Abstract is missing.
- Stable Parallel Training of Wasserstein Conditional Generative Adversarial Neural Networks : *Full/Regular Research Paper submission for the symposium CSCI-ISAI: Artificial IntelligenceMassimiliano Lupo Pasini, Junqi Yin. 1-7 [doi]
- Neural Network Optimization with Biologically Inspired Low-Dimensional Manifold LearningHieu Le, Andrew Wood, Sylee Dandekar, Peter Chin 0001. 8-13 [doi]
- A Federated Affective Computing Framework To Learn From Small DataLuca Bondin, Alexiei Dingli. 14-19 [doi]
- Enhancing the Resolution of Satellite Imagery Using a Generative ModelMahee Noor Tayba, Pablo Rivas 0001. 20-25 [doi]
- ConvGRU-TSNet: A Novel Deep Learning Approach for Multivariate Time Series PredictionJingke She, Shanshan Gong, Suyuan Yang, Tianzi Shi, Shaofei Lu, Heng Wu. 26-33 [doi]
- PCA Approaches for Optimal Convolution Kernels in Convolutional Neural NetworksPhilku Lee, Deyeon Kim, Seung-Heon Lee, Seongjai Kim. 34-39 [doi]
- On the Practical Uses of Experimental Adversarial Neural CryptographyKorn Sooksatra, Pablo Rivas 0001. 40-46 [doi]
- Weakly Supervised Crowdsourcing Learning Based on Adversarial ConsensusMeng-Long Wei, Shao-Yuan Li, Sheng-Jun Huang. 47-51 [doi]
- Hybrid Quantum Variational Autoencoders for Representation LearningPablo Rivas 0001, Liang Zhao, Javier Orduz. 52-57 [doi]
- Application of Data Transformation Techniques and Train-Test sitAmaya Shepard, Naim Naheed. 58-63 [doi]
- Modeling SQL Statement Correctness with Attention-Based Convolutional Neural NetworksPablo Rivas 0001, Donald R. Schwartz. 64-71 [doi]
- Data Driven Process Evaluation Simulation Model For Circular Economy Treatment ProcessesDominique Fabio Briechle, Sebastian Lawrenz. 72-78 [doi]
- Quantum Machine Learning: A Case Study of Grover's AlgorithmBikram Khanal, Pablo Rivas 0001, Javier Orduz, Alibek Zhakubayev. 79-84 [doi]
- Multi-Task Deep Neural Networks for Multimodal Personality Trait PredictionDena F. Mujtaba, Nihar R. Mahapatra. 85-91 [doi]
- Path-Enhanced Multi-hop Graph Attention Network for Aspect-based Sentiment AnalysisJiayi Wang, Lina Yang, Xichun Li, Zuqiang Meng. 92-97 [doi]
- A Deep Learning BERT-Based Approach to Person-Job Fit in Talent RecruitmentElias Abdollahnejad, Marilynn Kalman, Behrouz H. Far. 98-104 [doi]
- The Effects of Different Parameters on the Accuracy of Deep Learning Models for Predicting U.S. Citizen's Life ExpectancyMichelle Hu, Yen-Hung Frank Hu. 105-109 [doi]
- Attitudes Toward Corona Vaccine and Intention Among University StudentsSanaa Abujilban, Lina Mrayan, Shaher Hamaideh, Dheaya Alrousan, Hashim Abu-gellban. 110-115 [doi]
- Artificial Intelligence-Based Cognitive Radar ArchitectureArkadiusz Czuba. 116-120 [doi]
- Human Activity Classification Using Basic Machine Learning ModelsBikram Khanal, Pablo Rivas 0001, Javier Orduz. 121-126 [doi]
- Quantifying the Right Combination of Knowledge and Population Diversity for Transferred PopulationsTami Alghamdi, Robert B. Heckendorn, Terence Soule. 127-133 [doi]
- An Online Reinforcement Learning Approach for Solving the Dynamic Flexible Job-Shop Scheduling Problem for Multiple Products and ConstraintsNour El-Din Ali Said, Yassin Samaha, Eman Azab, Lamia A. Shihata, Maggie Mashaly. 134-139 [doi]
- Adversarial Training Negatively Affects FairnessKorn Sooksatra, Pablo Rivas 0001. 140-145 [doi]
- Face of the Team - Diversity, Equity, and InclusionTsz Hin Martin Cheung, Erik Noyes, Leonidas Deligiannidis. 146-151 [doi]
- Evaluating Accuracy and Adversarial Robustness of Quanvolutional Neural NetworksKorn Sooksatra, Pablo Rivas 0001, Javier Orduz. 152-157 [doi]
- Cyberbullying Detection Neural Networks using Sentiment AnalysisJalal Omer Atoum. 158-164 [doi]
- Sequential Recommendation for Online Consumption by ACFNNYahong Lian, Jing Yun, Xiaoming Su, Zhiwei Xu 0002. 165-169 [doi]
- A Study on Deep Learning Approach to Optimize Solving Construction ProblemsPhillip Roshon, Feng-Jen Yang. 170-174 [doi]
- Generative Adversarial Network Applications in Creating a Meta-UniverseSoheyla Amirian, Thiab R. Taha, Khaled Rasheed, Hamid R. Arabnia. 175-179 [doi]
- LogicGAN-based Data Augmentation Approach to Improve Adversarial Attack DNN ClassifiersChristophe Feltus. 180-185 [doi]
- Pairwise Learning for Imbalanced Data ClassificationShu Liu, Qiang Wu. 186-189 [doi]
- EXPANSE, A Continual Deep Learning System; Research ProposalMohammadreza Iman, Khaled Rasheed, Hamid R. Arabnia. 190-192 [doi]
- PM2.5 Prediction Based on the Combined EMD-LSTM ModelJingyi Zhao, Fahu He, Zhanlin Ji, Ivan Ganchev. 193-195 [doi]
- An Altmetric Study of Artificial Intelligence in MedicineDavid Wu, Qiping Zhang. 196-198 [doi]
- GA-Based Optimization of Generative Adversarial Networks on Stock Price PredictionBate He, Eisuke Kita. 199-202 [doi]
- Abstractive Text Summarization Using Generative Adversarial Network and Relation ExtractionLiwei Jing, Lina Yang, Xichun Li, Zuqiang Meng. 203-206 [doi]
- Similarity Based Methods for Faulty Pattern Detection in Predictive MaintenanceSomayeh Bakhtiari Ramezani, Logan Cummins, Brad Killen, Richard Carley, Shahram Rahimi 0001, Maria Seale. 207-213 [doi]
- Visually Compatible Home Decor Recommendations Using Object Detection and Product MatchingUnaiza Ahsan, Yuanbo Wang 0001, Alexander Guo, Kevin D. Tynes, Tianlong Xu, Estelle Afshar, Xiquan Cui. 214-220 [doi]
- Prototyping: Sample Selection for Imbalanced DataEdward Schwalb. 221-227 [doi]
- Atomic Layer Deposition Optimization Using Convolutional Neural NetworksJulian Cagnazzo, Osama Sam Abuomar, Angel Yanguas-Gil, Jeffrey W. Elam. 228-232 [doi]
- Enhancing Textual Knowledge Discovery using a Context-Awareness ApproachNour Matta, Nada Matta, Evan Giret, Nicolas Declercq. 233-237 [doi]
- Data Visualization Tool for Covid-19 and Crime DataSean Walker, Sharad Sharma. 238-242 [doi]
- A Predictive Analytics Approach Based on Grey-Markov for Digital EconomyGuang Hu, Yue Tang. 243-248 [doi]
- Data Analysis of Crime and Rates of Hospitalization due to COVID-19Tyren Walker, Sharad Sharma. 249-254 [doi]
- The application of Evolutionary and Nature Inspired Algorithms in Data Science and Data AnalyticsFarid Ghareh Mohammadi, Farzan Shenavarmasouleh, Khaled Rasheed, Thiab R. Taha, M. Hadi Amini, Hamid R. Arabnia. 255-261 [doi]
- Mining the Impact of Social Media on High-Frequency Financial dataRay R. Hashemi, Omid M. Ardakani, Jeffrey A. Young, Chanchal Tamrakar. 262-267 [doi]
- A data science approach to readabilityRon Coleman. 268-272 [doi]
- Network Intrusion Detection System Using Principal Component Analysis Algorithm and Decision Tree ClassifierOyeyemi Osho, Sungbum Hong, Tor A. Kwembe. 273-279 [doi]
- Time Series Analysis of COVID-19 Cases in Humboldt CountySoeon Park, Mohammed Mahmoud, Sherrene Bogle. 280-284 [doi]
