Abstract is missing.
- A Coding Translation to Increase the Efficiency of Programmatic Data AnalysesDavid Shilane. 1-4 [doi]
- A new Potential-Based Reward Shaping for Reinforcement Learning AgentBabak Badnava, Mona Esmaeili, Nasser Mozayani, Payman Zarkesh-Ha. 1-6 [doi]
- MGM for Aggregated General Distribution Queuing System in discrete timeTakako Hoshiyama. 5-8 [doi]
- Radar Target Identification Using Multiclass Sparse CentroidsIsmail Jouny. 9-13 [doi]
- Parallel Computing of the FFT and of Spectral Filtering with Few to No Complex-Valued OperationsDale H. Mugler. 14-21 [doi]
- Is the residential sector ready for prescriptive maintenance? A short analysisGeorgia Tzitziou, Asimina Dimara, Alexios Papaioannou, Stelios Krinidis, Christos-Nikolaos Anagnostopoulos, Dimosthenis Ioannidis, Dimitrios Tzovaras. 22-28 [doi]
- Distributed D2D Resource Allocation for Reducing Interference in Ultra-Dense Networks With Generic ImperfectionRedha M. Radaydeh. 29-34 [doi]
- Performance analysis of self-learning forwarding algorithms for Vehicle-to-Vehicle networks on Named Data Networking (NDN)Seshariana Rahma Melati, Leanna Vidya Yovita, Ratna Mayasari. 35-40 [doi]
- Electric Vehicle (EV) Preventive Diagnostic System: Solution for Thermal Management of Battery packs using AIOTLohith Kumar, Debajit Choudhury, Anwesh Reddy Paduri, Senthil Kumar, Devashis Sahoo, Jalaja Murthy, Narayana Darapaneni. 41-46 [doi]
- Career Support Platform for Older Adults Powered by AIAshish Jain, Sakthivel Durairaj, Anwesh Reddy Paduri, Praveen Krishnan, Pramod Chalaiah, Jaideep Chanda, Narayana Darapaneni. 47-53 [doi]
- Watson-Crick grammar and its label languagesPrithwineel Paul, Soumadip Ghosh, Arpita Mandal. 54-60 [doi]
- Investigating the Performance of Steepest Descent, Newton-Raphson, and Fletcher-Reeves Approaches in Unconstrained Minimization ProblemsMohammad Safayet Hossain, Marwan A. Simaan. 61-68 [doi]
- A Smart Solution to Identify an Efficient Delivery Route Involving Several Destinations and DriversSudiksha Das. 69-73 [doi]
- Face Recognition Based on Point Cloud Data Captured by Low-cost mmWave Radar SensorsYouxuan Zhong, Chun Yuan, Yi Zou, Heng Yao. 74-83 [doi]
- Autonomous Vehicle Driving Path Control with Deep Reinforcement LearningTeckchai Tiong, Ismail Saad, Kenneth Tze Kin Teo, Herwansyah Bin Lago. 84-92 [doi]
- Process Proportional-Integral PI Control with Deep Reinforcement LearningTeckchai Tiong, Ismail Saad, Kenneth Tze Kin Teo, Herwansyah Bin Lago. 93-101 [doi]
- Reinforcement Learning for a Raspberry Pi Smart Car for Lane Detection Using OpenCVMinh Nguyen, Tauheed Khan Mohd. 102-107 [doi]
- Investigating The Usability Issues In Mobile Applications Reviews Using A Deep Learning ModelShabbab Algamdi, Abdullah Albanyan, Stephanie Ludi. 108-113 [doi]
- Hybrid Quantum-Classical Machine Learning for Near Real-time Space to Ground Communication of ISS Lightning Imaging Sensor DataSamih Fadli, Bharat S. Rawal. 114-122 [doi]
- Optimizing Edge-Cloud Synergy for Big Data AnalyticsRaghubir Singh, Neeraj Kumar. 123-128 [doi]
- The Link Between a User's Religion and Mis/Disinformation VulnerabilityKevin Matthe Caramancion. 129-133 [doi]
- Blockchain Development in Colab: An Ethereum-Based Bicycle Registry SystemWilliam Downing, Dalton Harvey, Dennis Wagura, Yong Shi 0002. 134-139 [doi]
- Multi-Source Pandemic Data Visualization and Synchronization for Information ExtractionQi Zhang, James Brokaw. 140-146 [doi]
- Analyzing Multimodal Datasets for Detecting Online COVID Misinformation: A Preliminary Survey StudyAnkur Chattopadhyay, Nahom Beyene, Shohel Rana. 147-153 [doi]
- EEG and fNIRS Analysis to Determine Acute Stress Resulting From Reaction Time TestsJavier de la Cruz, Janson Law, Nii-Kwame Oteng-Quarshie, Kiran George. 154-159 [doi]
- Using Reinforcement Learning to Train Generative Adversarial Networks for Image GenerationAustin Nguyen, Rong Jin. 160-167 [doi]
- An Enhanced Segmentation and Deep Learning Architecture for Early Diabetic Retinopathy DetectionRenato R. Maaliw, Zoren P. Mabunga, Maria Rossana D. De Veluz, Alvin Sarraga Alon, Ace C. Lagman, Manuel Bautista Garcia, Luisito Lolong Lacatan, Rhowel M. Dellosa. 168-175 [doi]
