Abstract is missing.
- Product Search Prompts: Generator-Discriminator ApproachFedor Krasnov, Fedor Kurushin. 1-12 [doi]
- A Review of Speech Recognition and Application to Arabic Speech RecognitionEman Aboelela, Omar Mansour. 13-31 [doi]
- Digital Redlining: Past and Present MotivationsKyra Milan Abrams. 32-43 [doi]
- Aligning the FEDeRATED Upper Ontology with Battery and Electronics Ontologies to Aid Circular Economy Monitoring in PracticeTheodor Chirvasuta, Anelia Kurteva, Wout Hofman, Boriana Rukanova, Yao-Hua Tan. 44-61 [doi]
- Employing WGAN-GP for Synthesizing Biophysical Data: Generating Synthetic EEG for Concentration and Relaxation Level PredictionArchana Venugopal, Diego Resende Faria. 62-80 [doi]
- Clustering the Nodes of Sparse Edge-Weighted Graphs via Non-backtracking SpectraMarianna Bolla, Hannu Reittu, Fatma Abdelkhalek. 81-99 [doi]
- Measuring Crime with Double Machine Learning: The Impact of Vancouver's Broadway Subway ExtensionMohamed Aziz Srairi, Dominic Nootebos, Andrew J. Park, Valerie Spicer, Patricia L. Brantingham. 100-123 [doi]
- Hybrid Long Memory Artificial Intelligence Forecasting Model to Forecast Dhaka Stock Price ValuesShipra Banik, Shawan Kumar De, Rabindra Nath Das. 124-140 [doi]
- A Comparative Analysis of Fuzzy String Matching Algorithms for Content-Based Ontology AlignmentMohammed Suleiman Mohammed Rudwan, Jean Vincent Fonou Dombeu. 141-156 [doi]
- Towards a General Ontology TheoryHermann Bense. 157-174 [doi]
- Implementing Carbon Storage Technology to Combat Climate Change: Utilization of Numerical Simulation and a Variety of Machine Learning TechniquesGanesh C. Thakur, Sabyasachi Prakash. 175-188 [doi]
- Improving Automatic Detection of Gender-Based Violence in Spanish Song Lyrics Using Deep Learning, Data Augmentation and UndersamplingRichard Calbullanca Viluñir, Alejandra Andrea Segura Navarrete, Christian Vidal-Castro, Claudia Martinez-Araneda. 189-209 [doi]
- Comparative Study of Hand Activity Recognition from Egocentric 3D Hand PoseNguyen Thi Loan, Ninh Quang Tri, Do Huu Son, Pham Thi Thuy Linh, Le Van Hung. 210-228 [doi]
- An E-Learning Tool to Combat AMRGavin Schranz, Vanessa Camilleri, Monique Sciortino, Ermira Tartari. 229-253 [doi]
- Exploring Usability Factors in Canvas Educational Applications: An Empirical Analysis - A Case Study at the University of North TexasShabbab Algamdi, Stephanie Ludi. 254-271 [doi]
- Enhancing Sustainability Decisions: AR and AI in Gamified Public Education for Environmental Decision-MakingPatrick Jost, Sebastian Rangger, Julia Lehmann. 272-289 [doi]
- Tools and Settings Supporting Music Teachers' E-Learning in Undergraduate Professional TrainingSvetlana V. Karkina, Juanjo Mena. 290-302 [doi]
- AI and IoT as a Lever for Storytelling in an Educational EnvironmentNadine Rombert, Justino M. R. Lourenço. 303-311 [doi]
- Lifelong Learning E-Learning Education Systems for Sustainable Development and Public EngagementValentina Taverna, Ilaria Baffo, Giuseppe Calabrò. 312-331 [doi]
- From Novice to Creator: Examining Student Perspectives on Low-Code Development EnvironmentsMary Lebens. 332-351 [doi]
- Enhanced Cybersecurity: AI-Driven Phishing Fraud Detection ApproachSergey Avdoshin, Elena Pesotskaya, Denis Volkov, Yabin Alejandro Lagunes Cuevas. 352-368 [doi]
