Abstract is missing.
- Application of Spotted Hyena Optimizer in Cogeneration Power Plant on Single and Multiple-ObjectiveSomboon Sukpancharoen. 1-5 [doi]
- Removal of Wandering Baseline Artifact from Electrocardiogram SignalsEdder Sebastián Mendoza Garibay, Muhammad Sana Ullah. 7-11 [doi]
- Applying HRV Based Online Clustering Method to Identify Driver DrowsinessMohsen Babaeian, Mohammad Mozumdar. 12-21 [doi]
- Energy-Efficient Thermal Comfort Control in Smart BuildingsMusbah Abdulgader, Fadel Lashhab. 22-26 [doi]
- Outlier Prediction Using Random Forest ClassifierDivya Pramasani Mohandoss, Yong Shi, Kun Suo. 27-33 [doi]
- Towards Compositional Abstraction of Analog Neuronal NetworksAhmad Tarraf, Lars Hedrich. 34-37 [doi]
- Reinforcement Learning Based Penetration Testing of a Microgrid Control AlgorithmChristopher Neal, Hanane Dagdougui, Andrea Lodi 0001, José M. Fernandez 0001. 38-44 [doi]
- Texture Analysis for Machine Learning Based Marble Tiles SortingGeorge K. Sidiropoulos, Athanasios G. Ouzounis, George A. Papakostas, Ilias T. Sarafis, Andreas Stamkos, George Solakis. 45-51 [doi]
- Evaluation of Combining Optical and SAR Imagery for Burned Area Mapping using Machine LearningAnugrah Indah Lestari, Mia Rizkinia, Dodi Sudiana. 52-59 [doi]
- Automatic Video summarization with Timestamps using natural language processing text fusionAhmed Emad, Fady Bassel, Mark Refaat, Mohamed Abdelhamed, Nada Shorim, Ashraf AbdelRaouf. 60-66 [doi]
- Pulse Separation Using Time-Frequency Mask and Machine LearningJaron Lin, Jordan Juliano, Alex Erdogan, Kiran George. 67-72 [doi]
- Exploring the Effect of Noisy Environment on Distributed Problem SolvingSaeid Samadidana. 73-80 [doi]
- Towards Optimizing Task Scheduling Process in Cloud EnvironmentYong Shi, Kun Suo, Jameson Hodge, Divya Pramasani Mohandoss, Steven Kemp. 81-87 [doi]
- Application of Firefly Algorithm to UWB Indoor PositioningShiyu Cheng, Xinguang Wang, Haoqi Zhang. 88-93 [doi]
- Benchmarking of Regression Algorithms for Simulating the Building's EnergyAsimina Dimara, Christos-Nikolaos Anagnostopoulos, Stelios Krinidis, Dimitrios Tzovaras. 94-100 [doi]
- Analysis of Distracted Driver Behaviour Using Self-Organizing MapsMatthew Immanuel Samson, David A. Calvert, Lana M. Trick. 101-103 [doi]
- Compressed MobileNet V3: A Light Weight Variant for Resource-Constrained PlatformsPrasad S. P. Kavyashree, Mohamed El-Sharkawy. 104-107 [doi]
- Dynamic Phase Calibration Method for CSI-based Indoor PositioningGuangxin Wang, Arash Abbasi, Huaping Liu. 108-113 [doi]
- Detection of HTTPS Brute-Force Attacks with Packet-Level Feature SetJan Luxemburk, Karel Hynek, Tomás Cejka. 114-122 [doi]
- WiFi-based Environment Adaptive Positioning with Transferable Fingerprint FeaturesGuangxin Wang, Arash Abbasi, Huaping Liu. 123-128 [doi]
- Sentiment Analysis of The United States Senate Twitter Feeds in Election Year 2020Kalyan Sahu, Yoonsuk Choi. 129-133 [doi]
- News Categorization using Hybrid BiLSTM-ANN Model with Feature EngineeringSowmya Sanagavarapu, Sashank Sridhar, S. Chitrakala. 134-140 [doi]
- An Ontology-Based Approach for Curriculum Mapping in Higher EducationMuthana Zouri, Alexander Ferworn. 141-147 [doi]
- MediCrawl - A Web Search Engine For DiseasesDevharsh Trivedi, Vaishnavi Gopalakrishnan. 148-157 [doi]
- Monitoring People Moving during Covid-19 Pandemic in the Emilia-Romagna RegionGian Paolo Jesi, Elisabetta Gori, Andrea Zucchelli, Nicola Spazzoli, Gianluca Mazzini. 158-164 [doi]
- Accumulated Generalized Mean Value - a New Approach to Flow-Based Feature Generation for Encrypted Traffic CharacterizationRaoul R. Nigmatullin, Alexander Ivchenko, Semyon Dorokhin. 165-169 [doi]
- A Virtual Reality (VR) Based Interactive and Educative Experience of Hajj and Umrah for the People of BangladeshAlvee Morsele Kabir, Sharaban Tahura Nisa, Mohammad Monirujjaman Khan. 170-173 [doi]
- An Intuitionistic Fuzzy MCDM Approach Adapted to Minimum Spanning Tree Algorithm for Spreading Content on Social MediaEsra Çakir, H. Ziya Ulukan. 174-179 [doi]
- Stock Market PredictionWeb Service Using Deep Learning by LSTMMohammad Mahabubul Hasan, Pritom Roy, Sabbir Sarkar, Mohammad Monirujjaman Khan. 180-183 [doi]
- EEG Signal Analysis for Seizure Detection Using Recurrence Plots and Tchebichef MomentsKonstantinos Tziridis, Theofanis Kalampokas, George A. Papakostas. 184-190 [doi]
- Explainable Neural Network-based Modulation Classification via Concept Bottleneck ModelsLauren J. Wong, Sean McPherson. 191-196 [doi]
- BinArray: A Scalable Hardware Accelerator for Binary Approximated CNNsMario Fischer, Jürgen Wassner. 197-205 [doi]