- A Modified Clustering Using Representatives to Enhance and Optimize Tracking and Monitoring of Maritime Traffic in Real-time Using Automatic Identification System DataCheronika Manyfield-Donald, Tor A. Kwembe, Jing-Ru C. Cheng. 285-289 [doi]
- Insurance Reserve Prediction: Opportunities and ChallengesAyman Taha, Bernard Cosgrave, Wael Rashwan, Susan McKeever. 290-295 [doi]
- Research on the status of industrial sewage equipment based on clustering ensembleQinlu Li, Tao Du 0002, Rui Zhang, Jin Zhou, Shouning Qu. 296-300 [doi]
- Using Data Analytics to Forecast Violent CrimeHerious Cotton, Tor A. Kwembe. 301-304 [doi]
- A Zero Trust Model Based Framework For Data Quality AssessmentMahmood Mohammed, John R. Talburt, Serhan Dagtas, Melissa Hollingsworth. 305-307 [doi]
- Classification of Compton Camera Based Prompt Gamma Imaging for Proton Radiotherapy by Random ForestsCarlos A. Barajas, Gerson C. Kroiz, Matthias K. Gobbert, Jerimy C. Polf. 308-311 [doi]
- Implementation of PCA enabled Support Vector Machine using cytokines to differentiate smokers versus nonsmokersSeema Singh Saharan, Pankaj Nagar, Kate Townsend Creasy, Eveline O. Stock, James Feng, Mary J. Malloy, John P. Kane. 312-317 [doi]
- On Signaling Dysregulation in CancerYoucef Derbal. 318-323 [doi]
- Visualizing population substructures using multidimensional scaling and data smoothingDimitrios Charalampidis. 324-329 [doi]
- SARS-CoV-2 variant strains and viral phylodynamics of ORF1a-1b genetic aspects in South AmericaLuiz Henrique Pontes dos Santos, Jannison Karlly Cavalcante Ribeiro, Juliana Osório Alves, Maria Izabel Florindo Guedes, Stela Mirla da Silva Felipe, Raquel Martins de Freitas, Paula Matias Soares, Cláudio Gleidiston Lima da Silva, Cristina Pacheco Santos, Eric Petterson Viana Pereira, Valdevane Rocha Araújo, Vânia Marilande Ceccatto. 330-336 [doi]
- Improving Gene Expression Prediction of Cancer Data Using Nature Inspired Optimization AlgorithmsPayal Patel, Kalpdrum Passi, Chakresh Kumar Jain. 337-343 [doi]
- Missing Value Recovery for Single Cell RNA Sequencing DataWenjuan Zhang, William Yang, John Talburt, Sherman Morton Weissman, Mary Qu Yang. 344-348 [doi]
- Application of Machine Learning to Sleep Stage ClassificationAndrew Smith, Hardik Anand, Snezana Milosavljevic, Katherine M. Rentschler, Ana Pocivavsek, Homayoun Valafar. 349-354 [doi]
- Optimization of a classical algorithm for the alignment of genomic sequences with artificial bee colonyRaul Magdaleno Peñaloza, Gerardo Reyes Salgado, Andrea Magadan Salazar. 355-360 [doi]
- Application of Protein Language Models to low-N Engineering of metalloproteinase inhibitorsElham Khorasani Buxton, Rushabh Patel, Mari R. Toumaian, Maryam Raeeszadeh-Sarmazdeh. 361-365 [doi]
- A Computational Approach to Identify Transcription Factor Binding Sites Containing Spacer RegionsPunithavathi Sundaramurthy, Brandon White, Wendy Lee. 366-369 [doi]
- Application of Machine Learning Ensemble Super Learner for analysis of the cytokines transported by high density lipoproteins (HDL) of smokers and nonsmokersSeema Singh Saharan, Pankaj Nagar, Kate Townsend Creasy, Eveline O. Stock, James Feng, Mary J. Malloy, John P. Kane. 370-375 [doi]
- Understanding How the Relative Abundance of Candida Species Impacts Transcriptional Regulation in Co-culture BiofilmsDiksha Kool, Katy Kao, Wendy Lee. 376-378 [doi]
- Persisting Trust in Emerging Hybrid-Clouds and 6G SystemsMuhammed Akif Agca, Djamel Khadraoui, Mehmet Naci Efe. 379-385 [doi]
- Utilizing HAPS Deployed Data Centers in Offloading Cloud WorkloadsTolga Ovatman, Muhammed Enes Tirnakçi, Ahmet Yilmaz. 386-391 [doi]
- Addressing the Small Files Issue in HadoopSonam Yadav, Sindhura Gali, Saranya Bangarusamy, Mohammed Mahmoud. 392-396 [doi]
- MOBDroid2: An Improved Feature Selection Method for Detecting Malicious Applications in a Mobile Cloud Computing EnvironmentNoah Oghenefego Ogwara, Krassie Petrova, Mee Loong Bobby Yang. 397-403 [doi]
- Engineering Cloud Applications for the WorkplaceNoah Bankston, Sandy Jarkas, Tara Jubran, Noah Pape, Sterling Walker, Terrell Brooks, Mohammed Mahmoud. 404-410 [doi]
- A Review of Vehicular Micro-CloudsAbhishek Phadke, F. Antonio Medrano, Stanislav Ustymenko. 411-417 [doi]
- An Algorithm to Enhance Data Integrity in Cloud ComputingMoloko P. Mothlabeng, Topside E. Mathonsi, Tonderai Muchenje, Deon P. Du Plessis. 418-424 [doi]
- Optimal Balance of Privacy and Utility with Differential Privacy Deep Learning FrameworksOlivera Kotevska, Folami Alamudun, Christopher B. Stanley. 425-430 [doi]
- Sublinear evaluation of complex networks for extensive exploration of configurations for critical scenarios and decision makingAlexandre C. B. Delbem, Antonio Mauro Saraiva, João Bosco A. London Jr., Rodrigo Zempulski Fanucchi. 431-436 [doi]
- *Ireddy Siddhartha, Huixin Zhan, Victor S. Sheng. 437-442 [doi]
- Application of an input-output pairings selection methodology to control multivariable systems based on multi-objective optimizationVíctor Huilcapi, Xavier Blasco Ferragud, Juan M. Herrero, Alberto Pajares, Gilberto Reynoso-Meza. 443-449 [doi]
- Zero-Shot Cross-Lingual Transfer in Legal Domain Using Transformer ModelsZein Shaheen, Gerhard Wohlgenannt, Dmitry Mouromtsev. 450-456 [doi]
- Hybridizing Teaching-Learning Based Optimization with GA and PSO: Case Study of Supply Chain Network ModelMitsuo Gen, Chuluunsukh Anudari, YoungSu Yun. 457-462 [doi]
- Knowledge Inference and Knowledge Completion Methods using Neuro-Symbolic Inductive RulesWon-Chul Shin, Hyun Kyu Park, Young-Tack Park. 463-469 [doi]
- Kabuki Explanation System Based on User's Knowledge and InterestsMiku Kawai, Jumpei Ono, Takashi Ogata. 470-475 [doi]
- Ant Colony Optimization for Balanced Multiple Traveling Salesmen ProblemBing Sun, Chuan Wang, Qiang Yang, Weili Liu, Weijie Yu. 476-481 [doi]
- Hybrid Meta-heuristics Approach for Solving Supply Chain Network Model under Disruption RiskChuluunsukh Anudari, YoungSu Yun, Mitsuo Gen. 482-487 [doi]
- Towards 'serendipity engineering for seductive hypermedia' and 'user analysis using socialnomics': The role of ecological cognitionJonathan Bishop, Mark M. H. Goode. 488-494 [doi]
- Selecting Optimal Portfolio in Generalized Feed Forward networks and Support vector machines hybridsNikos Loukeris, Iordanis Eleftheriadis, G. Gikas. 495-501 [doi]
- 2E) for Generative Classification with Low Complexity NetworkKevyn Kelso, Byeong Kil Lee. 502-505 [doi]
- Splatter: An Efficient Sparse Image Convolution for Deep Neural NetworksTristan Lee, Byeong Kil Lee. 506-509 [doi]
- A Two-Dimensional Model for Game Theory Based Predictive AnalyticsMirhossein Mousavi Karimi, Shahram Rahimi. 510-515 [doi]
- An Algorithm to Solve Systems of Nonlinear Differential-Algebraic Equations With Extraordinary Efficiency Even at High Demanded PrecisionsJosef Dobes, David Cerný. 516-520 [doi]
