Abstract is missing.
- Robust Supervisory Control for Cyber-Physical Systems based on Discrete Timed Petri netsFu-Shiung Hsieh. 1-6 [doi]
- Predicting the Outcome of Soccer Matches Using Machine Learning and Statistical AnalysisHaytham Elmiligi, Sherif Saad. 1-8 [doi]
- Email phishing detection based on naïve Bayes, Random Forests, and SVM classifications: A comparative studyMustafa Al-Fayoumi, Ammar Jamil Odeh, Ismail Mohamed Keshta, Abobakr Aboshgifa, Tareq AlHajahjeh, Rana Abdulraheem. 7-11 [doi]
- Space Selection and Abstraction in Set Theoretic EstimationAlbert H. Carlson, Shivanjali Khare, Indira Kalyan Dutta, Bhaskar Ghosh, Michael W. Totaro. 12-20 [doi]
- Coherence of Hand Muscles During Activities of Daily LivingBrendan P. Beauchamp, Samhita Rhodes, Nabeeh Kandalaft. 21-24 [doi]
- Determination of 3D Coordinates of Objects from Image with Deep Learning ModelMd. Rasel Hossain, Md. Mahbubur Rahman, Mohammad Rezaul Karim, Md. Jaki Al Amin, Chinmay Bepery. 25-30 [doi]
- Development of an IoT Based Health Monitoring System for e-HealthMd. Julhas Hossain, Md. Amdadul Bari, Mohammad Monirujjaman Khan. 31-37 [doi]
- Electricity Consumption Prediction Model for Southern Luzon State University-Main Campus Using Artificial Neural NetworkAubee T. Mahusay, Senen D. Fenomeno. 38-44 [doi]
- Automated Feature Reduction in Machine LearningDavid Shilane. 45-49 [doi]
- Classification of Stroke Victims through Supervised Machine Learning Algorithms and Ensemble LearningDalton Hensley, Heba Elgazzar. 58-64 [doi]
- Privacy and Security in Mobile Health Technologies: Challenges and ConcernsAmmar Jamil Odeh, Ismail Mohamed Keshta, Abobakr Aboshgifa, Eman Abdelfattah. 65-71 [doi]
- Smart Recon: Network Traffic Fingerprinting for IoT Device IdentificationJay Thom, Nathan Thom, Shamik Sengupta, Emily M. Hand. 72-79 [doi]
- Review of Deep Learning Methods for Automated Sleep StagingMasoud Malekzadeh, Parisa Hajibabaee, Maryam Heidari, Brett Berlin. 80-86 [doi]
- Analysis of Reinforcement Learning in Autonomous VehiclesEstephanos Jebessa, Kidus Olana, Kidus Getachew, Stuart Isteefanos, Tauheed Khan Mohd. 87-91 [doi]
- Offensive Language Detection on Social Media Based on Text ClassificationParisa Hajibabaee, Masoud Malekzadeh, Mohsen Ahmadi, Maryam Heidari, Armin Esmaeilzadeh, Reyhaneh Abdolazimi, James H. Jones Jr.. 92-98 [doi]
- Feed-Forward Intrusion Detection and Classification on a Smart Grid NetworkAdedayo Aribisala, Mohammad S. Khan, Ghaith Husari. 99-105 [doi]
- Real-Time Motion Tracking System and Data Analytics for Live Insects Using Three-Wheeled Servosphere SystemNicholas Lee, Dal Hyung Kim. 106-111 [doi]
- MapReduce Preprocess of Big Graphs for Rapid Connected Components DetectionReyhaneh Abdolazimi, Maryam Heidari, Armin Esmaeilzadeh, Hassan Naderi. 112-118 [doi]
- Challenges Faced by Industries and Their Potential Solutions in Deploying Machine Learning ApplicationsRaj Mani Shukla, John Cartlidge. 119-124 [doi]
- Fine-Grained Chinese Named Entity Recognition Based on MacBERT-Attn-BiLSTM-CRF ModelJueyang Wang, Shuzhen Li, Edward Agyemang-Duah, Xingyu Feng, Chun Xu, Yuao Ji, Junqiang Liu. 125-131 [doi]
- Analysis of the use of Analytics Platform for the Commercial Value of Mud crab Production using Non-parametric ModelRossian V. Perea, Enrique D. Festijo. 132-137 [doi]
