Abstract is missing.
- State Trajectory - A Unifying Approach to Interactivity with Real-Time Sharing and Playback SupportIngar Mæhlum Arntzen, Njål T. Borch, Anders Andersen. 1-20 [doi]
- Utilizing FTP Procedures to Improve Sustainable Service Using IEEE 802.11 TechnologiesAli Mohd Ali, Mohammad R. Hassan. 21-41 [doi]
- Usability Evaluation of Freelance PlatformsZeeshan Haider Malik, Muhammad Ahmad, Hamza Munawar, Mubashar Mushtaq. 42-58 [doi]
- Implementation of Sophisticated Image Insertion Function Voice-Based Report Generator Application for the Visually ImpairedYubin Ok, Jongwoo Lee. 59-70 [doi]
- Quantum Optimized Centroid InitializationNicholas R. Allgood, Ajinkya Borle, Charles K. Nicholas. 71-85 [doi]
- Low-Cost Wireless MMG/Inertial-Based Sensor for Hand Gesture RecognitionDavid Moscoso-Montenegro, Luis Serpa-Andrade. 86-97 [doi]
- Method for Creation of Merged Dataset for SST Estimation with Thermal and Microwave Radiometer DataKohei Arai. 98-105 [doi]
- Optimal Starting Parameters for Unsupervised Data Clustering and Cleaning in the Data Washing MachineKris E. Anderson, John R. Talburt, Nicholas K. A. Hagan, Timothy J. Zimmerman, Deasia Hagan. 106-125 [doi]
- Exploring the Impact of Featured Images in News Stories Using Machine LearningCatherine Sotirakou, Elina Koutromanou, Constantinos Mourlas. 126-141 [doi]
- A Topological Data Analysis-Based Approach to Object Localization: A Comparison with ViT and Yolov7Hong Cheng, Zeng Ze Ong. 142-151 [doi]
- Metabolic Adaptation in Hibernating American Black Bears: Exploring Immobilization Protection with Mass Spectral Data and Computational MethodsMyana Anderson, Beth Lusczek, Kevin Murray 0006, Jens F. Lassen, Sayeed Ikramuddin, Tinen L. Iles. 152-167 [doi]
- Utilizing Phonemes in Music Classification: Do They Matter?Laurel Boykin Powell, Zhihui Liu. 168-179 [doi]
- In Consideration of Indigenous Data Sovereignty: Data Mining as a Colonial PracticeJennafer Shae Roberts, Laura N. Montoya. 180-196 [doi]
- Exploratory Data Analysis and Prediction of Human Genetic Disorder and Species Using DNA SequencingVedanshee Upadhyay, Sakshi Harbhajanka, Satyajit Pangaonkar, Reena Gunjan. 197-213 [doi]
- Security Protocols and Mechanisms for Sharing Near-Real-Time Environmental Data with Multiple Audiences During DisastersMustapha Awinsongya Yakubu, Joseph S. Johnson, Jess Kropczynski, Emmanuel Kojo Gyamfi. 214-224 [doi]
- Are You Aware that They Are Aware? Artificial Intelligence and SocietyDawid Zajac, Bryson Payne. 225-231 [doi]
- Voice Activity Detection Using Convolutional Recurrent Neural NetworksJosafá de Aguiar Pontes, Monserrate Intriago-Pazmiño. 232-243 [doi]
- Deep Learning-Based Vehicle ClassificationRaghib Barkat Muhib, Imran Shafiq Ahmad, Boubakeur Boufama. 244-258 [doi]
- Artificial Intelligence (AI) for Early Detection of Depression Using Machine LearningUgbaja Chioma Mary, Ephraim Nwoye. 259-272 [doi]
- Designing an Experimental Setup for Introducing Industry 5.0 in a Smart Manufacturing EnvironmentJeanne Coetzer, Rangith Baby Kuriakose, Herman J. Vermaak. 273-280 [doi]
- An Agent-Based Approach Toward Smart Software TestingFitzroy D. Nembhard, Khaled A. Slhoub, Marco M. Carvalho. 281-297 [doi]
- An Agent-Based Model for Studying Effects of Mosquito Bites Protection and the Intra-host Treatment on the Malaria TransmissionPaul Python Ndekou Tandong, Mamadou Diarra, Dethie Dione, Hamidou Dathe. 298-308 [doi]