- Explainable Neural Network Recognition of Handwritten CharactersPaul Whitten, Francis Wolff, Chris Papachristou. 176-182 [doi]
- A systematic review on artificial intelligence models applied to prediction in financeOtman Hijazi, Kawtar Tikito, Khadija Ouazzani Touhami. 183-188 [doi]
- Deep Learning Applications in Brain Computer Interface Based Lie DetectionMohammad Affan Khalil, Johnny Can, Kiran George. 189-192 [doi]
- Development of A Smart Non-Invasive Glucose Monitoring System With SpO2 and BPM for Diabetic PatientKazi Atique Moula Nabil, Md. Ariful Islam, Abdullah Al Noman, Mohammad Monirujjaman Khan. 193-197 [doi]
- Smart Supply Chain Management with Attribute-Based Encryption Access ControlHabeeb Shittu, Mahmoud Nabil. 198-204 [doi]
- Latency and Reliability Aware SDN Controller: A Role Delegation Function as a ServiceDinah Wobuyaga, Sisay T. Arzo, Harsh Kumar, Fabrizio Granelli, Michael Devetsikiotis. 205-211 [doi]
- Higher Order Sliding Mode Control for Speed Control of BLDC MotorZuhair Alqarni. 212-217 [doi]
- FPGA-Based Digital FIR Filters With Small Coefficients and Large Data InputNoureddine Chabini, Rachid Beguenane. 218-221 [doi]
- Incorporating an Integrated Software System for Stroke Prediction using Machine Learning Algorithms and Artificial Neural NetworkMd. Jalal Uddin Chowdhury, Ashab Hussan, Dewan Ashraful Islam Hridoy, Abu Sayed Sikder. 222-228 [doi]
- Generatively Augmented Neural Network Watchdog for Image Classification NetworksJustin M. Bui, Glauco A. Amigo, Robert J. Marks II. 229-237 [doi]
- Sensor Tracking System using Radar and Object DetectionCesar Martinez Melgoza, Kiran George, Jake Miho. 238-241 [doi]
- Image Segmentation and Anomaly Detection using Doppler Data from Coffee-Can RadarCesar Martinez Melgoza, Kiran George, Jake Miho. 242-245 [doi]
- Inductive Link Prediction Banking Fraud Detection System Using Homogeneous Graph-Based Machine Learning ModelHilmi Aziz Bukhori, Rinaldi Munir. 246-251 [doi]
- Camera with Artificial Intelligence of Things (AIoT) Technology for Wildlife Camera Trap SystemHeng-Chih Huang, Chun-Hung Richard Lin, JainShing Liu. 252-258 [doi]
- Road Curb Detection Based on a Deep Learning FrameworkMin Zou, Yoichi Kageyama. 259-262 [doi]
- Design of an Automated, Digital Water Tank Heating SystemMoses Njovana. 263-267 [doi]
- Metal-Organic Frameworks and Porphyrins for Water Filtration Using Density Functional TheoryRichard Kyung, Ian Huh Choi. 268-273 [doi]
- Implementing Privacy on Public Digital Displays Using Smart GlassesAlejandro Cabrera, Austin Rider, Jennifer Xiong, Hayssam El-Razouk. 274-279 [doi]
- Study on Modified Public Key Cryptosystem Based on ElGamal and Cramer-Shoup CryptosystemsSeung-Rae Kim, Richard Kyung. 280-284 [doi]
- Security Analysis of Ransomware: A Deep Dive into WannaCry and LockyBriana Fiore, Kenneth Ha, Loc Huynh, Jared Falcon, Robinson Vendiola, Yanyan Li. 285-294 [doi]
- Information Security using GNU Privacy GuardDabeeruddin Syed, Abdullah Hussein Al-Ghushami, Ameema Zainab, Shafii Muhammad Abdulhamid, Mohammed Salem Daen A Al-Kuwari. 295-300 [doi]
- Out-of-Band Analysis of GFDM Systems Based on Different Self-Interference TypesMohammad Reza Ghavidel Aghdam, Reza Abdolee, Behzad Mozaffari Tazehkand, Azadeh Abedi Jirdehi. 301-305 [doi]
- Adaptive Token Circulation to Avoid Malicious UEs Hoarding Tokens and Assure D2D Relay EfficiencyYou-Chiun Wang, Kingjade Yu. 306-312 [doi]
- Zero-Effort Two-Factor Authentication Using Wi-Fi Radio Wave Transmission and Machine LearningAli Abdullah S. AlQahtani, Thamraa Alshayeb. 313-318 [doi]
- Optimizing Smart Home Performance and User Convenience with RSSI-based Proximity DetectionAli Abdullah S. AlQahtani, Hosam Alamleh. 319-325 [doi]
- Classification of Road Objects Using Convolutional Neural NetworksMann Patel, Heba Elgazzar. 326-332 [doi]
- An IoT Intrusion Detection System Based on TON IoT Network DatasetGe Guo, Xuefeng Pan, He Liu, Fen Li, Lang Pei, Kewei Hu. 333-338 [doi]
- Airbnb Rental Price Prediction Using Machine Learning ModelsAlexander Lektorov, Eman Abdelfattah, Shreehar Joshi. 339-344 [doi]
