Abstract is missing.
- Automated Medicinal-Pill Dispenser with Cellular and Wi-Fi IoT IntegrationChanuka Bandara, Ashan Dhanuka Sandanayake, Yehan Kodithuwakku, V. Logeeshan. 1-7 [doi]
- Detecting Amazon Bot Reviewers Using Unsupervised and Supervised LearningBrandon Wood, Khaled Slhoub. 1-8 [doi]
- An Outcome Based Analysis on Heart Disease Prediction using Machine Learning Algorithms and Data Mining ApproachesAushtmi Deb, Mst. Sadia Akter Koli, Sheikh Beauty Akter, Adil Ahmed Chowdhury. 1-7 [doi]
- Analysis of the primary attacks on IoMT Internet of Medical Things communications protocolsCarlos José Martínez, Sebastià Galmés. 1-7 [doi]
- Machine Learning-based System for Monitoring Social Distancing and Mask WearingMohammed Faisal Naji, Chibli Joumaa, Yousef Alswailem, Abdulrahman Alobthni, Rayan Albusilan. 1-8 [doi]
- Survey on Types of Cyber Attacks on Operating System Vulnerabilities since 2018 onwardsMaame Araba Vander-Pallen, Paul Addai, Stuart Isteefanos, Tauheed Khan Mohd. 1-7 [doi]
- Detection of Faults in Electro-Hydrostatic Actuators Using Feature Extraction Methods and an Artificial Neural NetworkMaryam Ghanbari, Witold Kinsner, Nariman Sepehri. 1-7 [doi]
- Analysis of Various Vulnerabilities in the Raspbian Operating System and SolutionsChristopher Le, Alvaro Martin Grande, A. J. Carmine, Jordan Thompson, Tauheed Khan Mohd. 1-6 [doi]
- Feature Fusion Network Based on Hybrid Attention for Semantic SegmentationXinchen Xie, Chen Li 0033, Lihua Tian. 9-14 [doi]
- Leveraging Transfer Learning and GAN Models for OCR from Engineering DocumentsWael Khallouli, Raphael Pamie-George, Samuel F. Kovacic, Andres Sousa-Poza, Mustafa Canan, Jiang Li 0001. 15-21 [doi]
- Real Time FPGA-Based CNN Training and Recognition of SignalsTyler Groom, Kiran George. 22-26 [doi]
- A Review on Suicidal Ideation Detection Based on Machine Learning and Deep Learning TechniquesTanya Bhardwaj, Paridhi Gupta, Akshita Goyal, Akanksha Nagpal, Vivekanand Jha. 27-31 [doi]
- Ensemble Reinforcement Learning Framework for Sum Rate Optimization in NOMA-UAV NetworkSyed Khurram Mahmud, Yue Chen 0002, Kok Keong Chai. 32-38 [doi]
- Clustering and Classification Models For Student's Grit Detection in E-LearningRenato R. Maaliw, Karen Anne C. Quing, Julie Ann B. Susa, Jed Frank S. Maraueses, Ace C. Lagman, Rossana T. Adao, Ma. Corazon Fernando Raguro, Ranie Baul Canlas. 39-45 [doi]
- To Offload or Not? An Analysis of Big Data Offloading Strategies from Edge to CloudRaghubir Singh, József Kovács, Tamás Kiss. 46-52 [doi]
- Data Quality Management Improvement: Case Studi PT BPINandang Sunandar, Achmad Nizar Hidayanto. 53-58 [doi]
- Analysis of the Financial Efficiency of Companies in the Industrial Sector during COVID-19: Case Study in PeruLucero Sovero Rivera, Nicole Ninamango Origuela, Grimaldo Quispe Santivañez. 59-64 [doi]
- Using Timer Data to Conjunct Self-Reported Measures in Quantifying DeceptionKevin Matthe Caramancion. 65-70 [doi]
- Genetic Algorithm for Logistics-Route Optimization in Urban AreaNur Uddin, Hendi Hermawan, Nur Layli Rachmawati, Hendy Tannady. 71-76 [doi]
- Towards A Lightweight Identity Management and Secure Authentication for IoT Using BlockchainShereen Ismail, Diana Dawoud, Hassan Reza. 77-83 [doi]
