Abstract is missing.
- The Disabled's Learning Aspiration and E-Learning ParticipationSeonglim Lee, Jaehye Suk, Jinu Jung, Lu Tan, Xinyu Wang. 1-10 [doi]
- Are CK Metrics Enough to Detect Design Patterns?Gcinizwe Dlamini, Swati Megha, Sirojiddin Komolov. 11-24 [doi]
- Detecting Cyberbullying from Tweets Through Machine Learning Techniques with Sentiment AnalysisJalal Omer Atoum. 25-38 [doi]
- DNA Genome Classification with Machine Learning and Image DescriptorsDaniel Prado Cussi, V. E. Machaca Arceda. 39-58 [doi]
- A Review of Intrusion Detection Systems Using Machine Learning: Attacks, Algorithms and ChallengesJose Luis Gutierrez-Garcia, Eddy Sánchez-Delacruz, Maria del Pilar Pozos Parra. 59-78 [doi]
- Head Orientation of Public Speakers: Variation with Emotion, Profession and AgeYatheendra Pravan Kidambi Murali, Carl Vogel, Khurshid Ahmad 0001. 79-95 [doi]
- Using Machine Learning to Identify Top Antecedents Affecting Crime in US CommunitiesKamil Samara. 96-101 [doi]
- Hybrid Quantum Machine Learning Classifier with Classical Neural Network Transfer LearningAvery Leider, Gio Giorgio Abou Jaoude, Pauline Mosley. 102-116 [doi]
- Repeated Potentiality Augmentation for Multi-layered Neural NetworksRyotaro Kamimura. 117-134 [doi]
- SGAS-es: Avoiding Performance Collapse by Sequential Greedy Architecture Search with the Early Stopping IndicatorShih-Ping Lin, Sheng-De Wang. 135-154 [doi]
- Artificial Intelligence in Forensic ScienceNazneen Mansoor, Alexander Iliev. 155-163 [doi]
- Deep Learning Based Approach for Human Intention Estimation in Lower-Back ExoskeletonValeriya Zanina, Gcinizwe Dlamini, Vadim Palyonov. 164-182 [doi]
- TSEM: Temporally-Weighted Spatiotemporal Explainable Neural Network for Multivariate Time SeriesAnh-Duy Pham, Anastassia Küstenmacher, Paul G. Ploeger. 183-204 [doi]
- AI in CryptocurrencyAlexander I. Iliev, Malvika Panwar. 205-217 [doi]
- Short Term Solar Power Forecasting Using Deep Neural NetworksSana Mohsin Babbar, Lau Chee Yong. 218-232 [doi]
- Convolutional Neural Networks for Fault Diagnosis and Condition Monitoring of Induction MotorsFatemeh Davoudi Kakhki, Armin Moghadam. 233-241 [doi]
- Huber Loss and Neural Networks Application in Property Price PredictionAlexander I. Iliev, Amruth Anand. 242-256 [doi]
- Text Regression Analysis for Predictive Intervals Using Gradient BoostingAlexander I. Iliev, Ankitha Raksha. 257-269 [doi]
- Chosen Methods of Improving Small Object Recognition with Weak Recognizable FeaturesMagdalena Stachon, Marcin Pietron. 270-285 [doi]
- Factors Affecting the Adoption of Information Technology in the Context of Moroccan SmesYassine Zouhair, Mustapha Belaissaoui, Younous El Mrini. 286-296 [doi]
- Aspects of the Central and Decentral Production Parameter Space, Its Meta-Order and Industrial Application Simulation ExampleBernhard Heiden, Ronja Krimm, Bianca Tonino-Heiden, Volodymyr Alieksieiev. 297-309 [doi]
- Gender Equality in Information Technology Processes: A Systematic Mapping StudyJ. David Patón-Romero, Sunniva Block, Claudia Ayala, Letizia Jaccheri. 310-327 [doi]
- The P vs. NP Problem and Attempts to Settle It via Perfect Graphs State-of-the-Art ApproachMaher Heal, Kia Dashtipour, Mandar Gogate. 328-340 [doi]
- Hadoop Dataset for Job Estimation in the Cloud with Limited BandwidthMohammed Bergui, Nikola S. Nikolov, Said Najah. 341-348 [doi]
- Survey of Schema Languages: On a Software Complexity MetricKehinde Sotonwa, Johnson Adeyiga, Michael Adenibuyan, Moyinoluwa Dosunmu. 349-361 [doi]
- Bohmian Quantum Field Theory and Quantum ComputingF. W. Roush. 362-371 [doi]
- Service-Oriented Multidisciplinary Computing: From Code Providers to TransdisciplinesMichael Sobolewski. 372-384 [doi]
- Incompressible Fluid Simulation Parallelization with OpenMP, MPI and CUDAXuan Jiang, Laurence Lu, Linyue Song. 385-395 [doi]
- Predictive Analysis of Solar Energy Production Using Neural NetworksVinitha Hannah Subburaj, Nickolas Gallegos, Anitha Sarah Subburaj, Alexis Sopha, Joshua Macfie. 396-415 [doi]
- Implementation of a Tag Playing Robot for EntertainmentMustafa Ayad, Jessica MacKay, Tyrone Clarke. 416-426 [doi]