- Machine Learning in Embedded Systems: Limitations, Solutions and Future ChallengesEleftherios Batzolis, Eleni Vrochidou, George A. Papakostas. 345-350 [doi]
- Prompting Large Language Models With the Socratic MethodEdward Y. Chang. 351-360 [doi]
- Machine Learning Enabled Intrusion Detection for Edge Devices in the Internet of ThingsMaram Alsharif, Danda B. Rawat. 361-367 [doi]
- Recent Advances in Cybersecurity and Fraud Detection in Financial Services: A SurveyAakriti Bajracharya, Barron Harvey, Danda B. Rawat. 368-374 [doi]
- Recent Advances in Artificial Intelligence Enabled Tutoring Systems: A SurveyIsmail Yesir, Danda B. Rawat. 375-381 [doi]
- Classification Challenges and Analysis of Traffic Patterns for Highly Congested Areas in Central TexasDaniel Alonso, Eduardo Alonso, Damian Valles. 382-388 [doi]
- Applying Deep Reinforcement Learning for Detection of Internet-of- Things Cyber AttacksCurtis Rookard, Anahita Khojandi. 389-395 [doi]
- IoT Security: AI Blockchaining Solutions and PracticesHephzibah Rajan, John Burns, Chetan Jaiswal. 396-401 [doi]
- Short-Term AQI Forecasts using Machine/Deep Learning Models for San Francisco, CABarathwaja Subash Chandar, Prashanth Rajagopalan, Prakash Ranganathan. 402-411 [doi]
- Pragmatic Domestic Electrical Load DisaggregationSudarshan S. Chawathe. 412-418 [doi]
- Canny Edge Detection on GPU using CUDAMatthew Horvath, Michael Bowers, Shadi Alawneh. 419-425 [doi]
- Consumer review Analysis using NLP and Data MiningMd. Nasimuzzaman, Ahmed Nur Merag, Sumya Afroj, Md. Mustakin Alam, Md. Humaion Kabir Mehedi, Annajiat Alim Rasel. 426-430 [doi]
- Evaluating Question generation models using QA systems and Semantic Textual SimilaritySafwan Shaheer, Ishmam Hossain, Sudipta Nandi Sarna, Md. Humaion Kabir Mehedi, Annajiat Alim Rasel. 431-435 [doi]
- Transformation of Visual Information into Bangla Textual RepresentationNafisa Nawer, Md. Shakiful Islam Khan, Md. Mustakin Alam, Md. Humaion Kabir Mehedi, Annajiat Alim Rasel. 436-441 [doi]
- An Efficient Parallel Divide-and-Conquer Algorithm for Generalized Matrix MultiplicationJohn Eagan, Marc Herdman, Christian Vaughn, Nathaniel Bean, Sarah Kern, Matin Pirouz. 442-449 [doi]
- Assessing the Impact of Matched Fragments' Relative Locations on Application Artifact InferenceOluwaseun Adegbehingbe, James H. Jones. 450-457 [doi]
- Informational Query Detection on Social Media Posts in Bengali Language Using Machine Learning And Transfer Learning TechniquesMd. Atiqur Rahman, Sanjid Islam Chowdhury, Sadid Rafan, Nahian Jannat, Tahsin Aziz. 458-464 [doi]
- Classification of Lung Chest X-Ray Images Using Deep Learning with Efficient OptimizersAsai Asaithambi, V. Thamilarasi. 465-469 [doi]
- Predicting EURO Games Using an Ensemble Technique Involving Genetic Algorithms and Machine LearningArisoa S. Randrianasolo. 470-475 [doi]
- Deep learning for predictive alerting and cyber-attack mitigationArbnor Imeri, Ondrej Rysavý. 476-481 [doi]
- A Review On Breaking the Limits of Time Series Forecasting AlgorithmsAmmar Raneez, Torin Wirasingha. 482-488 [doi]
- A Comparison Study on AI Language DetectorAditi Singh. 489-493 [doi]
- Social Engineering Incidents and PreventionsAbu Kamruzzaman, Kutub Thakur, Sadia Ismat, Md Liakat Ali, Kevin Huang, Hasnain Nizam Thakur. 494-498 [doi]
- Network Packet Sniffing and DefenseMd Liakat Ali, Sadia Ismat, Kutub Thakur, Abu Kamruzzaman, Zijie Lue, Hasnain Nizam Thakur. 499-503 [doi]
- The Metaverse and Conversational AI as a Threat Vector for Targeted InfluenceLouis-Rosenberg. 504-510 [doi]
- Data Analytics of Network Intrusion Based on Deep Neural Networks with Weights Initialized by Stacked Autoencoders and Deep Belief NetworksLidong Wang, Reed L. Mosher, Patti Duett, Terril C. Falls. 511-515 [doi]
- Analysis of Well-Known DNS over HTTPS ResolversKamil Jerábek, Ondrej Rysavý, Ivana Burgetova. 516-524 [doi]
- Template Attack Against AES in Counter Mode With Unknown Initial CounterMarcial Tienteu, Edmund Smith, Edgar Mateos Santillan, Kevin T. Kornegay, Paige Harvey, Otily Toutsop, Tsion Yimer, Vinton Morris, Ketchiozo Wandji. 525-533 [doi]
- MediSearch: Advanced Medical Web Search EngineDevharsh Trivedi, Vaishnavi Gopalakrishnan, Dharati Dholariya. 534-540 [doi]