- Scalable Hindsight Experience Replay based Q-learning Framework with Explainability for Big Data Applications in Fog ComputingBhargavi Krishnamurthy, Sajjan G. Shiva. 138-144 [doi]
- Interrelating N-gram based Protein Sequences using LSTMs with Parallel Capsule RoutingSashank Sridhar, Sowmya Sanagavarapu. 145-151 [doi]
- Early Rumor Detection based on Data Augmentation and Pre-training TransformerYanjun Hu, Xinyi Ju, Zhousheng Ye, Sulaiman Khan, Chengwu Yuan, Qiran Lai, Junqiang Liu. 152-158 [doi]
- Betti-Number Based Machine-Learning Classifier Frame-work for Predicting the Hepatic Decompensation in Patients with Primary Sclerosing CholangitisYashbir Singh, William Jons, Joseph D. Sobek, John E. Eaton, Bradley J. Erickson, Barrett J. Anderies, Jaidip Jagtap. 159-162 [doi]
- Handwritten Digit Recognition using Convolution Neural NetworksShailesh S. Rajput, Yoonsuk Choi. 163-168 [doi]
- Skin Cancer Detection using Convolutional Neural NetworkDipu Chandra Malo, Md. Mustafizur Rahman, Jahin Mahbub, Mohammad Monirujjaman Khan. 169-176 [doi]
- Optimize Path Planning for UAV COVID-19 Test Kits Delivery System by Hybrid Reinforcement LearningYuan Xing, Charles Carlson, Holly Yuan. 177-183 [doi]
- A Study on Application Category Estimation Method Based on Burst Characteristics of CommunicationHiroshi Aoki, Takashi Ozu, Akio Hasegawa, Hiroyuki Yokoyama. 184-190 [doi]
- Design of a Machine Learning Based Intrusion Detection Framework and Methodology for IoT NetworksRicardo Manzano S, Nishith Goel, Marzia Zaman, Rohit Joshi, Kshirasagar Naik. 191-198 [doi]
- Analysis of Transfer Learning Models for Face Mask DetectionÖzge Yücel Kasap, Duygu Cakir. 199-202 [doi]
- Predictive Analysis & Brief Study of Early-Stage Diabetes Using Multiple Classifier ModelsMohammad Sadman Tahsin, Md Jobayer, Md. Borhan Uddin Antor, Maidul Islam, Fatima Fairuz Raisa, Md. Al Hasan Shaikat. 203-207 [doi]
- Instance-based Supervised Machine Learning Models for Detecting GPS Spoofing Attacks on UASGhilas Aissou, Selma Benouadah, Hassan El Alami, Naima Kaabouch. 208-214 [doi]
- A Survey on Mobile Malware Detection Methods using Machine LearningMina Esmail Zadeh Nojoo Kambar, Armin Esmaeilzadeh, Yoohwan Kim, Kazem Taghva. 215-221 [doi]
- Bimodal Key Data and Semantic AnalysisVictor Corja, Austin Ryan Crow, Nannan Liu, Ebrima Ceesay. 222-228 [doi]
- Forecasting Water Inflow for Bang Lang DamAkmal Benhawan, Sureena Matayong, Chidchanok Choksuchat. 229-233 [doi]
- The Effect of Singular-Vectors Feature Selection (SVFS) Based Hyper Dimentionality Framework in Ligand-Based Virtual ScreeningAya A. Mostafa, Sameh A. Salem, Amr E. Mohamed. 234-240 [doi]
- Predicting Bicycle Package Delivery Demand Using Historical Spatiotemporal DataSudarshan S. Chawathe. 241-247 [doi]
- Case study for Data Center Distributed MonitoringElisa Benetti, Matteo Fracassetti, Gianluca Mazzini. 248-253 [doi]
- Solutions for Closing Usage Gap in Rural Areas in West AfricaIda Sèmévo Tognisse, Jules Degila, Ahmed Dooguy KORA. 254-259 [doi]
- The Role of User's Native Language in Mis/Disinformation Detection: The Case of EnglishKevin Matthe Caramancion. 260-265 [doi]
- Detection of Hate Speech Texts Using Machine Learning AlgorithmMahamat Saleh Adoum Sanoussi, Chen Xiaohua, George K. Agordzo, Mahamed Lamine Guindo, Abdullah M. M. A. Al Omari, Boukhari Mahamat Issa. 266-273 [doi]
- Efficient Large Scale NLP Feature Engineering with Apache SparkArmin Esmaeilzadeh, Maryam Heidari, Reyhaneh Abdolazimi, Parisa Hajibabaee, Masoud Malekzadeh. 274-280 [doi]
