Abstract is missing.
- Characterization of Emerging AI Workloads: Neural Logic Machines and Graph Convolutional NetworksCory Davis, Patrick M. Stockton, Eugene B. John, Zachary Susskind, Lizy K. John. 1-6 [doi]
- CLPL: A Self-supervised Contrastive Learning Pseudo-Labeling Framework for Tabular DataAbolfazl Farahani, Navid Hashemi Tonekaboni, Khaled Rasheed, Hamid R. Arabnia. 7-12 [doi]
- High-Dimensional Probabilistic Time Series Prediction Via WaveNet+tXiuxuan Sun, Jianhua Chen. 13-18 [doi]
- Cloud-Based Sepsis Prediction System with Neural Architecture Search ServiceYen-Han Chiang, Hsin-Yu Lee, Yi-Wei Huang, Hui-Shan Chen, Yi-Lun Pan. 19-25 [doi]
- Multi-Pollutant Ground-level Air Pollution Prediction through Deep MeteoGCN-ConvLSTMPratyush Muthukumar, Shaurya Pathak, Kabir Nagrecha, Hirad Hosseini, Dawn Comer, Navid Amini, Jeanne Holm, Mohammad Pourhomayoun. 26-34 [doi]
- Reconstructing Word Representations from Pre-trained Subword EmbeddingsPaula Lauren. 35-40 [doi]
- Unsupervised Machine Learning Methods for Diagnosing Autism Spectrum Disorder Using Multimodal Data: A SurveyAntika Roy, Pablo Rivas, Mahee Noor Tayba. 41-52 [doi]
- Experimental Study on Decision Fusion Parameters using Alpha IntegrationAddisson Salazar, Luis Manuel Pereira, Luis Vergara. 53-57 [doi]
- EXPANSE: A Continual and Progressive Learning System for Deep Transfer LearningMohammadreza Iman, John A. Miller 0001, Khaled Rasheed, Robert Maribe Branch, Hamid R. Arabnia. 58-65 [doi]
- A Tensor Decomposition in Multi-Way Electroencephalogram (EEG) Data AnalysisEssence J. Stevenson, Roger B. Sidje. 66-71 [doi]
- Which Deep Learning Framework Should I Use: A Comparative Study For Deep Regression ModelingVishu Gupta, Wei-keng Liao, Alok N. Choudhary, Ankit Agrawal 0001. 72-77 [doi]
- Machine Learning Methods for Evaluating Public Crisis: Meta-AnalysisIzunna Okpala, Shane E. Halse, Jess Kropczynski. 78-84 [doi]
- On Unsupervised Reconstruction with Dressed Multilayered Variational Quantum CircuitsPablo Rivas, Liang Zhao. 85-88 [doi]
- A Comparative Analysis of State-of-the-Art Time Series Forecasting AlgorithmsCathal Murray, Priyanka Chaurasia, Lynsey Hollywood, Damien Coyle. 89-95 [doi]
- Performance Reliability of Reinforcement Learning Algorithms in Obstacle Avoidance Game with Differing Reward FormulationsBrandon E. Hansen, Haley Dozier. 96-99 [doi]
- Effects of Selection Bias on Online Adversarial Aware SVM When Facing an Evasion AttackVictor Barboza Morais, Pradeep Chowriappa. 100-106 [doi]
- Implementation Roadmap for Neural Networks in Array DatabasesOtoniel José Campos Escobar, Peter Baumann 0001. 107-113 [doi]
- Reinforcement Learning Agent Design and Optimization with Bandwidth Allocation ModelRafael F. Reale, Joberto S. B. Martins. 114-120 [doi]
- Software-Based Mass Customization of Artificial Neural Networks and its BenefitsDominic Rosch-Grace, Jeremy Straub. 121-126 [doi]
- Investigating Gender and Racial Bias in ELECTRAMaryam Taeb, Yonathan Torres, Hongmei Chi, Shonda Bernadin. 127-133 [doi]
- Evaluating the Performance Acceleration of Generalized Linear Solver using Normal Equation on Three Architectures for Tall Skinny DatasetsTran Van Sang, Rie Shigetomi Yamaguchi, Ryosuke Kobayashi, Toshiyuki Nakata 0001. 134-139 [doi]
- Comparison of Machine Learning Methods for Human Activity Recognition Using Pseudo Free-Living DataEnas E. Alkhoshi, Khaled M. Rasheed, Hamid R. Arabnia, Frederick W. Maier, Jennifer L. Gay. 140-146 [doi]
- Autonomous Sprinkler System with MAPE-KMira Kim, Jennifer Jin. 147-152 [doi]
- A Framework of Soft Sensor Systems with Machine LearningWoo Young Moon, Soo Dong Kim. 153-159 [doi]
- Service Chatbots and International Students: A Systematic ReviewSonipriya Paul, Lydia Ray. 160-164 [doi]
- A Method Based on Deep Neural Network for Instance Segmentation of Retinal Lesions Caused by Diabetic RetinopathyCarlos Santos, Marilton S. Aguiar, Daniel Welfer, Marcelo Silva, Alejandro Pereira, Marcelo Ribeiro, Bruno Belloni. 165-171 [doi]
- Enabling A Network AI Gym for Autonomous Cyber AgentsLi Li, Jean-Pierre S. El Rami, Adrian Taylor, James Hailing Rao, Thomas Kunz. 172-177 [doi]
- An Evaluation of Machine Learning and Deep Learning Approach on Ekman Sentiment ClassificationAbdou Aziz L. Ngou Njikam, Elie Tagne-Fute, Lionel Landry Sopdeffo. 178-182 [doi]
- Component-Wise Natural Gradient Descent on Deep Neural NetworksTran Van Sang, Rie Shigetomi Yamaguchi, Mhd Irvan, Toshiyuki Nakata 0001. 183-188 [doi]
- Various Patient classification model using ABR dataJun Ma, Seong-Jun Choi, Jaehyoun Kim, Min Hong. 189-194 [doi]
- Minimizing Computational Overhead while Retaining Gameplay Effectiveness in Starcraft BotsDavid Kipnis, Wesley Deneke, Matthew Mitchell, Nils Rys-Recker. 195-200 [doi]
- Predicting the Impact of Wildfire Using Machine Learning Techniques to Assist Effective Deployment of ResourcesNikesh Kumar Pahuja, Maria H. Rivero. 201-205 [doi]
- Winter Wheat Crop Yield Prediction on Multiple Heterogeneous Datasets using Machine LearningYogesh Bansal, David Lillis, M. Tahar Kechadi. 206-212 [doi]
- Epileptic Seizure Electroencephalography Signal Classification Using Machine Learning AlgorithmZheng You Lim, Yong Li Neo. 213-218 [doi]
- Predicting Time Series Values with LSTM Different Scenarios for PredictionAlberto Arteta, Kristopher Allbright, Mehmet Sahinoglu, Luis Fernando de Mingo López. 219-225 [doi]
- Autonomous Voice Recognition Wheelchair Control SystemMokhles M. Abdulghani, Wilbur L. Walters, Khalid H. Abed. 226-230 [doi]
- Hyperparameters and Features Impacts in Artificial Intelligence Applied to Stock MarketVictor Martins De Borba. 231-235 [doi]
- Application of Multi-Task Learning for Abnormal Diagnosis and Trip Variable Prediction in Nuclear Power PlantsHye Seon Jo, Ji Hun Park, Man Gyun Na. 236-239 [doi]
- Qualitative Study of Text-to-Image AI Generators and their Relationship with NFTsEmine Arikan, Siamak Aram. 240-245 [doi]
- A Drone Flight Control Using Brain Computer Interface and Artificial IntelligenceMokhles M. Abdulghani, Arthur A. Harden, Khalid H. Abed. 246-250 [doi]
- Few-Shot Learning on Histopathology Image ClassificationAnkit Kumar Titoriya, Maheshwari Prasad Singh. 251-256 [doi]
- Artificial Intelligence's use in Congestive Heart Failure Mid-Term findingsAtif Farid Mohammad, Rajan Vanjani, Jagadisan Suresh. 257-263 [doi]
- Artificial Intelligence's Role in Chronic Condition Decision ExtrapolationAtif Farid Mohammad, Mike Boese, G. Amruta, Ishdeep K, Ramyaa G., Tavishaa Vanjani. 264-268 [doi]
- Cardiac Detection Using YOLO-v5 with Data PreprocessingSungjin Lee, XiBin Jia, Ahyoung Lee, Hyo-Wook Gil, Sungyeup Kim, Min Hong. 269-274 [doi]
- Performance Analysis of a Micromodel-Based Multinomial ClassifierJawahar Y. V, Sanjay Nithin S, Varalakshmi M, Peer Mohideen. 275-278 [doi]
- What a drag! Streamlining the UAV design process with design grammars and drag surrogatesMichael Sandborn, Carlos Olea, Anwar Said, Mudassir Shabbir, Péter Völgyesi, Xenofon D. Koutsoukos, Jules White. 279-283 [doi]
- Preliminary Results of Applying Transformers to Geoscience and Earth Science DataJustin Delgado, U. Ebreso, Yulia Kumar, J. Jenny Li, Patricia Morreale. 284-288 [doi]
- Word Embedding Neural Networks to Advance Knee Osteoarthritis ResearchSoheyla Amirian, Husam Ghazaleh, Mehdi Assefi, Hilal Maradit Kremers, Hamid R. Arabnia, Johannes F. Plate, Ahmad P. Tafti. 289-292 [doi]