- Mobile App for the information management of pre-existing diseases towards preventing COVID-19 severityWashington Velasquez, Romulo J. Coronel, Anghelo A. Loayza, Vladimir Sanchez Padilla, Margarita Filian-Gomez. 541-546 [doi]
- Performance Analysis of TensorFlow2 Object Detection API Models for Engineering Site Surveillance ApplicationsDupri Grimes, Damian Valles. 547-552 [doi]
- Forecast Analysis of Visibility for Airport Operations with Deep Learning TechniquesSabhasachi Saha, Damian Valles. 553-558 [doi]
- A Gradient Boosting Classifier to Predict Electric Power Consumption by Nuclear Power PlantMushfiqur Rashid Khan, Farhan Fuad, Md. Adnan Ibrahim. 559-565 [doi]
- Application of LSTM Auto Encoder in Hardware Trojan DetectionAlex Sumarsono, Zachary Masters. 566-571 [doi]
- Red Team Ethical Physical Penetration Testing Simulations using Open Source IntelligenceC. DeCusatis, C. Danyluk, D. MacCarthy, J. Shapiro, N. Regan. 572-578 [doi]
- Spectral Clustering of Virus Spread through Computer NetworkAndrea Barnett, Jing Guo. 579-584 [doi]
- Eyes on the Road: A Survey on Cyber Attacks and Defense Solutions for Vehicular Ad-Hoc NetworksAmber Hankins, Tapadhir Das, Shamik Sengupta, David Feil-Seifer. 585-592 [doi]
- Cybersecurity in Malware ResearchHoratiu Lupsan, Remaz Ahmed, Yong Shi 0002. 593-597 [doi]
- Activity-Attack Graphs for Intelligence-Informed Threat COA DevelopmentCole Mckee, Kelsie Edie, Adam Duby. 598-604 [doi]
- Review of Ransomware Attacks and a Data Recovery Framework using Autopsy Digital Forensics PlatformSmit Chandrakant Nayak, Vaibhavi Tiwari, Bharath K. Samanthula. 605-611 [doi]
- File Allocation Chronology and its Impact on Digital ForensicsAhmed A. Bahjat, Jim Jones. 612-618 [doi]
- Automation of Buildings using Sign Interpretation Language to include People with Hearing DisabilitiesWashington Velasquez, Melanie Ruiz-Pena, Guillermo Merizalde, Danny Torres, Manuel S. Alvarez-Alvarado. 619-623 [doi]
- Ensemble of Gated Recurrent Unit and Convolutional Neural Network for Sarcasm Detection in BanglaNiloy Farhan, Ishrat Tasnim Awishi, Md. Humaion Kabir Mehedi, Md. Mustakin Alam, Annajiat Alim Rasel. 624-629 [doi]
- A Transfer Learning Approach For Efficient Classification of Waste MaterialsMd. Humaion Kabir Mehedi, Irfana Arafin, Murad Hasan, Farhin Rahman, Rufaida Tasin, Annajiat Alim Rasel. 636-640 [doi]
- Optimize Path Planning for Drone-based Wireless Power Transfer System by Categorized Reinforcement LearningYuan Xing, Abhishek Verma. 641-646 [doi]
- A Comparative Study of Machine Learning Algorithms for Detecting Breast CancerRazib Hayat Khan, Jonayet Miah, Md Minhazur Rahman, Maliha Tayaba. 647-652 [doi]
- System-information rationing of digital twins accuracyMykola Korablyov, Sergey Lutskyy, Ihor Ivanisenko, Oleksandr Fomichov. 653-660 [doi]
- PAM Constellations Minimizing Symbol-error Probability with Constrained Peak-to-average Power RatiosBrett Wiens, Daniel C. Lee 0001. 661-667 [doi]
- Bounds on Pairwise Error Probability for LDPC coded CF-mMIMO SystemChetan Fadnis, Sonali Chouhan. 668-673 [doi]
- Effect of Node Position and Human Activity on BER Performance and Data Throughput in Off-Body Medical Body Area NetworksNada El-Maradny, Heba A. Shaban, Nour Elmadany. 674-677 [doi]
- Analyzing Affect During Virtual Meetings to Improve Quality of InteractionEhsan Ashoori, Sylmarie Dávila-Montero, Andrew J. Mason. 678-681 [doi]
- PAPR Reduction Techniques for MC-CDMA SystemMoftah Ali, Raveendra K. Rao, Vijay Parsa. 682-689 [doi]
- System Monitoring and Data logging using PLX-DAQ for Solar-Powered Oil Well PumpingOnyinyechukwu Chidolue, Tariq Iqbal. 690-694 [doi]
- Data Science Analysis of Malicious Advertisements and Threat Detection Automation for Cybersecurity ProgressSandra Nguyen, Doina Bein. 695-704 [doi]
- Electroencephalogram-based Emotion Recognition with Hybrid Graph Convolutional Network ModelRakibul Alam Nahin, Md. Tahmidul Islam, Abrar Kabir, Sadiya Afrin, Imtiaz Ahmed Chowdhury, Rafeed Rahman, Md. Golam Rabiul Alam. 705-711 [doi]
- Unsupervised Network Intrusion Detection Using Convolutional Neural NetworksShumon Alam, Yasin Alam, Suxia Cui, Cajetan M. Akujuobi. 712-717 [doi]
