 [doi]
- Comparative Analysis: Recommendation Techniques in E-CommerceWaleed Ibrahim, Binaya Subedi, Sabreena Zoha, Abdussalam Ali, Emran Salahuddin. 96-107 [doi]
- Design and Manufacturing of Cap System to Prevent Chemotherapy-Induced AlopeciaElaf A. Shukur, Auns Q. Al-Neami, Furat Y. Mohsen. 108-119 [doi]
- Entropy in Fuzzy k-Means Algorithm for Multi-view DataImran Khan, Maya ALghafri, Abdelhamid Abdessalem. 120-133 [doi]
- HealthCare Text Analytics Using Recent ML TechniquesKhem Poudel, Movin Uddin, Revanth Kommu, Sadiat Muhammed, Nahid Hasan, Sammi Hamdan. 134-142 [doi]
- Emotion Recognition Techniques with IoT and Deep Learning TechnologiesAbel Méndez-Porras, Sixto Enrique Campaña Bastidas, Andrés Alejandro Diaz Toro, Luis-Alexander Calvo-Valverde, Rolando Rigoberto Rosero. 143-152 [doi]
- Hybrid Capsule Network for Hyperspectral Image Unmixing and ClassificationRavi Giri, Dibakar Raj Pant, Jukka Heikkonen, Rajeev Kanth. 155-168 [doi]
- An Artificial Intelligence Peer-To-Peer Car Repair PlatformAla Saleh AlLuhaidan, Layan Alzaid, Daniyah Aldossari, Renad Alhumid, Joud Alkadi. 169-177 [doi]
- Passive Operating System Fingerprinting Analysis Using Artificial Intelligence TechniquesStephen Hopkins, Ezhil Kalaimannan, Caroline John. 178-191 [doi]
- A Highly Efficient Computer Vision Approach for Tennis Ball Retrieval with Limited Computational PowerMalek Wahidi, Rodrigue Imad, Jihad Rishmany. 192-203 [doi]
- Work Disability Risk Prediction with Text Classification of Medical ReportsVili Huhta-Koivisto, Katja Saarela, Jukka K. Nurminen. 204-213 [doi]
- A Comparison of LSTM and GRU for Bengali Speech-to-Text TransformationNusrat Jahan, Zakia Sultana Shahid, Fahim Chowdhury, Sajjad Ahmed, Mohammad Zavid Parvez, Prabal Datta Barua, Subrata Chakraborty. 214-224 [doi]
- Advanced Traffic Management System for Smart CitiesMais Nijim, Viswas Kanumuri, Waseem Alaqqad, Hisham Albataineh. 225-235 [doi]
- Explainability of Machine Learning in Work Disability Risk PredictionKatja Saarela, Vili Huhta-Koivisto, Kai-Kristian Kemell, Jukka K. Nurminen. 236-245 [doi]
- A Power Efficient Solution to Determine Red Blood Cell Deformation Type Using Binarized DenseNetMd Tanzim Reza, Shakib Mahmud Dipto, Mohammad Zavid Parvez, Prabal Datta Barua, Subrata Chakraborty. 246-256 [doi]
- Augmented Reality for Cognitive Impairment and DementiaBikesh Maharjan, Ali Abas Albabawat, Razwan Mohmed Salah, Nada AlSallami, Syed Altaf, Oday Al-Jerew. 257-269 [doi]
- Enhancing the Tourism Experience Using Mobile Augmented Reality: Geo-Visualization TechniquesKarishma Solanki, Danish Faraz Abbasi, Munir Hossain, Emran Salahuddin, Shaymaa Ismail Ali, Shahad Ahmed. 270-280 [doi]
- A Taxonomy of Secure Data Transmission Techniques: Preventing Sybil Attacks in Vehicular Ad Hoc NetworksManmeet Kaur, Farnaz Farid. 283-293 [doi]
- Detecting Spyware in Android Devices Using Random ForestTamara N. AlMasri, Mu'awiya N. AlDalaien. 294-315 [doi]
- Statistical Approaches to File Fragment AnalysisRazaq Jinad, A. B. M. Rezbaul Islam, Narasimha Shashidhar. 316-328 [doi]
- Analysis of Intrusion Detection Using Ensemble Stacking-Based Machine Learning Techniques in IoT NetworksRao Naveed Bin Rais, Osman Khalid, Jazib-e Nazar, Muhammad Usman Shahid Khan. 329-344 [doi]
- Smart Grid Security: A Systematic Literature ReviewVivian Sultan, Arun Aryal, Crystal Wu, Hector Lopez. 345-358 [doi]
- Analysis of Malicious Intruder Threats to Data IntegrityPeter Padiet, Md. Rafiqul Islam, M. Arif Khan. 359-368 [doi]
- A Review of Cybersecurity Advancements in Unmanned Aerial VehicleMosladdin Mohammad Shueb, Xiangdong Che. 369-380 [doi]
- Open Voting Client Architecture and Op-Ed Voting for Secret Ballot ElectionsAaron Wilson, Swapnoneel Roy, Debajyoti Mukhopadhyay. 381-392 [doi]