- Challenges of Self-Supervised Learning for Unified, Multi-Modal, Multi-Task Transformer ModelsGraham Annett, Tim Andersen, Robert Annett. 293-297 [doi]
- To Shuffle or Not To Shuffle: Mini-Batch Shuffling Strategies for Multi-class Imbalanced ClassificationYuwei Mao, Vishu Gupta, Kewei Wang, Wei-keng Liao, Alok N. Choudhary 0001, Ankit Agrawal. 298-301 [doi]
- Remaining Trip Time Prediction Using Light Gradient Boosting Machine in Nuclear Power PlantsSang Won Oh, Sang Hyun Lee, Man Gyun Na. 302-305 [doi]
- Proposal of a Method for Inferring the Road Surface from Vibration Using Deep Learning on CanSatTakuya Saito, Miho Akiyama. 306-309 [doi]
- Machine Learning Algorithms for Natural Language Processing Tasks: A Case of COVID-19 Twitter data (Thailand)Kunyanuth Kularbphettong, Rujijan Vichivanives, Pannawat Kanjanaprakarn, Jaruwan Chutrtong, Nareenart Raksuntorn. 310-314 [doi]
- A Study of Model Based and Model Free Offline Reinforcement LearningIndu Shukla, Haley R. Dozier, Althea C. Henslee. 315-316 [doi]
- Machine Learning Opportunities for Improving Logistics within the ArmyJoseph E. Jabour, L. Thomas Arnold, Indu Shukla, Brandon E. Hansen, Haley R. Dozier, Ian D. Detwiller, Althea C. Henslee. 317-318 [doi]
- Designing of Prompts for Hate Speech Recognition with In-Context LearningLawrence Han, Hao Tang. 319-320 [doi]
- Intelligent Processing of Judicial Documents Based on Deep LearningJingzi Wang, Chao-Lin Liu. 321-322 [doi]
- Stacked Differential Evolution for Data Envelopment AnalysisPavel Krömer, Maryam Olfati. 323-329 [doi]
- Spoken Digits Classification Based on Spiking Neural Networks with Memristor-Based STDPDanila Vlasov, Yury Davydov, Alexey Serenko, Roman B. Rybka, Alexander G. Sboev. 330-335 [doi]
- Sampling Strategies for Exploratory Landscape Analysis of Bi-Objective ProblemsPavel Krömer, Vojtech Uher, Andrejaana Andova, Tea Tusar, Bogdan Filipic. 336-342 [doi]
- A Novel Hybrid Multi-resolution Image Registration Algorithm with Curvelet Trasnform and Artificial Neural NetworksHyunjong Choi, Xiao-Hua Yu. 343-348 [doi]
- Is There a Limit to the Utility of Analogy? A Case Study in Knowledge Graph Triple RepresentationAlexander Kalinowski, Yuan An. 349-355 [doi]
- Accuracy Analysis of Supervised and Unsupervised Techniques on Breast Cancer DatasetsElham Jahanpeikar, Mahdi Ebrahimi. 356-361 [doi]
- Knowledge Discovery of Bovine Tuberculosis in the Eurasian Badger using Machine Learning TechniquesKyle McBride, Aleksandar Novakovic, Adele H. Marshall, Emily Courcier. 362-367 [doi]
- Noise Suppression Using Gated Recurrent Units and Nearest Neighbor FilteringArghavan Asad, Rupinder Kaur, Farah A. Mohammadi. 368-372 [doi]
- Contextual fusion of classifiers under variable atmospheric conditions for coastal surveillanceOcéane Tran, Anne-Laure Jousselme, Gilles Tedeschi, Lionel Gardenal. 373-378 [doi]
- Stress Detection Using Physiological Signals Based On Machine LearningAshmita Hota, Sung Won Park. 379-384 [doi]
- Automatic Music Mastering using Deep LearningJared Smit, Byeong Kil Lee. 385-390 [doi]
- Fault Detection and Mitigation for Revenue Loss MinimizationS. L. Braide. 391-400 [doi]
- EEG Classifier Using Wavelet Scattering Transform-Based Features and Deep Learning for Wheelchair SteeringMokhles M. Abdulghani, Wilbur L. Walters, Khalid H. Abed. 401-405 [doi]
- Automatic Detection of Pathological Myopia Using Smartphone AppSarvat Ali, Shital Raut. 406-408 [doi]
- Survey and Comparison of Nature Inspired Optimization AlgorithmsJam Jahanzeb Khan Behan, Sajjad Haider. 409-415 [doi]
- Toward CORDIC-based Hyperbolic Function Implementation for Neural Engineering HardwareArdavan Vakil, Miad Faezipour. 416-418 [doi]
- Towards Practical onboard PHM System for Aircraft EnginesJian Cao, Jingyi Xu, Jiaqi Huang, Weidong Yang. 419-422 [doi]
- Deep Learning for Spatiotemporal Modeling of Illegal, Unreported, and Unregulated Fishing EventsDena F. Mujtaba, Nihar R. Mahapatra. 423-425 [doi]
- Inteplato: Generating Mappings of Heterogeneous Relational Schemas Using Unsupervised LearningLeonard Traeger, Andreas Behrend, George Karabatis. 426-431 [doi]
- Connected Hyperbolic Complex NetworksRolland Vida, József Bíró. 432-437 [doi]
- Web-based 3D Smog Visualization for Air Pollution AnalysisJordan Limperis, Felix Hamza-Lup, Weitian Tong. 438-444 [doi]
- A Review of the Informative Path Planning, Autonomous Exploration and Route Planning Using UAV in Environment MonitoringMarcela Ap. Aniceto dos Santos, Kelen Cristiane Teixeira Vivaldini. 445-450 [doi]
- A Modeling Strategy Using Bayesian Optimization with POMDP for Exploration and Informative Path Planning of UAVs in Monitoring of ForestMarcela Ap. Aniceto dos Santos, Kelen Cristiane Teixeira Vivaldini. 451-456 [doi]
- N-Body Performance With a kD-Tree: Comparing Rust to Other LanguagesJonathan Rotter, Mark C. Lewis. 457-462 [doi]
- Finite Difference Methods with Improved Properties and their Application to Solving Some Model ProblemsV. R. Ibrahimov, M. N. Imanova. 463-471 [doi]
- The 2-MAXSAT Problem Can Be Solved in Polynomial TimeYangjun Chen. 472-479 [doi]
- Refining a Parameter Setting Evolutionary Approach for Fire Spreading Models Based on Cellular AutomataMaria Eugênia de Avila Ferreira, Danielli A. Lima, Luiz G. A. Martins, Gina M. B. Oliveira. 480-486 [doi]
- An Open and Fully Decentralised Platform for Safe Food TraceabilityEric Tutu Tchao, Elton Modestus Gyabeng, Andrews Tang, Joseph Barnes Nana Benyin, Eliel Keelson, Jerry John Kponyo. 487-493 [doi]
- New Algorithms for the Computation of Inverse TransformsJun Zhang, Ruzong Fan, Fangyang Shen. 494-499 [doi]
- Modeling of Electrical Distribution System Reliability with Local and Interregional Bidirectional Centralized Electric Vehicle Charging StationsJanine C. G. Darato, Jordan R. Perlas, Taufik, Ali Dehghan Banadaki, Majid Poshtan. 500-506 [doi]
- Incentives Effect on the Size of Mining Pool for Power-of-Work Blockchain SystemsYean-Fu Wen, Chun Yu Huang. 507-512 [doi]
- A Review of Counterfeit Product Identification ModelsSelallo M. Rahlagane, Topside E. Mathonsi, Tshimangadzo Mavin Tshilongamulenzhe. 513-515 [doi]
- Formulations and Algorithms to Find Maximal and Maximum Independent Sets of GraphsMaher Heal, Kia Dashtipour, Mandar Gogate. 516-520 [doi]
- Intelligent Computational Approach to Constructing Adequate Statistical Decisions under Parametric Uncertainty of Applied Stochastic ModelsNicholas A. Nechval, Gundars Berzins, Konstantin N. Nechval. 521-528 [doi]
- Computation in Markoff-Hurwitz Equations IIIShanzhen Gao. 529-532 [doi]
- Entry and Exit Decision Under Uncertainty Where Prices Include Jump Diffusion ProcessesKangrong Tan, Shozo Tokinaga. 533-538 [doi]
- Effectiveness of PMV-Based Controls for Commercial Buildings in the USAMaya Arida, Ahmed Megri, Rand Talib. 539-545 [doi]
- Fibonacci Numbers In Memory Of Richard K. GuyWeizheng Gao, Jianning Su, Olumide Malomo, Julian Allagan, Adeyemi A. Adekoya, Ephrem Eyob, Somasheker Akkaladevi, Shanzhen Gao. 546-551 [doi]
- An Improved Sudoku SolverAdiba Afif Suha Binta Wadud, Mohammad Abdullah-Al-Wadud. 552-555 [doi]
- Running Time Comparison and Applications of Multiplying $\mathbf{2} \times \mathbf{2}$ Matrices Using the Strassen AlgorithmShanzhen Gao, Olumide Malomo, Ephrem Eyob, Weizheng Gao. 556-560 [doi]
- Automatic Plant Disease Detection Using Deep LearningSaeka Rahman, Sudip Vhaduri, Miad Faezipour. 561-564 [doi]