- Intrinsic Hierarchical Clustering Behavior Recovers Higher Dimensional Shape InformationPaul Samuel Ignacio. 206-212 [doi]
- Dynamic Performance Improvement of DFIM based on Hybrid Computational TechniqueMohamed Yazid Zidani, Noureddine Brakta, Omar Bendjeghaba. 213-217 [doi]
- Addressing Data Sparsity in Collaborative Filtering Based Recommender Systems Using Clustering and Artificial Neural NetworkAshrf Althbiti, Rayan Alshamrani, Tami Alghamdi, Stephen Lee, Xiaogang Ma 0001. 218-227 [doi]
- Perfect Tabular Hashing in Pseudolinear TimeShekhar Palit, Kevin A. Wortman. 228-232 [doi]
- Wavelet Analysis Using Hilbert Transform and Matching Algorithm for Radar Receiver SystemCesar Martinez Melgoza, Henry Lin, Illianna Izabal, Ameya Govalkar, Kayla Lee, Alex Erdogan, Kiran George. 233-237 [doi]
- District Energy Optimization Based on MLP SimulationAsimina Dimara, Dimitrios Triantafyllidis, Stelios Krinidis, Konstantinos Kitsikoudis, Dimosthenis Ioannidis, Stavros Antipas, Dimitrios Tzovaras. 238-244 [doi]
- Transfer Learning Model for Disrupting Misinformation During a COVID-19 PandemicRini Raju, Shova Bhandari, Sofia A. Mohamud, Ebrima N. Ceesay. 245-250 [doi]
- Track Prediction of Tropical Cyclones Using Long Short-Term Memory NetworkSandeep Kumar, Koushik Biswas, Ashish Kumar Pandey. 251-257 [doi]
- Monuments Recognition using Deep Learning VS Machine LearningShahd Hesham, Rawan Khaled, Dalia Yasser, Samira Refaat, Nada Shorim, Fatma Helmy Ismail. 258-263 [doi]
- SDPredictNet-A Topology based SDN Neural Routing Framework with Traffic Prediction AnalysisSowmya Sanagavarapu, Sashank Sridhar. 264-272 [doi]
- Row Detection Using a Machine Learning Approach for Autonomous Agriculture VehiclesNiko Anthony Simon, Cheol-Hong Min. 273-276 [doi]
- Indian Premier League Player Selection Model Based on Indian Domestic League PerformanceAmlan Ghosh, Abhirup Sinha, Pritam Mondal, Anusree Roy, Pritilata Saha. 277-282 [doi]
- Pattern Analysis for Transaction Fraud DetectionNicholas Cochrane, Thomas Gomez, John Warmerdam, Moises Flores, Preston Mccullough, Vincent Weinberger, Matin Pirouz. 283-289 [doi]
- Immersive Analytics Application in Smart Agriculture and Animal BehaviorEmilee Klaas, Mehdi Roopaei. 290-296 [doi]
- Analysis of Airbnb Prices using Machine Learning TechniquesJasleen Dhillon, Nandana Priyanka Eluri, Damanpreet Kaur, Aafreen Chhipa, Ashwin Gadupudi, Rajeswari Cherupulli Eravi, Matin Pirouz. 297-303 [doi]
- Analyzing Stance and Topic of E-Cigarette Conversations on Twitter: Case Study in IndonesiaCristin Purnama Sari Kaunang, Fitria Amastini, Rahmad Mahendra. 304-310 [doi]
- Semi-Automatic Reliable Explanations for Prediction in GraphsMasaru Todoriki, Masafumi Shingu, Shotaro Yano, Arseny Tolmachev, Tao Komikado, Koji Maruhashi. 311-320 [doi]
- Determining Level of Service of California HighwaysIsrael Perez, Min Su, Leonardo Yoshida, Manali Ajudiya, Enrique Verduzco, Julian Sandoval, Ryan Perez, Matin Pirouz. 321-328 [doi]
- Quasi-Monte Carlo Integration on the Unit DiskSayan Ghose, Lawrence Pohlman. 329-333 [doi]
- On distributed forest decomposition of graphs with bounded arboricityNarek Hovhannisyan. 334-340 [doi]
- A Self-Updating K-Contingency List for Smart Grid SystemSohini Roy, Arunabha Sen. 341-346 [doi]
- Motion Detection with Segmentation of Optical Flows for Infrared ImagesTrung T. Pham. 347-354 [doi]
- A Broadcasting Heuristic for Hypercube of TreesMohammad Saber Gholami, Hovhannes A. Harutyunyan. 355-361 [doi]
- Understanding the Pandemic Through Mining Covid News Using Natural Language ProcessingNafiz Sadman, Nishat Anjum, Kishor Datta Gupta, M. A. Parvez Mahmud. 362-367 [doi]
- Performance Evaluation of Adaptive Beaconing for High-Speed Wireless LAN Communication With Running Vehicle APsShoya Kobayashi, Tutomu Murase. 368-372 [doi]
- Downlink Interoperability Model of LTE/Wi-Fi Integration/Coexistence With Performance EvaluationAymen I. Zreikat, Ersin Elbasi. 373-379 [doi]
- Proposal of User Cooperative Mobility Control for Higher Throughput in Social Ad Hoc Networks With Dynamic Optimal RoutingTakumi Anjiki, Tutomu Murase. 380-386 [doi]
- Secrecy Enhancement of a Cognitive Two-Way Relay Network with Coordinate InterleavingM. Ajmal Khan. 387-392 [doi]
- Performance Characterization of 64-APSK Mapping Schemes for Uncoded Space-Time Labeling Diversity in Rician Fading ChannelsDauda Ayanda, Peter Akuon, Khadeejah A. Abdulsalam, Adefolarin Bolaji. 393-398 [doi]
- Centralized Route Control for Expanding Coverage by Wireless LAN with Many Vehicle APsRyota Miyazaki, Tutomu Murase. 399-404 [doi]
- Video anomaly detection method based on future frame prediction and attention mechanismChenxu Wang, Yanxin Yao, Han Yao. 405-407 [doi]