- Non-Orthogonal HOSVD Applied to 3-D Image CompressionIonela S. Munayco, Marina Chugunova, Ali Nadim. 521-526 [doi]
- Arbitrage Behavior amongst Multiple Cryptocurrency Exchange MarketsSamuel Grone, Weitian Tong, Hayden Wimmer, Yao Xu. 527-532 [doi]
- A New Unified Computational Method for Finding Confidence Intervals of Shortest Length and/or Equal Tails under Parametric UncertaintyNicholas A. Nechval, Gundars Berzins, Konstantin N. Nechval. 533-539 [doi]
- Ashurbanipal: A Diristry to Document Multimedia Metadata Tools for Transdisciplinary ArchivesAnousha Athreya, S. Koby Taswell, Andrew Kang, Ishani Das, Carl Taswell. 540-543 [doi]
- New Method for the Computation of Generating Functions with ApplicationsJun Zhang, Ruzong Fan, Fangyang Shen. 544-549 [doi]
- *Jackeline del Carmen Huaccha Neyra, Aurelio Ribeiro Leite de Oliveira. 550-555 [doi]
- A novel solution to perform real-time ETL process based on non-intrusive and reactive conceptsFlávio de Assis Vilela, Ricardo Rodrigues Ciferri. 556-561 [doi]
- Mechanical Anomaly Detection on an Embedded MicrocontrollerMansoureh Lord, Adam Kaplan. 562-568 [doi]
- Player Modeling using Behavioral Signals in Competitive Online GamesArman Dehpanah, Muheeb Faizan Ghori, Jonathan Gemmell, Bamshad Mobasher. 569-574 [doi]
- Scratch-Style Relational Algebra and CalculusLevi Meston, Jalal Kawash. 575-581 [doi]
- An Experimental Evaluation of a Function in Extremal CombinatoricsKai Wang, Hong Zhang. 582-586 [doi]
- Analysis of Routing Entropy in Hyperbolic TreesZalán Heszberger, András Majdán, András Gulyás, András Biró, László Balázs, József Bíró. 587-591 [doi]
- Robust asynchronous P systems for basic operationsNaoki Tojima, Akihiro Fujiwara. 592-597 [doi]
- Markov Regime Switching Analysis for the Pandemic and the Dynamics of German MarketKangrong Tan, Shozo Tokinaga. 598-603 [doi]
- Clustering algorithm based on k-value adaptive neighborhood selectionTianyu Shen, Youwei Wang, Tao Du 0002, Shouning Qu. 604-608 [doi]
- Cryptocurrency bounced back based on cryptography technology during the COVID-19 pandemicFatma Mallouli, Nesrine Khelifi, Aya Hellal, Eman Ferjani, Imen Gmach, Nada Chaabane, Rimah Amami, Rim Amami. 609-614 [doi]
- E-book Circulation System Based on BlockchainCheng-Chi Lee, Chung-Wei Li, Chun-Ta Li, Chin-Ling Chen. 615-619 [doi]
- Employing Genetic Algorithm and Discrete Event Simulation for Flexible Job-Shop Scheduling ProblemEman Azab, Nour El-Din Ali Said, Mohamed Nafea, Yassin Samaha, Lamia A. Shihata, Maggie Mashaly. 620-624 [doi]
- Blockchain as a Reliable Security FrameworkFady Nissan, Jacob Hamade, Jimmy Xiao, Jonah Ragle, Joshua Price, Julien Fares, Mohammed Mahmoud. 625-632 [doi]
- Hybrid Push-Pull Systems: Classification, Optimal Methods and UncertaintyHéctor Miguel, Gastelum-Gonzalez, Luis Antonio, Gama-Moreno, Ana Luisa, Garcia-Corralejo. 633-641 [doi]
- Proposal for the Virtual Library that Enables the User to Control the Bookshelf based on the Concept of TimelineXuezhen Li, Takayuki Fujimoto. 642-645 [doi]
- Multiple Story Generation Using Story Techniques Included in a Story : Full/Regular Research Paper, CSCI-ISCSJumpei Ono, Takashi Ogata. 646-650 [doi]
- Data Deletion and Recovery of Androd PlaformsHyungchan Kim, Yeonghun Shin, Sungbum Kim, Minju Kim, Wooyeon Jo, Taeshik Shon. 651-654 [doi]
- Security Analysis of Smart Watch and Band DevicesMinju Kim, Yeonghun Shin, Wooyeon Jo, Taeshik Shon. 655-658 [doi]
- Game Engine Based 2D Emotion Segmentation Generation MethodShinjin Kang, Jongin Choi, Hyunjeong Tae, Soo-Kyun Kim. 659-660 [doi]
- Deep Learning Based on Ensemble to Diagnose of Retinal Disease using Optical Coherence TomographyKuntha Pin, Yunyoung Nam, Sangho Ha, Jung-woo Han. 661-664 [doi]
- Fake News Detection on Social Media for Sustainable Trust-based Social NetworkingMaryam Bukhari, Muazzam Maqsood, Seungmin Rho. 665-670 [doi]
- AutoTR: Efficient Reformatting Text Spread out in a DOM Tree for Text-Analytic ApplicationsChangfeng Yu, Cheng Zhang 0016, Hao Zhang 0062, Jie Wang 0002. 671-674 [doi]
- Effectiveness of Privacy Techniques in Smart Metering SystemsMartin Peralta-Peterson, Olivera Kotevska. 675-678 [doi]
- The H2020 ANITA platform: generating knowledge about crime through user-centred innovative toolsValentina Mazzonello, Ernesto La Mattina, Roberto Acquaviva, Gianluca Cinà, Marialuna De Tommaso, Youssef Bouali, Barbara Pirillo, Simone Simoncini. 679-684 [doi]
- Model-Based Security Testing of Vehicle NetworksFlorian Sommer, Reiner Kriesten, Frank Kargl. 685-691 [doi]
- A new SOCMINT framework for Threat Intelligence IdentificationMarco San-Biagio, Roberto Acquaviva, Valentina Mazzonello, Ernesto La Mattina, Vito Morreale. 692-697 [doi]
- Mozi IoT Malware and Its Botnets: From Theory To Real-World ObservationsJosh Sahota, Natalija Vlajic. 698-703 [doi]
- Sprofiler: Automatic Generating System of Container-Native System Call Filtering Rules for Attack Surface ReductionTakashi Iiguni, Hitoshi Kamei, Keizo Saisho. 704-709 [doi]
- Consideration of the Use of Smart Grid Cyberattacks as an Influence Attack and Appropriate DeterrenceJeremy Straub. 710-715 [doi]
- Developing Cybersecurity Workforce: Introducing CyberSec Labs for Industry Standard Cybersecurity TrainingYasin Kose, Murat Ozer, Mehmet F. Bastug, Said Varlioglu, Oguzhan Basibuyuk, Hari Priya Ponnakanti. 716-721 [doi]
- Measuring the Effectiveness of Investment in Security Treatments through a Security ROI ModelToby Houchens, Yanzhen Qu. 722-727 [doi]
- Detecting Ransomware Automated Based on Network Behavior by Using Machine LearningHaydar Teymourlouei, Vareva E. Harris. 728-734 [doi]
- A Case Study of Credential Stuffing Attack: Canva Data BreachMinh Hieu Nguyen Ba, Jacob Bennett, Michael Gallagher, Suman Bhunia. 735-740 [doi]
- Securing on-Chip Communications: An On-The-Fly Encryption Architecture for SoCsAmin Sarihi, Ahmad Patooghy, Mahdi Hasanzadeh, Mostafa Abdelrehim, Abdel-Hameed A. Badawy. 741-746 [doi]
- Technical Analysis of the NSO Group's Pegasus SpywareJ. D. Rudie, Zach Katz, Sam Kuhbander, Suman Bhunia. 747-752 [doi]
- Leveraging Information Security Continuous Monitoring to Enhance CybersecurityTina Alsadhan, Joon S. Park. 753-759 [doi]
- How VMware Exploits Contributed to SolarWinds Supply-chain AttackJosh Huddleston, Pu Ji, Suman Bhunia, Joel Cogan. 760-765 [doi]
- MalDeWe: New Malware Website Detector Model based on Natural Language Processing using Balanced DatasetJovana Dobreva, Aleksandra Popovska-Mitrovikj, Vesna Dimitrova. 766-770 [doi]
- Remote Video SurveillanceLeonidas Deligiannidis. 771-776 [doi]
- Vulnerability in Massive API Scraping: 2021 LinkedIn Data BreachBrandon Gibson, Spencer Townes, Daniel Lewis, Suman Bhunia. 777-782 [doi]