- Fault Identification in Wind Turbines: A Data-Centric Machine Learning ApproachDanielle R. Pinna, Rodrigo F. Toso, Rafaelli Coutinho, Ana Isabel Pereira, Diego Brandão. 565-568 [doi]
- Hibernation Based Hybrid Booting for Baseboard Management ControllerAjung Kim, Jae-Hoon An, Younghwan Kim, Jiman Hong. 569-571 [doi]
- Collagen a1 (XI) structure prediction by Alphafold 2Abu Sayeed Chowdhury, Julia Thom Oxford. 572-577 [doi]
- A Flexible Variant of the Neighbor-Joining for Building Phylogenetic TreesA. Chastel Lima, Eloi Araujo, Marco Aurelio Stefanes, Luiz C. S. Rozante. 578-583 [doi]
- Data-Mining with Three Genome-Scale Approaches Supports that Lungfish is the Closest Living Relative of Land Vertebrate, but not CoelacanthYunfeng Shan, Guo Li, Xiu-Qing Li, Robin Gras, Youjun Zhou. 584-594 [doi]
- Screening Results by Colorectal5 of 169 MicroarraysShuichi Shinmura. 595-601 [doi]
- Investigating Protein Structure Populations from Simulation Data using Unsupervised LearningGideon K. Gogovi, Joshua Kiddy K. Asamoah, Gabriel Obed Fosu. 602-608 [doi]
- An Overview of Machine Learning in BiologyAbigayle Hoppe, Ehyo Marie Degny, Callie Siverson, Frank Djarnie, Mohammed Mahmoud. 609-612 [doi]
- Word2Vec Embeddings for Categorical Values in Synthetic Tabular GenerationWaldemar Hahn, Martin Sedlmayr, Markus Wolfien. 613-622 [doi]
- Sparrow Tracer: Scalable Real Time Metrics from Event Log Pipelines at TwitterRiya Chakraborty, Lohit Vijayarenu, Zhenzhao Wang, Praveen Killamsetti. 623-627 [doi]
- CDAP: A Cultural Algorithm for Data Placement in Big Data WorkflowsMahdi Ebrahimi, Seyed Ziae Mousavi Mojab, Najmeh Najmi. 628-633 [doi]
- An Agri-Food Data Platform for Food Safety and CertificationNikos Papageorgopoulos, Danai Vergeti, Elena Politi, Dimitris Ntalaperas, Xanthi S. Papageorgiou, Manos Karvounis, Giannis Stoitsis, Braminir Rakic, Milos Kotlar, Simeon Petrov, Antoniy Kunchev. 634-639 [doi]
- SPECTS: Price Elasticity Computation Model Using Thompson SamplingSrividhya Sethuraman, Uma Maheswari G, Sharadha Ramanan. 640-646 [doi]
- Application of an Oversampling Method for Improving Road Surface ClassificationAddisson Salazar, Gonzalo Safont, Luis Vergara. 647-651 [doi]
- An RNN Model for Exploring the Macroeconomic and Financial Indicators in the Context of the COVID-19 PandemicRay R. Hashemi, Omid M. Ardakani, Jeffrey A. Young, Azita G. Baharami. 652-657 [doi]
- New Version of Fast Automatic Determination of Cluster Numbers for High Dimensional Big DataZohreh Safari. 658-663 [doi]
- Leveraging K-hop based Graph for the Staffing Recommender System with Parametric GeolocationYan Wang, Amar Henni, Azade Fotouhi, Leopold Mvondo Ze. 664-669 [doi]
- A Study on the Performance Comparison of Five Popular Machine Learning Models Applied for Loan Risk PredictionIhsan Said, Yanzhen Qu. 670-676 [doi]
- Creating a Dataset Used for Applying Machine Learning Techniques to Accurately Forecast the Energy Cost in Home-Based Small BusinessesEdwin Arrey Agbor, Yanzhen Qu. 677-683 [doi]
- Moving RDBMS to NoSQL ParadigmsHiwa Ali Faraj. 684-689 [doi]
- Generating Random XML Files Using DGLPeter M. Maurer, John Carbone. 690-694 [doi]
- Statistical relationship between internet data indicators and the Brazilian stock exchangeKethlyn C. Silva, Lucas J. Faria, Deborah S. A. Fernandes, Marcio G. C. Fernandes, Afonso Ueslei Da Fonseca, Fabrízzio Soares. 695-700 [doi]
- Exploring Attribute Selection and Classification Methods for Predicting Heart DiseaseRichard Jacob Stupka, Trinadh Chowdary Chigurupati, Devin Jackson, Demontae Moore. 701-706 [doi]
- Multi-user Searchable Attribute Based Encryption for Outsourced Big DataKyle Astudillo, Mahdi Ebrahimi, Adam Kaplan. 707-712 [doi]
- Using Reinforcement Learning with Transfer Learning to Overcome Smart Building Cold StartMikhail Genkin, J. J. McArthur. 713-718 [doi]
- Cyber-Physical System Based Data Mining and Processing Toward Autonomous Agricultural SystemsAbdulrahman M. Abdulghani, Mokhles M. Abdulghani, Wilbur L. Walters, Khalid H. Abed. 719-723 [doi]
- Dynamic Text Modeling and Categorization Framework based on Semantics Extraction and Similarity CheckingGaukhar Dauzhan, Alisher Iskakov, Miras Kenzhegaliyev, Dinh-Mao Bui. 724-730 [doi]
- Structuring Context Entities for Knowledge DiscoveryNour Matta, Nada Matta, Agata Marcante, Nicolas Declercq. 731-734 [doi]
- Understanding Decision-Making in Terms of its SemanticsImen Gmach, Nada Chaabane, Amal Abdulrazzaq AlFryyan, Nahla O. A. Mustafa, Nabila Alomari, Aya Hellal, Abeer Rafi Abdullah Alabdulrahman, Reem Matahen, Sajeda Qasim Aldiabat, Enas Kanan. 735-741 [doi]
- Implementing Hypergraph Databases with Fast Relationship Linking and Traversal Using ILEVitit Kantabutra. 742-747 [doi]
- "You look like a Troll": Using K-Means Algorithm with Trolling Score to Spot Trolling BehaviourSaríah López-Fierro, Carlos Chiriboga-Calderón, José López-Fierro, Rubén Pacheco-Villamar. 748-751 [doi]
- Proposal of a Multi-Purpose Marketing Data Analysis Program Design MethodologyDonggyu Choi, Jongwook Jang. 752-753 [doi]
- Social Network Analysis of Biomedical Research Growth at a Primarily Undergraduate InstitutionArmina Ferdous, Diane B. Smith, Tracy Yarnell, Julia Thom Oxford. 754-759 [doi]
- Knowledge-Infused Dynamic Embedding for Predicting the Severity of Suicidal Ideation in Social MediaDavid M. Lee, Hamidreza Moradi. 760-766 [doi]
- Sentiment Analysis and Topic Modeling on COVID-19 Vaccines using Twitter DataDaniel Ojeda, Eric Landaverde, Ching-Yu Huang, Daehan Kwak. 767-771 [doi]
- A $k-\text{Way}$ Partitioning Framework for Compression on Social NetworksChandra N. Sekharan, Sridhar Radhakrishnan, Michael R. Nelson. 772-778 [doi]
- Parenthood Mining Using Hashtag Social Network Mining ApproachXiaowen Wang, Mourad Oussalah 0002, Mika Niemelä, Tiina Ristikari. 779-784 [doi]
- An Analysis of Public Sentiment around Face Mask During Covid-19Eric Landaverde, Daniel Ojeda, Daehan Kwak. 785-789 [doi]
- PSR: Probabilistic Serendipitous RecommendationsHyeseong Park, Kyung-Whan Oh, Uran Oh. 790-795 [doi]
- A Smart Trust Based Approach for Sybil Node Detection in Online Social NetworksRanjan Kumar 0001, Yashwanth Dasari, Prabhat Kumar, Akash Sinha. 796-801 [doi]
- A Study on Public Sentiment of Comments from COVID-19-related Videos: Research Track on Social Network Analysis, Social Media, & Mining (CSCI-RTNA)Hualong Yu, Chao Xu, Guang Yu. 802-806 [doi]
- Understanding Context Collapse for Social Media UsersDaiyaan Ijaz, Jhan Araja, Sterling Walker, Mohammed Mahmoud. 807-812 [doi]
- A Study on Personal Identifiable Information Exposure on the InternetNingning Wu, Robinson Tamilselvan, Talha Tayyab. 813-818 [doi]
- Predicting the Trends of Stock Price By CNN-BiLSTM-AM and Fuzzy Twin Support Vector Machine From Social NetworksPei-Yi Hao. 819-825 [doi]
- Analyzing Climate Change Discussions on RedditMohammad S. Parsa, Haoqi Shi, Yihao Xu, Aaron Yim, Yaolun Yin, Lukasz Golab. 826-832 [doi]
- CSCI-RTNA: Research Paper: Security and Privacy Challenges in Voice-Based Social NetworksYouna Jung, Dylan Palmer, Mark Shelton. 833-838 [doi]
- An Experiment on Dynamic Extraction of the Human Relationships on the Web Using Closeness CentralityAyaka Ichikawa, Ryo Onuma, Hiroki Nakayama, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura. 839-844 [doi]
- Exploring Leverages and Pitfalls of Context Collapse in Modern CommunicationDaiyaan Ijaz, Jhan Araja, Sterling Walker, Mohammed Mahmoud. 845-850 [doi]
- Using Topological Analysis to Investigate True and False Information DiffusionAmin Riazi, Yingfeng Wang. 851-855 [doi]