- SeVa: A Food Donation App for Smart LivingChristina Varghese, Drashti Pathak, Aparna S. Varde. 408-413 [doi]
- Development of the Protocol for Inter-Autonomous Systems Routing in Software Defined NetworksFred Arineitwe, Jonathan Serugunda, Dorothy Okello. 414-422 [doi]
- Radar Pulse on Pulse Identification Algorithm Hardware Acceleration Performance AnalysisJordan Juliano, Jaron Lin, Alex Erdogan, Kiran George. 423-425 [doi]
- Improving Reward Functions in Robots Playing Capture the Flag Using Q-LearningTrevor Powers, Michael Novitzky, Christopher Korpela. 426-431 [doi]
- Tradeoff and Solutions of Data Storage in Edge ComputingAnnelise Trout, Xiang Cao. 432-438 [doi]
- Optimization of Event Management Activity in Public Health Services Using OpenERP with Quickstart ApproachPutu Dela Apsari Mertadewi, Warih Puspitasari, Muhardi Saputra. 439-444 [doi]
- Private Cloud Tuning for Efficient Inter-Server Simulation ExecutionPavle Ivanovic, Christian Siemers. 445-450 [doi]
- Data Science Techniques to Detect Fraudulent Resource Consumption in the CloudLauren Courtney, Xiang Li, Rongzuo Xu, Joel Coffman. 451-457 [doi]
- Business Continuity Implementation for Data Center EnvironmentsElisa Benetti, Gianluca Mazzini. 458-462 [doi]
- An Online Cost Optimization Algorithm for IaaS Instance Releasing in Cloud EnvironmentsBingbing Zheng, Li Pan, Shijun Liu. 463-469 [doi]
- A Share Quota Manager for the Public AdministrationsEnrica Salbaroli, Andrea Zucchelli, Gianluca Mazzini. 470-474 [doi]
- Election Data Analysis From Clustering Welfare DataTiffany Zhan. 475-479 [doi]
- Emerging Trends in Data Center Management AutomationMoises Levy, Anitha Subburaj. 480-485 [doi]
- Blockchain Simulation: A Web Application for IT EducationXingyu Chen, Zexi Xing, Bishwodeep Karki, Yimin Li, Zhengxin Chen. 486-491 [doi]
- Deep Learning-Based Resolution Prediction of Software Enhancement ReportsMuhammad Ali Arshad, Zhiqiu Huang, Adnan Riaz, Yasir Hussain. 492-499 [doi]
- Analyzing Tweets on New Norm: Work from Home during COVID-19 OutbreakSwapna Gottipati, Kyong Jin Shim, Hui Hian Teo, Karthik Nityan, Shreyansh Shivam. 500-507 [doi]
- Effect of Absolute Cosine Value Regularization on VGG-19William Singleton, Mohamed El-Sharkawy. 508-516 [doi]
- Bayesian Time-Series Analysis to Predict Real-Time Smart Grid Energy Price UncertaintySaeed Ahmadian, Saba Ebrahimi, Heidar Malki. 517-523 [doi]
- CondenseNeXt: An Ultra-Efficient Deep Neural Network for Embedded SystemsPriyank Kalgaonkar, Mohamed El-Sharkawy. 524-528 [doi]
- A Kubernetes CI/CD Pipeline with Asylo as a Trusted Execution Environment Abstraction FrameworkJamal Mahboob, Joel Coffman. 529-535 [doi]
- Online Store for Local Small and Medium BusinessMd. Redwanul Islam, Md. Ishtiaq Kadir, KaziAmena Nasrin, Samia Chowdhury, Tahia Tazin, Mohammad Monirujjaman Khan. 536-541 [doi]
- An Empirical Study in Edge Computing Using AWSJacob Koch, Wei Hao. 542-549 [doi]
- Development of Online Home Sharing Web ApplicationKhondoker Aminuzzaman, Md. Junayed Miah, Md. Anisur Rahman, Mohammad Monirujjaman Khan. 550-553 [doi]
- Parallel Proxy Re-Encryption Workload Distribution for Efficient Big Data Sharing in Cloud ComputingOsama Ahmed Khashan. 554-559 [doi]
- Effectiveness of Discrete Particle Swarm Optimization and Binary Differential Evolution for Process FormationFu-Shiung Hsieh. 560-564 [doi]
- Resilient Cyber-Security Approach For Aviation Cyber-Physical Systems Protection Against Sensor Spoofing AttacksAbdulaziz A. Alsulami, Saleh Zein-Sabatto. 565-571 [doi]
- A Review on Edge Intelligence based Collaborative Learning ApproachesLahiru Welagedara, Janani Harischandra, Nuwan Jayawardene. 572-577 [doi]
- Deep Learning for Optimized Multiuser OFDMA Energy-efficient Wireless TransmissionYuan Xing, Yuchen Qian, Wei Shi, Xuejun Liu, Tianchi Zhao, Cristiano Tapparello. 578-584 [doi]
- Drug Safety Intelligence and AutomationVedant Maniyar, Doina Bein, Marian Sorin Nistor, Stefan Pickl. 585-590 [doi]
- Evaluating the Performances of Memristor, FinFET, and Graphene TFET in VLSI Circuit DesignNaheem Olakunle Adesina, Ashok Srivastava, Md Azmot Ullah Khan. 591-595 [doi]
- FPGA-Based Implementation of MSPWM Utilizing 6-Input LUT for Reference Signal GenerationAmean Al Safi, Ali Al-Khayyat, Zeyad Aklah. 597-602 [doi]
- CSRaaS: Composite Service Rendezvous as a Service for IoT-Based Smart EnvironmentsBenjamin Gooder, Rasib Khan, Paul-Rus Adrian, Kokou Sossoe. 603-609 [doi]
- CoviReader: Using IOTA and QR Code Technology to Control Epidemic Diseases across the USBenjamin Cisneros, Jiani Ye, Chol Hyun Park, Yoohwan Kim. 610-618 [doi]