- Privacy-Preserving Federated Learning Model for Healthcare DataTanzir Ul Islam, Reza Ghasemi, Noman Mohammed. 281-287 [doi]
- Employability Prediction of Engineering Graduates Using Ensemble Classification ModelingRenato R. Maaliw, Karen Anne C. Quing, Ace C. Lagman, Bernard Haber Ugalde, Melvin A. Ballera, Michael Angelo D. Ligayo. 288-294 [doi]
- Development A Web Application for Lawyer and Client Virtual CommunicationDipta Voumick, Sreyasi Sen, Nusher Jamil Kazi, Homaira Islam Parisa, Mohammad Monirujjaman Khan, Priyanka Dixit. 295-301 [doi]
- Factors Affecting Vietnamese People's Intention to Buy Health Care Products Online During COVID-19Giang Nguyen Thi Phuong, Do Thi Bich Tram, Le Thi Anh Hang, LeThi My Nhien, Nguyen Binh Phuong Duy. 302-309 [doi]
- A Comparative Analysis of the Ensemble Models for Detecting GPS Spoofing attacks on UAVsAydan Gasimova, Tala Talaei Khoei, Naima Kaabouch. 310-315 [doi]
- Ransomware Classification and Detection With Machine Learning AlgorithmsMohammad Masum, Md Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo 0001, Muhaiminul Islam Adnan. 316-322 [doi]
- ECG Data Analysis with IoT and Machine LearningAbhigya Pote Shrestha, Chen-Hsiang Yu. 323-327 [doi]
- A Light Boosting-based ML Model for Detecting Deceptive Jamming Attacks on UAVsHadjar Ould Slimane, Selma Benouadah, Tala Talaei Khoei, Naima Kaabouch. 328-333 [doi]
- Autonomous Valet Parking with Asynchronous Advantage Actor-Critic Proximal Policy OptimizationTeckchai Tiong, Ismail Saad, Kenneth Tze Kin Teo, Herwansyah Bin Lago. 334-340 [doi]
- Real-time face mask detection for COVID-19 preventionMohammad Rezaul Karim Sujon, Md. Rasel Hossain, Md. Jaki Al Amin, Chinmay Bepery, Md. Mahbubur Rahman. 341-346 [doi]
- Bangla Food Review Sentimental Analysis using Machine LearningMohd. Istiaq Hossain Junaid, Faisal Hossain, Udyan Saha Upal, Anjana Tameem, Abul Kashim, Ahmed Fahmin. 347-353 [doi]
- Efficient Email phishing detection using Machine learningRana Abdulraheem, Ammar Jamil Odeh, Mustafa Al-Fayoumi, Ismail Keshta. 354-358 [doi]
- Alternative Methodology and Framework for Assessing Differential Privacy Constraints and Consequences From a GDPR PerspectiveDmitry Prokhorenkov. 359-364 [doi]
- Convolutional neural network implementations using Vitis AIAkihiko Ushiroyama, Minoru Watanabe, Nobuya Watanabe, Akira Nagoya. 365-371 [doi]
- Lightweight Computer Vision System for Automated Weed MappingSaad Abouzahir, Mohamed Sadik, Essaid Sabir. 372-376 [doi]
- U.S. Wildfire Risks and PreventionTenzin Sherpa, Eman Abdelfattah, Kristin Miyamoto, Tiffany La Torre. 377-384 [doi]
- Contactless Payments through E-wallets on Mobile Devices in the Context of Covid 19 at VietNamNguyen Binh Phuong Duy, Giang Nguyen Thi Phuong. 385-392 [doi]
- Sentiment Analysis High_School' Feedback for Predicting Career PossibilitiesGiang Nguyen Thi Phuong, Danh Thi Ngoc Anh, Truong Minh Tuan. 393-398 [doi]
- A Machine Learning and Explainable AI Approach for Predicting Secondary School Student PerformanceKhan Md. Hasib, Farhana Rahman, Rashik Hasnat, Md. Golam Rabiul Alam. 399-405 [doi]
- Autoregressive Modeling of Utility Customer Outages with Deep Neural NetworksKingsley Udeh, David W. Wanik, Diego Cerrai, Derek Aguiar, Emmanouil N. Anagnostou. 406-414 [doi]
- An FPGA-based Piecewise Linear Spiking Neuron for Simulating Bursting BehaviorXiaomei Pi, Xianghong Lin. 415-420 [doi]