- Nano-Resolution Visual Identifiers Enable Secure Monitoring in Next-Generation Cyber-Physical SystemsHao Wang, Xiwen Chen, Abolfazl Razi, Michael N. Kozicki, Rahul Amin, Mark Manfredo. 856-861 [doi]
- SREP+SAST: A Comparison of Tools for Reverse Engineering Machine Code to Detect Cybersecurity Vulnerabilities in Binary ExecutablesThomas Ryan Devine, Maximillian Campbell, Mallory Anderson, Dale Dzielski. 862-869 [doi]
- Classifying RDP Remote Attacks on User Interfaces to Industrial Control SystemsRyan P. Ramirez, Thuy D. Nguyen, Neil C. Rowe, Joseph T. Meier. 870-875 [doi]
- FDIA Detection Methods on a Navy Smart Grid AMI Data Set using Autoenocoder Neural Networks: A Case StudyPreston Musgrave, Preetha Thulasiraman. 876-882 [doi]
- Development of an Autonomous Retesting Penetration Testing ParadigmJeremy Straub. 883-889 [doi]
- Mapping Zero-Click Attack Behavior into MITRE ATT&CK Mobile: A Systematic ProcessAwad A. Younis, Zachary Daher, Brendan Martin, Connor Morgan. 890-896 [doi]
- A Multiagent CyberBattleSim for RL Cyber Operation AgentsThomas Kunz, Christian Fisher, James La Novara-Gsell, Christopher Nguyen, Li Li 0009. 897-903 [doi]
- Analyzing Attacks on Client-Side Honeypots from Representative Malicious Web SitesBrian A. Foley, Neil C. Rowe, Thuy D. Nguyen. 904-909 [doi]
- Performance Evaluation of Partially Homomorphic Encryption AlgorithmsGeorge Dimitoglou, Carol Jim. 910-915 [doi]
- Ada-Thres: An Adaptive Thresholding Method To Mitigate The False AlarmsJayesh Soni, Nagarajan Prabakar, Himanshu Upadhyay. 916-921 [doi]
- Data Behind the Walls - An Advanced Architecture for Data Privacy ManagementAmen Faridoon, M. Tahar Kechadi. 922-928 [doi]
- When AI Facilitates Trust Violation: An Ethical Report on Deep Model Inversion Privacy AttackMahdi Khosravy, Kazuaki Nakamura, Antoine Pasquali, Olaf Witkowski, Naoko Nitta, Noboru Babaguchi. 929-935 [doi]
- SMS Malware Detection: A Machine Learning ApproachHeather Broome, Yaju Shrestha, Nyzaireyus Harrison, Nick Rahimi. 936-941 [doi]
- Security Analytics Framework Validation Based on Threat IntelligenceViktor Sowinski-Mydlarz, Vassil T. Vassilev, Karim Ouazzane, Anthony Phipps. 942-947 [doi]
- An Experimental Evaluation of a Privacy-Preserving Authentication and Authorization SchemeKai Wang, Tyler Phillips, Xukai Zou. 948-952 [doi]
- Implementation of an Enhanced Security Algorithm for Detecting Distributed Denial of Services Attacks in Cloud ComputingCoster Baloyi, Deon P. Du Plessis, Topside E. Mathonsi, Tshimangazdo Mavin Tshilongamulenzhe. 953-957 [doi]
- Unmanned Aerial Vehicle Forensics Investigation Performance under Different AttacksTaiwo P. Ojo, Hongmei Chi, Samuel Kofi Erskine. 958-964 [doi]
- Comparative Analysis of LSTM and CNN for Efficient Malware DetectionFrances Osamor, Briana Wellman. 965-970 [doi]
- Roles of Information Security and Benefits in Forming User Satisfaction of MetaverseHyeon Jo, Sangsun Park. 971-975 [doi]
- The Need for Proactive Digital Forensics in Addressing Critical Infrastructure Cyber AttacksA. Tanner, F. C. Dancer, J. Hall, N. Parker, R. Bishop, T. McBride. 976-982 [doi]
- A Design Approach for Minimizing Data TheftGeorge O. M. Yee. 983-989 [doi]
- Cyber Warfare And National Security: Imperative For Naval OperationsAbdullahi Muhammad Ahmed, Adamu Hussaini, Alhassan Abdulhamid. 990-996 [doi]
- Gender Differences in the Perceptions of Information Security, Usefulness, and Enjoyment of MetaverseHyeon Jo, Sangsun Park. 997-1003 [doi]
- Qualitatively Evaluating a Four-Phase Process for Managing Solution of the United States' Biometric Identity RepositoryJames Merrill, Yanzhen Qu. 1004-1009 [doi]
- Development of Threat Hunting Model Using Machine Learning Algorithms for Cyber Attacks MitigationAkinsola J. E. T., Olajubu E. A., Aderounmu G. A.. 1010-1015 [doi]
- An Intelligent Approach for Intrusion Detection using Snake Optimizer and Random ForestSalahaldeen Duraibi. 1016-1021 [doi]
- Preventing Data Breaches: Utilizing Log Analysis and Machine Learning for Insider Attack DetectionHaydar Teymourlouei, Vareva E. Harris. 1022-1027 [doi]
- Implementation of an Enhanced Cybersecurity Algorithm for Smart GridKholofelo Hope Halefose, Topside E. Mathonsi, Tonderai Muchenje, Deon P. Du Plessis. 1028-1033 [doi]
- Full/Regular Research Paper submission to (CSCI-RTCW): Multi Class Classification of Online Radicalization Using Transformer ModelsChesta Sofat, Shabeg Singh Gill, Divya Bansal. 1034-1038 [doi]
- Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online BankingMunir Majdalawieh, Anoud Bani-Hani, Mohammed Hussain, Aisha AlShamsi. 1039-1046 [doi]
- Detection of Malicious Activities Using Machine Learning in Physical EnvironmentsTzu-Yen Hsu, Cheng-Yuan Tang. 1047-1052 [doi]
- Cyber-Criminals Metrics Engine for Attack Determination on Web Technologies PlatformsOlumide Malomo, Shanzhen Gao, Adeyemi A. Adekoya, Ephrem Eyob, Weizheng Gao. 1053-1058 [doi]
- Data Approach to Biometrics in Cybersecurity with Related RisksAngelo Arteche, Cody Asher, Caroline Bull, Henry Dare, Isha Datey, Erich Elshoff, Mohammed Mahmoud. 1059-1066 [doi]
- Linguistic Casualties: Cybersecurity Degrees Must Require Foreign LanguagesGary L. Wallace. 1067-1070 [doi]
- Detection and Isolation Malware by Dynamic Routing Moving Target Defense with ProxiesKouki Inoue, Hiroshi Koide. 1071-1075 [doi]
- Privacy-Preserving Collaborative Intrusion Detection Systems: A Federated Learning FrameworkChukwuebuka Ezelu, Ulrich Buehler. 1076-1079 [doi]
- Considering the Implications of Artificial Intelligence, Quantum Computing, and CybersecurityDominic Rosch-Grace, Jeremy Straub. 1080-1082 [doi]
- Contemporary Cybersecurity Challenges in Metaverse Using Artificial IntelligenceFadi Al-Ayed. 1083-1086 [doi]
- Semi-Supervised Methods for Detecting Cyber-Physical Attacks in Industrial Control SystemsCorwin Stanford, April Tanner. 1087-1090 [doi]
- Arithmetic Optimization Algorithm Based Feature Selection Approach for Malicious URL DetectionNawaf Abdualziz Almolhis. 1091-1093 [doi]
- CSecPrivAF - Cybersecurity, and Privacy Assessment Framework for IoT SystemsSérgio Ribeiro, João Pedro De Lima Cassiano, Alana Almeida. 1094-1095 [doi]
- Unknown Malicious Domain Detection based on DNS Query Analysis using Word2VecHiroto Yamada, Daiki Nobayashi, Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga. 1096-1097 [doi]
- Modeling the Resource Allocation in 5G Radio Access Networks with Network SlicingDaniel Haro-Mendoza, Luis Tello-Oquendo, Vicent Pla, Jorge Martínez-Bauset, Shih-Chun Lin, Luis A. Marrone. 1098-1104 [doi]
- On the Resource Allocation for Radio Access Network Slicing in Cellular IoT with Massive TrafficDaniel Haro-Mendoza, Luis Tello-Oquendo, Vicent Pla, Jorge Martínez-Bauset, Luis A. Marrone, Shih-Chun Lin. 1105-1111 [doi]
- Optimizing the Transmission of Multimedia Content over Vehicular NetworksP. Pablo Garrido, Pablo Piñol, Miguel Martínez-Rach, Otoniel López, Héctor Migallón, Manuel P. Malumbres. 1112-1116 [doi]
- Android Malware Detection Using Machine Learning TechniquesPriya Raghuvanshi, Jyoti Prakash Singh. 1117-1121 [doi]
- GRASSMARLIN-based Metadata Extraction of Cyber-Physical Systems Intrusion Detection in CyberSCADA NetworksJohn E. Efiong, Bodunde O. Akinyemi, Emmanuel Ajayi Olajubu, Ganiu Adesola Aderounmu. 1122-1128 [doi]
- Performance Optimization of Concurrent VOIP Calls Across Wireless Mesh NetworksOlusola Olorunnisola, Topside E. Mathonsi, Deon P. Du Plessis. 1129-1136 [doi]
