Abstract is missing.
- Scrutinization of Saline Sea Utilizing a Water-Based Antenna for the Radio CommunicationsImadeldin Elsayed Elmutasima, Izzeldin I. Mohd, Khalid Hamid Bilal. 1-4 [doi]
- Suspicious Permissions Detection of Covid-19 Themed Malicious Android ApplicationsMonika Sharma, Ajay Kaul. 1-6 [doi]
- EdgeGym: A Reinforcement Learning Environment for Constraint-Aware NFV Resource AllocationJing Su, Suku Nair, Leo Popokh. 1-7 [doi]
- Bearing Fault Diagnosis Based on Sparse Wavelet Decomposition and Sparse Graph Connection Using GraphSAGEGuanhua Zhu, Xiaofan Liu, Lizhe Tan. 1-6 [doi]
- Significance of artificial intelligence to deal with stress during the organisational changesYashwant Aditya. 1-6 [doi]
- Collaborative Differentially Private Federated Learning Framework for the Prediction of Diabetic RetinopathyIsmail Hossain, Sai Puppala, Sajedul Talukder. 1-6 [doi]
- Cuff-less blood pressure estimation from ECG and PPG using CNN-LSTM algorithmsGengjia Zhang, Daegil Choi, Siho Shin, Jaehyo Jung. 1-4 [doi]
- How Private Blockchain Technology Secure IoT Data RecordElham Abdulwahab Anaam, Mohammad Kamrul Hasan, Taher M. Ghazal, Su-Cheng Haw, Haitham M. Alzoubi, Muhammad Turki Alshurideh. 1-6 [doi]
- Detection of Cardiac Tumors Using Parallel ComputingJyoti Saini, Keshav Kumar, Bishwajeet Pandey, Hardik A. Gohel. 1-4 [doi]
- Supervised and Unsupervised Learning Techniques Utilizing Malware DatasetsDaryle Smith, Sajad Khorsandroo, Kaushik Roy 0003. 1-7 [doi]
- Machine Learning and Sentiment Analysis for Predicting Environmental Lead Toxicity in Children at the ZIP Code LevelSai Puppala, Ismail Hossain, Sajedul Talukder. 1-6 [doi]
- Long Short-Term Memory Networks for Monitoring Groundwater Contamination at the Hanford SiteMichael P. Murphy, Hirak Mazumdar, Hardik A. Gohel, Hilary P. Emerson, Daniel I. Kaplan. 1-5 [doi]
- A Framework to Reconstruct Digital Forensics Evidence via Goal-Oriented ModelingAyodeji-Ogundiran, Hongmei Chi, Jie Yan, Ruth Agada. 1-11 [doi]
- Decision Tree Algorithm for Depression Diagnosis from Facial ImagesDaegil Choi, Gengjia Zhang, Siho Shin, Jaehyo Jung. 1-4 [doi]
- Voltage hopping induced by bias injection attack against Kalman filter of BLDC motorYuri B. Boiko, Iluju Kiringa, Tet Hin Yeap. 1-5 [doi]
- Utilization of Blockchain Technology In Human Resource ManagementElham Anaam, Taher M. Ghazal, Su-Cheng Haw, Haitham M. Alzoubi, Muhammad Turki Alshurideh, Abdullah Al Mamun. 1-5 [doi]
- Quantum Machine Learning for Network Intrusion Detection Systems, a Systematic Literature ReviewOtavio Kiyatake Nicesio, Adriano Galindo Leal, Vagner Luiz Gava. 1-6 [doi]
- Blockchain Technology and Impacts on Potential IndustriesGasim Othman Alandjani. 1-4 [doi]
- Seasonal Trend Assessment for Groundwater Contamination Detection and Monitoring using ARIMA ModelMiguel A Barajas, Michael P. Murphy, Louis C. Lasseter, Godspower I Sunny, Hirak Mazumdar, Hardik A. Gohel, Hilary P. Emerson, Daniel I. Kaplan. 1-7 [doi]
- Design of QR Based Smart Student Attendance SystemSangu Venkata Sai Harsith Reddy, Gadhiraju Reddy Sekhar Raju, Nookala Jayanth, Malla Charan Sai, Bishwajeet Pandey, Geetha G., Hardik A. Gohel. 1-4 [doi]
- On Phishing: Proposing a Traffic Behavior-Based Model to Detect, Prevent, and Classify Webpage Suspicious and Malicious ActivitiesWesam Fadheel, Steve Carr 0001, Wassnaa Al-Mawee. 1-8 [doi]
- Penetration Testing for IoT Security: The Case Study of a Wireless IP Security CAMOmar Saif Musabbeh Bin Hamed Almazrouei, Pritheega Magalingam, Mohammad Kamrul Hasan, Majed Almehrzi, Ahmed Alshamsi. 1-5 [doi]