- Factors Enhancing the Use of Business Intelligence to Support Organizational Learning: A conceptual ModelKenza Finnaoui, El Hassan Megder, Ouafae Zerouali Ouariti. 619-626 [doi]
- A Novel Multi-Hop Routing Protocol for D2D Communications in 5GRana E. Ahmed. 627-630 [doi]
- Cyber-security Enhancement of Smart Grid's Substation Using Object's Distance Estimation in Surveillance CamerasSaeed Ahmadian, Saba Ebrahimi, Heidar Malki. 631-636 [doi]
- Novel CNN and Hybrid CNN-LSTM Algorithms for UWB SNR EstimationArash Abbasi, Huaping Liu. 637-641 [doi]
- App Success Classification Using Machine Learning ModelsBiplab Thapa Magar, Subin Mali, Eman Abdelfattah. 642-647 [doi]
- Novel device detection using RF fingerprintsJosh Robinson, Scott Kuzdeba. 648-654 [doi]
- Optic Disk Extraction and Hard Exudate Identification in Fundus Images using Computer Vision and Machine LearningSudhir Rao Rupanagudi, Varsha G. Bhat, Bharath Kumar Revana, Jeevitha Gowda Chandramouli, Sheetal Devegowda, Darshan G, Kaushik Kumaran, Niyatha Malepati, Laveena Manjunath, Shwetha N, Vaishnavi Ramsali, Vandana C. Shekar, Tarun M. V, Yamini Narayan, Sanjay S. 655-661 [doi]
- Performance of Different Classification Models on National Coral Reef Monitoring DatasetShreeja Dahal, Robert Schaeffer, Eman Abdelfattah. 662-666 [doi]
- Comparison of Two Differential Evolution Approaches for Combinatorial Double AuctionsFu-Shiung Hsieh. 667-671 [doi]
- Data Mining of Twitter Retweets: A Visual and Practical RepresentationTiffany Zhan. 672-676 [doi]
- Cyber-Hero: A Gamification framework for Cyber Security Awareness for High Schools StudentsHani Qusa, Jumana Tarazi. 677-682 [doi]
- Petri Nets Modelling of Assembly Robots CoordinationMowafak Hassan Abdul-Hussin. 683-688 [doi]
- Studying Execution Time and Memory Transfer Time of Image Processing Using GPU CardsAbu Asaduzzaman, Srinivas Jojigiri, Thushar Sabu, Sanath Tailam. 689-695 [doi]
- 4PR-NetsMowafak Hassan Abdul-Hussin. 696-701 [doi]
- Security and Privacy Issues with Virtual Private Voice AssistantsDeeksha Anniappa, Yoohwan Kim. 702-708 [doi]
- Severity Assessment of Cervical Lymph Nodes using Modified VGG-Net, and Squeeze and Excitation ConceptHitesh Tekchandani, Shrish Verma, Narendra D. Londhe, Rajiv Ratan Jain, Avani Tiwari. 709-714 [doi]
- Accelerated Modified Sine Cosine Algorithm for Data ClusteringSaida Ishak Boushaki, Omar Bendjeghaba, Noureddine Brakta. 715-720 [doi]
- Novel Cascade CNN Algorithm for UWB Signal Denoising, Compressing, and ToA EstimationArash Abbasi, Huaping Liu. 721-725 [doi]
- Automotive Feature Coordination based on a Machine-Learning ApproachSven Dominka, Sarah Tabrizi, Michael Mandl, Michael Dübner. 726-731 [doi]
- Unsupervised Emitter Clustering through Deep Manifold LearningJames Stankowicz, Scott Kuzdeba. 732-737 [doi]
- Performance Analysis of Gaussian Normal Basis GF ($2^{m}$) Serial Multipliers and InvertersMahidhar Puligunta, Hayssam El-Razouk. 738-746 [doi]
- Predictive Tracking of a High Capability Malicious UAVJason Brown, Nawin Raj. 747-752 [doi]
- A Lightweight Countermeasure to DIS Attack in RPL Routing ProtocolGe Guo. 753-758 [doi]
- A Study on UAV Operating System Security and Future Research ChallengesShahrear Iqbal. 759-765 [doi]
- Correlation of Cyber Threat Intelligence Data Across Global HoneypotsJay Thom, Yash Shah, Shamik Sengupta. 766-772 [doi]
- A Secure Communication Method for CANBusChol Hyun Park, Yoohwan Kim, Ju-Yeon Jo. 773-778 [doi]
- Effectiveness of Classifiers to Identify Hand Gestures with Motion Capture Coordinate MarkersArifur Rahman, Michael Whitlock, Eman Abdelfattah. 779-784 [doi]
- CombinoChord: A Guitar Chord Generator AppKevin A. Wortman, Nicholas Smith. 785-789 [doi]
- Performance and Predicting of Inbound Logistics Processes Using Machine LearningAbdullah Albadrani, Faisal Alghayadh, Mohamed A. Zohdy, Esam Aloufi, Richard Olawoyin. 790-795 [doi]
- Rapid Detection of Bacteria Using Raman Spectroscopy and Deep LearningKaitlyn Kukula, Denzel Farmer, Jesse Duran, Nishatul Majid, Christie Chatterley, Jeff Jessing, Yiyan Li. 796-799 [doi]
- S-PANET: A Shallow Convolutional Neural Network for Pain Severity Assessment in Uncontrolled EnvironmentAshish Semwal, Narendra D. Londhe. 800-806 [doi]
- Intrusion Detection in Software Defined Network Using Deep Learning ApproachBambang Susilo, Riri Fitri Sari. 807-812 [doi]
- Machine LearningTechniquesfor Detection of Website Phishing: A Review for Promises and ChallengesAmmar Jamil Odeh, Ismail Mohamed Keshta, Eman Abdelfattah. 813-818 [doi]
- A deep learning-based multi-model ensemble method for eye state recognition from EEGMd Shafiqul Islam, Md Moklesur Rahman, Md. Hafizur Rahman, Md Robiul Hoque, Arman Kheirati Roonizi, Md. Aktaruzzaman. 819-824 [doi]