- Mobile AR Application for Navigation and Emergency ResponseNishith Reddy Mannuru, Mounica Kanumuru, Sharad Sharma. 1137-1142 [doi]
- Improved Encryption Algorithm for Public Wireless NetworkChristopher Khosa, Topside E. Mathonsi, Deon P. Du Plessis, Tshimangazdo Mavin Tshilongamulenzhe. 1143-1149 [doi]
- Locating and Extracting Digital Evidence From Mobile: Malware ContextAbdullah Mujawib Alashjaee. 1150-1155 [doi]
- A Survey of Intelligent Traffic Control Algorithm in Wireless Sensor NetworksTshimangadzo Mavin Tshilongamulenzhe, Topside E. Mathonsi, DP DuPlessis. 1156-1160 [doi]
- Implementation of a Model to Amplify Transmission Quality of Satellite TelevisionLebohang Maja, Deon P. Du Plessis, Topside E. Mathonsi, Tshimangazdo Mavin Tshilongamulenzhe. 1161-1166 [doi]
- Crowd-Funded Earthquake Early-Warning SystemHudson Kaleb Dy, James Hsi-Jen Yeh. 1167-1173 [doi]
- Steganalysis on Covert Channel in IPv6 Flow LabelDa-Chih Lin, Quincy Wu. 1174-1177 [doi]
- Vehicle Ad Hoc Network System for Intelligent Transport SystemsNgobeni Ndzalama, Topside E. Mathonsi, Tonderai Muchenje, Vusumuzi Malele. 1178-1181 [doi]
- A Review of Authentication Algorithms for Mobile Ad Hoc NetworksThandiwe W. Mahlalela, Topside E. Mathonsi, Tonderai Muchenje, Vusumuzi Malele. 1182-1184 [doi]
- Collision Avoidance Method for Broadcast Communication Over Multi-Hop HD-PLC NetworkYuki Furuhama, Daiki Nobayashi, Kazuya Tsukamoto, Takeshi Ikenaga. 1185-1186 [doi]
- RSSI and Machine Learning-Based Positioning System With Sub-Meter AccuracyHanyuan Huang, Varick L. Erickson. 1187-1192 [doi]
- User Acceptance of A Modular Interactive Digital Twin of The Production Department for Virtual RealityMatej Dvorák, Jan Kubr, Miroslav Bednár, David Krákora, Miroslav Malaga, Petr Horejsi, Michal Simon. 1193-1198 [doi]
- Delay-Based Dynamic Clustering Method for the IoT ClusterSeo Jin Chang, Boyeon Kim, Yunseok Chang. 1199-1204 [doi]
- Implementation of a Multisensors Fire-Fighting Monitoring System for Forest ProtectionGiovanni Pettorru, Marco Bertolusso, Michele Spanu, Mariella Sole, Matteo Anedda, Daniele D. Giusto. 1205-1209 [doi]
- Smart Prediction System for Classifying Mirai and Gafgyt Attacks on IoT DevicesRawan Aldawod, Noura Alsaleh, Nojod Aldalbahi, Reema Alqahtani, Sapiah Sakri. 1216-1222 [doi]
- Humanoid Robot Acceptance: A Concise Review of LiteratureReilly Moberg, Arshia Khan. 1223-1228 [doi]
- Towards a smarter IoT environment with Ethereum Virtual Machine enabling ledgersSandi Gec, Dejan Lavbic, Vlado Stankovski, Petar Kochovski. 1229-1232 [doi]
- Security Model over Mobile Internet of Things in Wireless Networks: A ReviewTopside E. Mathonsi, Tshimangadzo Mavin Tshilongamulenzhe. 1233-1236 [doi]
- Study of Ultrasonic Data Collection System for Anomaly Detection for Mechanical EquipmentRio Shigyo, Daiki Nobayashi, Kazuya Tsukamoto, Mitsunori Mizumachi, Takeshi Ikenaga. 1237-1238 [doi]
- 5G Reference IoT Board for Smart FarmSo Young Kwon, Young-Hyung Kim, Dong-Soo Jung, Ki-Ryong Cha, Yong-Hwan Lee. 1239-1240 [doi]
- Fallacies in the Implementation of a Local Micro Smart GridSteffen Späthe, Peter Conrad. 1241-1247 [doi]
- Study on Q-Learning and Deep Q-Learning in Urban Roadside Parking Space SearchHung-Chin Jang, Chun-Yee Lee. 1248-1253 [doi]
- Data Driven Characterization and Predictive Classification of Energy Economy for Public TransportRoman Michael Sennefelder, Rubén Martín-Clemente, Ramón González Carvajal. 1254-1262 [doi]
- Development and Implementation of a Communication Network in a Formula SAE CarGuilherme P. de Lima, Luiz Carlos G. Sacramento Junior, Cristiano de Souza de Carvalho, Roberto F. Júnior, Luis B. de Assis Junior, Fabricio L. e Silva, Diego N. Brandão. 1263-1268 [doi]
- Methods and Tools for Monitoring Driver's BehaviorMuhammad Tanveer Jan, Sonia Moshfeghi, Joshua William Conniff, Jinwoo Jang, KwangSoo Yang, Jiannan Zhai, Monica Rosselli, David Newman, Ruth Tappen, Borko Furht. 1269-1273 [doi]
- Independent and Non-Invasive State Detection for Elevator Based on Total Current ConsumptionPirmin Held, Daniel Weißhaar, Djaffar Ould Abdeslam, Dirk Benyoucef. 1274-1280 [doi]
- A Contrastive Learning Based CNN-GRU Model for Time Series and Its Application for Water Quality PredictionYahong Lian, Jing Yun, Yuncheng Wang, Zhiwei Xu. 1281-1285 [doi]
- Modeling of DC House Distribution NetworkLauren Rotsios, Taufik Taufik, Siddharth Vyas, Majid Poshtan, Ali Dehghan Banadaki. 1286-1292 [doi]
- Waste Management SystemMesk Saad Aldossari, Taghreed Assaf Almarshadi, Reem Abduallah Alwasel, Rahaf Saeed Alqahtani, Ala Saleh AlLuhaidan. 1293-1298 [doi]
- Green Computing from a Holistic PerspectiveAshley Hoheisel, Brendan Betterman, Isaiah Dunham, Houston O'Leary, Mohammed Mahmoud. 1299-1302 [doi]
- Reaching Sustainable Development Goals Through Tax Reductions and Incentives within a Trustworthy Decentralized Autonomous OrganizationPetar Kochovski, Vlado Stankovski, Sandi Gec, Maja Klun, Mitja Decman. 1303-1306 [doi]
- GIS Applications in Air Pollution ModelingDaniel Isakovic, Josh Jordan, Connor Bowyer, Isabella Jamil, Elias Qamar, Mohammed Mahmoud. 1307-1313 [doi]
- Detecting Anomalous Energy Consumptions in Smart Buildings - an Overview of Two Unsupervised TechniquesCindy Mund, Lena Charlotte Altherr. 1314-1316 [doi]
- Container-Based VoIP Failover Design on Kubernetes Overlay NetworksCai-Sian Jhuang, Quincy Wu. 1317-1322 [doi]
- Response-Time Tail Mitigation in Cloud SystemsAsaad Althoubi, Hassan Peyravi. 1323-1329 [doi]
- Serverless Cloud Functions - Opportunity in ChaosMadhavi Jaival, Katya Mkrtchyan, Adam Kaplan. 1330-1335 [doi]
- Performance Assessment for Scheduling Algorithms In Cloud ComputingMimouna Abdullah Alkhonaini. 1336-1340 [doi]
- Approach of Migrating SAAS Applications to Password-Less AuthenticationIehab Al Rassan, Hala Alajlan. 1341-1345 [doi]
- Addressing Cloud Computing Security Issues with SolutionsSuvarchala Naidu, Mohammed Mahmoud. 1346-1351 [doi]
- A Concurrent Relaxed Queue for Unordered Parallel Accesses on GPUsMengshen Zhao, David Troendle, Byunghyun Jang. 1352-1358 [doi]
- An approach to parallelization of respiratory disease spread simulations in emergency roomsMartín Paradiso, Lucas Maccallini, Agustina Vericat, Fernando Romero 0003, Diego Omar Encinas. 1359-1365 [doi]
- Towards a Generic Framework for GPU-Parallelized Simulations of Light-Driven Nano-ParticlesFlorian Fey, Alexander Gerwing, Sergei Gorlatch. 1366-1371 [doi]
- Performance Evaluation on the Parallel Processing System with the Raspberry Pi 4Hyunseung Han, Kyungha Kim, Seungwoo Jung, Yunseok Chang. 1372-1374 [doi]
- Spatial Resolution Enhancement for Halftone Images Using Convolutional Neural NetworksGuilherme Apolinario Silva Novaes, Hae Yong Kim. 1375-1380 [doi]
- Fast Key Points Detection and Matching for Tree-Structured ImagesHao Wang, Xiwen Chen, Abolfazl Razi, Rahul Amin. 1381-1387 [doi]
- Foreign Object Debris Detection for Airport Pavement Images Based on Self-Supervised Localization and Vision TransformerTravis J. E. Munyer, Daniel Brinkman, Xin Zhong, Chenyu Huang, Iason Konstantzos. 1388-1394 [doi]
- Perspective Transformation LayerNishan Khatri, Agnibh Dasgupta, Yucong Shen, Xin Zhong, Frank Y. Shih. 1395-1401 [doi]
- Transform Decomposition Switching for Efficient Attribute Compression of 3D Point Clouds Using Neural NetworksReetu Hooda, W. David Pan, Bernard Vattepu Benson. 1402-1407 [doi]