- MVE-based Reinforcement Learning Framework with Explainability for improving Quality of Experience of Application Placement in Fog ComputingBhargavi Krishnamurthy, Sajjan G. Shiva, Saikat Das. 84-90 [doi]
- A Face Recognition Method Using Deep Learning to Identify Mask and Unmask ObjectsSaroj Mishra, Hassan Reza. 91-99 [doi]
- Man-in-the-Middle attack Explainer for Fog computing using Soft Actor Critic Q-Learning ApproachBhargavi Krishnamurthy, Sajjan G. Shiva. 100-105 [doi]
- Neighbor-Based Optimized Logistic Regression Machine Learning Model For Electric Vehicle Occupancy DetectionSayan Shaw, Keaton Chia, Jan Kleissl. 106-110 [doi]
- A Deep Learning Approach for Automatic Scoliosis Cobb Angle IdentificationRenato R. Maaliw, Julie Ann B. Susa, Alvin Sarraga Alon, Ace C. Lagman, Shaneth C. Ambat, Manuel Bautista Garcia, Keno Cruz Piad, Ma. Corazon Fernando Raguro. 111-117 [doi]
- Power and Telecommunication Lines Detection and Avoidance for DronesPaul Addai, Tauheed Khan Mohd. 118-123 [doi]
- Major threats to the continued adoption of Artificial Intelligence in today's hyperconnected worldOpeoluwa Tosin Eluwole, Segun Akande, Oluwole Abiodun Adegbola. 124-130 [doi]
- Disrupting the Cooperative Nature of Intelligent Transportation SystemsSultan Ahmed Almalki, Ahmed Abdel-Rahim, Frederick T. Sheldon. 131-137 [doi]
- An Evaluation and Embedded Hardware Implementation of YOLO for Real-Time Wildfire DetectionJordan Johnston, Kaiman Zeng, Nansong Wu. 138-144 [doi]
- An Approach for Automatic Discovery of Rules Based on ECG Data Using Learning Classifier SystemsMuthana Zouri, Alexander Ferworn. 145-154 [doi]
- Fake News Detection in Social Networks Using Data Mining TechniquesHebah Alquran, Shadi Banitaan. 155-160 [doi]
- No-Clear for NuclearSanskar Raj Marahata, Eman Abdelfattah, Sandra Ibrahim, Audrina Dobrevic. 161-166 [doi]
- Computer Vision Method in Means of Egress Obstruction DetectionIsmail A. Idowu, Kofi Nyarko, Otily Toutsop. 167-173 [doi]
- Cyber Security Vulnerability Detection Using Natural Language ProcessingKanchan Singh, Sakshi S. Grover, Ranjini Kishen Kumar. 174-178 [doi]
- Shift-Invariant Structure-Imposed Convolutional Neural Networks for Direction of Arrival EstimationKaushallya Adhikari. 179-186 [doi]
- Lung cancer prediction model using ensemble learning techniques and a systematic review analysisMuntasir Mamun, Afia Farjana, Miraz Al-Mamun, Md Salim Ahammed. 187-193 [doi]
- Heart failure survival prediction using machine learning algorithm: am I safe from heart failure?Muntasir Mamun, Afia Farjana, Miraz Al-Mamun, Md Salim Ahammed, Md Minhazur Rahman. 194-200 [doi]
- Classification of COVID-19 in Chest X-ray Images Using Fusion of Deep Features and LightGBMHamid Nasiri, Ghazal Kheyroddin, Morteza Dorrigiv, Mona Esmaeili, Amir Raeisi Nafchi, Mohsen Haji Ghorbani, Payman Zarkesh-Ha. 201-206 [doi]
- Ship Deck Segmentation In Engineering Document Using Generative Adversarial NetworksMohammad Shahab Uddin, Raphael Pamie-George, Daron Wilkins, Andres Sousa-Poza, Mustafa Canan, Samuel F. Kovacic, Jiang Li 0001. 207-212 [doi]