- Speech emotion recognition for psychotherapy: an analysis of traditional machine learning and deep learning techniquesNidhi Shah, Kanika Sood, Jayraj Arora. 718-723 [doi]
- Detecting Hate Speech on Social Media with Respect to Adolescent VulnerabilityAnna Chiu, Kanika Sood, Ariadne Rincon, Davina Doran. 724-728 [doi]
- Wildfire Time Estimation using a Machine Learning Algorithms Interaction Mechanism for Endemic Tree Species RecognitionWashington Velasquez, Guillermo Sanchez-Guzman, Freddy Jijon-Veliz, Manuel S. Alvarez-Alvarado. 729-733 [doi]
- A Machine Learning Model for Early Prediction of Parkinson's Disease from Wearable SensorsLambert Igene, Anika Alim, Masudul H. Imtiaz, Stephanie Schuckers. 734-737 [doi]
- Soft Voting Strategy for Multi-Modal Emotion Recognition Using Deep-learning- Facial Images and EEGUma Chinta, Jugal Kalita, Adham Atyabi. 738-745 [doi]
- A Framework Pipeline to Address Imbalanced Class Distribution Problem in Real-world DatasetsUma Chinta, Adham Atyabi. 746-753 [doi]
- Non-Intrusive Load Monitoring Method for Appliance Identification Using Random Forest AlgorithmAndi Shridivia Nuran, Muhammad Ary Murti, Fiky Yosep Suratman. 754-758 [doi]
- The Impact of Dynamic Adjustment of Swarm Behavior on Particle Swarm Optimization Performance using Benchmark FunctionsMohd Nadhir Ab Wahab, Samia Nefti-Meziani, Adham Atyabi. 759-767 [doi]
- Automatic Detection of Microplastics in the Aqueous EnvironmentMd Abdul Baset Sarker, Usama Butt, Masudul H. Imtiaz, Abul Basar Baki. 768-772 [doi]
- Design and Implementation Improvements for RFID Based Tactile Communication DevicesBrock Rivera, Andy Liu, Kenric Luong, Kiran George. 773-777 [doi]
- Introducing the Scientific Image Analysis Application: A Free and User-Friendly Program for Extracting Bioinformatics From Digital ImagesIan Bentley, Joel Ralston, Satin D. Garman, Olivia Hershberger, Charlotte M. Probst, Campbell Washer. 778-787 [doi]
- A Survey on Data Integrity Attacks and DDoS Attacks in Cloud ComputingYun Tian, Andres F. Romero Nogales. 788-794 [doi]
- Using Cuckoo Filters to Improve Performance in Object Store-based Very Large DatabasesR. K. N. Sai Krishna, Chandrasekhar Tekur, Ramesh Bhashyam, Venkat Nannaka, Ravi Mukkamala. 795-800 [doi]
- Development of an Movil IoT System Using ESP8266 for the Detection of Pollutants in the EnvironmentJason Alanya Villanueva, Xiomara Huaman Rojas, Carlos Coaquira Rojo. 801-805 [doi]
- Cloud Service Misconfigurations: Emerging Threats, Enterprise Data Breaches and SolutionsJames Guffey, Yanyan Li. 806-812 [doi]
- Multi-Agent-Based Simulation of Intelligent Network SystemPetro M. Tshakwanda, Sisay T. Arzo, Michael Devetsikiotis. 813-819 [doi]
- Classification of Potato Disease with Digital Image Processing Technique: A Hybrid Deep Learning FrameworkFatema Tuj Johora Faria, Mukaffi Bin Moin, Ahmed Al Wase, Md. Rabius Sani, Khan Md Hasib, Mohammad Shafiul Alam. 820-826 [doi]
- Smartphone Context Event Sequence Prediction with POERMH and TKE-Rules AlgorithmsPooja Goyal, Md Khorrom Khan, Christian Steil, Sarah M. Martel, Renée C. Bryce. 827-834 [doi]
- Detecting Network Transmission Anomalies using Autoencoders-SVM Neural Network on Multi-class NSL-KDD DatasetShehram Sikander Khan, Akalanka Bandara Mailewa. 835-843 [doi]
- Wind Speed Forecasting for Designing Sustainable Wastewater Treatment PlantsShriyank Somvanshi, Emily Zhu Fainman, Keisuke Ikehata, Damian Valles Molina, Tongdan Jin. 844-850 [doi]
- Large-scale Investigations of AAC Usage Patterns: Trends, Autism, and Stacked AutoencodersAdham Atyabi, Laura Boccanfuso, James C. Snider, Minah Kim, Erin Barney, Amy Yeo-jin Ahn, Beibin Li, Kelsey Jackson Dommer, Frederick Shic. 851-859 [doi]
- Sentiment Analysis of Social Media Comments in MauritiusNuzhah Gooda Sahib, Marie Angele Justine Marianne, Baby Gobin-Rahimbux. 860-865 [doi]
- Machine Learning Based Cost prediction for Acquiring New CustomersGuduru Lakshmi Vara Prasad, Angad Deep Singh Nanda, Narayana Darapaneni, Avantika Bunga, Sri Keerthi Tadepalli, Anwesh Reddy Paduri, Sumit Kishore, Yogesh Saini. 866-872 [doi]
