Abstract is missing.
- Cognitive Programming AssistantIndervir Singh Banipal, Shubhi Asthana, Sourav Mazumder, Nadiya Kochura. 1-11 [doi]
- Correcting User Decisions Based on Incorrect Machine Learning DecisionsSaveli Goldberg, Lev Salnikov, Noor Kaiser, Tushar Srivastava, Eugene Pinsky. 12-20 [doi]
- On Graphs Defined by Equations and Cubic Multivariate Public KeysVasyl Ustimenko, Tymoteusz Chojecki, Michal Klisowski. 21-46 [doi]
- System Tasks of Digital Twin in Single Information SpaceMykola Korablyov, Sergey Lutskyy, Anatolii Voronin, Ihor Ivanisenko. 47-56 [doi]
- Smart City, Big Data, Little People: A Case Study on Istanbul's Public Transport DataEmre Kizilkaya, Kerem Rizvanoglu, Serhat Guney. 57-75 [doi]
- Educommunication as a Communicative Strategy for the Dissemination of Cultural ProgramsDavid Xavier Echeverría Maggi, Washington Dután, Lilibeth Orrala, Gregory Santa-María, Mariana Avilés, Ángel Matamoros, María-José Macías, Martha Suntaxi, Lilian Molina, Gabriel Arroba, Arturo Clery. 76-83 [doi]
- On Implemented Graph-Based Generator of Cryptographically Strong Pseudorandom Sequences of Multivariate NatureVasyl Ustimenko, Tymoteusz Chojecki. 84-98 [doi]
- Fengxiansi Cave in the Digital NarrativeWu-wei Chen. 99-107 [doi]
- Lambda Authorizer Benchmarking Tool with AWS SAM and Artillery FrameworkCornelius, Shivani Jaswal. 108-128 [doi]
- Hardware and Software Integration of Machine Learning Vision System Based on NVIDIA Jetson NanoDenis Manolescu, David C. Reid, Emanuele Lindo Secco. 129-137 [doi]
- Novel Approach to 3D Simulation of Soft Tissue Changes After Orthognathic SurgeryB. A. P. Madhuwantha, E. S. L. Silva, S. M. S. P. Samaraweera, A. I. U. Gamage, K. D. Sandaruwan. 138-149 [doi]
- EdgeBench: A Workflow-Based Benchmark for Edge ComputingQirui Yang, Runyu Jin, Nabil Gandhi, Xiongzi Ge, Hoda Aghaei Khouzani, Ming Zhao 0002. 150-170 [doi]
- An Algebraic-Geometric Approach to NP Problems IIF. W. Roush. 171-181 [doi]
- Augmented Intelligence Helps Improving Human Decision Making Using Decision Tree and Machine LearningMohammed Ali Al-Zahrani. 182-191 [doi]
- An Analysis of Temperature Variability Using an Index ModelWisam Bukaita, Oriehi Edisemi Anyaiwe, Patrick Nelson. 192-212 [doi]
- A Novel Framework Predicting Anxiety in Chronic Disease Using Boosting Algorithm and Feature Selection TechniquesN. Qarmiche, N. Otmani, N. Tachfouti, B. Amara, N. Akasbi, R. Berrady, S. El Fakir. 213-221 [doi]
- Machine Learning Application in Construction Delay and Cost Overrun Risks AssessmentAnia Khodabakhshian, Umar Malsagov, Fulvio Re Cecconi. 222-240 [doi]
- Process Mining in a Line ProductionCristina Santos, Joana Fialho, Jorge Silva, Teresa Neto. 241-257 [doi]
- Digital Transformation of Project ManagementZornitsa Yordanova. 258-268 [doi]
- Text Analysis of Ethical Influence in Bioinformatics and Its Related DisciplinesOliver Bonham-Carter. 269-289 [doi]
- A Multi-Criteria Decision Analysis Approach for Predicting User Popularity on Social MediaAbdullah Almutairi, Danda B. Rawat. 290-303 [doi]
- A Computationally Inexpensive Method for Anomaly Detection in Maritime Trajectories from AIS DatasetZahra Sadeghi, Stan Matwin. 304-317 [doi]
- An Ontology-Based Recommendation Module for Optimal Career ChoicesMaria-Iuliana Dascalu, Rares Birzaneanu, Constanta-Nicoleta Bodea. 318-331 [doi]
- Digital Infrastructures for Compliance Monitoring of Circular Economy: Requirements for Interoperable Data SpacesWout Hofman, Boriana Rukanova, Yao-Hua Tan, Nitesh Bharosa, Jolien Ubacht, Elmer Rietveld. 332-351 [doi]