- Which Machine Learning method for outbreaks predictions?Patrick Loola Bokonda, Khadija Ouazzani Touhami, Nissrine Souissi. 825-828 [doi]
- Consensus From Distributed Iterative VotingAgneyi Guha, Abhijit Dasgupta. 829-833 [doi]
- Predictive Analytics of Donors in crowdfunding platforms: A case study on Donorschoose.orgJoel Varma Dirisam, Doina Bein, Abhishek Verma. 834-838 [doi]
- MCTA: Mobile-Coverage Scheme Based on Trust-Aware for Hybrid WSNsChunyang Qi, Jie Huang, Xuejing Zhu, Xiaowen Wang. 839-845 [doi]
- Application of the Spectra of Graphs in Network ForensicsChuck Easttom, Mo Adda. 846-852 [doi]
- A Survey on Security Attacks and Solutions in the IoT NetworkXingwei Liang, Yoohwan Kim. 853-859 [doi]
- On the Use of the SSIM Algorithm for Detecting Intellectual Property Copying in Web DesignChuck Easttom. 860-864 [doi]
- CryptoRevocate: A Cryptographic Accumulator based Distributed Certificate Revocation ListIlker Özçelik, Anthony Skjellum. 865-872 [doi]
- Semiotic Recognition SystemRatik Ratnakar Shetty, Doina Bein, Marian Sorin Nistor, Stefan Pickl. 873-877 [doi]
- AR/VR Tutorial System for Human-Robot TeamingColin Jones, Michael Novitzky, Christopher Korpela. 878-882 [doi]
- Performance of Single Board Computers for Vision ProcessingCurtis Manore, Pratheek Manjunath, Dominic Larkin. 883-889 [doi]
- Credibility-Based Countermeasure Against Slow HTTP DoS Attacks by Using SDNYou-Chiun Wang, Ren-Xuan Ye. 890-895 [doi]
- Digital Transformation as an Agent of Change in a Pharmaceutical Industry from the Perspective of Dynamic CapabilitiesMarcelo Tsuguio Okano, Henry de Castro Lobo dos Santos, Edson Luiz Ursini, William Honorato, Rosinei Batista Ribeiro. 896-902 [doi]
- An Initial Deep CNN Design Approach for Identification of Vehicle Color and Type for Amber and Silver AlertsUma K. Kesava Pillai, Damian Valles. 903-908 [doi]
- Simple Automated Narrative Generator (SANG)Purvish Khalpada, Sanjay Garg. 909-915 [doi]
- Station-level Demand Prediction for Bike-Sharing SystemArthi Akilandesvari Ramesh, Sai Pavani Nagisetti, Nikhil Sridhar, Kenytt Avery, Doina Bein. 916-921 [doi]
- Geometrical evaluation of the Scar in Left ventricle using TDAYashbir Singh, S. Deepa, Wathiq Mansoor, Weichih Hu. 922-925 [doi]
- Design and Feasibility Analysis of NSUGT A Machine Learning-Based Mobile Application for EducationNusrat Jahan, Tasfiqul Ghani, Md. Rasheduzzaman, Yakut Marzan, Sadman Hossain Ridoy, Mohammad Monirujjaman Khan. 926-929 [doi]
- Forensic Requirements Specification for Mobile Device Malware Forensic ModelsAbdullah Mujawib Alashjaee, Michael Haney. 930-935 [doi]
- Evaluation of Recurrent Neural Networks for Detecting Injections in API RequestsSujan Reddy A, Bhawana Rudra. 936-941 [doi]
- A Multi-Layered Defense Approach to Safeguard Against RansomwareAlexander Pagan, Khaled Elleithy. 942-947 [doi]
- Improving Physical Layer Security of Two-Way Cooperative DF System using Modulation DiversityM. Ajmal Khan. 948-953 [doi]
- Anonymous Prediction of Mental Illness in Social MediaSrikanth Tadisetty, Kambiz Ghazinour. 954-960 [doi]
- EEG-based Image Classification using Machine Learning AlgorithmsJahnavi Kachhia, Kiran George. 961-966 [doi]
- Recommend Speciality Doctor from Health Transcription: Ensemble Machine Learning ApproachNafiz Sadman, Md Habibur Rahman, Sumaiya Tasneem, Mohd Ariful Haque, Kishor Datta Gupta. 967-972 [doi]
- Medical Prescription Recognition using Machine LearningEsraa Hassan, Habiba Tarek, Mai Hazem, Shaza Bahnacy, Lobna Shaheen, Walaa H. Elashmwai. 973-979 [doi]
- Using Artificial Intelligence In Enhancing Banking ServicesAya Tarek Elrefai, Mohamed H. Elgazzar, Aliaa N. Khodeir. 980-986 [doi]
- Parallel, True Random Number Generator (P-TRNG): Using Parallelism for Fast True Random Number Generation in HardwareThomas Arciuolo, Khaled M. Elleithy. 987-992 [doi]
- Discord Forensics: The Logs Keep GrowingKyle Moffitt, Umit Karabiyik, Shinelle Hutchinson, Yung Han Yoon. 993-999 [doi]
- ML-based NIDS to secure RPL from Routing AttacksMohammed Aman Kareem, Shahab Tayeb. 1000-1006 [doi]
- Wireless Encryption and WPA2 WeaknessesKyle Moissinac, David Ramos, Giovanna Rendon, Abdelrahman Elleithy. 1007-1015 [doi]
- Modeling the Operating Characteristics of IoT for Underwater Sound ClassificationChristos C. Constantinou, Erricos Michaelides, Ilias Alexopoulos, Theofylaktos Pieri, Stelios Neophytou, Ioannis Kyriakides, Ehson Abdi, Jerald Reodica, Daniel R. Hayes. 1016-1022 [doi]
- Using a Raspberry Pi to prevent an intoxicated driver from operating a motor vehicleJack McShane, Mandy Douglas, Kevin Meehan. 1023-1028 [doi]