- On Label Languages of Homogeneous Variant of SNPSSP (HSNPSSP)Prithwineel Paul, Soumadip Ghosh. 421-427 [doi]
- Interpretable Learning Model for Lower Dimensional Feature Space: A Case study with Brown Spot Detection in Rice LeafMd Amit Khan, Nafiz Sadman, Kishor Datta Gupta, Jesan Ahammed Ovi. 428-434 [doi]
- Evaluation of the Deep Learning-Based m-Health Application Using Mobile App Development and Assessment GuideChristopher G. Estonilo, Enrique D. Festijo. 435-440 [doi]
- Using EEG and fNIRS Signals as PolygraphMohammad Affan Khalil, Maria Ramirez, Kiran George. 441-445 [doi]
- Performance Analysis of Convolutional Neural Network Architectures for the Identification of COVID-19 from Chest X-ray ImagesTanvir Anjum, Tanzil Ebad Chowdhury, Shadman Sakib, Shafkat Kibria. 446-452 [doi]
- MLOps - Definitions, Tools and ChallengesGeorgios Symeonidis, Evangelos Nerantzis, Apostolos Kazakis, George A. Papakostas. 453-460 [doi]
- Analysis and Exploratory of Lecture Preparation Process to Improve the Conformance using Process MiningRia Rahmawati, Rachmadita Andreswari, Rokhman Fauzi. 461-466 [doi]
- Analysing Tweets on COVID-19 Vaccine: A Text Mining ApproachSwetha Gottipati, Debashis Guha. 467-474 [doi]
- Detection of Northern Corn Leaf Blight Disease in Real Environment Using Optimized YOLOv3Brian Song, JeongKyu Lee. 475-480 [doi]
- A Lightweight Multilayer Machine Learning Detection System for Cyber-attacks in WSNShereen Ismail, Diana Dawoud, Hassan Reza. 481-486 [doi]
- Android GUI Test Generation with SARSAMd Khorrom Khan, Renée C. Bryce. 487-493 [doi]
- Performance Analysis of Deep Learning Architectures in Classifying Calamansi (Citrofortunella microcarpa)Epie F. Custodio, Alexander A. Hernandez. 494-500 [doi]
- A Novel Skeleton-based Model with Spine for 3D Human Pose EstimationZhaoxu Li, Sheng Liu, Jue Bai, Chenglei Peng, Yang Li, Sidan Du. 501-506 [doi]
- Optimize Mobile Wireless Power Transfer by Finite State Machine Reinforcement LearningYuan Xing, Riley Young, Giaolong Nguyen, Maxwell Lefebvre, Tianchi Zhao, Haowen Pan. 507-512 [doi]
- Improving the Machine Learning Prediction Accuracy with Clustering DiscretizationChunlan Gao, Yanqing Zhang, Dan Lo 0001, Yong Shi, Jian Huang. 513-517 [doi]
- Benchmarking Conventional Vision Models on Neuromorphic Fall Detection and Action Recognition DatasetKarthik Sivarama Krishnan, Koushik Sivarama Krishnan. 518-523 [doi]
- Software Development Models for IoTShereen Ismail, Diana W. Dawoud. 524-530 [doi]
- Measuring Consistency Metric for Web ApplicationsLevent Dane, Deniz Gurkan. 531-537 [doi]
- My Diary: A Web Application to Accumulate Necessary FilesNazifa Tasneem, Md Anik Hasan, Yakut Marzan, Mohammad Monirujjaman Khan. 538-544 [doi]
- Monitoring Audio Training Learning Outcomes with EEG DataFrancis Liri, Abel Desoto, Wendy Catalan, Kiran George, Kenneth Faller, Julia Drouin. 545-551 [doi]
- Optimizing constraint driven container orchestration policies in a cloud environmentAbhishek Das, J. Tarun Gupta, N. Sanketh Reddy, Phalachandra Hallymysore. 552-560 [doi]
- Development of Smart Telemedicine SystemAjan Ahmed, Mohammad Monirujjaman Khan. 561-567 [doi]
- An IoT-Based Cloud Solution for Intelligent Integrated Rice-Fish Farming Using Wireless Sensor Networks and Sensing Meteorological ParametersMd Ashif Uddin, Uzzwal Kumar Dey, Shamama Ahmed Tonima, Toriqul Islam Tusher. 568-573 [doi]
