Abstract is missing.
- Partial Scoring of Reordering Tasks Revisited: Linearity Matrix by ExcelAmma Kazuo. 1-6  [doi]
- Significance of Agile Software Development and SQA Powered by AutomationBilal Gonen, Dipali Sawant. 7-11  [doi]
- Mobile System for Optimized Planning to Drone Flight applied to the Precision AgricultureAndre Rabello, Robison Cris Brito, Fábio Favarim, Alfredo Weitzenfeld, Eduardo Todt. 12-16  [doi]
- Precise String Domain for Analyzing JavaScript Arrays and ObjectsNabil Almashfi, Lunjin Lu. 17-23  [doi]
- An Improved Agile Framework For Implementing Data Science Initiatives in the GovernmentWafa Qadadeh, Sherief Abdallah. 24-30  [doi]
- Data-Enabled Correlation Analysis between Wildfire and Climate using GISWeiwei Xie, Mingyan He, Bo Tang. 31-35  [doi]
- A Case of Use in the Management of Administrative Processes, Control of Procedures and Services to Citizens In E-GovernmentGiovanni Ortegón Cortázar, Olmer Garcia-Bedoya, José Javier Samper, Francisco Garcia. 36-40  [doi]
- Explainability of SMOTE Based Oversampling for Imbalanced Dataset ProblemsAum Patil, Aman Framewala, Faruk Kazi. 41-45  [doi]
- A Framework to Analyze Social Tagging and Unstructured DataAmjed Al-Thuhli, Mohammed Al-Badawi. 46-53  [doi]
- Cluster-Linkage Analysis in Traffic Data Clustering for Development of Advanced Driver Assistance SystemsHiroki Watanabe, Tomás Malý, Johannes Wallner 0002, Günther Prokop. 54-59  [doi]
- Big Data Pipeline with ML-Based and Crowd Sourced Dynamically Created and Maintained Columnar Data Warehouse for Structured and Unstructured Big DataKamran Ghane. 60-67  [doi]
- An Initial Feasibility Study to Identify Loneliness Among Mental Health Patients from Clinical NotesPeter Bearse, Omar Manejwala, Atif Farid Mohammad, Intisar Rizwan-i-Haque. 68-77  [doi]
- New Perspective of Interpretability of Deep Neural NetworksMasanari Kimura, Masayuki Tanaka 0001. 78-85  [doi]
- Improved Generalizability of Deep-Fakes Detection using Transfer Learning Based CNN FrameworkPranjal Ranjan, Sarvesh Patil, Faruk Kazi. 86-90  [doi]
- Simulate Forest Trees by Integrating L-System and 3D CAD FilesMuhammad Hassan Tanveer. 91-95  [doi]
- mpiPython: A Robust Python MPI BindingHeecheon Park, Joshus DeNio, Jeongyun Choi, Hanku Lee. 96-101  [doi]
- Short-Term Prediction Model for Multi-currency Exchange Using Artificial Neural NetworkIsha Zameer Memon, Shahnawaz Talpur, Sanam Narejo, Aisha Zahid Junejo, Engr. Fawwad Hassan. 102-106  [doi]
- Topological Representation of Rare States Using Combination of Persistent Homology and Complexity MeasuresRebecca Miao, Zhenyi Yang, Valeriy Gavrishchaka. 107-113  [doi]
- A Mathematical Framework for Exploring Protein Folding Dynamics using Probabilistic Model CheckingPrasenjit Biswas, Sarit Pal, Sunil Khatri. 114-123  [doi]
- Performance Analysis of Keystroke Dynamics Using Classification AlgorithmsAlaa Darabseh, Doyel Pal. 124-130  [doi]
- Modeling a Smart School Building System Using UML and TLA+Nawar H. Obeidat, Carla Purdy. 131-136  [doi]
- Obstacle Detection Using Faster R-CNN Oriented to an Autonomous Feeding Assistance SystemJavier Orlando Pinzón-Arenas, Robinson Jiménez-Moreno. 137-142  [doi]
- Retinal Vascular Network Segmentation Using Adaptive Thresholding Method Based on LSRVTemitope Mapayi, Pius Adewale Owolawi. 143-147  [doi]
