Abstract is missing.
- PESOHA: Privacy-Preserving Evaluation System for Online Healthcare ApplicationsYouna Jung. 1-15 [doi]
- Computer Vision and Hybrid Reality for Construction Safety Risks: A Pilot StudyRita Yi Man Li, Tat Ho Leung. 17-22 [doi]
- Data Reduction Using NMF for Outlier Detection Method in Wireless Sensor NetworksOussama Ghorbel, Hamoud Alshammari, Mohammed Aseeri, Radhia Khdhir, Mohamed Abid. 23-30 [doi]
- Measuring Customer Satisfaction on Software-Based Products and Services: A Requirements Engineering PerspectiveEzekiel Uzor Okike, Seamogano Mosanako. 31-45 [doi]
- To Develop a Water Quality Monitoring System for Aquaculture Areas Based on Agent ModelThai Minh Truong, Cuong Huy Phan, Hoang Van Tran, Long Nhut Duong, Linh Van Nguyen, Toan Thanh Ha. 47-58 [doi]
- Identifying Intrusions in Dynamic Environments Using Semantic Trajectories and BIM for Worker SafetyMuhammad Arslan, Christophe Cruz, Dominique Ginhac. 59-67 [doi]
- The Ontological Approach in Organic Chemistry Intelligent System DevelopmentKarina A. Gulyaeva, Irina L. Artemieva. 69-78 [doi]
- Effective Way of Deriving the Context from a Handwritten Image/ObjectKomal Teja Mattupalli, Sriraman Kothuri. 79-88 [doi]
- E-Voting System Based on Multiple Ballot CastingLiudmila Babenko, Ilya Pisarev. 89-97 [doi]
- Against Malicious SSL/TLS Encryption: Identify Malicious Traffic Based on Random ForestYong Fang, Yijia Xu, Cheng Huang, Liang Liu, Lei Zhang. 99-115 [doi]
- Automatically Determining a Network Reconnaissance Scope Using Passive Scanning TechniquesStefan Marksteiner, Bernhard Jandl-Scherf, Harald Lernbeiß. 117-127 [doi]
- Using a Temporal-Causal Network Model for Computational Analysis of the Effect of Social Media Influencers on the Worldwide Interest in VeganismManon Lisa Sijm, Chelsea Rome Exel, Jan Treur. 129-140 [doi]
- Detecting Drivers' Fatigue in Different Conditions Using Real-Time Non-intrusive SystemAnn Nosseir, Ahmed Hamad, Abdelrahman Wahdan. 141-151 [doi]
- Decentralized Autonomous CorporationsCraig S. Wright. 153-167 [doi]
- A Distribution Protocol for Dealerless Secret DistributionCraig S. Wright. 169-191 [doi]
- Comparative Analysis of ML Classifiers for Network Intrusion DetectionAhmed M. Mahfouz, Deepak Venugopal, Sajjan G. Shiva. 193-207 [doi]
- Achieving Wellness by Monitoring the Gait Pattern with Behavioral Intervention for Lifestyle DiseasesNeha Sathe, Anil Hiwale. 209-218 [doi]
- A Temporal-Causal Modelling Approach to Analyse the Dynamics of Burnout and the Effects of SleepHendrik von Kentzinsky, Stefan Wijtsma, Jan Treur. 219-232 [doi]
- Modeling Cultural Segregation of the Queer Community Through an Adaptive Social Network ModelPieke Heijmans, Jip van Stijn, Jan Treur. 233-248 [doi]
- Derivation of a Conceptual Framework to Assess and Mitigate Identified Customer Cybersecurity Risks by Utilizing the Public CloudDavid Bird. 249-265 [doi]
- Securing Manufacturing Intelligence for the Industrial Internet of ThingsHussain Al-Aqrabi, Richard Hill, Phil Lane, Hamza Aagela. 267-282 [doi]
- The Private Sector's Role in e-Government from a Legal PerspectiveKaisa Lõhmus, Katrin Nyman-Metcalf, Rozha K. Ahmed, Ingrid Pappel, Dirk Draheim. 283-298 [doi]
- Toward an Effective Identification of Tweet Related to Meningitis Based on Supervised Machine LearningThierry Roger Bayala, Sadouanouan Malo, Atsushi Togashi. 299-306 [doi]
- The Effect of Data Transmission and Storage Security Between Device-Cloudlet CommunicationNhlakanipho C. Fakude, Ayoturi Tosin Akinola, Mathew Olusegun Adigun. 307-319 [doi]