- Development of Scoliotic Spine Severity Detection using Deep Learning AlgorithmsNahid Ameer Makhdoomi, Teddy Surya Gunawan, Nur Hanani Idris, Othman Omran Khalifa, Rajandra Kumar Karupiah, Arif Bramantoro, Farah Diyana Abdul Rahman, Zamzuri Zakaria. 574-579 [doi]
- Lessons Learned from the Initial Development of a Brain Controlled Assistive DeviceEllen Ketola, Christopher Lloyd, Dylan Shuhart, Josiah Schmidt, Raigan Morenz, Abul Khondker, Masudul H. Imtiaz. 580-585 [doi]
- Secure Access Service Edge: A Zero Trust Based Framework For Accessing Data SecurelySilafu Yiliyaer, Yoohwan Kim. 586-591 [doi]
- Design, Implementation and Performance of an Edge Computing Prototype Using Raspberry PisTyler Gizinski, Xiang Cao. 592-601 [doi]
- Goals and Solutions of Data Allocation in Data CenterXiang Cao. 602-607 [doi]
- Cloud-Based Produce Market for Independent Farmers, Grocers, and RetailersSakik Al Sajid, Syeda Natasha Nafreen, Al Amin Sogah, Md Ferdous Alam, Mohammad Monirujjaman Khan. 608-612 [doi]
- FPGA Implementation of Radio Frequency Neural NetworksAmit Bhatia, Josh Robinson, Joseph M. Carmack, Scott Kuzdeba. 613-618 [doi]
- Optical Flow-Based Place Recognition: Bridging the Gap Between Simulation and Real-World ExperimentsSotirios Ch. Diamantas, Prithviraj Dasgupta. 619-624 [doi]
- An Intelligent System for Safely Managing Traffic Flow of Connected Autonomous Vehicles at Multilane Intersections in Smart CitiesAmin Sahba, Ramin Sahba. 625-631 [doi]
- Approaches for migrating non cloud-native applications to the cloudAbhigna L. Shastry, Devika S. Nair, B. Prathima, C. P. Ramya, Phalachandra Hallymysore. 632-638 [doi]
- Modeling a simulated Forest to get Burning Times of Tree Species using a Digital TwinGuillermo Sanchez-Guzman, Washington Velasquez, Manuel S. Alvarez-Alvarado. 639-643 [doi]
- A Comparitive Study of Machine Learning Algorithms for Identifying Mental States from EEG RecordingsChuck Easttom, Izzat Alsmadi. 644-648 [doi]
- The Design of High Efficiency Voltage Mode Integrated Converter for Glucose Monitoring SystemsKavyashree Puttananjegowda, Majdi M. Ababneh, Sylvia Thomas. 649-653 [doi]
- NTRU and LASH for a Quantum Resistant BlockchainChuck Easttom. 654-658 [doi]
- Reversible Audio Data Hiding using Samples Greatest Common Factor and Audio InterpolationFariz Ardin Adhiyaksa, Moh. Muzayyin Amrulloh, Tanzilal Mustaqim, Hilya Tsaniya, Hudan Studiawan, Ary Mazharuddin Shiddiqi. 659-666 [doi]
- Security Analysis of a Key Exchange Protocol under Dolev-Yao Threat Model Using Tamarin ProverSingam Bhargav Ram, Vanga Odelu. 667-672 [doi]
- Smart Helmet with Rear View and Accident Detection System for Increased SafetyAjan Ahmed, Mohammad Monirujjaman Khan, Rajesh Dey, Ipseeta Nanda. 673-678 [doi]
- Modelling and Analysis of a Vertical Wall Robot for Ceiling InspectionRizuwana Parween, Tan Yeh Wen, Mohan Rajesh Elara. 679-687 [doi]
- Estimation of Sloshing Motion in a Wheel-based Drain Inspection RobotRizuwana Parween, Povendhan Arthanaripalayam Palanisamy, Tan Yeh Wen, Dylan Ng Terntzer, Mohan Rajesh Elara. 688-693 [doi]
- A comparative analysis of Buffer Overflow vulnerabilities in High-End IoT devicesBlas Molina Calatayud, Liam Meany. 694-701 [doi]
- Analysis and Prevention of Security Vulnerabilities in a Smart CityBen Lupton, Mackenzie Zappe, Jay Thom, Shamik Sengupta, Dave Feil-Seifer. 702-708 [doi]