- An Overview of Bengali Speech Recognition: Methods, Challenges, and Future DirectionNabila Tasnia, Mahidul Islam, Mahi Shahriar Rony, Nishat Tanzim, Khan Md Hasib, Mohammad Shafiul Alam. 873-878 [doi]
- A Multi-modal Deep Learning Approach for Predicting Dhaka Stock ExchangeMd. Nabil Rahman Khan, Omor Al Tanim, Most. Sadia Salsabil, S. M. Raiyan Reza, Khan Md Hasib, Mohammad Shafiul Alam. 879-885 [doi]
- IoBT Intrusion Detection System using Machine LearningBasmh Alkanjr, Thamer Alshammari. 886-892 [doi]
- Active Learning Framework For Long-term Network Traffic ClassificationJaroslav Pesek, Dominik Soukup, Tomás Cejka. 893-899 [doi]
- Explainable Autonomic Cybersecurity For Industrial Control SystemsValeti Manoj, Shao Wenda, Niu Sihan, Christopher A. Rouff, Lanier A. Watkins, Aviel Rubin. 900-9006 [doi]
- Design of Energy Efficient Ring Oscillator and Full Adder Circuit using Compact Model of MoS2 Channel TFETNaheem Olakunle Adesina, Md Azmot Ullah Khan, Jian Xu. 907-914 [doi]
- Experimental Analyses of a Noise-Based True Random Number GeneratorNaheem Olakunle Adesina, Baorui Wang, William Morell, Md Azmot Ullah Khan. 915-918 [doi]
- Adaptive DFE Utilizing Fixed Step Error Signal for Multi-Gb/s Serial LinksAlaa R. Altaee. 919-922 [doi]
- Sign-Sign LMS-Based Adaptive DFE for 4PAM Multi-Gbps Serial LinksAlaa R. Altaee. 923-927 [doi]
- Process Variation's Effect on Various Threshold Voltage Assignments in 6T SRAM Designs Using 12nm FinFET TechnologyUmme Rani Irin, Sajib Barua, Md Minhajul Azmir, Tasnuva Hassan, Dewan Mohammed. 928-932 [doi]
- A Look into the Vulnerabilities of Automatic Dependent Surveillance-BroadcastChristian Clay, Mohammad Khan, Biju Bajracharya. 933-938 [doi]
- Grouping Patients for Ridesharing in Non-emergency Medical Care ServicesFu-Shiung Hsieh, Ji-Zheng Huang. 939-942 [doi]
- OC-SMOTE-NN: A Deep Learning-based Approach for Imbalanced ClassificationNavodika Karunasingha, Buddhi G. Jayasekara, Asela Hevapathige. 943-948 [doi]
- A Comparative Study of Machine Learning classifiers to analyze the precision of Myocardial Infarction predictionRazib Hayat Khan, Jonayet Miah, Shah Ashisul Abed Nipun, Majharul Islam. 949-954 [doi]
- Data Complexity for Identifying Suitable AlgorithmsPrem Anand Ramalingam, Nikhat Fathima, P. Supriya, Prathish Shetty, Mainak Sanyal, P. Yeshaswini, Mukesh Rao, Narayana Darapaneni, Anwesh Reddy Paduri. 955-961 [doi]
- A Survey of Advanced Methods for Efficient Text SummarizationDinu Antony, Sumit Abhishek, Sujata Singh, Siddu Kodagali, Narayana Darapaneni, Mukesh Rao, Anwesh Reddy Paduri, Sudha BG. 962-968 [doi]
- A Study of Text Summarization in the Medical Domain using BERT and its VariantsTippu Sulthan Shaik, Jaya Bharath, Narayana Darapaneni, Sumit Patra, S. Aditya Vishal, Sridhar Manthripragada, Anil Kumar Kagita, Mukesh Rao, Anwesh Reddy Paduri. 969-975 [doi]
- A Semi-Supervised Multi-Spike Learning Algorithm for Deep Spiking Neural NetworksXiaoman Zhao, Xianghong Lin, Zhen Zhang. 976-982 [doi]
- Heart Disease Detection Using MLRanjit Chandra Das, Madhab Chandra Das, Md. Amzad Hossain, Md. Ashiqur Rahman, Md. Helal Hossen, Rakibul Hasan. 983-987 [doi]
- Capacity Bounds Analysis of 5G networks in different propagation environmentsAymen I. Zreikat. 988-993 [doi]
- Smart Cup for a Smart Pill Dispenser for Verification of Pill ConsumptionSergio R. Minera, Abulaiti Nuerbiya, Alonso Espinoza, Kiran George, Anand Panangadan. 994-998 [doi]
- Proposal of Client-Server Based Vertical Handover Scheme Using Virtual Routers for Edge Computing in Local 5G Networks and WLANsKoya Ito, Noboru Izuka. 999-1004 [doi]
- User Optimum Locations in Cellular Networks for Tradeoff of Throughput and User SatisfactionJiaxin Zhang, Xiukui Li. 1005-1010 [doi]
- A Blockchain Application on Bootstrapping Mobile Nodes within VANETEdgar Wallace Bowlin, Mohammad S. Khan, Biju Bajracharya. 1011-1016 [doi]
- Benchmark Signals with Inter-harmonics for the Development of Harmonic Estimation MethodsM. A. Aziz Jahan, Shipra Tiwari, Flavio B. Costa. 1017-1022 [doi]
- 60 GHz Wi-Fi as a Tractor-Trailer Wireless HarnessAhmed Elhadeedy, Jeremy Daily. 1023-1028 [doi]