- Implementation of Machine Learning in BCI Based Lie DetectionMohammad Affan Khalil, Maria Ramirez, Johnny Can, Kiran George. 213-217 [doi]
- A Survey on Deep Learning Techniques for Joint Named Entities and Relation ExtractionMina Esmail Zadeh Nojoo Kambar, Armin Esmaeilzadeh, Maryam Heidari. 218-224 [doi]
- Deep Learning Models for Water Potability Classification in Rural Areas in the PhilippinesArgeen Blanco, Lance Victor Del Rosario, Ken Ichiro Jose, Melchizedek Alipio. 225-231 [doi]
- Deep Learning Autoencoder based Anomaly Detection Model on 4G Network Performance DataMd Rakibul Ahasan, Mirza Sanita Haque, Mohammad Rubbyat Akram, Mohammed Fahim Momen, Md. Golam Rabiul Alam. 232-237 [doi]
- Machine learning model evaluation for 360° video cachingMd. Milon Uddin, Jounsup Park. 238-244 [doi]
- Classification of "Like" and "Dislike" Decisions From EEG and fNIRS Signals Using a LSTM Based Deep Learning NetworkMaria Ramirez, Mohammad Affan Khalil, Johnny Can, Kiran George. 252-255 [doi]
- Practical Applications of Edge Computing to Accelerate Cloud Hosted Web ContentJacob Koch, Wei Hao 0001. 256-263 [doi]
- Cloud Computing Security and FuturePatrick Kopacz, Md Minhaz Chowdhury. 264-269 [doi]
- Honeynets and Cloud SecurityEric M. Toth, Md Minhaz Chowdhury. 270-275 [doi]
- Using Amazon Managed Blockchain for ePHI An Analysis of Hyperledger Fabric and EthereumAudrey Long, Daniel Choi, Joel Coffman. 276-282 [doi]
- Evaluation of Naïve Bayesian Algorithms for Cyber-Attacks Detection in Wireless Sensor NetworksShereen Ismail, Hassan Reza. 283-289 [doi]
- An Automatic Speech Segmentation Algorithm of Portuguese based on Spectrogram WindowingLap-Man Hoi, Yuqi Sun, Sio Kei Im. 290-295 [doi]
- COVID-19 Prediction based on Infected Cases and Deaths of Bangladesh using Deep Transfer LearningKhan Md. Hasib, Shadman Sakib, Jubayer Al Mahmud, Kamruzzaman Mithu, Md. Saifur Rahman, Mohammad Shafiul Alam. 296-302 [doi]
- Pulse and Signal Data Classification Using Conventional and Few-Shot Machine LearningKayla Lee, Kiran George. 311-317 [doi]
- EEG and fNIRS Analysis Using Machine Learning to Determine Stress LevelsJavier de la Cruz, Douglas Shimizu, Kiran George. 318-322 [doi]
- Development of a mobile application for occupant-centric facility maintenance managementMohamed Bin Alhaj, Hexu Liu, Osama Abudayyeh, Mohammed Sulaiman. 323-329 [doi]
- Predicting Cryptocurrency Price Change Direction from Supply-Side Factors via Machine Learning MethodsDavid Mayo, Heba Elgazzar. 330-336 [doi]
- Comparative Analysis of AlexNet, Resnet-50, and Inception-V3 Models on Masked Face RecognitionBenedicta Nana Esi Nyarko, Wu Bin, Jinzhi Zhou, George K. Agordzo, Justice Odoom, Ebenezer Koukoyi. 337-343 [doi]
- Real-Time Dynamic Object Grasping with a Robotic Arm: A Design for Visually Impaired PersonsFrancis Liri, Austin Luu, Kiran George, Axel Angulo, Johnathan Dittloff. 344-350 [doi]
- Covid-EnsembleNet: An Ensemble Based Approach for Detecting Covid-19 by utilising Chest X-ray ImagesAbdullah Al-Monsur, M. D. Rizwanul Kabir, Abrar Mohammad Ar-Rafi, Mirza Muntasir Nishat, Fahim Faisal. 351-356 [doi]
- Toward Detecting Cyberattacks Targeting Modern Power Grids: A Deep Learning FrameworkEhsan Naderi, Arash Asrari. 357-363 [doi]