- The Impact of Purchasing Cyber Insurance on the Enhancement of Operational Cyber Risk Mitigation of U.S. Banks - A Case StudyThomas F. Watson, Kutub Thakur, Md Liakat Ali. 709-715 [doi]
- Image Encryption Through Rössler System, PRNG S-Box and Recamán's SequenceMohamed ElBeltagy, Wassim Alexan, Abdelrahman Elkhamry, Mohamed Moustafa, Hisham H. Hussein. 716-722 [doi]
- A panorama of the implementation of the General Law for the Protection of Personal Data (LGPD) in Brazil: an exploratory surveyLamara Ferreira, Marcelo Tsuguio Okano, Fernanda Aguiar, Henry de Castro Lobo dos Santos, Edson Luiz Ursini. 723-729 [doi]
- Best Practices to Secure API Implementations in Core Banking System (CBS) in BanksMahbub Ul Alam, Muhammad Abul Kalam Azad 0003, Md. Showkat Ali. 730-735 [doi]
- Blockchain Based Secured Multipurpose Identity (SMID) Management System for Smart CitiesAbrarul Hassan Rahat, Mamunur Rashid Rumon, Tassnim Jaman Joti, Humayra Tasnin, Tania Akter, Arif Shakil, Md. Iqbal Hossain. 737-744 [doi]
- Detecting and Classifying Self-Deleting Windows Malware Using Prefetch FilesAdam Duby, Teryl Taylor, Gedare Bloom, Yanyan Zhuang. 745-751 [doi]
- Evolution of Firewalls: Toward Securer Network Using Next Generation FirewallJunyan Liang, Yoohwan Kim. 752-759 [doi]
- A Framework for Open Source Intelligence Penetration Testing of Virtual Health Care SystemsCasimer DeCusatis, Patrick Peko, Jordan Irving, Maxwell Teache, Christopher Laibach, Jason Hodge. 760-764 [doi]
- A Cybersecurity Awareness Escape Room using Gamification Design PrinciplesC. DeCusatis, B. Gormanly, E. Alvarico, O. Dirahoui, J. McDonough, B. Sprague, M. Maloney, D. Avitable, B. Mah. 765-770 [doi]
- Physical Layer Security Improvement of Dual-Hop Dual-Relay Network Using Signal Space DiversityM. Ajmal Khan, Firas Hassan, Rhys Davies. 771-775 [doi]
- Evil-Twin Browsers: Using Open-Source Code to Clone Browsers for Malicious PurposesMathew David Salcedo, Mehdi Abid, Yoohwan Kim, Ju-Yeon Jo. 776-784 [doi]
- DER Communication Networks and Their Security IssuesKi Chan, Yoohwan Kim, Ju-Yeon Jo. 785-790 [doi]
- An Overview on Detection and Prevention of Application Layer DDoS AttacksSamuel Black, Yoohwan Kim. 791-800 [doi]
- States of Attack Under Incomplete InformationAliyu Tanko Ali, Damas P. Gruska. 801-807 [doi]
- Privacy Attacks Based on Correlation of Dataset Identifiers: Assessing the RiskOleksii Podoliaka, Virginia Mushkatblat, Adam Kaplan. 808-815 [doi]
- Improved Control Strategy for 4 WD Electric Vehicle Using Direct Torque Control Technique with Space Vector ModulationZuhair Alqarni. 816-822 [doi]
- A Brief Survey of Fault Tolerant Techniques for Field Programmable Gate ArraysRaihana Yarzada, Divya Singh, Hussain Al-Asaad. 823-828 [doi]
- Technoeconomic Analysis for Microgrid Renewable Energy with Battery and Hydrogen StorageTeckchai Tiong, Kiing-Ing Wong, Wei Kitt Wong, Ing Ming Chew. 829-835 [doi]
- Throughput Improvement in Vehicular Communication by Using Low Density Parity Check (LDPC) CodeUtpal Kumar Dey, Robert Akl, Robin Chataut. 836-843 [doi]
- Achieving High Gain Performance for 5G Millimeter-Wave Transmission with Large Communication Transmission LossOmar Almesbahi, Abdullah Alqadhi, Mahmood Almesbahi. 844-850 [doi]
- PARADA: Parking Space Rental and Leasing Application SystemIrene L. Balmes, Riva Mae P. Alejandro, Jose Miguel L. Gamo, Angelu Merry T. Ilagan. 851-856 [doi]