- Smartphone-Based Turbidity Estimation with Inherent CalibrationDing Zhang, Alan Marchiori, Joshua Stough. 1408-1414 [doi]
- Interpretable Generative Modeling Using a Hierarchical Topological VAEEtienne Desticourt, Véronique Letort, Florence d'Alché-Buc. 1415-1421 [doi]
- Fixed-point iterative computation of Gaussian barycenters for some dissimilarity measuresAlessandro D'Ortenzio, Costanzo Manes, Umut Orguner. 1422-1428 [doi]
- Attentional Convolutional Neural Network for Automating Pathological Lung Auscultations Using Respiratory SoundsMd Motiur Rahman, Shiva Shokouhmand, Miad Faezipour, Smriti Bhatt. 1429-1435 [doi]
- Sentence-Level Sign Language Recognition FrameworkAtra Akandeh. 1436-1441 [doi]
- HPGER: Integrating Human Perception Into Group Emotion RecognitionAbolfazl Farahani, Navid Hashemi Tonekaboni, Khaled Rasheed, Hamid R. Arabnia. 1442-1446 [doi]
- Performance Analysis of Geo-Fencing Effect for Intruder MonitoringYoung-Il Kim, Park Seong Hee, Tae-Wook Heo, Tae-Chong Lee, Yong-Hyun Yeun, Seung-Tae Kim. 1447-1453 [doi]
- Smart Observer for Distant Water Fishing in TaiwanP. Karthikeyan 0004, Tan-Khang Luong, Jui-An Ku, Chih-Chun Chang, Hsiu-Chun Hsu, Pao-Ann Hsiung. 1454-1460 [doi]
- Weed Recognition in Sesame Field Using Computer Vision AlgorithmsUchechukwu Ngozi Nwachukwu, Cristian Rodriguez Rivero. 1461-1470 [doi]
- Lung Cancer Prediction System using CNN, ANN, And Naïve BayesHanan Aljuaid, Raida Alotaibi, Hilah Almatrafi, May Aldhobaie, Najla Alsowayed, Tina Alshalan, Leen Alfuraih. 1471-1476 [doi]
- Mean Maximum Raw Thresholding Algorithm for Detecting Suspected Regions of Interest of Tumors in Breast Magnetic Resonance ImagingAli Al-Faris. 1477-1483 [doi]
- Maritime UAV Patrol Tasks Based on YOLOv4 Object DetectionYi-Yu Chang, John Ayeelyan, Pao-Ann Hsiung. 1484-1490 [doi]
- Deep-RSI: Deep learning for Radiographs Source IdentificationFarid Ghareh Mohammadi, Ronnie Sebro. 1491-1496 [doi]
- Nostrils and Mouth Detection for Drivers Using Convolutional Neural Networks with Automatically Generated Ground Truth DataSorin Valcan, Mihail Gaianu. 1497-1503 [doi]
- Fast One-Stage Human Pose Estimation by Polar Coordinate RepresentationJiahua Wu, Hyo Jong Lee. 1504-1508 [doi]
- Group-level analysis of relations between resting-state functional connectivity and arithmetic ability using CONNGrace Metri, Xin Yang. 1509-1514 [doi]
- The Applications of GIS in Water ResourcesKirollos Girgis, Nicole Clouse, Olyana Mushe, Parker Morgan, Terrell Brooks, Mohammed Mahmoud. 1515-1520 [doi]
- Transfer Learning Approach for Multilabel Fine Grain Image Attribute ExtractionGaurav Sharma, Kuruvilla Abraham, Bagya Lakshmi V. 1521-1524 [doi]
- The Practical use of GIS in AgricultureAaron Butora, Brent Soloniewicz, Cameron Schwartz, Christian Aziz, Sichang Su, Mohammed Mahmoud. 1525-1529 [doi]
- UNet++ with Attention Mechanism for Hippocampus SegmentationXueting Cui, Thony Yan Liang, Maryamossadat Aghili, Micheal Adeyosoye, Rosie E. Curiel Cid, David A. Lowenstein, Ranjan Duara, Malek Adjouadi. 1530-1534 [doi]
- On the Design and Development of an Intelligent Safety Warning System for Slow-Moving VehiclesHongjun Su. 1535-1538 [doi]
- Citizen Science Mobile Apps with Machine Learning for Recyclable ObjectsChelsea Yeh, Fahim Hasan Khan. 1539-1542 [doi]
- Deep Learning-Based Multimodal Image Retrieval Combining Image and TextMd Imran Sarker, Mariofanna G. Milanova. 1543-1546 [doi]
- A Study of Feature Importance in Fish Species Prediction Neural NetworksDena F. Mujtaba, Nihar R. Mahapatra. 1547-1550 [doi]
- Automatic Arrhythmia Detection Using Deep LearningSaeka Rahman, Miad Faezipour. 1551-1554 [doi]
- An Unsupervised Object Localization Based on Topological Data AnalysisHong Cheng. 1555-1557 [doi]
- Hierarchical Deep Learning Models for Identification of Fish SpeciesDena F. Mujtaba, Nihar R. Mahapatra. 1558-1562 [doi]
- Synthesizing a Reference Image from the Macro Images of a Painting for Vignetting CorrectionSoonchul Jung, Jae-Woo Kim, Yoon-Seok Choi, Hyeong-Ju Jeon, Jin-Seo Kim. 1563-1565 [doi]
- Deep Learning-based Synthesized Image Attribution Using Frequency Distribution InformationJunbin Zhang 0002, Yixiao Wang, Hamid Reza Tohidypour, Panos Nasiopoulos. 1566-1567 [doi]
- Design a Hardware of Image Stitching Using LBP AlgorithmChang-Yong Lee, Min-Jun Cho, Yong-Hwan Lee. 1568-1569 [doi]
- Leveraging Data Pathways for Next Generation Safety Monitoring of Medicines and VaccinesJeffery L. Painter, Laurie Girard, Michael Glaser, Andrew Bate. 1570-1576 [doi]
- Diagnosis of Pediatrics Epilepsy Based on Graph Analysis of Scalp EEG Applying Mutual InformationElaheh Zarafshan, Parisa Forouzannezhad, Hoda Rajaei, Ulyana Morar, Mercedes Cabrerizo, Ilker Yaylali, Alberto Pinzon, Malek Adjouadi. 1577-1582 [doi]
- A Bioengineering System for Assessing Children's Cognitive Development by Computerized Evaluation of Shared IntentionalityIgor Val Danilov. 1583-1590 [doi]
- A Topological Characterization of DNA Sequences Based on Chaos Geometry and Persistent HomologyDong Quan Ngoc Nguyen, Phuong Dong Tan Le, Lin Xing, Lizhen Lin. 1591-1597 [doi]
- Comparison of Dimensionality Reduction Methods for Multimodal Classification of Early Stages of Alzheimer's DiseaseLuana Okino Sawada, Ulyana Morar, Robin Perry Mayrand, Christian Yaphet Freytes, Micheal Adeyosoye, Mercedes Cabrerizo, Rosie E. Curiel Cid, David Loewenstein, Ranjan Duara, Malek Adjouadi. 1598-1603 [doi]
- Evaluation of an Automated Mapping from ICD-10 to SNOMED CTPatrick Philipp, Julia Veloso, Arno Appenzeller, Tobias Hartz, Juergen Beyerer. 1604-1609 [doi]
- On Creating a Comprehensive Food DatabaseLexington Whalen, Brie Turner-McGrievy, Matthew McGrievy, Andrew Hester, Homayoun Valafar. 1610-1614 [doi]
- Comprehensive and User-Analytics-Friendly Cancer Patient Database for Physicians and ResearchersAli Firooz, Avery T. Funkhouser, Julie C. Martin, W. Jeffery Edenfield, Homayoun Valafar, Anna V. Blenda. 1615-1621 [doi]
- Construction of disease-pathological feature knowledge graph based on entity recognition and relation extractionJun Li, Honghai Feng, Pengcheng Zhou, Ruihui Hou, Yaju Wei, Yanyan Chen. 1622-1627 [doi]
- Applying Systems Engineering and Decision Analysis to Healthcare: a Perinatal Operations CenterJohn N. Celona, Louis Halamek. 1628-1634 [doi]
- Summarizing Behavioral Health Electronic Health Records Using a Natural Language Processing PipelineTristram Dacayan, Daniel Ojeda, Daehan Kwak. 1635-1639 [doi]
- Subject Skin Tone Classification with Implications in Wound Imaging using Deep LearningMasrur Sobhan, Daniela Leizaola, Anuradha Godavarty, Ananda Mohan Mondal. 1640-1645 [doi]
- Automatic Tuberculosis Detection using Binary Pattern of Phase CongruencyAfonso Ueslei Da Fonseca, Juliana Paula Felix, Gabriel da Silva Vieira, Deborah S. A. Fernandes, Fabrízzio Alphonsus A. M. N. Soares. 1646-1651 [doi]
- Exploring emotional stimulation to better address BPSD: Analysis of heart rate variability, electrodermal activity, mood alterations and its ethical implications of in dementia careYumna Anwar, Arshia Khan. 1652-1662 [doi]
- eVision: Forecasting the spread of Tuberculosis in India with Deep LearningJuan Manuel Zuluaga Fernandez, Michael Castillo, Divya Syal, Andrés Mauricio Calle, Navid Shaghaghi. 1663-1668 [doi]
- M-Health System Framework for Diagnosing Inflammatory Breast Cancer with Fuzzy LogicBuket D. Barkana, Ahmed ElSayed, Mark Pitcher, Ruba Deeb, Ruth Pfeiffer, Marilyn Roubidoux, Rana H. Khaled, Maha Helal, Hussein Khaled, Catherine Schairer, Amr S. Soliman. 1669-1674 [doi]