- Semantic Segmentation and Contextual Information Based Image Scene Interpretation: A ReviewAjay Koul, Apeksha Koul. 148-153  [doi]
- Face Recognition Techniques using Statistical and Artificial Neural Network: A Comparative StudyNawaf Alsrehin, Mu'tasem A. Al-Taamneh. 154-159  [doi]
- An Image Cipher Based on Latin CubesMing Xu, Zihong Tian. 160-168  [doi]
- Content-Based Search in Lecture Video: A Systematic Literature ReviewDipesh Chand, Hasan Ogul. 169-176  [doi]
- Kagawa University-Type Development Model and Its Practice of Information System for Regional Problem Solution by Open InnovationTakayuki Kunieda, Satoru Yamada, Tetsuya Ikeda, Yusuke Kometani, Naka Gotoda, Rihito Yaegashi. 177-182  [doi]
- Exploring the Influence of Organizational Context on Cross-boundary Information-Sharing Initiatives: The Case of the Saudi's Government Secure BusMohammed A. Gharawi, Hashim H. Alneami. 183-192  [doi]
- An Investigation on Social Relations between University Students from Seat Position DataToshiro Minami, Yoko Ohura. 193-197  [doi]
- Mobile Learning for Just-in-Time Knowledge Acquisition in a Workplace EnvironmentTemitope Alade, Ruel Welch, Andrew Robinson, Lynn Nichol. 198-204  [doi]
- Methodology to Build a Wearable System for Assisting Blind People in Purposeful NavigationAndrés Alejandro Diaz Toro, Sixto Enrique Campaña Bastidas, Eduardo Francisco Caicedo Bravo. 205-212  [doi]
- A Low-Cost Multi-modal Auditory-Visual-Tactile Framework for Remote TouchFilippo Sanfilippo, Claudio Pacchierotti. 213-218  [doi]
- An IT Service Management Methodology for an Electoral Public InstitutionMario Barcelo-Valenzuela, Carlos Maximiliano Leal-Pompa, Gerardo Sanchez-Schmitz. 219-223  [doi]
- Analyzing Enterprise Smart Business Capability in a Smart Technology EnvironmentChui Young Yoon. 224-229  [doi]
- Hacking User in Human-Computer Interaction Design (HCI)Duc Son Nguyen, Quynh Mai Le. 230-234  [doi]
- Inkatán: A Game for Smart TV and Android with Ensemble InteractionsRaphael Bravo Dedo, Juan Jesus Cueto Yabar, David Mauricio. 235-241  [doi]
- Analysis of Security Mechanisms to Mitigate Hacker Attacks to Improve e-Commerce Management in EcuadorSegundo Moises Toapanta Toapanta, Harold Ariel Mera Caicedo, Bertha Alice Naranjo Sánchez, Luis Enrique Mafla Gallegos. 242-250  [doi]
- Log Parser with One-to-One MarkupZhang Chunyong, Xiaojing Meng. 251-257  [doi]
- Blockchain Analysis Applied to a Process for the National Public Data System for EcuadorSegundo Moisés Toapanta Toapanta, Luis Enrique Mafla Gallegos, Patricio Ordoñez Baldeon, Fabrizio Darío Triviño Triviño. 258-265  [doi]
- Deciding Backup Location Methods for Distributed Stream Processing SystemNaoki Iijima, Koichiro Amemiya, Jun Ogawa, Hidenobu Miyoshi. 266-270  [doi]
- Optimizing Online Shopping using Genetic AlgorithmSahil Verma, Akash Sinha, Prabhat Kumar, Ajay Maitin. 271-275  [doi]
- Analysis of New Technologies in Information Security to Mitigate Data Risks in a Public OrganizationSegundo Moisés Toapanta Toapanta, Luis Enrique Mafla Gallegos, Mario Darío Medina Lara, Javier Gonzalo Ortiz Rojas. 276-283  [doi]
- Securing the Rights of Data Subjects with Blockchain TechnologyDominik Schmelz, Karl Pinter, Johannes Brottrager, Phillip Niemeier, René Lamber, Thomas Grechenig. 284-288  [doi]
- Explainable Deep-Fake Detection Using Visual Interpretability MethodsBadhrinarayan Malolan, Ankit Parekh, Faruk Kazi. 289-293  [doi]