- Design of 2*1 Patch Array Antenna for 5G Communications Systems using mm-wave Frequency BandMd. Abdul Kader Jilani, Md Arman Hossain, Farzana Yeasmin Lamia, Md. Afzalur Rahman, Adiba Haque Sharker, Md. Rezwanul Ahsan. 857-862 [doi]
- Load balancing call admission control algorithm (CACA) based on soft-handover in 5G NetworksAymen I. Zreikat. 863-869 [doi]
- Design and Implementation of Mobile Applications for Military Personnel Based on SIP (Session Initiation Protocol)Sandhya Hizrian Sabila, I Wayan Mustika, Selo Sulistyo. 870-875 [doi]
- Assessing 3.5 GHz Frequency for 5G New Radio (NR) Implementation in Indonesia's Urban AreaPutri Rahmawati, Muhammad Imam Nashiruddin, Ahmad Tri Hanuranto, Akhmad Akhmad. 876-882 [doi]
- Simulation of 5G Dense-Urban Deployment at 3.5 GHz Frequency: A Case Study of Central JakartaMuhammad Adam Nugraha, Muhammad Imam Nashiruddin, Ahmad Tri Hanuranto, Akhmad Akhmad. 883-888 [doi]
- Simulation and Experimental Study of a Power Amplifier Behaviour to Enhance Relay Node Co-operative SDR Platform: Performance AnalysisRandy Verdecia-Peña, José I. Alonso. 889-894 [doi]
- MPTCP Performance Simulation in Multiple LEO Satellite EnvironmentChol Hyun Park, Phillipe Austria, Yoohwan Kim, Ju-Yeon Jo. 895-899 [doi]
- Message Parsing Based on Structure Description in IoT for Electric Power and Energy SystemsRuizhe Ma, Chong Tan, Hong Liu, Min Zheng. 900-906 [doi]
- Reliable Multicast of Dynamic Content Streams from AMQP to NORM Protocol-based SystemsAmbar Prajapati. 907-914 [doi]
- A Scalable Self-Learning Chatbot for ClassroomChristopher Martin 0010, Yanyan Li. 915-921 [doi]
- Implementation and evaluation of spectrum sharing technology using smart contractsNobuo Suzuki, Tatsuya Yoshioka, Akio Hasegawa, Hiroyuki Yokoyama, Toshiyuki Maeyama. 922-928 [doi]
- Study on the Nano-plasmonics and Plasmonic Materials to Improve Photon Absorption in Optical DevicesRichard Kyung, Daniel Seungmin Lee. 929-932 [doi]
- An Investigation of Clinical Laser Applications in Dentistry; a Review and OutlookMatineh Ghafoorian Eshghi, Zahra Amiri, Morteza Modarresi Asem. 933-942 [doi]
- Securing Wireless Signals using Artificial Phase NoiseM. Ajmal Khan, Rhys Davies, Firas Hassan. 943-947 [doi]
- Optimization of Survivability of a Mission Critical System in the Presence of Hardware TrojansMohammad Rahman, Laurent Njilla, Swastik Brahma. 948-952 [doi]
- The Role of a Light-Based Quantum Computational Model in the Creation of an Oscillating UniversePravir Malik. 953-959 [doi]
- A Multi-level Morphological and Stochastic Tagalog Stemming TemplateGreat Allan Ong, Melvin A. Ballera. 960-965 [doi]
- User-Centered Design to Improve Personal Development In Comic ApplicationRicky Djamaluddin, Yudi Priyadi, Eko Darwiyanto. 966-973 [doi]
- Usability Measurement in User Interface Design Using Heuristic Evaluation & Severity Rating (Case Study: Mobile TA Application based on MVVM)Muhammad Irsyad Sabiqun Bil Khairat, Yudi Priyadi, Monterico Adrian. 974-979 [doi]
- An Interference Elimination Algorithm for Group Brain-Computer Interface SystemHaiying Ren, Xinxuan Huang, Xiaoyong Tang. 980-982 [doi]
- Rate-Configurable SC-LDGM Codes Concatenated with Zipper Codes for Optical CommunicationYixin Wang, Xiao Ma. 983-987 [doi]
- Collaborative Route Management to Mitigate Congestion in Multi-Domain Networks Using SDNYou-Chiun Wang, Li-Chia Yen. 988-994 [doi]
