Abstract is missing.
- Wearable Device Technology in Healthcare - Exploring Constraining and Enabling FactorsMike Krey. 1-13 [doi]
- Proposed System for Effective Adoption of E-government to Obtain Construction Permit in EgyptHeba Fawzy, Dalia A. Magdi. 15-32 [doi]
- Potential Use of Bitcoin in B2C E-commerceRalf-Christian Härting, Christopher Reichstein. 33-40 [doi]
- Smart Cabin: A Semantic-Based Framework for Indoor Comfort Customization Inside a Cruise CabinAtieh Mahroo, Daniele Spoladore, Massimiliano Nolich, Raol Buqi, Sara Carciotti, Marco Sacco. 41-53 [doi]
- Formal Modeling and Analysis of Probabilistic Real-Time SystemsChristian Nigro, Libero Nigro, Paolo F. Sciammarella. 55-72 [doi]
- Regional Agricultural Land Classification Based on Random Forest (RF), Decision Tree, and SVMs TechniquesNassr Azeez, Wafa Yahya, Inas Al-Taie, Arwa M. Basbrain, Adrian Clark. 73-81 [doi]
- On Hierarchical Classification Implicative and Cohesive M_GKMGK-Based: Application on Analysis of the Computing Curricula and Students Abilities According the Anglo-Saxon ModelHery Frédéric Rakotomalala, André Totohasina. 83-90 [doi]
- A Modeling Environment for Dynamic and Adaptive Network Models Implemented in MATLABSeyed Sahand Mohammadi Ziabari, Jan Treur. 91-111 [doi]
- Face Authentication Using Image Signature Generated from Hyperspectral Inner ImagesGuy Leshem, Menachem Domb. 113-125 [doi]
- Unsupervised Learning of Image Data Using Generative Adversarial NetworkRayner Alfred, Chew Ye Lun. 127-135 [doi]
- Adaptive Message Embedding in Raw ImagesTamer Shanableh. 137-146 [doi]
- Megapolis Tourism Development Strategic Planning with Cognitive Modelling SupportAlexander Raikov. 147-155 [doi]
- Design and Implementation of Ancient and Modern Cryptography Program for Documents SecuritySamuel Sangkon Lee. 157-169 [doi]
- Methodology for Selecting Cameras and Its Positions for Surround Camera System in Large VehiclesS. Makarov Aleksei, V. Bolsunovskaya Marina. 171-178 [doi]
- Fuzzy Models and System Technical Condition Estimation CriteriaGennady Korshunov, Vladimir Smirnov, Elena Frolova, Stanislav Nazarevich. 179-189 [doi]
- Software Tools and Techniques for the Expert Systems BuildingArslan I. Enikeev, Rustam A. Burnashev, Galim Z. Vakhitov. 191-199 [doi]
- A Component-Based Method for Developing Cross-Platform User Interfaces for Mobile ApplicationsMarek Beranek, Vladimir Kovar. 201-217 [doi]
- Improvement of Vehicles Production by Means of Creating Intelligent Information System for the Verification of Manufacturability of Design DocumentationIrina Makarova, Ksenia Shubenkova, Timur Nikolaev, Krzysztof Zabinski. 219-228 [doi]
- Group Delay Function Followed by Dynamic Programming Versus Multiscale-Product for Glottal Closure Instant DetectionGhaya Smidi, Aïcha Bouzid. 229-239 [doi]
- Activity Logging in a Bring Your Own Application Environment for Digital ForensicsBernard Shibwabo Kasamani, Duncan Litunya. 241-257 [doi]
- Game Theory for Wireless Sensor Network SecurityHanane Saidi, Driss Gretete, Adnane Addaim. 259-269 [doi]
- DSP Implementation of OQPSK Baseband Demodulator for Geosynchronous Multichannel TDMA Satellite ReceiverA. Chinna Veeresh, S. Venkata Siva Prasad, S. V. Hari Prasad, M. Soundarakumar, Vipin Tyagi. 271-284 [doi]
- Textile Sensor-Based Exoskeleton Suits for the DisabledP. R. Sriram, M. Muthu Manikandan, Nithin Ayyappaa, Rahul Murali. 285-292 [doi]
- A Comparison of Indoor Positioning Systems for Access Control Using Virtual PerimetersBrian Greaves, Marijke Coetzee, Wai Sze Leung. 293-302 [doi]