- Pseudonymisation of SS7 Identifiers by Random TablesCharles Beumier, Thibault Debatty. 369-378 [doi]
- A Reformulation of Feedback Shift Register from Practical ViewpointPrasanna Raghaw Mishra 0001, Nupur Gupta, Navneet Gaba. 379-387 [doi]
- Enhancing Cybersecurity in Critical Infrastructure: Utilizing Random Forest AI Model for Threat DetectionMahnoor Jamil, Reiner Creutzburg. 388-398 [doi]
- Method of PLC's Dependability (Reliability and Cybersecurity) Ensuring in IIoT SystemsMaryna Kolisnyk, Axel Jantsch. 399-412 [doi]
- Enhancing RSA with Random Insertion Method: A New Approach to Secure CryptographyR. S. Raja Durai, Suk-Geun Hwang, Ashwini Kumar, Ki-Bong Nam. 413-423 [doi]
- Deferred Synchronous Communication in a Myo-to-Gesture DeviceUwe M. Borghoff, Klaus Buchenrieder. 424-437 [doi]
- Untrustworthy AI: Blockchain as Inhibitor to the Propagation of DisinformationNeil H. Wasserman. 438-453 [doi]
- Evaluation of Post-Quantum Cryptography Signature Scheme on an Automotive Multicore Microcontroller for Real-Time ApplicationFelix Sinell, René Tschirley, Philipp Jungklass. 454-466 [doi]
- A Modelling Approach for Identifying Normal Activities in Computer Network CommunicationsMaxence Lannuzel, David Brosset. 467-481 [doi]
- Efficacy of Various Large Language Models in Generating Smart ContractsSiddhartha Chatterjee, Bina Ramamurthy. 482-500 [doi]
- Vulnerability Analysis of Vision Backbone Networks: A Retrospect on Transfer LearningChukwuemeka Duru, Emmanuel Masa-Ibi, Bikesh Regmi, Kofi Nyarko. 501-517 [doi]
- Area Optimized Architectures for Galois Counter ModeJithra Adikari, M. Anwar Hasan, Christophe Nègre, Pujan Patel. 518-535 [doi]
- Revisiting a Probabilistic Moving Target Defense Strategy to Handle Attacks Against Network Nodes with Multiple ResourcesJamil Ahmad Kassem, Helena Rifà-Pous, Joaquín García-Alfaro. 536-554 [doi]
- Increasing Interference Detection in Quantum Cryptography Using the Quantum Fourier TransformNicholas J. C. Papadopoulos, Kirby Linvill. 555-572 [doi]
- FLUE: Federated Learning with Un-Encrypted Model WeightsElie Atallah. 573-606 [doi]
- IoT Device Security Using PUF-Based Tags: A Lightweight Protocol for Preventing Hardware SubstitutionCarmelo Felicetti, Antonino Rullo, Andrea Tagarelli, Domenico Saccà. 607-624 [doi]
- Towards a Privacy Trade-Off AssessmentTam Thanh Doan. 625-637 [doi]
- Software Evolution Visualization in Virtual Reality Using the Library MetaphorJuraj Zalabai, Peter Kapec. 638-655 [doi]
- Assessing WLAN 802.11ac vs. 802.11n Using OPNET: An Evaluation of Comparative PerformanceAli Mohd Ali, Ahmad Al-Qerem, Hamza Abu Owida. 656-670 [doi]
- Signals as Cobordisms in Riemannian ManifoldsTatyana Barron. 671-683 [doi]
- Planning and Installation of 5G Campus Networks in Hospitals in Rural Areas and Possible Use Cases: A Practical ExampleDietmar Jakob, Sebastian Schmidt, Florian Wahl. 684-705 [doi]
- Cayley Hashing with CookiesVladimir Shpilrain, Bianca Sosnovski. 706-718 [doi]
- A Smart and Secure Wireless Sensor Network for Early Forest Fire Prediction: An Emulated Scenario ApproachHamdy Soliman 0001, Ahshanul Haque. 719-731 [doi]