- A Review of Human Immune Inspired Algorithms for Intrusion Detection SystemsChukwuemeka Duru, Jumoke Ladeji-Osias, Ketchiozo Wandji, Otily Toutsop, Rachida Kone. 364-371 [doi]
- Simulating the Behaviour and Displacement of Women in Water-Stressed AreasAakib Bin Nesar, Tahseena Mahmud, Fahreen Hossain. 372-378 [doi]
- Red Toad, Blue Toad, Hacked Toad?Lane Rizkallah, Nick Potter, Kyle Reed, Dylan Reynolds, Mohammed Salman, Suman Bhunia. 379-386 [doi]
- Comparative Study of Sha-256 Optimization TechniquesBharat S. Rawal, Lingampally Shiva Kumar, Sriram Maganti, Varun Godha. 387-392 [doi]
- A Distributed Average Cost Reinforcement Learning approach for Power Control in Wireless 5G NetworksAntonio Ornatelli, Alessandro Giuseppi, Andrea Tortorelli. 393-399 [doi]
- A Review on Energy Efficient Strategies for Corona Based Architecture in Wireless Sensor NetworksAaniya Agrawala, Vidhi Katyal, Neha Pandey, Astha Jain, Vivekanand Jha. 400-406 [doi]
- Performance Evaluation of a new one-time password (OTP) scheme using stochastic petri net (SPN)Razib Hayat Khan, Jonayet Miah. 407-412 [doi]
- Wearable Sensing and Physical Exercise RecognitionXiaojie Mu, Cheol-Hong Min. 413-417 [doi]
- MusCare+: Muscle Monitoring for AnomaliesNicholas Foley, Chen-Hsiang Yu. 425-430 [doi]
- Comparing Pretrained Image-Net CNN with a Siamese Architecture for Few-Shot Learning Applications in Radar SystemsCesar Martinez Melgoza, Kayla Lee, Tyler Groom, Nate Ruppert, Kiran George, Henry Lin. 431-436 [doi]
- Day ahead Power Demand Forecasting for Hybrid Power at the EdgeCalum McCormack, Christopher Wallace, Peter Barrie, Gordon Morison. 437-441 [doi]
- Classification of Various Workout Motions Using Wearable SensorsChad O'Brien, Cheol-Hong Min. 442-446 [doi]
- Graph Attention Neural Network Distributed Model TrainingArmin Esmaeilzadeh, Mina Esmail Zadeh Nojoo Kambar, Maryam Heidari. 447-452 [doi]
- Using Machine Learning and Regression Analysis to Classify and Predict Danger Levels in Burning SitesAdenrele A. Ishola, Damian Valles. 453-459 [doi]
- ComparativeAnalysisofARIMAandLSTMM achine Learning Algorithm for Stock PricePredictionMohammad Monirujjaman Khan, Md. Farabi Alam, Shoumik Mahabub Ridoy. 460-465 [doi]
- Predicting Audio Training Learning Outcomes Using EEG Data and KNN ModelingAbel Desoto, Ethan Santos, Francis Liri, Kenneth Faller, Devin Heng, Joshua Dodd, Kiran George, Julia Drouin. 466-470 [doi]
- Electronic device for acquiring images of sardine cansSalah-Eddine Mansour, Abdelhak Sakhi, Larbi Kzaz, Amine Erroutbi, Abderrahim Sekkaki. 471-475 [doi]
- Extraction of Step Performed in Use Case Description as a Reference for Conformity of Sequence Diagrams Using Text Mining (Case Study: SRS APTU)Nur Apriyanto, Yudi Priyadi, Dana Sulistyo Kusumo. 476-482 [doi]
- Comparison of Task Performance and User Satisfaction Between Holographic and Standard QWERTY KeyboardTalha Hassan, Tauheed Khan Mohd. 483-488 [doi]
- Salted Egg Cleaning and Grading System Using Machine VisionLaily Mariz A. Bengua, Vanessa Jane D. De Guzman, Danica Mae S. Macunat, Efren D. Villaverde, Aubee T. Mahusay, Renato R. Maaliw, Ace C. Lagman, Alvin S. Alon. 489-493 [doi]