- aMDH and TWIN: Two original honeypot-based approaches to protect swarms of dronesSerge Chaumette, Titien Cubilier. 783-787 [doi]
- Quantifying the Impact of Vulnerabilities of the Components of an Information System towards the Composite Rise ExposureYanzhen Qu, Adam English, Brace Hannon. 788-793 [doi]
- Machine Learning for Multiple Stage Phishing URL PredictionKhalid Amen, Mohamad Zohdy, Mohammed Mahmoud. 794-800 [doi]
- Digital Twins for Industrial Control Systems SecurityGuillermo Francia, Gregory Hall. 801-805 [doi]
- A Study of the Landscape of Security Issues, Vulnerabilities, and Defense Mechanisms in Web Based ApplicationsNick Rahimi. 806-811 [doi]
- A Novel Traceback Technology for E-mail Sender Verification : Type of submission: Regular Research Paper / Most relevant symposium: CSCI-ISCWWoo Young Park, Sang Hyun Kim, Duy-Son Vu, Chang Han Song, Hee Soo Jung, Hyeon Jo. 812-816 [doi]
- Taxonomy for Malware Detection to Enhance the Security of Smart Devices using AIAnusha Thapa, Abeer Alsadoon, Sreekanth Gopalakrishnan Nair, Muhammad Siddiqi, Rashidul Mubasher, Rajesh Ampani, Benoy Varghese, P. W. C. Prasad. 817-822 [doi]
- Analysis of the Information Security of Public Organizations in EcuadorRichard Romero Izurieta, Luis Jhony Caucha Morales, Segundo Moisés Toapanta Toapanta, Luis Enrique Mafla Gallegos, Jose Antonio Orizaga Trejo. 823-829 [doi]
- Developing an API for Block-Cipher Encryption powered by Supervised LearningAtif Tirmizi, Osama Abuomar, Khaled M. Alzoubi. 830-835 [doi]
- On the Impact of the Embedding Process on Network Resilience QuantificationLuiz Manella Pereira, S. Sitharama Iyengar, M. Hadi Amini. 836-839 [doi]
- The Need for Certification-Based Security Curriculum: A Matter of National SecurityGary L. Wallace. 840-843 [doi]
- Deep-Learning Side-Channel Attack Against STM32 Implementation of AESFanliang Hu, Huanyu Wang, Junnian Wang. 844-847 [doi]
- A safe dynamic access control providing mandatory automotive cybersecurityVincent Hugot, Adrien Jousse, Christian Toinard, Benjamin Venelle. 848-851 [doi]
- Zero-Trust Model of Cybersecurity: A Significant Challenge in the FutureFadi Al-Ayed. 852-854 [doi]
- Evaluation strategies at University for students with Dyslexia: a pilot study supported by face emotion recognitionMaura Mengoni, Silvia Ceccacci, Noemi Del Bianco, Ilaria D'Angelo, Simone Aperecida Capellini, Catia Giaconi. 855-860 [doi]
- Student Hackathons for Low Cost Digital SolutionsGermán Terrazas, Gregory Hawkridge, Duncan C. McFarlane, Mike McNally. 861-865 [doi]
- Cybersecurity Integration: Deploying Critical Infrastructure Security and Resilience Topics into the Undergraduate CurriculumStephanie Lunn, Monique Ross, Jason Liu 0001. 866-871 [doi]
- A Dev-Ops Practicum Course for Information Technology MajorsAdam Kaplan. 872-877 [doi]
- Learning Finance with Games: An Empirical StudySandy Ingram, Rania Islambouli, Miharisoa Andrianantenaina, Jean-Philippe Weisskopf, Philippe Masset, Nicole Baudat. 878-882 [doi]
- Assessing Cognitive Load for Junior Software Engineers: A Mixed-Method StudyMark Allison, Stephen W. Turner, Molly Kwasny. 883-888 [doi]
- Hyperparameter Optimization and Comparison of Student Performance Prediction AlgorithmsIbrahim A. Alharbi, Ali Jaber Almalki, Cliff C. Zou. 889-894 [doi]
- Redesigning An Undergraduate Course: Principles of Programming LanguagesXuguang Chen. 895-899 [doi]
- A Circular Framework from Branding to Recruitment in Perspective of Higher Education : Type of the submission: Full/Regular Research Paper Symposium acronyms is: CSCI-ISEDMiaoqing Chen, Ali A. Al-Babawat, Abeer Alsadoon, Srujal Patel, Razwan Mohmed Salah, P. W. Chandana Prasad. 900-906 [doi]
- Evaluation of Web-based Digital Storytelling Tools for Early Childhood EducationMarianthi Manousi, Jim Prentzas. 907-912 [doi]
- MarieSimR: The MARIE Computer Simulator RevisionXuejun Liang. 913-919 [doi]
- Computer Science Theory from a Practical Point of ViewPeter M. Maurer. 920-924 [doi]
- Modify Flipped Model of Co-regulation and Shared-regulation Impact in Higher Education, and Role of Facilitator on Student's AchievementAida Jafarian, Razwan Mohmed Salah, Abeer Alsadoon, Srujal Patel, Gustavo R. Alves, P. W. C. Prasad. 925-932 [doi]
- Usability Heuristics for Early Primary Children: A Case Study in Sri LankaS. M. U. P. Samarakoon, T. A. Weerasinghe, Hakim Usoof. 933-939 [doi]
- A Remote Instructional Approach with Interactive and Collaborative Learning to Teach an Introductory Programming Course during COVID-19 PandemicMd Mahmudur Rahman, Roshan Paudel Morgan. 940-946 [doi]
- The Mental Challenges of Emergency Remote Learning: UAE Engineering Students Case StudySara Suleymanova, Amjad Gawanmeh, Wathiq Mansoor. 947-952 [doi]
- A Blended Learning Approach Supporting the Improvement of Primary School Students' PerformanceStavros Tsetsos, Jim Prentzas. 953-958 [doi]
- Design of Network Forensics Labs for Teaching-oriented InstitutionsKewei Sha, Wei Wei, Arpit Jain. 959-963 [doi]
- Supporting Undergraduates for Careers in Computing and Engineering with Scholarships and SupervisionDulal Chandra Kar, Scott Alan King, Dugan Um. 964-969 [doi]
- Application of Consumptive Metrics to Measure Internship AlignmentMathew Nicho, Emad Bataineh, Tarannum Parkar. 970-975 [doi]
- The transformation process from in-campus classes into online classes due to COVID-19 pandemic situationEreza Baftiu, Krenare Pireva Nuci. 976-982 [doi]
- Statistical Study and Intelligent Classroom Proposal Adapted to Students with Speech and Hearing DisabilitiesAsmaa Elmahmoudi, Habiba Chaoui, Nour El Houda Chaoui. 983-989 [doi]
- Lessons and Experiences From Teaching Computing Science Capstone Project CoursesKewei Sha. 990-995 [doi]
- Impacts of COVID-19 and Social Measure on Behavioral Intention in the context of Online Learning SoftwareMinje Cho, Hyeon Jo. 996-1000 [doi]
- Undergraduate In-class Research Experience for Computer Architecture StudentsMuhittin Yilmaz. 1001-1007 [doi]
- A Real-Time Translation of Arabic Video Contents to Arabic Sign LanguageAshwag Maghraby, Safaa Qutub, Afraa Alandijani, Huda Alandijani, Linah Bakhsh, Nuha Alharbi. 1008-1013 [doi]
- Designing Diversity, Service, and Active Learning For the Common Good in an Undergraduate Computer Science CourseArshia Khan, Kathryn Milun. 1014-1020 [doi]
- The use of Augmented Reality to promote learning in Science LaboratoriesFrancielli Freitas Moro, Maria Paula Corrêa Angeloni, Liane Margarida Rockenbach Tarouco, João Bosco da Mota Alves. 1021-1025 [doi]
- Challenges of Incorporating a Mobile Device Forensics Detectives Summer Camp with Critical Thinking Amongst K-12 StudentsFrances C. Dancer, April L. Tanner, Mary M. Thomas. 1026-1030 [doi]
- Experiences with Hundreds of Similar and Customized Sites with DevOpsChristian Rodríguez, Gerónimo Afonso, Lucas Di Cunzolo, Mauricio Foster, Leandro Di Tommaso, Fernando G. Tinetti. 1031-1036 [doi]