- Slang-Based Text Sentiment Analysis in InstagramElton Shah Aly, Dustin Terence van der Haar. 321-329 [doi]
- A Temporal Cognitive Model of the Influence of Methylphenidate (Ritalin) on Test AnxietyIlse Lelieveld, Gert-Jan Storre, Seyed Sahand Mohammadi Ziabari. 331-345 [doi]
- Stroke Diagnosis Algorithm Based on Similarity AnalysisSung-Jong Eun, Eun-Young Jung, Hyun-Ki Hong, Dong-Kyun Park. 347-352 [doi]
- A Multilevel Graph Approach for Predicting Bicycle Usage in London AreaFrancesco Colace, Massimo De Santo, Marco Lombardi, Francesco Pascale, Domenico Santaniello, Allan Tucker. 353-362 [doi]
- Machine Learning and Digital Heritage: The CEPROQHA Project PerspectiveAbdelhak Belhi, Houssem Gasmi, Abdelaziz Bouras, Taha Alfaqheri, Akuha Solomon Aondoakaa, Abdul Hamid Sadka, Sebti Foufou. 363-374 [doi]
- Developing a Business Model for a Smart Pedestrian Network ApplicationGeorge Papageorgiou, Eudokia Balamou, Athanasios Maimaris. 375-381 [doi]
- The Role of Supervised Climate Data Models and Dairy IoT Edge Devices in Democratizing Artificial Intelligence to Small Scale Dairy Farmers WorldwideSantosh Kedari, Jaya Shankar Vuppalapati, Anitha Ilapakurti, Sharat Kedari, Rajasekar Vuppalapati, Chandrasekar Vuppalapati. 383-404 [doi]
- Security Benchmarks for Wearable Medical Things: Stakeholders-Centric ApproachSwapnika Reddy Putta, Abdullah Abuhussein, Faisal Alsubaei, Sajjan G. Shiva, Saleh Atiewi. 405-418 [doi]
- Teacher Perception of OLabs PedagogyChandrashekhar Pantina, Prabhakaran Malini, Georg Gutjahr, Raghu Raman, Prema Nedungadi. 419-426 [doi]
- Comparing English and Malayalam Spelling Errors of Children using a Bilingual Screening ToolMithun Haridas, Nirmala Vasudevan, Georg Gutjahr, Raghu Raman, Prema Nedungadi. 427-436 [doi]
- Curriculum Enrichment in Empowering "Corporate-Ready" IndividualsGaneshayya Shidaganti, S. Prakash, K. G. Srinivasa 0001. 437-447 [doi]
- Cryptographic Algorithms to Mitigate the Risks of Database in the Management of a Smart CitySegundo Moisés Toapanta Toapanta, Felix Gustavo Mendoza Quimi, Rubén Franklin Reina Salazar, Luis Enrique Mafla Gallegos. 449-461 [doi]
- Analysis of Adequate Bandwidths to Guarantee an Electoral Process in EcuadorSegundo Moisés Toapanta Toapanta, Johan Eduardo Aguilar Piguave, Luis Enrique Mafla Gallegos. 463-473 [doi]
- Applied N F Interpolation Method for Recover Randomly Missing Values in Data MiningSanjay Gaur, Darshanaben D. Pandya, Manish Kumar Sharma. 475-485 [doi]
- ICT-Enabled Business Promotion Approach Through Search Engine OptimizationSanjay Gaur, Hemant Sahu, Kulvinder Singh. 487-495 [doi]
- Infrared Versus Visible Image Matching for Multispectral Face RecognitionWafa Waheeda Syed, Somaya Al-Máadeed. 497-507 [doi]
- Using Machine Learning Advances to Unravel Patterns in Subject Areas and Performances of University Students with Special Educational Needs and Disabilities (MALSEND): A Conceptual ApproachDrishty Sobnath, Sakirulai Olufemi Isiaq, Ikram Ur Rehman, Moustafa M. Nasralla. 509-517 [doi]
- Image-Based Ciphering of Video Streams and Object Recognition for Urban and Vehicular Surveillance ServicesKarim Hammoudi, Mohammed AbuTaha, Halim Benhabiles, Mahmoud Melkemi, Féryal Windal, Safwan El Assad, Audrey Queudet. 519-527 [doi]
- Augmented Reality - A Tool for Mediated Communication: A Case Study of Teen Pregnancy in Contexts like IndiaSuparna Dutta, Niket Mehta. 529-536 [doi]