- A Hybrid Probabilistic Ensemble based Extreme Gradient Boosting Approach For Breast Cancer DiagnosisMuhammad Sakib Khan Inan, Rizwan Hasan, Fahim Irfan Alam. 1029-1035 [doi]
- Data Quality Visual Analysis (DQVA) A tool to process and pinspot raw data irregularitiesCélio Carvalho, Rui S. Moreira, José Manuel Torres 0003. 1036-1045 [doi]
- Improved Sampling and Feature Selection to Support Extreme Gradient Boosting For PCOS DiagnosisMuhammad Sakib Khan Inan, Rubaiath E. Ulfath, Fahim Irfan Alam, Fateha Khanam Bappee, Rizwan Hasan. 1046-1050 [doi]
- Classifying Sound Sources Based On Directions Using Audio Visual StimulusUrmil Shah, Jonathan Wong, Kiran George. 1051-1054 [doi]
- Red-blue team exercises for cybersecurity training during a pandemicCasimer DeCusatis, J. Bavaro, T. Cannistraci, B. Griffin, J. Jenkins, M. Ronan. 1055-1060 [doi]
- Design and Evaluation of Cascading Cuckoo Filters for Zero-False-Positive Membership ServicesSai Medury, Amani Altarawneh, Anthony Skjellum. 1061-1065 [doi]
- Towards a Secured Blockchain-based Smart GridSalma Samy, Mohamed Azab, Mohamed R. M. Rizk. 1066-1069 [doi]
- Modeling the Tidal Locking Mechanism of the Moon in Function of Inverse-Square Law and Hooke's LawJongmin Kim. 1070-1073 [doi]
- Survey of the Development of Quantum Cryptography and Its ApplicationsDaniel Alvarez, Yoohwan Kim. 1074-1080 [doi]
- Unmanned Aerial Vehicle Kill Chain: Purple Teaming TacticsFahad E. Salamh, Umit Karabiyik, Marcus K. Rogers, Eric T. Matson. 1081-1087 [doi]
- A Fast Stacker Based on Symmetric Stacking, Multiplexing, and Barrel-ShiftingUttam Kumar, Adly T. Fam. 1088-1092 [doi]
- 'Fastest Finger First - Educational Quiz Buzzer' Using Arduino and Seven Segment Display for Easier Detection of ParticipantsMohammad Monirujjaman Khan, Nazifa Tasneem, Yakut Marzan. 1093-1098 [doi]
- Multi-Objective Grid Scheduling for Battery Exchange Stations in Battery Consolidation SystemsDara Nyknahad, Wolfgang Bein, Laxmi Gewali, Rojin Aslani. 1099-1105 [doi]
- Energy Efficient Smart Antenna Beamforming Algorithms for Next-Generation NetworksHailu Belay Kassa, Kevin Kornegay, Ebrima N. Ceesay. 1106-1113 [doi]
- Precision Power Measurements of FPGA-MPSoCsRobert Drehmel, Markus Hefele. 1114-1120 [doi]
- Precoding for Multi-user MIMO Interference Channel: A Signal Set Separation ProblemXuechen Xie, Yong Jin Daniel Kim. 1121-1126 [doi]
- Peer-to-Peer Assisted Off-Grid Message Dissemination in the Failure of Communication InfrastructuresZhaohong Wang, Jing Guo. 1127-1133 [doi]
- Task Processing Energy Minimization Based on Hybrid Mode in D2D-Enabled Fog NetworkAbdalafatah A. Almahi, Xiaoge Huang, Qianbin Chen. 1134-1138 [doi]
- Comparison and Analysis Performance in Topology-Based Routing Protocols in Vehicular Ad-hoc Network (VANET)Mohammed Rajhi, Hatim Madkhali, Ibrahim Daghriri. 1139-1146 [doi]
- Design and Feasibility Analysis of an Artificial Intelligence Based Mobile App for Emergency AmbulanceTasfiqul Ghani, Nusrat Jahan, Md. Rasheduzzaman, Yakut Marzan, Mohammad Monirujjaman Khan. 1147-1150 [doi]
- A Single-Band 28.5GHz Rectangular Microstrip Patch Antenna for 5G Communications TechnologyFardeen Mahbub, Rashedul Islam, Sayed Abdul Kadir Al-Nahiun, Shouherdho Banerjee Akash, Raja Rashidul Hasan, Md. Abdur Rahman. 1151-1156 [doi]
- Optimal Placement of Single Cluster Head in Wireless Sensor Networks via ClusteringZahraa Hammodi, Ahmed Al Hilli, Mohanad Al-Ibadi. 1157-1160 [doi]
- Logarithmic Non-uniform Quantization for List Decoding of Polar CodesMohammad Rowshan, Emanuele Viterbo, Rino Micheloni, Alessia Marelli. 1161-1166 [doi]
- A Wearable Mobile-App Controlled Device for Continuous Monitoring of UV Exposure and Hydration LevelsNoelle R. Benavides, Hayley E. Rutkey, Courteney M. DiDomenico, Tin Wong, Joe Martel-Foley, Chen-Hsiang Yu, Ali Kiapour. 1167-1172 [doi]
- Improved and Efficient Dual-Hop Relaying SystemM. Ajmal Khan. 1173-1178 [doi]
- Shifted Pruning for Path Recovery in List Decoding of Polar CodesMohammad Rowshan, Emanuele Viterbo. 1179-1184 [doi]
- Microstrip Patch Antenna for the Applications of WLAN Systems using S-BandFardeen Mahbub, Shouherdho Banerjee Akash, Sayed Abdul Kadir Al-Nahiun, Rashedul Islam, Raja Rashidul Hasan, Md. Abdur Rahman. 1185-1189 [doi]
- Survey on Context-Aware Healthcare SystemsHamed Vahdat-Nejad, Zahra Abbasi-Moud, Seyed Abolfazl Eslami, Wathiq Mansoor. 1190-1196 [doi]
- Personalized Safety Instruction Recommendation for construction workers Based on Apriori AlgorithmNing Tang, Hao Hu, Feng Xu. 1197-1203 [doi]
- Improving System Performance in Indoor Environment by Designing Femtocell Considering Interference and Mobility ManagementMirza Mohd Shahriar Maswood, Uzzwal Kumar Dey, Sonia Akter, Md Ashif Uddin, Md. Mainul Islam Mamun, Shamima Sultana Sonia, Abdullah G. Alharbi. 1204-1209 [doi]