- A strategy to assess computational thinkingAntonio González Torres, Lilliana Sancho-Chavarría, Magaly Zuniga-Cespedes, Jorge Monge-Fallas, José Navas-Sú. 1037-1042 [doi]
- Benchmarking the software engineering undergraduate program curriculum at Jordan university of science and technology with the IEEE software engineering body of knowledge: (software engineering knowledge Areas #11-15)Moh'd A. Radaideh. 1043-1049 [doi]
- Undergraduate Research Experiences: A case study from the Computer Science Department, University of GuyanaPenelope DeFreitas. 1050-1054 [doi]
- Teaching Undergraduate Software Engineering: Xamarin Mobile App Development During the Covid-19 PandemicM. Javed, M. Estep. 1055-1060 [doi]
- Evaluation of distance learning and students' achievement in Saudi Higher Education Institutions (HEIs)Fahd H. Almutari, Sung Chul Hong. 1061-1065 [doi]
- Effects of Social Distancing Intention, Affective Risk Perception, and Cabin Fever Syndrome on Perceived Value of E-learning : Type of submission: Late Breaking Paper / Most relevant symposium: CSCI-ISEDHyeon Jo. 1066-1071 [doi]
- Shifting the paradigms from teaching project management to teaching software project management at Jordan university of science and technology based on the IEEE software engineering management knowledge areaMoh'd A. Radaideh. 1072-1078 [doi]
- A Survey of Innovation in Undergraduate Computer Science EducationJoel Weymouth, Ramesh K. Karne, Alexander L. Wijesinha. 1079-1084 [doi]
- Ethics in Technology: Heroes Assemble!Gary L. Wallace. 1085-1090 [doi]
- Designing an Extreme-Based Teaching Model for the First Programming CourseLeon Pan. 1091-1094 [doi]
- Impact of COVID-19 pandemic on Higher EducationGeorge Feuerlicht, Marek Beránek, Vladimír Kovár. 1095-1098 [doi]
- Discovering Effective Learning Methods and Impact of Team-based Programming Projects in Graduate Level CoursesDewan Tanvir Ahmed. 1099-1102 [doi]
- Digital measurement of spatial ability using a Virtual Reality environmentJhasmani Tito, Tânia Basso, Regina Moraes. 1103-1107 [doi]
- Authentic Assessment in a Beginning Cybersecurity Course: A Pilot StudyGlen Sagers. 1108-1112 [doi]
- Reinforcement Learning - Based Control Systems For Networked Power InfrastructuresNamrata Saha, Shabnam Rezapour, M. Hadi Amini. 1113-1116 [doi]
- Posters about Women Pioneers in Computer Science to Break the Gender Gap: A Preliminary MethodLina García-Cabrera, Irene Pedrosa-García, José-María Serrano. 1117-1120 [doi]
- Agile Transformation for Capstone Projects: Preparing Graduates for the Job MarketMaha Al-Yahya, Rana Alkadhi, Hend Alrasheed. 1121-1124 [doi]
- The Power of Mentoring Programs in Retaining Women and Black, Indigenous, and Students of Color in Undergraduate Computing MajorsKristina Kramarczuk, Kate Atchison, Jandelyn D. Plane, Maya Narayanasamy. 1125-1128 [doi]
- Estimation of Problematic Portions in Presentation Slides Based on Analysis of Audience's Unconscious Reactions and Slide DataKo Saito, Ryo Onuma, Hiroki Nakayama, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura. 1129-1130 [doi]
- Design of a new innovative and systematic education program for tech-oriented startups and scaleups leadersDong h. Lee, Hwa Jeong Seo, Jinung An, Jong h. Lee. 1131-1132 [doi]
- Discussion Visualization Based on Analysis of Comments to Web NewsHiroki Wakabayashi, Hiroki Nakayama, Ryo Onuma, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura. 1133-1134 [doi]
- The Hub of Innovation and Entrepreneurship: Education through Collaboration between University and IndustryMona Elshinawy, Ginger Scarbrough, Patricia Sullivan. 1135-1136 [doi]
- Industry Connect Initiative: Partnering for Student SuccessBonnie Achee, Ghassan Alkadi, Matthew McNulty, Sandy Summers. 1137-1139 [doi]
- Myolink: EMG-based Inter-human Wireless Neuroprosthetic ControllerKathleen Martin, Jimmy Lee, Andrew Kim, Yi Zhao, Shane Walsh, Bahram Shafai. 1140-1145 [doi]
- Surgical Skill Training and Evaluation for a Peg Transfer Task of a Three Camera-Based Laparoscopic Box-Trainer SystemFatemeh Rashidi Fathabadi, Janos L. Grantner, Saad A. Shebrain, Ikhlas Abdel-Qader. 1146-1151 [doi]
- Sensor-based System to Algorithmically Recognize Gait Disturbances Common to Vascular Dementia OnsetArshia Khan, Janna Madden. 1152-1162 [doi]
- Modeling Clinical Practice Guidelines for Interactive Decision Support Exemplified by Primary Myelofibrosis and Immune ThrombocytopeniaPatrick Philipp, Louisa Hempel, Dirk Hempel, Juergen Beyerer. 1163-1168 [doi]
- A Novel Event-Related Desynchronization/Synchronization with Gamma Peak EEG model for Motor State IdentificationRavi Suppiah, Anurag Sharma, Noori Kim, Khalid Abidi. 1169-1175 [doi]
- Impact of Patch Extraction Variables on Histopathological Imagery Classification Using Convolution Neural NetworksWillmer R. Quinones, Ashraf Murtaza, Mun Yong Yi. 1176-1181 [doi]
- A Review of Publicly Patient-Centered Alzheimer's disease datasetsRui Wang, Chwan-Li Shen, Victor Sheng, Heng Wu, Zackery Toler, Samuel Temesgen. 1182-1188 [doi]
- Motor State Classification based on Electromyography (EMG) Signals using Wavelet Entropy and Neural NetworksRavi Suppiah, Khalid Abidi, Noori Kim, Anurag Sharma. 1189-1195 [doi]
- An Early Warning System for Patients in Emergency Department based on Machine LearningYing-Feng Hsu, Morito Matsuoka. 1196-1201 [doi]
- Understanding the multiclass classification of lymphomas from simple descriptorsTiago P. De Faria, Marcelo Zanchetta do Nascimento, Luiz G. A. Martins. 1202-1208 [doi]
- Estimating the Trend of COVID-19 in Iran Before and After the Start of VaccinationAlireza Safarzadeh, Mohammad Javad Heidarian, Reza Sharifanfar, Sina Forqandoost Haqiqi, Mohammad Reza Jamali. 1209-1216 [doi]
- Towards Language Models for AI Mental Health Assistant DesignCami Czejdo, Sambit Bhattacharya. 1217-1222 [doi]
- COVIUAM: A mobile app to get information about COVID-19 casesDelia Montero-Contreras, José Luis Quiroz-Fabián, Adriana Pérez-Espinosa, Rodrigo Rivera-Cerón. 1223-1228 [doi]
- Automated Indicator of Atrial Fibrillations Risk Using Machine LearningMajed Almazrouei, Murad Al-Rajab. 1229-1235 [doi]
- Smart Task Reminder Model for People with Mild Dementia at HomeDan O. Oketch, Topside E. Mathonsi. 1236-1240 [doi]
- Middleware to Integrate Patient Data from Heterogeneous Distributed Databases and Its EfficacySubrata Kumar Das, Mohammad Zahidur Rahman. 1241-1245 [doi]
- Iterative Ensemble Transductive Learning for Microscopy Image AnalysisTian Shi, Longshi Wu, Changhong Zhong 0001, Ruixuan Wang, Hongmei Liu. 1246-1249 [doi]
- Applied Blockchain Technology in Saudi Arabia Electronic Health RecordsAshwag Maghraby, Asmaa Numan, Arwa Al Mashi, Asrar Aljuhani, Razan Almehdar, Nada Abdu. 1250-1254 [doi]