- English-Filipino Speech Topic Tagger Using Automatic Speech Recognition Modeling and Topic ModelingJohn Karl B. Tumpalan, Reginald Neil C. Recario. 427-445 [doi]
- A Novel Adaptive Fuzzy Logic Controller for DC-DC Buck ConvertersThuc Kieu-Xuan, Duc-Cuong Quach. 446-454 [doi]
- Visual Mechanisms Inspired Efficient Transformers for Image and Video Quality AssessmentJunyong You, Zheng Zhang. 455-473 [doi]
- A Neural Network Based Approach for Estimation of Real Estate PricesVentsislav Nikolov. 474-481 [doi]
- Contextualizing Artificially Intelligent Morality: A Meta-ethnography of Theoretical, Political and Applied EthicsJennafer Shae Roberts, Laura N. Montoya. 482-501 [doi]
- An Analysis of Current Fall Detection Systems and the Role of Smart Devices and Machine Learning in Future SystemsEdward R. Sykes. 502-520 [doi]
- Authentication Scheme Using Honey SentencesNuril Kaunaini Rofiatunnajah, Ari Moesriami Barmawi. 521-540 [doi]
- HSDVS-DPoS: A Secure and Heterogeneous DPoS Consensus Protocol Using Heterogeneous Strong Designated Verifier SignatureCan Zhao, Xiaoxiao Wang, Zhengzhu Lu, Jiahui Wang, Dejun Wang, Bo Meng. 541-562 [doi]
- Framework for Multi-factor Authentication with Dynamically Generated PasswordsIvaylo Chenchev. 563-576 [doi]
- Randomness Testing on Strict Key Avalanche Data Category on Confusion Properties of 3D-AES Block Cipher Cryptography AlgorithmNor Azeala Mohd Yusof, Suriyani Ariffin. 577-588 [doi]
- A Proof of P ! = NP: New Symmetric Encryption Algorithm Against Any Linear Attacks and Differential AttacksGao-Ming. 589-601 [doi]
- Python Cryptographic Secure Scripting Concerns: A Study of Three VulnerabilitiesGrace LaMalva, Suzanna Schmeelk, Dristi Dinesh. 602-613 [doi]
- Developing a GSM-GPS Based Tracking System: Vulnerable Nigerian School Children as a Case StudyAfolayan Ifeoluwa, Idachaba Francis. 614-634 [doi]
- Standardization of Cybersecurity Concepts in Automotive Process Models: An Assessment Tool ProposalNoha Moselhy, Ahmed Adel Mahmoud. 635-655 [doi]
- Factors Affecting the Persistence of Deleted Files on Digital Storage DevicesTahir M. Khan, James H. Jones Jr., Alex V. Mbazirra. 656-673 [doi]
- Taphonomical Security: DNA Information with a Foreseeable LifespanFatima-Ezzahra El Orche, Marcel Hollenstein, Sarah Houdaigoui, David Naccache, Daria Pchelina, Peter B. Rønne, Peter Y. A. Ryan, Julien Weibel, Robert Weil. 674-694 [doi]
- Evaluation and Analysis of Reversible Watermarking Techniques in WSN for Secure, Lightweight Design of IoT Applications: A SurveyTanya Koohpayeh Araghi, David Megías, Andrea Rosales. 695-708 [doi]
- Securing Personally Identifiable Information (PII) in Personal Financial StatementsGeorge Hamilton, Medina Williams, Tahir M. Khan. 709-728 [doi]
- Conceptual Mapping of the Cybersecurity Culture to Human Factor Domain FrameworkEmilia N. Mwim, Jabu Mtsweni, Bester Chimbo. 729-742 [doi]
- Attacking Compressed Vision TransformersSwapnil Parekh, Pratyush Shukla, Devansh Shah. 743-758 [doi]
- Analysis of SSH Honeypot EffectivenessConnor Hetzler, Zachary Chen, Tahir M. Khan. 759-782 [doi]
- Human Violence Recognition in Video Surveillance in Real-TimeHerwin Alayn Huillcen-Baca, Flor de Luz Palomino-Valdivia, Ivan Soria Solis, Mario Aquino Cruz, Juan Carlos Gutiérrez-Cáceres. 783-795 [doi]
- Establishing a Security Champion in Agile Software Teams: A Systematic Literature ReviewHege Aalvik, Anh Nguyen Duc 0001, Daniela Soares Cruzes, Monica Iovan. 796-810 [doi]
- HTTPA: HTTPS Attestable ProtocolGordon King, Hans Wang. 811-823 [doi]
- HTTPA/2: A Trusted End-to-End Protocol for Web ServicesGordon King, Hans Wang. 824-848 [doi]
- Qualitative Analysis of Synthetic Computer Network Data Using UMAPPasquale A. T. Zingo, Andrew P. Novocin. 849-861 [doi]
- Device for People Detection and Tracking Using Combined Color and Thermal CameraPawel Woronow, Karol Jedrasiak, Krzysztof Daniec, Hubert Podgorski, Aleksander Nawrat. 862-874 [doi]
- Robotic Process Automation for Reducing Food Wastage in Swedish Grocery StoresLinus Leffler, Niclas Johansson Bräck, Workneh Yilma Ayele. 875-892 [doi]
- A Survey Study of Psybersecurity: An Emerging Topic and Research AreaAnkur Chattopadhyay, Nahom Beyene. 893-912 [doi]