- Predictive Analytics for Non-performing Loans and Bank Vulnerability During Crises in PhilippinesJessie James C. De Guzman, Macrina P. Lazo, Ariel Kelly D. Balan, Joel C. De Goma, Grace Lorraine D. Intal. 352-367 [doi]
- Classification of Academic Achievement in Upper-Middle Education in Veracruz, Mexico: A Computational Intelligence ApproachYaimara Céspedes-González, Alma Delia Otero Escobar, Guillermo Molero-Castillo, Jerónimo Domingo Ricárdez Jiménez. 368-382 [doi]
- Accelerating the Distribution of Financial Products Through Classification and Regression Techniques - A Case Study in the Wealth Management IndustryEdouard A. Ribes. 383-405 [doi]
- Are K-16 Educators Prepared to Address the Educational and Ethical Ramifications of Artificial Intelligence Software?Julie Delello, Woonhee Sung, Kouider Mokhtari, Tonia De Giuseppe. 406-432 [doi]
- Teleoperation of an Aerial Manipulator Robot with a Focus on Teaching: Learning ProcessesAlex R. Chanataxi, Jessica S. Ortiz. 433-447 [doi]
- Exploring Traditional and Tech-Based Toddler Education: A Comparative Study and VR Game Design for Enhanced LearningFatemehalsadat Shojaei. 448-460 [doi]
- A Universal Quantum Technology Education ProgramSanjay Vishwakarma, D. Shalini, Srinjoy Ganguly, Sai Nandan Morapakula. 461-470 [doi]
- Digital Formative Assessment as a Transformative Educational TechnologyBoumedyen Shannaq. 471-481 [doi]
- Meaningful Learning Processes of Service Robots for Tracking Trajectories Through Virtual EnvironmentsJhonatan W. Tercero, Jessica S. Ortiz. 482-498 [doi]
- Audience Engagement Factors in Online Health Communities: Topics, Domains and "Scale Effect"Konstantin Platonov. 499-510 [doi]
- Enhancing Human-Computer Interaction: An Interactive and Automotive Web Application - Digital Associative Tool for Improving Formulating Search QueriesBoumedyen Shannaq. 511-523 [doi]
- Dtnmqtt: A Resilient Drop-In Solution for MQTT in Challenging Network ConditionsLars Baumgärtner. 524-543 [doi]
- Forensic Analysis of Social Media Android Apps via TimelinesAyodeji-Ogundiran, Hongmei Chi, Jie Yan, Jerry Miller. 544-559 [doi]
- AES-ECC and Blockchain in Optimizing the Security of Communication-Rich IoTIbrahima Souare, Khadidiatou Wane Keita. 560-572 [doi]
- Bitcoin Gold, Litecoin Silver: An Introduction to Cryptocurrency Valuation and Trading StrategyHaoyang Yu, Yutong Sun, Yulin Liu 0002, Luyao Zhang 0001. 573-586 [doi]
- A Stakeholders' Analysis of the Sociotechnical Approaches for Protecting Youth OnlineXavier V. Caddle, Jinkyung Katie Park, Pamela J. Wisniewski. 587-616 [doi]
- Intrusion Detection in IoT Network Using Few-Shot Class Incremental LearningMostafa Hosseini, Wei Shi. 617-636 [doi]
- A Transcendental Number-Based Random Insertion Method for Privacy ProtectionKi-Bong Nam, Suk-Geun Hwang, Ki-Suk Lee, Jiazhen Zhou. 637-649 [doi]
- Zero Trust and Compliance with Industry Frameworks and Regulations - A Structured Zero Trust Approach to Improve Cybersecurity and Reduce the Compliance BurdenYuri Bobbert, Tim Timmermans. 650-667 [doi]
- The Forever Robotics Rules? An Overview Analysis of Their Applicability Scaled Over Time from Isaac Asimov to Our Software RobotsMonica-Ioana Vulpe, Stelian Stancu. 668-676 [doi]
- Artificial Intelligence (AI) in Medical Diagnostics: Social Attitude of PolesJoanna Ejdys, Magdalena Czerwinska. 677-686 [doi]
- Predictive Models of Gaze Positions via Components Derived from EEG by SOBI-DANSAkaysha C. Tang, Rui Sun, Cynthina Chan, Janet Hsiao. 687-698 [doi]
- Revealing the Relationship Between Beehives and Global Warming via Machine LearningJeongwook Kim, Gyuree Kim. 699-706 [doi]