- A Hybrid Event Log Acquisition Technique in Distributed SystemsMohammad Amin Yazdi, Marius Politze, Matthias S. Müller. 309-328 [doi]
- A Holonic Homoiconic Agent-Oriented Patricia TrieMichéle Cullinan, Duncan Coulter. 329-343 [doi]
- Idea Theory: Towards Logical Foundations of Intelligence ScienceIoachim Drugus. 344-356 [doi]
- Optimizing Microgrid Energy Management Systems with Variable Renewable Energy Penetration: Analysis of Data Loss EffectsSaikat Das, Zhifang Wang. 357-374 [doi]
- Design of a Measurement and Control System for Electricity Generation from a Photovoltaic System in the Department of MetaObeth Hernán Romero Ocampo. 375-387 [doi]
- The Role of Ayushman Bharat Health Account (ABHA) in Telehealth: A New Frontier of Smart Healthcare Delivery in IndiaSushila Paliwal, Suraiya Parveen, Ompal Singh, Mohammad Afshar Alam, Jawed Ahmed. 388-406 [doi]
- Promoting Learners' Engagement to Maximize Learning in a Synchronous Online Workshop: A Case Study Analysis from Different PerspectivesLivinus Obiora Nweke. 407-426 [doi]
- The Design and Development of Gamified Mixed Reality for Education with a Focus on the Implementation of Dental Morphology ApplicationAreej Banjar, Thomas Costa, Abraham G. Campbell. 427-444 [doi]
- Home2edu Education at Your Fingertips: An International Web Platform with Educational Resources for TeachersCélio Gonçalo Marques, Inês Araújo, Hélder Pestana, Luís Colaço, Maria Celeste Sousa. 445-455 [doi]
- Cooperative Control of UGV-UAV with Focus on Teaching-Learning ProcessesMiguel A. Velasco, Alba M. Moreno, Jessica S. Ortiz, Víctor H. Andaluz. 456-472 [doi]
- NASA-TLX Based Workload Assessment of Learning Tasks for Primary School ChildrenSubha Sankar Chakraborty, Subashis Karmakar, Aniruddha Sinha, Sanjoy Kumar Saha 0001, Papiya Mukherjee, Vandana Sharma, Mamata Dalui Chakraborty, Parag Kumar Guhathakurta, Chiranjib Koley, Tandra Pal 0001. 473-486 [doi]
- Measurements of Class Design QualityJames Helfrich. 487-500 [doi]
- Novel Delivery Model with the Combination of Iterative and Sequential ModelsP. Vijaya Vardhan Reddy. 501-509 [doi]
- Gamified Collaborative Learning for InnovationHariklia Tsalapatas, Olivier Heidmann, Menelaos Kokaras, Christina Taka. 510-516 [doi]
- Forensic Analysis of Contents in Thumbnails Using Transfer LearningShahrzad Sayyafzadeh, Weifeng Xu, Hongmei Chi. 517-535 [doi]
- Automatic Data Generation and Rule Creation for Network Scanning ToolsJaime C. Acosta, Monika Akbar, Mahmud Shahriar Hossain, Veronica Rivas. 536-549 [doi]
- Uses of Artificial Intelligence in Cyber Security to Mitigate DDOSSafaa Sharif Althagafi, Hajer Fahad Aljudiaibi, Badriah Abdelhadi Alharbi, Raniyah Wazirali. 550-565 [doi]
- Formal Security Analysis of Generalized Ultralightweight Mutual Authentication ProtocolMuhammad Najam-ul-Islam, Madiha Khalid, Umar Mujahid Khokhar. 566-573 [doi]
- A Controversial Study on Random Forest Accuracy for Attack DetectionQuentin Vacher, Philippe Owezarski. 574-589 [doi]
- An Implementation of Man-in-the-Browser Attack and Defense Method in the Google Chrome BrowserJizhou Tong, Joshua C. Nwokeji, Qing Zhang. 590-596 [doi]
- Cybersecurity Workforce Readiness Recommender System Using NLPRamoni O. Lasisi. 597-610 [doi]
- Scan Me: QR Codes as Emerging Malware Delivery MechanismKeegan Cargrill, Tamirat Abegaz, Luis Cueva-Parra, Richelle DaSouza. 611-617 [doi]