- Neuro-Respiratory and Mechanical Ventilation Methodologies for Exploring Human Cognitive OverloadMokhles M. Abdulghani, Wilbur L. Walters, Khalid H. Abed. 1675-1680 [doi]
- Implementation of Predictive Model for Diarrhea Among Afghanistan Children Based on Medical and Non-Medical AttributesAbdullah Zahirzada, Kittichai Lavangnananda. 1681-1686 [doi]
- The Research Activities and Development Trends of Antineoplastics Targeting PD-1/PD-L1 Based on Scientometrics and PatentometricsTing Zhang, Juan Chen, Yan Lu, Dngzi Xu, Xiaoyi Yang, Zhaolian Ouyang. 1687-1693 [doi]
- College Spread of COVID-19 in OhioAkinkunle Akinola, Akoh Atadoga, Kimberlyn Brooks, Vibhuti Chandna, Robert C. Green. 1694-1699 [doi]
- An Intelligent ZigBee Algorithm for Healthcare Monitoring System using Wireless Sensor NetworksPertunia N. Mosana, Tonderai Muchenje. 1700-1704 [doi]
- Medication Nonadherence in TB Patients: Innovative Technology Use and Related Legal Framework: Health Informatics And Medical Systems (CSCI-RTHI)Oluwaseun Adetunji, Olayinka Adeniyi, Adele Botha, Marlien Herselman. 1705-1712 [doi]
- Towards a SaaS application providing an ethical support for human caregiving of people living at homePierre Bouchet, Sophie Jacquot, Christian Toinard. 1713-1718 [doi]
- Current Cybersecurity Challenges of Applying Blockchain in HealthcareNahla F. AL Hamad, Jing-Chiou Liou. 1719-1724 [doi]
- Explainable A.I. in HealthcareHritik Rao, Arshia Khan. 1725-1729 [doi]
- Assessments Tools and Types of Therapies for Motor Skills Enhancement in the Elderly with Dementia: A Concise ReviewIsra Hassan, Arshia Khan. 1730-1735 [doi]
- Effects of Individual Cognitive Stimulation Therapy on People With Dementia: A PRISMA- Guided Systematic ReviewAlfia Parvez, Arshia Khan. 1736-1742 [doi]
- Improved Navigation for Social Robots Through Process OffloadingMaryam Kameli, Thomas Zurales, Arshia Khan. 1743-1748 [doi]
- Graph OLAP-based Influence Analytics for Complex Gene and Disease Influence NetworkMira Kim. 1749-1753 [doi]
- The Applications of Machine Learning in MedicineSailesh Bk, Nicholas Schmidberger, Louis Bentil, Shukri Ali, Steven Westmoreland, Mohammed Mahmoud. 1754-1759 [doi]
- Effects of Emotion Therapies on People With Dementia: A PRISMA-Guided Systematic ReviewSakina Rao, Arshia Khan. 1760-1766 [doi]
- HCI for Mobile Healthcare During the COVID-19 PandemicMitchell Macuga, Nicholas Wysocki, Rick Dymond, Terrell Brooks, Travis Bauman, Zachary Layman, Mohammed Mahmoud. 1767-1771 [doi]
- Covid-19 Prevention Online Information SystemsTyson Howard, Zizhong John Wang. 1772-1777 [doi]
- Free Technical Solutions for Ecological Momentary Assessments - Searching GitHub plus GoogleMichael Stach, Manfred Reichert, Fabian Prasser, Harald Baumeister, Winfried Schlee, Peter Heuschmann, Matthias Rose, Rüdiger Pryss. 1778-1781 [doi]
- Data Engineering to Support Intelligence for Precision Medicine in Intensive CareNasim Sadat Mosavi, Manuel Filipe Santos. 1782-1786 [doi]
- Computational Analysis of a Light-Weight SUVr Processing Technique for Neuroimaging Alzheimer's DiseaseRobin Perry Mayrand, Christian Yaphet Freytes, Luana Okino Sawada, Micheal Adeyosoye, Rosie E. Curiel Cid, David Lowenstein, Ranjan Duara, Malek Adjouadi. 1787-1791 [doi]
- Inflammation Assessment of Burn Wound with Deep LearningSaeka Rahman, Miad Faezipour, Guilherme Aramizo Ribeiro, Elika Ridelman, Justin D. Klein, Beth A. Angst, Christina M. Shanti, Mo Rastgaar. 1792-1795 [doi]
- Question Formulation and Transformer Model Resilience: Effects of Question-Wording Variants on the Robustness of Transformer-Based Question-Answer ModelsAshraf Elnashar, William Schreiber, Jules White, Douglas C. Schmidt. 1796-1799 [doi]
- Generalized Pandemic Equation for Monitoring COVID-19Michael Shur. 1800-1802 [doi]
- Internet-of-Things Monitoring of Physical Restraint PatientsChelsea Yeh, Alexander W. Lee, Melissa S. Lee, Karin C. Li. 1803-1807 [doi]
- Real-Time Monitoring of Urine Output with Internet-of-Things Connected Foley CathetersAlexander W. Lee, James Hsi-Jen Yeh. 1808-1811 [doi]
- Development of a healthcare monitoring diabetes mobile application for communityKanyarat Bussaban, Phanu Waraporn, Pattarapan Roonrakwit, Chanyapat Sangsuwan, Kunyanuth Kularbphettong. 1812-1815 [doi]
- Modelling Companion Animals' Well-being based on Activity Recognition and Biological Rhythms MonitoringHazar Zilelioglu, Ioana Ocnarescu, Ghazaleh Khodabandelou, Abdelghani Chibani, Clément Bataille, Jérôme Mlynarczyk, Yacine Amirat, Solène Le Bars. 1816-1818 [doi]
- Steady-State Visual Evoked Potential Classifiers for their Use in Industrial Brain-Computer InterfacesBryzgalov Dmitri, André Gaspard, Florian Waszak, Solène Le Bars. 1819-1820 [doi]
- Event Abstraction in Medical Context Using Self Organizing Maps (CSCI-RTHI)Patrick Philipp, Marie Bommersheim. 1821-1822 [doi]
- Nutrient Profiles of Food Items in Adolescent Diet: A Cluster Analysis of Data Collected from A High School Citizen Science ProjectJonah T. Treitler, Senait Tekle, Jennifer Ushe, Qing T. Zeng. 1823-1824 [doi]
- Monitoring circadian rhythms of night-shift operators with Hidden Markov Models: Poster paper: CSCI-RTHIRodrigo Balp, Solène Le Bars. 1825-1826 [doi]
- Intelligent Tutoring Systems in Healthcare for Low Literacy Population: A Concise ReviewRyan Ackerman, Francisco Icobelli, Renu Balyan. 1827-1829 [doi]
- Towards Specification Completion for Systems with Emergent Behavior based on DevOpsMohamed Toufik Ailane, Adina Aniculaesei, Christoph Knieke, Andreas Rausch, Fauzi Sholichin. 1830-1836 [doi]
- A Research Agenda for Embedding 4IR Technologies in the Leadership Management of Formal MethodsJohn Andrew van der Poll. 1837-1842 [doi]
- Test Case Prioritization for Mobile AppsZeinab Abdalla, Kerstin Haring, Anneliese Andrews. 1843-1848 [doi]
- Guidelines for Combining Regression Testing ApproachesZeinab Abdalla, Kerstin Haring, Anneliese Andrews. 1849-1854 [doi]
- Uncertainty and Dependency-wise Requirements PrioritizationNorah Ibrahim Alfassam, M. Abdullah-Al-Wadud, Mubarak Rashed Alrashoud. 1855-1858 [doi]
- On the Educational and Professional Implications of Integrating Mind Mapping in Software TestingPankaj Kamthan, Nazlie Shahmir. 1859-1865 [doi]
- GATE II: Visualizing Semantic Web SearchNisha Kottekat, Kevin Gary. 1866-1871 [doi]
- A Process Model for Ensuring Diffusion and Adhesion of Cybersecurity Innovations in Software Development OrganizationsGregory Vsevolozhsky, Yanzhen Qu. 1872-1878 [doi]
- Towards the Development of Text-Based Format Converters for Object RepresentationCarlos R. Jaimez González, Betzabet García Mendoza. 1879-1883 [doi]
- Improving Quality of Software Requirements by Using a Triplet StructureBruel Gérançon, Sylvie Trudel. 1884-1888 [doi]
- Measuring Influencing Factors of API UsabilityJeff Tian, Sultan Alanazy, Abdullah Bokhary, Sultan Alharthi, Sakher Ghanem. 1889-1894 [doi]
- Hospitality Industry 4.0 - Customize and Optimize Real-Time Allocation of RoomsVijayarangan Natarajan, Rashmi Kumari, Sakthi Priya M. 1895-1900 [doi]
- How We Develop an Online Kanban Board Game in Two Months?Yu-Hsiang Hu, Chien-Tsun Chen, Yu Chin Cheng. 1901-1906 [doi]
- Automating File Operations via PythonAndrew Miller, Nicholas Kobylski, Elias Qamar, Jimmy Xiao, Nicholas Veal, Richard Kenney, Nicholas Wysocki, Mohammed Mahmoud. 1907-1913 [doi]