- Dynamic On-Demand Virtual Extensible LAN Tunnels via Software-Defined Wide Area NetworksGieorgi Zakurdaev, Mohammed Ismail, Chung-Horng Lung. 995-1000 [doi]
- Novel Encoding method for Quantum Error CorrectionMummadi Swathi, Bhawana Rudra. 1001-1005 [doi]
- An Empirical Model for 1-D Molecular Communication Diffusive Channels Under Reflecting and Absorbing Boundary ConditionsSaqer Alhloul, Uri Rogers. 1006-1010 [doi]
- Performance Analysis of Filter Bank Multicarrier with Doppler Effect in Vehicle to Vehicle Communication ChannelHasna Hanifah Suranto, Titiek Suryani. 1011-1017 [doi]
- Assessing the Information Capacity of Image Based on the Theory of ContrastSergei Yelmanov, Yuriy Romanyshyn. 1018-1023 [doi]
- Application of Convolutional Neural Network for Classification of Consumer Preference from Hybrid EEG and FNIRS SignalsMaria Ramirez, Shima Kaheh, Mohammad Affan Khalil, Kiran George. 1024-1028 [doi]
- Digital IIR Filter Design Using a Differential Evolution Algorithm with Polar CoordinatesPeter Stubberud. 1029-1035 [doi]
- Implementation of Predistorter for HPA Nonlinearity Mitigation on OQAM FBMC SystemSofyan Prasetyo, Titiek Suryani. 1036-1042 [doi]
- Design and Analysis of a Compact Wideband V-Band and W-Band Antenna for Healthcare ApplicationsAjan Ahmed, H. M. Arifur Rahman, Mohammad Monirujjaman Khan. 1043-1048 [doi]
- Design and sizing of a microgrid system for a University community in NigeriaStephen Ogbikaya, M. Tariq Iqbal. 1049-1054 [doi]
- Commiteam: Committee Management SystemKareem Al-Nabulsi, Fadi Odeh, Mohammad Kanaan, Ammar Odeh. 1055-1058 [doi]
- Design and Economic Analysis of Solar Powered Drinking Water Reverse Osmosis Desalination System for a Community in PakistanSheikh Usman Uddin, Tariq Iqbal. 1059-1064 [doi]
- BBR Congestion Control Analysis with Multipath TCP (MPTCP) and Asymmetrical Latency SubflowPhillipe Austria, Chol Hyun Park, Ju-Yeon Jo, Yoohwan Kim, Rahul Sundaresan, Khanh D. Pham. 1065-1069 [doi]
- A Comparative Study of Solar Water Pump Storage SystemsAmirhossein Jahanfar, M. Tariq Iqbal. 1070-1075 [doi]
- Design and Optimization of Solar PV system for a Fish Farm in PakistanAdnan Sarwar, M. Tariq Iqbal. 1076-1081 [doi]
- Spectrum Sharing between Directional-Antenna-Equipped UAV System and Terrestrial SystemsTao Yu, Kento Kajiwara, Kiyomichi Araki, Kei Sakaguchi. 1082-1086 [doi]
- Frequency Hopping Acquisition Based on Variable Forgetting Factor Recursive Least Squares AlgorithmZengmao Chen, Xianwu Zhao, Li Lu, Rongchen Sun, Zhiguo Sun. 1087-1091 [doi]
- Ground Experiment of Full-Duplex Multi-UAV System Enabled by Directional AntennasTao Yu, Kiyomichi Araki, Kei Sakaguchi. 1092-1097 [doi]
- Power Control in Local 5G/Beyond Systems Utilizing Spectrum Database and Monte Carlo Stochastic ProgrammingTetsuki Taniguchi, Takeo Fujii. 1098-1104 [doi]
- Joint Analysis of Success and Outage Probability in 5G Multi-Tier Heterogeneous NetworkMobasshir Mahbub, Raed M. Shubair, Bobby Barua. 1105-1111 [doi]
- The Road to 6G, Vision, Drivers, Trends, and ChallengesAhmed Hassebo. 1112-1116 [doi]
- A Survey From 1G to 5G Including the Advent of 6G: Architectures, Multiple Access Techniques, and Emerging TechnologiesA. F. M. Shahen Shah. 1117-1123 [doi]
- Limitations of static autonomous scheduling for TSCH protocol and advances in adaptive schedulingSana Rekik, Nouha Baccour, Mohamed Jmaiel. 1124-1129 [doi]