- Data provenance management and application in Clinical Data SpacesXiaoyuan Bao, Jingsi Jiang, Kai Zhang. 1255-1258 [doi]
- Neural Net Analysis of Peak-Calling Errors in CUT&Tag DataMicah Lessnick, Holger Mauch. 1259-1263 [doi]
- A User Self-Design Collaborative Web System for Self-directed Health Learning: A Covid-19 Awareness ProjectAlireza Ebrahimi. 1264-1267 [doi]
- Toward Intelligent Respite-Care Dyad Monitoring Using IoTShakour Abuzneid, Miad Faezipour. 1268-1270 [doi]
- Development of a Causal Model to Study the Disparate Effects of COVID-19 on MinoritiesMisagh Faezipour, Miad Faezipour, Brianna Bauman. 1271-1274 [doi]
- Machine learning and big data based clinical EBM evidence acquisition and evaluationMeng Jin, Jingsi Jiang, Kai Zhang, Xiaoyuan Bao. 1275-1278 [doi]
- Privacy Modelling in Contact TracingMarius Mølnvik Øye, Bian Yang. 1279-1282 [doi]
- Lateral Flow Test Interpretation with Residual NetworksDena F. Mujtaba, Nihar R. Mahapatra. 1283-1286 [doi]
- Decision Making on School Closure Based on Correlation Analysis During COVID-19 PandemicIyke Maduako, Kwon Ryul Cha. 1287-1288 [doi]
- Supporting the Incorporation of Individual Patient Preferences for Decision Support in Breast Cancer TherapyMarie Bommersheim, Patrick Philipp. 1289-1290 [doi]
- A High-Performance 5G/6G Infrastructure for Augmented, Virtual, and Extended RealityJeffrey Wallace, Angelica Valdivia. 1291-1296 [doi]
- Security Threats and Possible Countermeasure In Digital HealthcareOlufemi Fasunlade, Shikun Zhou, David Sanders 0001. 1297-1302 [doi]
- Optimized Edge, Fog and Cloud Computing Method for Mobile Ad-hoc NetworksJosip Balen, Davor Damjanovic, Petar Maric, Kresimir Vdovjak. 1303-1309 [doi]
- 1An-Hui Lo, Justie Su-tzu Juan. 1310-1316 [doi]
- Web-based Malware Detection for Android OSHani Alshahrani, Ali Alshehri, Abdulrahman Alzahrani, Huirong Fu. 1317-1322 [doi]
- Distributed Algorithms for k-Coverage in Mobile Sensor NetworksRinku Sen, Rajib Kumar Das. 1323-1328 [doi]
- An ML Based Anomaly Detection System in real-time data streamsJavier Jose Diaz Rivera, Talha Ahmed Khan, Waleed Akbar, Muhammad Afaq, Wang-Cheol Song. 1329-1334 [doi]
- Key Factors Affecting Mobile App Usage Intensity During Isolation: A Cross-National Study : Type of submission: Full research paper / Most relevant symposium: CSCI-ISMCHyeon Jo. 1335-1340 [doi]
- DCLPP: A Distributed and Cooperative approach based on Local Path Planning for Multi-sensors Patrolling - Application to Rapid Bushfire DetectionTagne Fute Elie, Doris-Khöler Nyabeye Pangop, A. L. Ngou Njikam Aziz, Emamnuel Tonyé. 1341-1347 [doi]
- ACLSGO: Ant Colony Link State aware Geographic Opportunistic routing protocol for VANETFatima Belamri, Samra Boulfekhar, Djamil Aïssani. 1348-1354 [doi]
- Mimic: A Remote Webcam Device Over WebRTCLogan Crandall, Mason Roberts, En Cheng. 1355-1359 [doi]
- WPA3: The Greatest Security Protocol That May Never BeGlen Sagers. 1360-1364 [doi]
- An Enhanced VoIP Codec Transcoder to Enhance VoIP Quality for IP Telephone InfrastructureThubelihle S. Zulu, Topside E. Mathonsi. 1365-1369 [doi]
- Evaluation of the security level of Aruba wireless networks in an educational centerDe La Cruz De La Cruz Paola, Rúsbel Domínguez Domínguez. 1370-1376 [doi]
- Simulating Realistic IoT Network Traffic Using Similarity-based DSEPeter Brand, Joachim Falk, Tanja Maier, Jürgen Teich. 1377-1380 [doi]
- Dynamic model change analysis of social behavior processes during the COVID19 pandemicJulián A. Pucheta, Sergio Laboret, H. Daniel Patiño, Carlos A. Salas, Cristian Rodriguez Rivero, Martín R. Herrera. 1381-1387 [doi]
- Platform Neutrality and the Global Balance of PowersMarcel S. Stolz. 1388-1394 [doi]
- Effects of Different Recommendation Algorithms on Structure of Social NetworksSepideh Banihashemi, Abdolreza Abhari. 1395-1400 [doi]
- An Adaptive Approach for Fake News Detection in Social Media: Single vs Cross DomainShubhangi Rastogi, Shabeg Singh Gill, Divya Bansal. 1401-1405 [doi]
- Optimized Ranking-Based Community DetectionMatin Pirouz. 1406-1409 [doi]
- Proposal of an Application for Sharing Daily Ambient SoundMizuki Watanabe, Takayuki Fujimoto. 1410-1414 [doi]
- A Sentiment Analysis Approach for Abusive Content Detection using Improved DatasetAziz L. Ngou Njikam Abdou, Elie Fute Tagne. 1415-1420 [doi]
- The Impact of Social Media On HCIDaiyaan Ijaz, Fady Nissan, Henry Dare, Jonathan Williams, Sean Radatz, William Parker, Sherrene Bogle, Mohammed Mahmoud. 1421-1431 [doi]
- Information Dissemination Model and Trend Forecast of Short Video Social NetworkJiawei Han, Limin Jiang, Ying Xu, Jingwen Yang, Taotao Sun. 1432-1436 [doi]
- Uncertainty Estimation for Twitter InferenceMeng-Hsiu Tsai, Nicole Marie Ely, Yingfeng Wang. 1437-1440 [doi]
- Time is Important in Fake News Detection: a short reviewShubhangi Rastogi, Divya Bansal. 1441-1443 [doi]
- Living, Loving and Learning Online: Raising Awareness of the New Normal and its Security ConsiderationsPortia Buthelezi. 1444-1448 [doi]
- Determining the motivations to use Computer-Mediated CommunicationJunghyun Nam. 1449-1450 [doi]
- System and Methods for Optimal and Synchronized Workflow Based CommunicationMassoud Alibakhsh. 1451-1453 [doi]
- IoT-based Monitoring System to Prevent Collapse of Falsework Systems During ConstructionRonald Chun Yu Lam, L. C. H. Lam, N. X. Li, Peter Kai Kwong Lee. 1454-1459 [doi]
- Safe Social Internet of Thing for Urban Mobility ServicesMatteo Anedda, Mauro Fadda, Massimo Farina, Roberto Girau, Mariella Sole, Daniele D. Giusto. 1460-1464 [doi]
- DDS-Cerberus: Ticketing Performance Experiments and AnalysisAndrew T. Park, Richard Dill, Douglas D. Hodson, Wayne C. Henry. 1465-1469 [doi]
- UV-C VentGuard: An IoT-based Monitoring and Disinfection System for Pathogen Inactivation in Ventilation Pipes of High-rise BuildingsRonald Chun Yu Lam, C. K. Tang, K. L. A. Cheung, L. C. H. Lam. 1470-1475 [doi]
- A Novel Modular Low Power and Low Cost IoT Wireless Sensor Node for Air Quality MonitoringMatthew Meli, Edward Gatt, Owen Casha, Ivan Grech, Joseph Micallef. 1476-1481 [doi]
- A Token Label for Maturity Prediction using Current-Future Changing RateC. Alisdair Lee, Shum Paul Kwok-ching, H. Anthony Chan. 1482-1485 [doi]
- Analyzing a Low-bit rate Audio Codec - Codec2 - on an FPGAPeter Jamieson, Santhiya Sampath Kumar, José Augusto Miranda Nacif, Ricardo S. Ferreira 0001. 1486-1492 [doi]
- Scalability Evaluation of a Per-User Access Control FrameworkArata Endo, Chunghan Lee, Susumu Date. 1493-1499 [doi]
- A Service Tier Design for the EMULSION IoT PlatformIvan Ganchev, Zhanlin Ji, Máirtín O'Droma. 1500-1504 [doi]
- Weather Information Acquisition System using Small Wireless Microcomputers and Environmental Sensors for Agricultural SectorUyou Cyou, Shohei Yokoyama, Shingo Otsuka. 1505-1510 [doi]