- Post Prioritization Techniques to Improve Code Coverage for SARSA Generated Test CasesMd Khorrom Khan, Ryan Michaels, Dylan Williams, Benjamin Dinal, Beril Gurkas, Austin Luloh, Renée C. Bryce. 1029-1035 [doi]
- Secure Access Control for Healthcare Information Systems: A Body Area Network PerspectiveRamadan Abdunabi, Rejina Basnet, Md Al-Amin. 1036-1045 [doi]
- Counter-surveillance Technique by Diversifying Transmission LinksHosam Alamleh. 1046-1050 [doi]
- CNN Based Study of Improvised Food Image ClassificationThirumal Raman, Sravan Kumar, Anwesh Reddy Paduri, Gaurav Mahto, Sapna Jain, Bindhu K, Narayana Darapaneni. 1051-1057 [doi]
- Medical Radiology Image processing for Pneumonia Detection Using Convolutional Neural NetworkVinay Singh, Aditya Manay, Raj Prakash Singh, Shaurya Tomer, Chandan A, Narayana Darapaneni, Vishnu Manoj, Aashi Rastogi, Anwesh Reddy Paduri. 1058-1064 [doi]
- Deep Semi-Supervised Learning With Contrastive Learning in Large Vocabulary Automatic Chord RecognitionChen Li, Yu Li, Hui Song, Lihua Tian. 1065-1069 [doi]
- A Review of Current Techniques for Robotic Arm Manipulation and Mobile NavigationTroy Sieusankar, Balasubramaniyan Chandrasekaran. 1070-1075 [doi]
- Symbolic and Flat Affect Humanoid Head Design for Modular Humanoid RobotsPranshu Chaurasia, Rohan Antony Viji, Prabuddh M, Arunkumar P. Chavan, A H. Manjunatha Reddy, Preetham R. 1076-1084 [doi]
- Cable-Driven Parallel Robot for Warehouse Monitoring TasksArmaun Zargari, Zahir Abram Castrejon, Dongbin Kim, Paul Y. Oh. 1085-1090 [doi]
- Automation of Agave Americana L fiber for the production of reinforced earthenware blocksAlbert Jorddy Valenzuela-Inga, Juan Gabriel Benito-Zuñiga, Jesus Angel Huamán-Chavez, Heydi Karina Hinostroza-Maravi, Sliver Ivan Del Carpio Ramirez, Giovene Perez-Campomanes. 1091-1097 [doi]
- Mechatronic design for load-bearing masonry construction based on BIM methodologyLovell Wilder Torpoco-Lopez, Thalía Jackeline Cochachi-Rubio, Romel Moisés Olivera-Pérez, Sliver Ivan Del Carpio Ramirez, Jhon Rodrigo Ortiz Zacarias, Giovene Perez-Campomanes. 1098-1104 [doi]
- A Blockchain-based IoT Security Solution Using MultichainShereen Ismail, Hassan Reza, Hossein Kashani Zadeh, Fartash Vasefi. 1105-1111 [doi]
- Integration of an IoT System for Monitoring the Thermal Comfort of a Barn with a Trombe Wall in the High Andean AreasJason Alanya Villanueva, Xiomara Huaman Rojas, Carlos Coaquira Rojo. 1112-1116 [doi]
- FLODAREM: Intelligent Flood Detection and Dam Reservoir Monitoring SystemPradeep Kumar Sharma, Shatabdi Basu, Kingshuk Bairagi, Afaq Ahmed. 1117-1120 [doi]
- A Quantum Key Distribution Network Routing Performance Based on Software-Defined NetworkVivi Monita, Rendy Munadi, Indrarini Dyah Irawati. 1121-1125 [doi]
- Infrastructure-as-Code in Open-Networking: Git, Ansible, and Cumulus-Linux Case StudyGustavo Salazar-Chacón, Diego Marcillo Parra. 1126-1131 [doi]
- Avionics Design of a Sub-Orbital Launch and Recovery SystemRaymond E. Yanez, Brad Williams, Yoonsuk Choi. 1132-1136 [doi]
- A Discriminative DeepLab Model (DDLM) for Surface Anomaly Detection and LocalizationNana Kankam Gyimah, Kishor Datta Gupta, Mahmoud Nabil 0001, Xuyang Yan, Abenezer Girma, Abdollah Homaifar, Daniel Opoku. 1137-1144 [doi]
- Analysis of Automated Skin Disease Classification Exploiting Different Machine Learning TechniquesTanvir Rahman Anik, Purnendu Talukder, Ishmam Faruki, Ifti Sam Ibn Rahman, Emam Hossain. 1145-1151 [doi]
- A Low Parametric CNN Based Solution to Efficiently Detect Brain Tumor Cells from Ultrasound ScansMd. Arman Islam, Sheikh Araf Noshin, Md. Robiul Islam, Md. Farhan Razy, Samiha Antara, Md. Tanzim Reza, Mohammad Zavid Parvez. 1152-1158 [doi]
- Identification of Motifs in Aptamers Using MEME Analysis to aid design of AptasensorsAndrew Takayama, Andres Medina, Stevan Pecic, Ankita Mohapatra. 1159-1162 [doi]
- Predicting motifs and secondary structure of steroid aptamers using APTANIAndres Medina, Andrew Takayama, Ankita Mohapatra, Stevan Pecic. 1163-1166 [doi]
- Fixed Wing UAV-based Non-Terrestrial Networks for 5G millimeter wave Connected VehiclesMohammad Shah Alamgir, Brian Kelley. 1167-1173 [doi]