- Web System for Storing and Visualizing Web Objects in XMLJosé M. Hernández-Salinas, Carlos R. Jaimez González, Betzabet García Mendoza. 1914-1919 [doi]
- GreenWebAdvisor: Discovering and Recommending Hidden Eco-Design' Best-PracticesMoussa Aboubakar, Moubarak Zoure, Ines Ben Kraiem, Mouna Ben Mabrouk. 1920-1921 [doi]
- Cloud Computing From an Architectural ViewSuvarchala Naidu, Mohammed Mahmoud. 1922-1925 [doi]
- Identifying Impact Criteria for Software Requirement Verification and Validation Tools SelectionKhalid Aldousari, Mohammad Abdullah-Al-Wadud. 1926-1930 [doi]
- The Suitability of Software as a Service (SAAS) as the Replacement to Traditional SoftwareRichard Anderson, Ronnie Nguyen, Nathaniel Duarte, Tekena Sylvester-Ogan, Mohammed Mahmoud. 1931-1935 [doi]
- Improving Autonomous Systems Education: A Literature SurveyJames I. Maher, Shannon Beck, Adrian A. de Freitas, Troy Weingart. 1936-1942 [doi]
- A MOOC on Computational Thinking for All: Pedagogical Principles, Challenges, and Their ApplicationNoa Ragonis, Orit Hazzan. 1943-1949 [doi]
- Leveraging Continuous Feedback in Education to Increase C Code QualityMax Schrötter, Bettina Schnor. 1950-1956 [doi]
- 'Who Done It?' A Multidisciplinary Mobile Device Forensics Framework: From Theory to Practice with Intermediate StudentsFrances C. Dancer, April L. Tanner, Mya N. Thomas, Mary M. Thomas. 1957-1963 [doi]
- Co-designing Immersive and Inclusive Virtual Museum with children and People with Disabilities: a Pilot StudyAldo Caldarelli, Stefano Di Tore, Silvia Ceccacci, Michele Domenico Todino, Lucia Campitiello, Catia Giaconi. 1964-1969 [doi]
- Developing Effective Cybersecurity Labs: Initiating the ConversationGlen Sagers. 1970-1976 [doi]
- Concept and Realization to Automatically Generate Test and Training Data for a Natural Language Processing Algorithm for the Assessment of Free Text Answers for Digital Courses on Work Design in the Context of Psychology Studies in Higher Educational InstitutionsRamona Srbecky, Franz Bühler, Simon-Alexander Wetzel, Michael Winterhagen, Wieland Fraas, Jan Dettmers, Matthias L. Hemmje. 1977-1982 [doi]
- Exploring the Impact of Student Learning and Programming Pedagogy while Adjusting to COVID-19 (An HBCU Case Study)Edward Dillon, Krystal L. Williams, Steven Fuller, Elisée Djapa, Abigail Dina, Makhya Wilridge, Chauncey Rogers. 1983-1987 [doi]
- Developing an Interdisciplinary Curriculum for Educational Robotics: Programming, STEM, and ArtLauren Harter, Alaina Caulkett. 1988-1991 [doi]
- Showcasing Native Wildflowers in Virtual RealityAndy Wagner, Leonidas Deligiannidis. 1992-1995 [doi]
- Initial Impact of Evidence-Based and Experiment-Focused Teaching Approach in a Computer Architecture Course in Computer ScienceMd Mahmudur Rahman, Opeyemi Adeniran, Neda Bazyar Shourabi, Oludare Owolabi. 1996-2002 [doi]
- Analysis of Student Learning Outcomes in Data Structures and AlgorithmsDewan Tanvir Ahmed. 2003-2007 [doi]
- Experience in Teaching and Engaging Computer Science and Computer Information Systems Students in Active LearningWeizheng Gao, Olumide Malomo, Somasheker Akkaladevi, Ephrem Eyob, Adeyemi A. Adekoya, Shanzhen Gao, Julian D. Allagan, Jianning Su. 2008-2014 [doi]
- Simulating Turing Machine in Augmented RealityWanwan Li. 2015-2022 [doi]
- Student Persistence in the Use of Test Driven DevelopmentJohn W. Coffey, Steve Bitner. 2023-2027 [doi]
- Forensic Technologies to Automate the Acquisition of Digital EvidencesDavid García, Llanos Tobarra, Antonio Robles-Gómez, Rafael Pastor Vargas. 2028-2033 [doi]
- Framework for Developing Cybersecurity Activities for Children in Grades K-5Georgia Tyner, Lila Rajabion. 2034-2040 [doi]
- Keeping Capstone Project Current with TechnologyHong Wang, Mason Huelskamp, Jakob Stober, Joshua Taylor, Amanda Joyner, Tyler Westhoven. 2041-2044 [doi]
- The Impact of Online Support on the Performance of Students Transitioning to University Mathematics in a Blended Learning EnvironmentMary Ruth Freislich, Alan Bowen-James. 2045-2048 [doi]
- Teaching Induction and Deductive ReasoningPeter M. Maurer. 2049-2053 [doi]
- Open-Source Education Development: An Experiential Capstone ReportJoseph Faulkner, Matthew McNulty, Ghassan Alkadi. 2054-2058 [doi]
- Teacher Practices for Computational Thinking Implementation in Elementary ScienceJennifer Pietros, Sara Sweetman, Minsuk K. Shim. 2059-2065 [doi]
- An Educational Software for Digital Terrestrial Television Broadcasting (DTTB) Systems to Engineering Students Using PythonKonstantinos Zarkadas, Apollon Smyrnaios, George Dimitrakopoulos. 2066-2071 [doi]
- Knowledge: Making a Quality ChoiceAntonio Sanchez. 2072-2075 [doi]
- Differences Between Neurodivergent and Neurotypical Learning During Covid-19: Towards the E-Tivities Satisfaction ScaleJonathan Bishop, Kamal Bechkoum. 2076-2080 [doi]
- A Framework for Promoting the Experience of Novices in Examining Articles that Alert Dangers of Disaster on Social MediaTomoki Ishii, Hiroki Nakayama, Ryo Onuma, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura. 2081-2085 [doi]
- A Set of Machine-Learning ExercisesMehdi R. Zargham, J. Cheng. 2086-2090 [doi]
- Review of Video Games & Simulation in Computer Science EducationJoel Weymouth, Rose Atuah. 2091-2096 [doi]
- Students behaviors and factors affecting online learning during the COVID-19 situation Based on Machine LearningJaruwan Chutrtong, Narumon Boonman, Supatchalee Sirichokworrakit, Kunyanuth Kularbphettong. 2097-2101 [doi]
- Information Technology Education: A Multi-Fold Learning ApproachMoh'd A. Radaideh. 2102-2107 [doi]
- An Educational Perspective on Online Learning PlatformsCameron Schwartz, Jason Wahby, Geko Ezekiel Jimenez, Kemal Koymen, Hunter Doll, Mohammed Mahmoud. 2108-2113 [doi]
- Industry Connect Initiative: A Preliminary Report on Internships and the Addition of Technical Career Manager to University Career ServicesBonnie Achee, Ghassan Alkadi, Sandy Summers, Matthew McNulty, John Burris. 2114-2117 [doi]
- Implementation of Microsoft's PowerBI into EducationDavid Zenisek, Michal Simon. 2118-2121 [doi]
- Networking and Computing: Creating Opportunities for Low Income Students to Succeed in Computing CareersSherri Turner, Anne Hinderliter, Arshia Khan. 2122-2124 [doi]
- LACGC: Learning Research Model for Knowledge & Contribution: Consumption, Creation, and Implementation of Knowledge: Academic and Non-AcademicSatpreet Singh. 2125-2128 [doi]
- Gateway Scholars Program - Reducing Barriers to STEM for Undergraduate Students Through Scholarship and Supportive ProgramsAmy Ulappa, Vicki Stieha, Diane B. Smith, Julia Thom Oxford. 2129-2132 [doi]
- Redesigning an Upper-Division Java Elective into a Job Interview Preparation ClassXuguang Chen. 2133-2136 [doi]
- Building Framework and Infrastructure to Assist a Minority Serving Institution (MSI) in Cybersecurity Program DevelopmentSwapnoneel Roy, O. Patrick Kreidl, Karthikeyan Umapathy, Zornitza G. Prodanoff, Iman Vakilinia. 2137-2139 [doi]
- Industry Connect Initiative: A Real World Ready Case Study in Information SystemsCaleb Martin, Jared Martin, Bonnie Achee, Ghassan Alkadi. 2140-2142 [doi]
- Data Science to Enhance Research Capacity of a Research-Intensive Medical CollegeQingguo Wang, Aize Cao, Vibhuti Gupta, Ashutosh Singhal, Todd Gary. 2143-2144 [doi]
- Proposal of a System Enabling Adaptive Support Based on Transition of Each Learner's Source CodesSoichiro Sato, Yoshiki Sato, Shoichi Nakamura, Youzou Miyadera. 2145-2146 [doi]