- Ensuring Web Integrity through Content Delivery NetworksZhao Xiang Lim, Xiu Qi Ho, Daniel Zhonghao Tan, Weihan Goh. 494-500 [doi]
- A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking and Identity-TheftChristopher Faircloth, Gavin Hartzell, Nathan Callahan, Suman Bhunia. 501-507 [doi]
- Proof-of-Concept for a Granular Incident Management Information Sharing SchemeOuti-Marja Latvala, Ivo Emanuilov, Tatu Niskanen, Pia Raitio, Jarno Salonen, Diogo Santos, Katerina Yordanova. 515-520 [doi]
- Energy Efficient Double Critic Deep Deterministic Policy Gradient Framework for Fog ComputingBhargavi Krishnamurthy, Sajjan G. Shiva. 521-527 [doi]
- Fake Product Review Detection Using Machine LearningMd Mahadi Hassan Sohan, Mohammad Monirujjaman Khan, Ipseeta Nanda, Rajesh Dey. 527-532 [doi]
- Profit Prediction based on Financial Statements using Deep Neural NetworkAlonso-Montesinos. 533-537 [doi]
- CNN-Based Hyperparameter Optimization Approach for Road Pothole and Crack Detection SystemsZahra Salsabila Hernanda, Hani'ah Mahmudah, Rahardhita Widyatra Sudibyo. 538-543 [doi]
- Violence Detection Using Computer Vision ApproachesKhalid Raihan Talha, Koushik Bandapadya, Mohammad Monirujjaman Khan. 544-550 [doi]
- Low-Cost Ensembling for Deep Neural Network based Non-Intrusive Load MonitoringBalarupan Gowrienanthan, N. Kiruthihan, K. D. I. S. Rathnayake, S. Kumarawadu, V. Logeeshan. 551-556 [doi]
- Research and Development of an E-commerce with Sales ChatbotMostaqim Hossain, Mubassir Habib, Mainuddin Hassan, Faria Soroni, Mohammad Monirujjaman Khan. 557-564 [doi]
- Development of Cloud-based Infrastructure for Real Time Analysis of Wearable Sensor SignalKabir Hossain, Tonmoy Ghosh, Edward Sazonov. 565-570 [doi]
- HomeIO: Offline Smart Home Automation System with Automatic Speech Recognition and Household Power Usage TrackingI. B. C. Irugalbandara, A. S. M. Naseem, M. S. H. Perera, V. Logeeshan. 571-577 [doi]
- A Survey of Intrusion Detection and Prevention SystemsTristan Erney, Md Minhaz Chowdhury. 578-584 [doi]
- Botnets as the Modern Attack VectorFrank Antonucci, Md Minhaz Chowdhury. 585-590 [doi]
- A Taxonomy of Privacy, Trust, and Security Breach Incidents of Internet-of-Things Linked to F(M).A.A.N.G. CorporationsJoseph Squillace, May Bantan. 591-596 [doi]
- PPIoV: A Privacy Preserving-Based Framework for IoV- Fog Environment Using Federated Learning and BlockchainJamal Alotaibi, Lubna K. Alazzawi. 597-603 [doi]
- Employing Edge Computing to Enhance Self-Defense Capabilities of IoT DevicesJack Li, Yi Hu. 604-610 [doi]
- A Robust Information Hiding Scheme Using Third Decomposition Layer of Wavelet Against Universal AttacksErsin Elbasi. 611-616 [doi]
- Automated Determination of Mushroom Edibility Using an Augmented DatasetSudarshan S. Chawathe. 617-623 [doi]
- Facial Detection in Low Light Environments Using OpenCVChristopher Le, Tauheed Khan Mohd. 624-628 [doi]
- ADMSV - A Differential Machine Learning based Steering Controller for Smart VehiclesBrook W. Abegaz. 629-634 [doi]
- Optical Features for Automated Determination of Agricultural Product VarietiesSudarshan S. Chawathe. 635-641 [doi]