- COVID-19 Case Number Prediction Utilizing Dynamic Clustering With Polynomial RegressionFelix Zhan. 1210-1214 [doi]
- Natural Language Controlled Real-Time Object Recognition Framework for Household RobotRuchi Bagwe, Rashika Natharani, Kiran George, Anand Panangadan. 1215-1220 [doi]
- Classification Models of Text: A Comparative StudyTiffany Zhan. 1221-1225 [doi]
- Artificial Intelligence Bias Minimization Via Random Sampling Technique of Adversary DataMuat Obaidat, Nila Singh, George Vergara. 1226-1230 [doi]
- Highway Accident Severity Prediction for Optimal Resource Allocation of Emergency Vehicles and PersonnelHani M. Alnami, Imad Mahgoub, Hamzah Al Najada. 1231-1238 [doi]
- Decoding Linguistic Ambiguity in Times of Emergency based on Twitter Disaster DatasetsAustin Hembree, Andrew Beggs, Tiffany Marshall, Ebrima N. Ceesay. 1239-1244 [doi]
- Identifying User Authentication and Most Frequently Used Region Based on Mouse Movement Data: A Machine Learning ApproachMd. Muhaimenur Rahman, Sarnali Basak. 1245-1250 [doi]
- Statistical Post-processing Approaches for Active Infrared Thermography: A Comparative StudyKirandeep Kaur, Ravibabu Mulaveesala. 1251-1255 [doi]
- Image Enhancement by Recursive Correction of its Average BrightnessSergei Yelmanov, Yuriy Romanyshyn. 1256-1262 [doi]
- Channel Equalization for converged OFDM-Based 5G mm-wave A-RoF System at 60 GHzUmar Farooq, Amalia N. Miliou. 1263-1267 [doi]
- Joint Activity Localization and Recognition with Ultra Wideband based on Machine Learning and Compressed SensingLong Cheng, Yifan Wang, Ruogu Jin, Kangnan Dong, ZhaoQi Wu, Yuanchen Zhao. 1268-1273 [doi]
- Computation of Stabilizing Decentralized PI Controllers for Fractional Order TITO (FOTITO) SystemsMiray Günay Bulut, Furkan Nur Deniz. 1274-1280 [doi]
- An Applayed Survey with ESP8266 Lolin + Shield Base with Nextion Touchscreen DisplayAntonio Carlos Bento, José Carmino Gomes, Ellen Martins Lopes da Silva, Marcelo Galdino. 1281-1286 [doi]
- Energy Consumption Analyses for Unmanned Aerial Systems used in Disaster ManagementAbu Asaduzzaman, Abhignan Telakapalli, Fadi N. Sibai. 1287-1293 [doi]
- Adaptive Model Predictive Control for a TORA System under Initial Axial and angular Position DispersionsFawaz F. Al-Bakri, Salwan Obaid Waheed Khafaji, Hasan H. Ali, Laheeb Noori Muhi. 1294-1299 [doi]
- PLC Based a Robust Solution for an Urban Area Water System DilemmaAbdulbasit Alaribi, Abbas Elazhari, Omar A. Zargelin. 1300-1305 [doi]
- A Survey of Teaching PDC Content in Undergraduate CurriculumXiaoyuan Suo, Olga Glebova, David Liu, Alina Lazar, Doina Bein. 1306-1312 [doi]
- Partitioning Mesh for Workload Balance According to the Capability of Each Computing NodeGan Luo, Zhi-guo Zhang. 1313-1318 [doi]
- Towards Embedding Data Provenance in FilesThye Way Phua, Panos Patros, Vimal Kumar 0001. 1319-1325 [doi]
- Test Suite Prioritization with Element and Event Sequences for Android ApplicationsRyan Michaels, Md Khorrom Khan, Renée C. Bryce. 1326-1332 [doi]
- An Optimum Strategy to Control Peltier Device Cold Side TemperatureT. H. Indiketiya. 1333-1338 [doi]
- Short Interval Solar Power Prediction for Energy Harvesting with Low Computation Cost on Edge Computation NetworkYue Chen, Xing Cheng, Yanxin Yao, Bei Wan. 1339-1342 [doi]
- Performance analysis of double-threshold based multi-relay selection with differential modulation for cooperative D2D networkShamganth Kumarapandian, Qasim Zeeshan Ahmed. 1343-1346 [doi]
- A Sensor-based Garbage Gas Detection SystemJunaidy B. Sanger, Lanny Sitanayah, Imam Ahmad. 1347-1353 [doi]
- Mobility management in HetNets consider on QOS and improve ThroughputFereshteh Atri Niasar, Mohammad Jalilvand Aghdam, Mohammad Nabipour, Amir Momen. 1354-1359 [doi]
- Modified Gram Schmidt Based Chaotic Matrix for Compressive Sensing in Cognitive RadioHadeel S. Abed, Hikmat N. Abdullah. 1360-1365 [doi]
- 3D printed capacitive relative pressure sensor for use in a CAE environmentSamia Achouch, Lhoussaine Masmoudi, Pierre Nonnon, Mourad Gharbi. 1366-1369 [doi]
- Data Structures for Ordered Short Character-SequencesSudarshan S. Chawathe. 1370-1376 [doi]
- Evaluation of Machine Learning Architectures in HealthcareYash Verma, Shahab Tayeb. 1377-1382 [doi]
- Monitoring and Data Processing Architecture using the FIWARE Platform for a Renewable Energy SystemsWashington Velasquez, Luis Tobar-Andrade, Ivan Cedeno-Campoverde. 1383-1387 [doi]
- A Divide and Conquer method with Semi-Global Failover for Software Defined NetworksKasra Goravanchi, Ju-Yeon Jo, Yoohwan Kim. 1388-1397 [doi]