- q-LMF: Quantum Calculus-Based Least Mean Fourth AlgorithmAlishba Sadiq, Muhammad Usman, Shujaat Khan, Imran Naseem, Muhammad Moinuddin, Ubaid M. Al-Saggaf. 303-311 [doi]
- Process Driven Access Control and Authorization ApproachJohn Paul Kasse, Lai Xu, Paul de Vrieze, Yuewei Bai. 313-322 [doi]
- Comprehensive Exploration of Game Reviews Extraction and Opinion Mining Using NLP TechniquesStefan Ruseti, Maria-Dorinela Sirbu, Mihnea Andrei Calin, Mihai Dascalu, Stefan Trausan-Matu, Gheorghe Militaru. 323-331 [doi]
- MHAD: Multi-Human Action DatasetOmar ElHarrouss, Noor Almaadeed, Somaya Al-Máadeed. 333-341 [doi]
- Machine Learning-Based Approaches for Location Based Dengue Prediction: ReviewChamalka Seneviratne Kalansuriya, Achala Chathuranga Aponso, Artie Basukoski. 343-352 [doi]
- Critical Evaluation of Different Biomarkers and Machine-Learning-Based Approaches to Identify Dementia Disease in Early StagesGayakshika Gimhani, Achala Chathuranga Aponso, Naomi Krishnarajah. 353-364 [doi]
- Interactive Visualization of Ontology-Based Conceptual Domain Models in Learning and Scientific ResearchDmitry Litovkin, Anton Anikin, Marina Kultsova. 365-374 [doi]
- A Secure Lightweight Mutual Authentication and Message Exchange Protocol for IoT Environments Based on the Existence of Active ServerOmar A. Abdulkader, Alwi M. Bamhdi, Vijey Thayananthan, Kamal Jambi, Bandar Al-Ghamdi, Ahmed Patel. 375-384 [doi]
- Monetary Transaction Fraud Detection System Based on Machine Learning StrategiesLakshika Sammani Chandradeva, Thushara Madushanka Amarasinghe, Minoli De Silva, Achala Chathuranga Aponso, Naomi Krishnarajah. 385-396 [doi]
- The Impact of Service-Level Agreement (SLA) on a Cloudlet Deployed in a Coffee Shop ScenarioMandisa N. Nxumalo, Matthew O. Adigun, Ijeoma N. Mba. 397-406 [doi]
- A New Use of Doppler Spectrum for Action Recognition with the Help of Optical FlowMeropi Pavlidou, George Zioutas. 407-418 [doi]
- Meeting Challenges in IoT: Sensing, Energy Efficiency, and the ImplementationToni Perkovic, Slaven Damjanovic, Petar Solic, Luigi Patrono, Joel J. P. C. Rodrigues. 419-430 [doi]
- Small Cells Handover Performance in Centralized Heterogeneous NetworkRaed Saadoon, Raid Sakat, Maysam Abbod, Hasanein Hasan. 431-447 [doi]
- CRISP-DM/SMEs: A Data Analytics Methodology for Non-profit SMEsJhon Montalvo-Garcia, Juan Bernardo Quintero, Bell Manrique Losada. 449-457 [doi]
- Bridges Strengthening by Conversion to Tied-Arch Using Monarch Butterfly OptimizationOrlando Gardella, Broderick Crawford, Ricardo Soto 0001, José Lemus-Romani, Gino Astorga, Agustín Salas-Fernández. 459-469 [doi]
- Deep Learning Approach for IDS - Using DNN for Network Anomaly DetectionZhiqiang Liu, Mohi-Ud-Din Ghulam, Ye Zhu, Xuanlin Yan, Lifang Wang, Zejun Jiang, Jianchao Luo. 471-479 [doi]
- Outlier Detection Method-Based KPCA for Water Pipeline in Wireless Sensor NetworksMohammed Aseeri, Oussama Ghorbel, Hamoud Alshammari, Ahmed S. Alabdullah, Mohamed Abid. 481-488 [doi]
- Data Extraction and Exploration Tools for Business IntelligenceMário Cardoso, Tiago Guimarães, Carlos Filipe Portela, Manuel Filipe Santos. 489-497 [doi]
- Systems and Methods for Implementing Deterministic Finite Automata (DFA) via a BlockchainCraig S. Wright. 499-512 [doi]
- Closest Fit Approach Through Linear Interpolation to Recover Missing Values in Data MiningSanjay Gaur, Darshanaben D. Pandya, Deepika Soni. 513-521 [doi]