- Human Activity Recognition in Smart Home using Deep Learning ModelsAbdoulaye Diallo, Chérif Diallo. 1511-1515 [doi]
- Internet of Things (IoT) in Healthcare: Applications, Challenges and SolutionsFarid Ghareh Mohammadi, Farzan Shenavarmasouleh, Hamid R. Arabnia. 1516-1522 [doi]
- A conceptual framework for a Blockchain-based Tax payment financial serviceAbhishek Phadke, F. Antonio Medrano, Jaimin Brahmbhatt. 1523-1527 [doi]
- An Internet of Things System with a Social Robot to Reduce the Risk of Hypothermia and Dehydration Occurring in Older AdultsHani Sindi, Rachel McCrindle. 1528-1533 [doi]
- A Review on Multiple Data Source Based Recommendation SystemsDebashish Roy, Farid Shirazi. 1534-1539 [doi]
- Service Prototype Provisioning for the EMULSION IoT PlatformIvan Ganchev, Zhanlin Ji, Máirtín O'Droma. 1540-1543 [doi]
- Development of a Wireless Communication System for Reliable Acoustic Data Collection Toward Anomaly Detection in Mechanical EquipmentChinari Takano, Shinya Fujino, Daiki Nobayashi, Kazuya Tsukamoto, Mitsunori Mizumachi, Takeshi Ikenaga. 1544-1547 [doi]
- Ziggurat: A Framework for Providing Scalability and Security in IoT BlockchainsBrett Glendenning, Riley Kiefer, Ashokkumar Patel. 1548-1550 [doi]
- Identifying actionable customer behavior through advanced analysis of bank transaction dataAnna Nesvijevskaia, Vincent Martenot, Paul Fogel, Jean-Daniel Zucker. 1551-1552 [doi]
- Convolutional Neural Networks for Morphologically Similar Fish Species IdentificationDena F. Mujtaba, Nihar R. Mahapatra. 1553-1559 [doi]
- Fusion of Visual and Textual Features for Table Header Detection in Handwritten Text ImagesAddisson Salazar, José Ramón Prieto, Enrique Vidal 0001, Gonzalo Safont, Luis Vergara. 1560-1566 [doi]
- Metricam: Fast and Reliable Social Distancing Analysis in Online Security CamerasBruno Padilha, Pedro Losco Takecian, Décio Lauro Soares, André Luís Schwerz, Leonardo Tadashi Kamaura, João Eduardo Ferreira. 1567-1573 [doi]
- Application Note: μPolar - An Interactive 2D Visualization Tool for Microscopic Time-Series ImagesMehran Ghafari, Daniel Mailman, Hong Qin 0003. 1574-1581 [doi]
- Improving classification of composite materials measured by ultrasounds using classifier combinationAddisson Salazar, Alberto Rodriguez 0002, Nancy Vargas, Luis Vergara. 1582-1587 [doi]
- Fish Species Classification with Data AugmentationDena F. Mujtaba, Nihar R. Mahapatra. 1588-1593 [doi]
- Corrupting Data to Remove Deceptive Perturbation: Using Preprocessing Method to Improve System RobustnessHieu Le, Hans Walker, Dung N. Tran, Peter Chin 0001. 1594-1599 [doi]
- Automatic Classification of Coronary Stenosis using Feature Selection and Boltzmann-Univariate Marginal Distribution AlgorithmMiguel-Angel Gil-Rios, Igor Guryev, Juan Manuel Lopez-Hernandez, Iván Cruz-Aceves. 1600-1605 [doi]
- Speeding-Up the Particle Filter Algorithm for Tracking Multiple Targets Using CUDA ProgrammingJinhua Zhang, Wenkai Guan, Cristinel Ababei, Henry Medeiros 0001, Richard J. Povinelli. 1606-1610 [doi]
- 3D Face Reconstruction from Front and Profile Images for Low Computational DevicesSankarshan Dasgupta, Mehdi R. Zargham. 1611-1616 [doi]
- Combining Technologies for Aiding Search Missions with DronesFernando G. Tinetti, Oscar C. Valderrama Riveros. 1617-1622 [doi]
- Neighborhood Base Matched Morphological Filters: Cross-fertilization with Linear Lowpass FilteringMahdi Khosravy, Neeraj Gupta, Olaf Witkowski, Antoine Pasquali. 1623-1628 [doi]
- Low-Resolution Face Recognition in Multi-person Indoor Environments Using Convolutional Neural NetworksGreg C. Lee, Yu-Che Lee, Cheng-Chieh Chiang. 1629-1633 [doi]
- Determining Performance of Computer Vision Models using Generalizability, Robustness & Elasticity ScoreAishwarye Omer, Hien Nguyen. 1634-1638 [doi]
- Nonnegative Matrix Factorization Approach for Image ReconstructionYueyang Wang, Bahram Shafai. 1639-1642 [doi]
- Gain and DC Offset Mismatch Correction in TI-ADC System Using Adaptive FilterMuktiben Mehta, Sung Won Park. 1643-1647 [doi]
- Efficient 2D Keypoint-based Hand Pose EstimationShan-Chien Hsiao, Ching-Te Chiu. 1648-1652 [doi]
- Multimodal Medical Image Fusion Based on Hybrid Bilateral Filter and Contrast Adjustment ModelYingmei Zhang, Hyo Jong Lee. 1653-1656 [doi]
- Age Invariant Face Recognition Methods: A ReviewKedimotse Baruni, Nthabiseng Mokoena, Mahalingam Veeraragoo, Ross Holder. 1657-1662 [doi]
- Partial Attention CenterNet for Bottom-Up Human Pose EstimationJiahua Wu, Hyo Jong Lee. 1663-1667 [doi]
- Optimal Bilateral Filtering of CT ImagesIvo R. Draganov, Veska Gancheva. 1668-1672 [doi]
- Simultaneous analysis of fMRI and EEG biosignals: a multimodal fusion approachLuis Manuel Pereira, Addisson Salazar, Luis Vergara. 1673-1677 [doi]
- Weight Perception Analysis using Electroencephalographic Signals : Full/regular papers, CSCI-ISPCMurtaza Aslam, Fozia Rajbdad, Ömer M. Soysal. 1678-1683 [doi]
- Late Fusion for Improving Intrusion Detection in a Network Traffic DatasetAddisson Salazar, Nancy Vargas, Gonzalo Safont, Luis Vergara. 1684-1689 [doi]
- Segmentation of Tuberculosis Bacteria: Evaluation and ComparisonV. Vanitha, S. Pitchumani Angayarkanni, M. Sathishkumar. 1690-1696 [doi]
- A Fully Convolutional Neural Network Based on 2D-Unet in Cardiac MR Image SegmentationYifeng Tan, Lina Yang, Xichun Li, Zuqiang Meng. 1697-1701 [doi]
- A Review Paper on Facial Recognition Techniques in E-businessTiyani Christopher Hlongwane, Topside E. Mathonsi, Deon Du Plessis, Tonderai Muchenje. 1702-1707 [doi]
- Artificial Intelligence in Support of Welfare Monitoring of Dairy Cattle: A Systematic Literature ReviewLucas Mendes Lima, Victor Calebe Cavalcante, Mariana Guimarães de Sousa, Cláudio Afonso Fleury, Diogo Oliveira, Eduardo Noronha de Andrade Freitas. 1708-1715 [doi]
- A Discussion of Optimization about Stereo Image Depth Estimation Based on Multi-baseline Trinocular Camera ModelHanrong Wang, Ming Li, Jie Wang, Yang Li, Sidan Du. 1716-1720 [doi]
- An Intelligent System for Detecting People from Images and Videos Provided by IoT DevicesChérif Diallo. 1721-1727 [doi]
- On the Selection of Hyperparameters in Convolutional Neural NetworksDonglin Wang, Qiang Wu 0003. 1728-1731 [doi]
- An Efficient Fingerprint Enhancement Algorithm for Access Control IdentificationCecilia N. Mphahlele, Topside E. Mathonsi. 1732-1735 [doi]
- Accelerating Model Validation by Reconstructing Image Sets Using GANToshiki Hatano, Taro Kiriyama, Toi Tsuneda, Satoshi Yamane. 1736-1739 [doi]
- Image Segmentation and Classification: Alien Plant Detection Using MATLABIbidun Christiana Obagbuwa, Kutlo Baldwin Mogorosi, Tshepang Duncan Morapedi. 1740-1743 [doi]