- Fuzzy Classification of Color Carrots (Dacus Carota) using Raspberry Pi towards Farming 4.0Marcos J. Villaseñor-Aguilar, José Alfredo Padilla-Medina, Juan Prado-Olivarez, Saúl Martínez-Díaz, Iris Iddaly Méndez-Gurrola, Alejandro Israel Barranco Gutiérrez. 1174-1178 [doi]
- DS-HPE: Deep Set for Head Pose EstimationVelayuthan Menan, Asiri Gawesha, Pradeepa Samarasinghe, Dharshana Kasthurirathna. 1179-1184 [doi]
- The Precise 3D Reconstruction of Human Faces Based on 2D PhotographXiaoyuan Suo. 1185-1190 [doi]
- Probability Density Functions of the Subspace-Based Direction of Arrival EstimatorsRidhab Al Kinani, Kaushallya Adhikari. 1191-1197 [doi]
- A Robust Sparse Fractal ArrayKretika Goel, Monika Aggarwal, Subrat Kar. 1198-1204 [doi]
- Continuous Time Digital Signal Processing and Signal ReconstructionPatrick Jungwirth, W. Michael Crowe. 1205-1211 [doi]
- Age of Information in Multichannel Slotted ALOHA: Should Collided Users Send First?Yurong Lai, Tse-Tin Chan, Jiaxin Liang, Haoyuan Pan. 1212-1217 [doi]
- Full-Duplex mmWave Massive MIMO Systems with A Joint Self-Interference Cancellation Design Based on Zero-Space Projection and Angular ExcludingXinping Xia, Jianing Zhao, Fei Xu. 1218-1223 [doi]
- A Survey of Data Dissemination Schemes in Secure Inter-Vehicle CommunicationsSamar Bayan, Utayba Mohammad. 1224-1230 [doi]
- Ultra-Wideband Edge Trimmed Bowtie Antenna for X-band Radar CommunicationP. Priyalatha, Pratyush Choudhary, Runa Kumari. 1231-1235 [doi]
- New Reward-Clipping Mechanism in Deep -Learning Enabled Internet of Things in 6G to Improve Intelligent Transmission SchedulingMohammed Alhartomi. 1236-1242 [doi]
- Compact Low-pass Filtering-response Wilkinson Power Divider with Wide Harmonic SuppressionArpita Mandal, Tamasi Moyra, Prithwineel Paul. 1243-1249 [doi]
- Performance of Battery-free BackCom in Uplink NOMA Systems with Joint DetectionSimone Angelucci, Roberto Valentini, Piergiuseppe Di Marco, Fortunato Santucci. 1250-1255 [doi]
- Econometrics and Manufacturing Industries Retail Volumes ForecastKaran Salunkhe, Sudhanshu Gonge, Rahul Joshi, Ketan Kotecha, Vinod Basalalli, Pankaj Shah. 1256-1259 [doi]
- Big Data Approach For IoT Botnet Traffic Detection Using Apache Spark TechnologyOluwatomisin Arokodare, Hayden Wimmer, Jie Du. 1260-1266 [doi]
- Predicting Chronic Kidney Disease Using Machine Learning AlgorithmsAfia Farjana, Fatema Tabassum Liza, Parth Pratim Pandit, Madhab Chandra Das, Mahadi Hasan, Fariha Tabassum, Md. Helal Hossen. 1267-1271 [doi]
- Interpretable Bangla Sarcasm Detection using BERT and Explainable AIRamisa Anan, Tasnim Sakib Apon, Zeba Tahsin Hossain, Elizabeth Antora Modhu, Sudipta Mondal, Md. Golam Rabiul Alam. 1272-1278 [doi]
- Short- Term Electric Vehicle Demand Forecasts and Vehicle-to-Grid (V2G) Idle- Time Estimation Using Machine LearningPrashanth Rajagopalan, Jack Thornby, Prakash Ranganathan. 1279-1286 [doi]
- Towards Inclusive Privacy Consenting for GDPR Compliance in Visual Surveillance: A Survey StudyAnkur Chattopadhayay, Isha Rijal. 1287-1293 [doi]
- Machine Learning Based Pedestrian Detection and Tracking for Autonomous VehiclesTyler Ward, Sherif Rashad, Heba Elgazzar. 1294-1299 [doi]
- Proactive Actuator Update Management for Reliability Enhancement in Cyber-Physical SystemsC. M. Krishna. 1300-1306 [doi]
- Design & Verification of AMBA AHB-Lite Memory ControllerAnila Kommineni, Manoj Kumar Gundu, Youngsoo Kim, Shrikant Jadhav. 1307-1312 [doi]
- Design of an Automation System for the Production of Soil-Cement BlocksDeyvid Froilán Matamoros-Paitán, Efrain Junior Dolorier-Flores, Faifer Alanya-Almonacid, Albert Jorddy Valenzuela-Inga, Juan Gabriel Benito-Zuñiga, Jesus Angel Huamán-Chavez, Lizbett Nattaly Mantari-Ramos, Giovene Perez-Campomanes. 1313-1319 [doi]
- Exploring Technical Capabilities of Unmanned Aerial VehiclesTauheed Khan Mohd, Elnatan Mesfin Tesfa. 1320-1325 [doi]
- Mechatronic design and monitoring of a tuned mass damper in structural vibrationsJose Luis Nizama-Mallqui, Evelin Ruth Mayta-Mercado, Ivan Enrique Sarmiento-Ñaupa, Albert Jorddy Valenzuela-Inga, Juan Gabriel Benito-Zuñiga, Lizbett Nattaly Mantari-Ramos, Giovene Perez-Campomanes. 1326-1332 [doi]