- Enhancing Object Detection Using Synthetic ExamplesDavid Hughes, Hao Ji. 1398-1402 [doi]
- An open source SCADA for a solar water pumping system designed for Pakistani ConditionsUsman Ashraf, M. Tariq Iqbal. 1403-1408 [doi]
- Study of Helix Functions and Multi-Source Rauch FiltersMinhTri Tran, Anna Kuwana, Haruo Kobayashi 0001. 1409-1416 [doi]
- Key Factors Influencing the Rise of Current Ransomware Attacks on Industrial Control SystemsMazen Gazzan, Abdullah Alqahtani, Frederick T. Sheldon. 1417-1422 [doi]
- Multi-UAV Full-Duplex Communication Systems for Joint Video Transmission and Flight ControlTao Yu, Shunya Imada, Kiyomichi Araki, Kei Sakaguchi. 1423-1428 [doi]
- Joint Application of Sliding Window and Full-Vector RLNC for Vehicular PlatooningElif Tasdemir, Christopher Lehmann, Frank H. P. Fitzek. 1429-1435 [doi]
- Designing the Clamp System with the Emergency Braking System in the trains by using PLC and SCADAAybike Üstündag, Çetin Gençer. 1436-1441 [doi]
- A Novel Approach to Design the Cell of LTE Cellular Network to Improve the Call Quality and Coverage Area in Rural and Suburban AreaMirza Mohd Shahriar Maswood, Uzzwal Kumar Dey, Md Ashif Uddin, Amit Kumar Ghosh, Md. Mainul Islam Mamun, Shamima Sultana Sonia, Abdullah G. Alharbi. 1442-1447 [doi]
- Automatic Traffic Density Control System with Wireless Speed Limit NotificationPramod Muttigarahalli Shankarappa, Ambar Bajpai. 1448-1452 [doi]
- Delay and Energy Balance for Unmanned Aerial Vehicle NetworksMuhammad I Khalil. 1453-1458 [doi]
- Experimental Study on 3D Fractal Base Antennas Design for Efficient Wi-Fi Energy HarvestingRiken Parekh, Urmil Shah, Kiran George. 1459-1463 [doi]
- Program Equivalence Checking for the Facilitation of Quantum OffloadingJon Speer, Jukka K. Nurminen. 1464-1470 [doi]
- Planning for NB-IoT Smart City Network Deployment in Bandung AreasMaruli Tua Baja Sihotang, Muhammad Imam Nashiruddin, Muhammad Ary Murti. 1471-1477 [doi]
- Analysis and Classification of Basketball Shooting Form Using Wearable Sensor SystemsNathan Kuhlman, Cheol-Hong Min. 1478-1482 [doi]
- Face Liveness Detection Using a sequential CNN techniqueAbdelrahamn Ashraf Mohamed, Marwan Mohamed Nagah, Mohamed Gamal Abdelmonem, Mohamed Yasser Ahmed, Mahmoud El-Sahhar, Fatma Helmy Ismail. 1483-1488 [doi]
- Artificial Neural Networks for (Automotive) Embedded Control - A Comparative StudySven Dominka, Henrik Smith, Benjamin Hartmann. 1489-1494 [doi]
- Detection of High Germ Spreading ActivitiesAlex Eayrs, Cheol-Hong Min. 1495-1500 [doi]
- Diabetes prognosis using white-box machine learning framework for interpretability of resultsPathan Faisal Khan, Kevin Meehan. 1501-1506 [doi]
- TCP Congestion Control with Multiagent Reinforcement and Transfer LearningShahrukh Khan Kasi, Saptarshi Das, Subir Biswas. 1507-1513 [doi]
- Detection and Classification of Power Quality Disturbances Using Variational Mode Decomposition and Convolutional Neural NetworksWeimin Deng, Da Xu, Yuhan Xu, Mengshi Li. 1514-1518 [doi]
- Vulnerability Detection in C/C++ Source Code With Graph Representation LearningYuelong Wu, Jintian Lu, Yunyi Zhang, Shuyuan Jin. 1519-1524 [doi]
- Exploring Trade-offs in Parallel Beam-ACOJeffrey Hajewski, Suely Oliveira, David E. Stewart, Laura Weiler. 1525-1534 [doi]
- A new approach for detection Alzheimer's Disease with machine learning using Whole Genomic and Single Nucleotide Polymorphism-Chip dataAhmed Samir, Fairuz Soufy, Omar Ehab, Sara Hassan, Lobna Shaheen, Ashraf AbdelRaouf, Nourhan Elsamanodie, Omar Eldemerdash, Rawan AL-Kady, Lamiaa N. Hammad, Mohamed H. Shahin. 1535-1540 [doi]
- Efficient Evolution of Variational AutoencodersJeffrey Hajewski, Suely Oliveira. 1541-1550 [doi]
- Kalman Filter and its Application on Tuning PI Controller ParametersIndrajit Pandey, Atanu Panda, Parijat Bhowmick. 1551-1556 [doi]
- Implementation of Reversible Logic Gates with Quantum GatesMummadi Swathi, Bhawana Rudra. 1557-1563 [doi]
- Near term implementation of Shor's Algorithm using QiskitCasimer DeCusatis, Emily Mcgettrick. 1564-1568 [doi]
- A Reliable Energy and Spectral Efficient Spectrum Sensing Approach for Cognitive Radio Based IoT NetworksMohammad Amzad Hossain, Michael Schukat, Enda Barrett. 1569-1576 [doi]
- An Experimental Study of TSN-NonTSN CoexistenceSameer Chouksey, Hariram Selvamurugan Satheesh, Johan Åkerberg. 1577-1584 [doi]
- A Scalable Multicast Hybrid Broadband Crossbar Wavelength Selective Switch For DatacentersAkhilesh S. P. Khope, Roger J. Helkey, Songtao Liu, Adel A. M. Saleh, Rod C. Alferness, John E. Bowers 0001. 1585-1587 [doi]
- Noise Evolution and Analysis of long Repeated/Regenerated IMDD LinksFredy Francis, R. Manivasakan. 1588-1593 [doi]