Abstract is missing.
- A Survey: Resource Allocation Technology Based on Edge Computing in IIoTZifan Lin, Jinqing Liu, Jinchao Xiao, Shuangfei Zi. 1-5 [doi]
- Throughput-Optimized Spectrum Cognizant Routing for Coded Military Cognitive Ad Hoc Radio NetworksPhetho Phaswana, Mthulisi Velempini. 1-5 [doi]
- Mining for the Preference of Funds based on Subgraph Embedding of Fund-Stock NetworksShangzhe Li, Xingkun Wang, Xin Jiang. 1-5 [doi]
- Genetic Algorithm Augmented Convolutional Neural Network for Image Recognition ApplicationsOmar Kaziha, Anwar Jarndal, Talal Bonny. 1-5 [doi]
- On Diabetes Classification and Prediction using Artificial Neural NetworksMaha S. Diab, Saddam Husain, Anwar Jarndal. 1-5 [doi]
- A Secure Algorithm for Deep Learning Training under GAN AttacksAseem Prashar, Sergio A. Salinas Monroy. 1-6 [doi]
- Virtual Machine Performance Analysis and PredictionYuegang Li, Dongyang Ou, Congfeng Jiang, Jing Shen, Shuangshuang Guo, Yin Liu, Linlin Tang. 1-5 [doi]
- Temperature Dependent SVR and ANN based I-V Models for GaN HEMTsSaddam Husain, Amar Hamadeh, Omar Zaatar, Talal Al Gumaei, Anwar Jarndal. 1-4 [doi]
- Performance Evaluation of Slotted ALOHA based IoT Networks under Asymmetric TrafficKonstantina Spathi, Anastasios Valkanis, Georgia Beletsioti, Georgios I. Papadimitriou, Petros Nicopolitidis. 1-5 [doi]
- Weighted Scheduling of Mixed Gang Jobs on Distributed ResourcesGeorgios L. Stavrinides, Helen D. Karatza. 1-6 [doi]
- An Empirical Analysis of the Role of Contextual Factors in Moderating the Performance Impact of ERP SystemsMohamed Abdalla Nour. 1-5 [doi]
- PhishGAN: Data Augmentation and Identification of Homoglyph AttacksJoon Sern Lee, Gui Peng David Yam, Jin Hao Chan. 1-6 [doi]
- Cascaded RBF-CBiLSTM for Arabic Named Entity RecognitionAya Mousa, Ismail Shahin, Ali Bou Nassif, Ashraf Elnagar. 1-5 [doi]
- Cyber-Attacks on Smart Home Energy Management Systems under AggregatorsAksha Sajeev, Haile-Selassie Rajamani. 1-5 [doi]
- Digital IIR Filter Design using Bilinear Transformation in MATLABBeza Negash Getu. 1-6 [doi]
- Modelling Audiograms for People with Dementia Who Experience Hearing Loss Using Multiple Linear Regression MethodAbeer Elkhouly, Hasliza A. Rahim, Nidhal Abdulaziz, Mohamed Fareq Abd Malek. 1-4 [doi]
- Utility Pattern Mining Based on the Rule of Utility LeverageYong Zhang, Xiangcai Yang, Zhousheng Ye, Jueyang Wang, Yanjun Hu. 1-6 [doi]
- A New Efficient Distributed Orthogonal Space Time Block Coding in Cooperative Relay NetworksAbdulghani M. Elazreg, Ahmad Kharaz. 1-6 [doi]
- A Smart System Based on Digital Object Architecture to Verify the Diploma CertificatesMahmood Al-Bahri, Salim Al-Wardi, Ravindra R. Dharamshi, Naeem Al-shukail, Ammar Muthanna. 1-5 [doi]
- A Novel Approach to Predict the Real Time Sentimental Analysis by Naive Bayes & RNN Algorithm during the COVID Pandemic in UAEAbdulrahman Radaideh, Fikri Dweiri, Mohammad S. Obaidat. 1-5 [doi]
- Performance and Energy-Tuning Methodology for Wireless Sensor Networks Using TunableMACEkereuke Udoh, Vladimir Getov. 1-5 [doi]
- Studying the Similarity of COVID-19 Sounds based on Correlation Analysis of MFCCMohammed Bader Alsabek, Ismail Shahin, Abdelfatah Hassan. 1-5 [doi]
- GPR and ANN based Prediction Models for COVID-19 Death CasesAnwar Jarndal, Saddam Husain, Omar Zaatar, Talal Al Gumaei, Amar Hamadeh. 1-5 [doi]
- Forecasting of Electric Peak Load Using ANN-Cascaded, ANN-NARX and GPR TechniquesAnwar Jarndal, Saddam Husain. 1-5 [doi]
- Automatic Digital Modulation Recognition Based on Machine Learning AlgorithmsSam Ansari, Khawla A. Alnajjar, Saeed Abdallah, Mohamed Saad 0001. 1-6 [doi]
- Applying Privacy-Aware Policies in IoT Devices Using Privacy MetricsMona Tavakolan, Ismaeel A. Faridi. 1-5 [doi]
- HeaL: A blockchain-envisioned signcryption scheme for healthcare IoT ecosystemsPronaya Bhattacharya, Payal Mehta, Sudeep Tanwar, Mohammad S. Obaidat, Kuei-Fang Hsiao. 1-6 [doi]
- Heart Arrhythmia Abnormality Classification Using Machine LearningYaman Afadar, Ali Bou Nassif, Maha Alaa Eddin, Manar AbuTalib, Qassim Nasir. 1-5 [doi]