- Face Recognition Using MATLABIbidun Christiana Obagbuwa, Stefany Bam, Dineo Tiffany Moroka. 1744-1747 [doi]
- High-density 3D reconstruction in a Large space using single camera and 2D LiDARSangha Oh, Soon-Yong Park. 1748-1749 [doi]
- Comparison Study of Optimizer on CNN based Finger Number Recognition using sEMG SignalsSung-Hwan Bae, Chun Ki Kwon. 1750-1751 [doi]
- Human-in-the-Loop Automatic Data Migration for a Large Research Computing Data CenterFang (Cherry) Liu, Michael D. Weiner, Kevin Manalo, Aaron Jezghani, Christopher J. Blanton, Christopher Stone, Kenneth J. Suda, Nuyun Zhang, Dan Zhou, Mehmet Belgin, Semir Sarajlic, Rubén Lara. 1752-1758 [doi]
- Non-Blocking Technique for Parallel Algorithms with Global Barrier SynchronizationArturo Garza, Claudio A. Parra, Isaac D. Scherson. 1759-1764 [doi]
- Continuous Variable Quantum CompilationFederico Rueda, Sonia Lopez-Alarcon. 1765-1770 [doi]
- Out-of-GPU FFT: A case study in GPU prefetchingPeter Pirgov, Lenore Mullin, Rishi Khan. 1771-1776 [doi]
- Distributed Network Optimization for Secure Operation of Interdependent Complex NetworksM. Hadi Amini, Laurent L. Njilla, Ahmed Imteaj, Calvin Mark. 1777-1782 [doi]
- Accelerating Workload Processing with MPI for Porter's Stemming AlgorithmEduardo Colmenares, Heng Wu. 1783-1787 [doi]
- Parallel Multithreaded Medical Images FilteringVeska Gancheva. 1788-1793 [doi]
- Starvation Avoidance Task Scheduling Algorithm for Heterogeneous Computing SystemsAmjad Gawanmeh, Wathiq Mansoor, Sa'ed Abed, Darin Kablaoui, Hala Al-Faisal. 1794-1799 [doi]
- Prediction and Convergence Calculations using Rust-based NAlgebra GLMNoah W. Scott, Douglas D. Hodson, Richard Dill, Michael R. Grimaila. 1800-1804 [doi]
- Hierarchical and Density Aware Spectral Clustering Approach to Server Placement for Collaborative Virtual ServicesSakir Yucel. 1805-1810 [doi]
- Just Network Reorientation In RTDS May Differ the System Efficiency and AccommodativenessRashmi Sharma, Nitin 0001. 1811-1816 [doi]
- Odd-Even Flexible Router for High Performance Network-on-ChipsGarrett Hentges, Mostafa Abdelrehim. 1817-1820 [doi]
- A load balancing scheme based on deep learning in blockchain networkHye-Young Kim, Ji-Hyun Lee. 1821-1823 [doi]
- Model-Based Testing of Smart Home Systems Using EFSM and CEFSMAfnan Albahli, Anneliese Andrews. 1824-1829 [doi]
- A lightweight Ontology for real time semantic correlation of situation awareness data generated for first respondersIosif Angelidis, Elena Politi, George Vafeiadis, Danai Vergeti, Dimitris Ntalaperas, Nikos Papageorgopoulos. 1830-1835 [doi]
- Drowsiness Detection Systems: Comparison and Technical Criteria for Industrial DeploymentRalf Luis de Moura, Débora de Souza Martins, Luciana de Landa Farias Ceotto. 1836-1842 [doi]
- Optimal operation of a microgrid for energy-aware buildings by decision-based algorithmTeodora Mindra, Gheorghe Florea, Oana Chenaru, Radu Dobrescu, Lucian Toma. 1843-1848 [doi]
- P2P Power Trading between Nanogrid Clusters Exploiting Electric Vehicles and Renewable Energy SourcesSangkeum Lee 0002, Hojun Jin, Sarvar Hussain Nengroo, Dongsoo Har. 1849-1855 [doi]
- On cognitive management and non-causal reasoning for enabling highly automated drivingIlias E. Panagiotopoulos, Konstantina N. Karathanasopoulou, George J. Dimitrakopoulos. 1856-1861 [doi]
- Autonomous Cycle of Data Analysis Tasks for Scheduling the Use of Controllable Load Appliances using Renewable EnergyJose Aguilar, Juan Giraldo, Manuela Zapata, Andrés Jaramillo, Luis Zuluaga, Maria D. R.-Moreno. 1862-1867 [doi]
- Risk Assessment in the Context of Dynamic Reconfiguration of Level of Driving Automation in Highly Automated VehiclesIlias E. Panagiotopoulos, Konstantina N. Karathanasopoulou, George J. Dimitrakopoulos. 1868-1873 [doi]
- IoT Smart Home Devices' Security, Privacy, and Firmware Labeling SystemNaif Waheb Rajkhan, Jia Song. 1874-1880 [doi]
- The Concept of Resilience in Supply Chain: A Grounded Theory ApproachPeyman Akhavan, Lila Rajabion, Maryam Philsoophian. 1881-1885 [doi]
- Enhanced cybersecurity for safe smart worldChoongHee Han. 1886-1890 [doi]
- An Efficient CNN-based Approach for Automatic Brazilian License Plate RecognitionJoão Pedro Cabral, Vitor Gaboardi Dos Santos, Camila Souza, Alison Silva, Abraão Dantas, Nélio Cacho, Frederico Lopes, Daniel Araújo 0001. 1891-1894 [doi]
- An Overview of Selected Autoencoders and Their Potential Application in Smart CitiesReinhard Hendricks, Lena Charlotte Altherr. 1895-1897 [doi]
- Converting Android Native Apps to Flutter Cross-Platform AppsYoonsik Cheon, Carlos V. Chavez. 1898-1904 [doi]
- Preservation of Manual Changes and Provenance for Data Quality using the Nano Version Control RepoLukasz A. Machowski, Tshilidzi Marwala. 1905-1911 [doi]
- Regression Testing of Mobile AppsZeinab Abdalla, Anneliese Andrews, Ahmed Alhaddad. 1912-1917 [doi]
- Crossed analysis of three-variable for early pre-diagnosis of COVID-19Ana María Campos Mora, Diego Sánchez Buitrago, Leonardo Juan Ramírez López. 1918-1923 [doi]
- Grammar-based Fuzzing Tool Using Markov Chain Model to Generate New Fuzzing InputsHamad Al Salem, Jia Song. 1924-1930 [doi]
- Towards a Framework to compare Blockchain Platforms for Smart ContractsGiuseppe A. Di Lucca, Maria Tortorella. 1931-1937 [doi]
- Nano Version Control and "Robots of Robots" - Data Driven, Regenerative Production CodeLukasz A. Machowski, Tshilidzi Marwala. 1938-1943 [doi]
- Automatic Test Cases Generation for C Written Programs Using Model CheckingDaniset González Lima, Raul Ernesto Gonzalez-Torres, Pedro Mejía-Alvarez. 1944-1950 [doi]
- Software Development Methodologies for Virtual RealityBrendan Tischbein, Caroline Bull, Chris Wiegand, Denisa Gradianu, Elias Qamar, Fabian Isho, Mohammed Mahmoud. 1951-1957 [doi]
- A Comprehensive Framework for Measuring and Improving API UsabilityJeff Tian, Abdullah Bokhary, Sultan Alanazy. 1958-1963 [doi]
- Design of software applications using access and actions control policies based on trustMarcel Danilescu, Laura Danilescu. 1964-1968 [doi]
- Modern HCI for Mobile Applications, Study and ChallengesAli Abbiss, Brent Soloniewicz, Cameron Jordan, Chandler Connolly, Chris Wiegand, Corey Dutkiewicz, Mohammed Mahmoud. 1969-1975 [doi]
- A survey on security and human-related challenges in agile software deploymentNeha Singh, Palak Patel, Soma Datta. 1976-1982 [doi]
- A metric for software service outsourcing contracts within the scope of the Brazilian Federal Public AdministrationWashington Henrique de Carvalho Almeida, Felipe Furtado, Fernando Escobar. 1983-1988 [doi]
- Evolution of Software Development in the Video Game IndustryKieran Newell, Kunjal Patel, Magnus Lindén, Michael Demetriou, Michal Huk, Mohammed Mahmoud. 1989-1996 [doi]
- Virtual Basketball Training PlatformTyson Howard, Zizhong John Wang. 1997-2001 [doi]