- Mobility-Aware Workload Distribution and Task Allocation for Mobile Edge Computing NetworksAristeidis Karras, Christos N. Karras, Anastasios Giannaros, Dimitrios Tsolis, Spyros Sioutas. 395-407 [doi]
- A Comparative Analysis of Performance and Usability on Serverless and Server-Based Google Cloud ServicesAnoop Abraham, Jeong Yang. 408-422 [doi]
- Taxonomy of Green Mobile Cloud Computing for Multimedia ApplicationsFarhad Ahamed, Farnaz Farid, Ahmed Dawoud. 423-432 [doi]
- Enhanced Not Recently Used Algorithm for Cache Memory Systems in Mobile ComputingAmjad Gawanmeh, Sa'ed Abed, Sara Abdul Aziz AlAwadh, Wathiq Mansoor, Shadi Atalla, Ahmad Alomari, Eric Yocam. 433-442 [doi]
- Cloud Resources Usage Prediction Using Deep Learning ModelsMuhammad Johan Alibasa, Basem Suleiman, Abubakar Bello, Ali Anaissi, Qijing Yan, Shulei Chen. 443-452 [doi]
- A Light-Weight Real-Time Anomaly Detection Framework for Edge ComputingRawan Sanyour, Manal Abdullah, Salha Abdullah. 453-466 [doi]
- Distributed TDMA for IoT Using a Dynamic Slot AssignmentChahrazed Benrebbouh, Lemia Louail, Sarra Cherbal. 469-480 [doi]
- Multi-objective VNF Placement Optimization with NSGA-IIIMahmoud Bekhit, Ahmed Fathalla, Esraa Eldesouky, Ahmad Salah. 481-493 [doi]
- Vehicle Controller Area Network Inspection Using Recurrent Neural NetworksKyle Stein, Arash Mahyari, Eman El-Sheikh. 494-499 [doi]
- Evaluation of Human Immune-Based IDPS Under DoS/DDoS AttacksFarouq Aliyu, Tarek R. Sheltami, Marwan H. Abu-Amara, Mohamed Deriche 0001, Ashraf S. Mahmoud. 500-510 [doi]
- Detecting Phishing Websites Based on Machine Learning TechniquesAlexander Veach, Munther Abualkibash. 513-522 [doi]
- A Survey on Drone Cybersecurity and the Application of Machine Learning on Threat EmergenceJonathan Walatkiewicz, Omar Darwish. 523-532 [doi]
- Integrating Data-Driven Security, Model Checking, and Self-adaptation for IoT Systems Using BIP Components: A Conceptual Proposal ModelAnas Alsobeh, Amani Shatnawi. 533-549 [doi]
- Toward Secure and Efficient CNN Recognition with Different Activation and Optimization FunctionsFathi Amsaad 0001, P. L. Prasanna, T. Pravallika, G. Mamatha, B. Raviteja, M. Lakshmi, Nasser Alsaadi, Abdul Razaque, Yahya M. Tashtoush. 550-568 [doi]
- A Comparative Study of Secure and Efficient Data Duplication Mechanisms for Cloud-Based IoT ApplicationsVishnu Vardhan Baligodugula, Fathi Amsaad 0001, Varshitha Vunnam Tadepalli, Vojjala Radhika, Yetukuri Sanjana, Sai Shiva, Supriya Meduri, Majdi Maabreh, Naser Alsaadi, Omar A. Darwish, Abdul Razaque, Yahya M. Tashtoush. 569-586 [doi]
- Ensuring Cybersecurity While Leveraging Social Media as a Data Source for Internet of Things ApplicationsSamar Hendawi, Shadi AlZu'bi, Ala Mughaid, Nayef Alqahtani. 587-604 [doi]
- Credit Card Fraud Detection Using Enhanced Random Forest Classifier for Imbalanced DataAlsharifHasan Mohamad Aburbeian, Huthaifa I. Ashqar. 605-616 [doi]
- Utilizing Machine Learning Algorithms for Effectively Detection IoT DDoS AttacksAla Mughaid, Ali Alqahtani, Shadi AlZu'bi, Ibrahim Obeidat, Rabee Alqura'n, Mahmoud AlJamal, Raid AL-Marayah. 617-629 [doi]
- Towards Cyber Readiness Assessment in Rural AreasIzzat Alsmadi, Lucy Tsado, Camille Gibson. 630-639 [doi]
- Detection of DDoS Attacks in Software Defined Networking Using Machine Learning ModelsAhmad Hamarshe, Huthaifa I. Ashqar, Mohammad Hamarsheh. 640-651 [doi]
- Smart Product Recommendation SystemSarah Abuhaimed, Maha Al-Jasir, Hanan Al-Juaid, Ather Alhameidi. 655 [doi]
- Detection and Prediction of Epileptic Seizures Using Machine Learning ModelNouf AlFouzn, Arwa Almutairi, Sara Alwadyy, Shatha Almutairi, Noore Zahra. 656 [doi]