- Pattern Recognition Method for Detecting Engineering Errors on Technical DrawingsRimma Dzhusupova, Richa Banotra, Jan Bosch, Helena Holmström Olsson. 642-648 [doi]
- A Hybrid Firefly-DE algorithm for Ridesharing Systems with Cost Savings Allocation SchemesFu-Shiung Hsieh. 649-653 [doi]
- Classification of Movie Success: A Comparison of Two Movie DatasetsShreehar Joshi, Eman Abdelfattah, Ryan Osgood. 654-658 [doi]
- Text Data Processing in Requirement Specifications as a Reference for Similarities Between Use Case Diagrams and Use Case Descriptions for Smart Sleeping Lamp Application DocumentsTania Angelina Hutajulu, Yudi Priyadi, Arfive Gandhi. 665-671 [doi]
- Measurement of Similarity Between Requirement Elicitation and Requirement Specification Using Text Pre-Processing in the Cinemaloka ApplicationJunifar Adam Pamungkas, Yudi Priyadi, Muhammad Johan Alibasa. 672-678 [doi]
- Implementation of Semantic Textual Similarity between Requirement Specification and Use Case Description Using WUP Method (Case Study: Sipjabs Application)Elsa Jelista Sari, Yudi Priyadi, Rosa Reska Riskiana. 681-687 [doi]
- Mental Health Stigma and Natural Language Processing: Two Enigmas Through the Lens of a Limited CorpusMin-Hyung Lee, Richard Kyung. 688-691 [doi]
- An Auditing Framework for Analyzing Fairness of Spatial-Temporal Federated Learning ApplicationsAfra Mashhadi, Ali Tabaraei, Yuting Zhan, Reza M. Parizi. 699-707 [doi]
- Development of Low Cost Smart Cane with GPSFerdaus Ahmed, Zarin Tasnim, Masud Rana, Mohammad Monirujjaman Khan. 715-724 [doi]
- An Evaluation of IoT DDoS Cryptojacking Malware and Mirai BotnetAdam Borys, Abu Kamruzzaman, Hasnain Nizam Thakur, Joseph C. Brickley, Md Liakat Ali, Kutub Thakur. 725-729 [doi]
- Factors Impacting Resilience of Internet of Things Systems in Critical InfrastructureMiroslav Bures, Pavel Blazek, Jiri Nema, Hynek Schvach. 730-735 [doi]
- NFDLM: A Lightweight Network Flow based Deep Learning Model for DDoS Attack Detection in IoT DomainsKumar Saurabh, Tanuj Kumar, Uphar Singh, O. P. Vyas 0001, Rahamatullah Khondoker. 736-742 [doi]
- Bit switching decoding of Cyclic Hamming codes for IoT applicationsPraveen Sai Bere, Mohammed Zafar Ali Khan. 743-748 [doi]
- Applying Aspect-Oriented Design Methodology to Manage Time-Validity of Information in Internet-of-Things SystemsVyas O'Neill, Ben Soh. 749-752 [doi]
- LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT NetworksKumar Saurabh, Saksham Sood, P. Aditya Kumar, Uphar Singh, Ranjana Vyas, O. P. Vyas 0001, Rahamatullah Khondoker. 753-759 [doi]
- IoT Based Healthcare Kit for Domestic UsageYehan Kodithuwakku, Ashan Dhanuka Sandanayake, Chanuka Bandara, V. Logeeshan. 760-765 [doi]
- Enhanced Data-Driven LoRa LP-WAN Channel Model in BirminghamAlaaAllah A. ElSabaa, Florimond Guéniat, Wenyan Wu 0002, Michael Ward. 766-772 [doi]
- Sparse Mobile Crowdsensing: Components and FrameworksUrvi Goel, Kaial Mongia, Quanta Gupta, Hansika Rajput, Vivekanand Jha. 773-778 [doi]
- Smart Three In One System For Indoor Safety AssuranceAshan Dhanuka Sandanayake, Yehan Kodithuwakku, Chanuka Bandara, V. Logeeshan. 779-785 [doi]
- Proposed Antenna Design for IoT and 5G-WiFi ApplicationsAmin H. Al-Ka'bi. 786-790 [doi]