- Android Malware Detection Using Static Features and Machine LearningAli Al Zaabi, Djedjiga Mouheb. 1-5 [doi]
- Interplay of Machine Learning and Software Engineering for Quality EstimationsHamza Abubakar, Mohammad S. Obaidat, Aaryan Gupta, Pronaya Bhattacharya, Sudeep Tanwar. 1-6 [doi]
- COVID-19 Detection System using Recurrent Neural NetworksAbdelfatah Hassan, Ismail Shahin, Mohamed Bader Alsabek. 1-5 [doi]
- On the Effect of Traffic Burstiness in LoRaWAN Networks' PerformanceAthanasios Tsakmakis, Anastasios Valkanis, Georgia A. Beletsioti, Petros Nicopolitidis, Georgios Papadimitriou. 1-4 [doi]
- Exploring Quantization-Aware Training on a Convolution Neural NetworkOmar Kaziha, Talal Bonny. 1-5 [doi]
- Optimal Security Cost for Latency-Aware Service Provisioning in Mobile Edge ComputingGlaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan, Issa Traoré. 1-5 [doi]
- Survey on Hybrid Classical-Quantum Machine Learning ModelsMaha A. Metawei, Hazem Said, Mohamed Taher, Hesham Eldeeb, Salwa M. Nassar. 1-6 [doi]
- Digital Forensic Acquisition and Analysis of Discord ApplicationsMichal Motylinski, Áine MacDermott, Farkhund Iqbal, Mohammed Hussain, Saiqa Aleem. 1-7 [doi]
- Systematic Literature Review: Metaheuristics-based Approach for Workflow Scheduling in CloudDina Jamal Hejji, Ali Bou Nassif, Qassim Nasir, Manar AbuTalib. 1-5 [doi]
- Access Permissions for Apple Watch Applications: A Study on Users' PerceptionsMuhammad Umair Shah, Umair Rehman, Farkhund Iqbal, Fazli Wahid, Mohammed Hussain, Ali Arsalan. 1-7 [doi]
- Reinforcement Learning in Traffic Prediction of Core Optical Networks using Learning AutomataAnastasios Valkanis, Georgia A. Beletsioti, Petros Nicopolitidis, Georgios I. Papadimitriou, Emmanouel A. Varvarigos. 1-6 [doi]
- Research on Robot's Indoor Object Finding Strategy Based on Semantic RelatednessZhao Zhao, Zhenqiang Mi, Yu Guo, Mohammad S. Obaidat. 1-5 [doi]
- Protecting the ESP8266 Module from Replay AttacksIvan Vaccari, Maurizio Aiello, Federico Pastorino, Enrico Cambiaso. 1-6 [doi]
- Parallel Semi-blind Joint Timing-Offset and Channel Estimation for AF-TWRNsOruba Alfawaz, Ali A. El-Moursy, Khawla A. Alnajjar, Saeed Abdallah. 1-6 [doi]
- Power Attack and Detection Technology in Data Centers: A SurveyShenglei Chen, Dongyang Ou, Congfeng Jiang, Jing Shen, Li Yan, Shuangshuang Guo. 1-5 [doi]
- Parallelization of Global Sequence Alignment on Graphics Processing UnitKailash W. Kalare, Mohammad S. Obaidat, Jitendra V. Tembhurne, Chandrashekhar Meshram, Kuei-Fang Hsiao. 1-5 [doi]
- Algorithm Appreciation: Algorithmic Performance, Developmental Processes, and User InteractionsDonghee Shin, Bouziane Zaid, Mohammed Ibahrine. 1-5 [doi]
- Fast Local Map Construction of Robot Using Semantic PriorsNan Yang, Zhenqiang Mi, Yu Guo 0001, Balqies Sadoun, Mohammad S. Obaidat. 1-5 [doi]
- Predicting the power of a combined cycle power plant using machine learning methodsSalama Alketbi, Ali Bou Nassif, Maha Alaa Eddin, Ismail Shahin, Ashraf Elnagar. 1-5 [doi]
- A Study on Optimizing Laser Beam Waist for LEO-To-GEO Communication for 100 Kg-Class SatellitePhong Xuan Do, Alberto Carrasco-Casado, Takayuki Hosonuma, Morio Toyoshima, Shinichi Nakasuka. 1-6 [doi]
- A Post Dynamic Clustering Approach for Classification-based Image RetrievalJitesh Pradhan, Arup Kumar Pal, Mohammad S. Obaidat, SK Hafizul Islam. 1-7 [doi]
- Joint Carrier Frequency Offset, Timing Offset and Channel Estimation in Two-way RelaysFatimah Al-Rahmani, Saeed Abdallah. 1-4 [doi]
- Big Data Mining for Spatial-Temporal Characteristics of Catering DataYue Zeng, Xiru Hou, Bing Liu, Xin Jiang. 1-5 [doi]
- Deep learning regularization in imbalanced dataFiruz Kamalov, Ho-Hon Leung. 1-5 [doi]
- Comparison and Model of Compression Techniques for Smart Cloud Log File HandlingJosef Spillner. 1-6 [doi]
- A Recommendation System for Diabetes Detection and TreatmentFatima Almatrooshi, Sumayya Alhammadi, Said A. Salloum, Iman Akour, Khaled Shaalan. 1-6 [doi]