- Hyperledger Technology in Public Organizations in EcuadorSegundo Moisés Toapanta Toapanta, Tatiana Fernanda Prado Quintana, Ma. del Roció Maciel Arellano, Luis Enrique Mafla Gallegos. 294-301  [doi]
- AzureML Based Analysis and Prediction Loan Borrowers CreditworthyKhaldoon Alshouiliy, Ali Alghamdi, Dharma P. Agrawal. 302-306  [doi]
- GDPR Compliant Consent Driven Data Protection in Online Social Networks: A Blockchain-Based ApproachJaved Ahmed, Sule Yildirim, Mariusz Nowostaki, Raghvendra Ramachandra, Ogerta Elezaj, Mohamad Abomohara. 307-312  [doi]
- A Hyperledger Technology Approach to Mitigate the Risks of the Database in Foreign Trade ManagementSegundo Moisés Toapanta Toapanta, Luis Enrique Mafla Gallegos, Michael Gerardo Guaman Villalta, Nelson Salomon Mora Saltos. 313-319  [doi]
- Establishing a Graphical Method for Calculation of Raft Thickness in Piled Raft, Pile Group and Raft FoundationHoa Cao Van, Tuan Nguyen Anh. 320-325  [doi]
- A Decision Model of Taxi Driver Based on Qualitative AnalysisQianhao Zhai, Yang Deng, Haoming Zhou, Siling Feng, Mengxing Huang. 326-330  [doi]
- Conspiracy and Rumor Correction: Analysis of Social Media Users' CommentsGilang Maulana Majid, Anjan Pal. 331-335  [doi]
- A Novel System for Ammonia Gas Control in Broiler Production EnvironmentRobison Cris Brito, Carlos Vinícius Ferrareze, Fábio Favarim, Jefferson Talles Oliva, Eduardo Todt. 336-340  [doi]
- Coronary Artery Disease Diagnosis Using Feature Selection Based Hybrid Extreme Learning MachineAfzal Hussain Shahid, Maheshwari Prasad Singh, Bishwajit Roy, Aashish Aadarsh. 341-346  [doi]
- Design and Controlling of Low-Cost Prosthetic Hand Using Force SensorSyed Faiz Ahmed, M. Hassan Tanveer, Isho James Kiwarkis, Herish Badal Basy. 347-350  [doi]
- Attempt to Utilize Surplus Storage Capacity as Distributed StorageToshiya Kawato, Masayuki Higashino, Kenichi Takahashi, Takao Kawamura. 351-355  [doi]
- Analysis of Stress-Strain Behaviours and Stability of the Ground Around the Tunnel in Ho Chi Minh City During the Construction StagesTuan Nguyen Anh. 356-360  [doi]
- Multiple Anchor Staged Alignment Algorithm - Sensitive (MASAA - S)Bharath Reddy, Richard Fields. 361-365  [doi]
- Achieving Multi-port Memory Performance on Single-Port Memory with Coding TechniquesHardik Jain, Matthew Edwards, Ethan R. Elenberg, Ankit Singh Rawat, Sriram Vishwanath. 366-375  [doi]
- 2D Finite Element Analysis for the Application of Deep Soil Mixing Columns for Reinforcement of Soft Ground Surrounding Deep ExcavationTuan Nguyen Anh, Dat Nguyen Thanh. 376-379  [doi]
- Optimization Design of LQR Controller Based on Improved Whale Optimization AlgorithmQianhao Zhai, Xiaoyu Xia, Siling Feng, Mengxing Huang. 380-384  [doi]
- Is Cryptojacking Dead After Coinhive Shutdown?Said Varlioglu, Bilal Gonen, Murat Ozer, Mehmet F. Bastug. 385-389  [doi]
- Approach to Mitigate the Cyber-Environment Risks of a Technology PlatformSegundo Moisés Toapanta Toapanta, Luis Enrique Mafla Gallegos, Bryan Smith Benavides Quimis, Dario Fernando Huilcapi Subia. 390-396  [doi]
- Intrusion Detection: Issues, Problems and SolutionsOluwamayowa Adeleke. 397-402  [doi]
- Conditionally Optimal Parallelization for Global FP on Multi-core SystemsDaechul Park, Youngeun Cho, Chang-Gun Lee. 403-412  [doi]
- On Cybersecurity Education for Non-technical LearnersMatthew McNulty, Houssain Kettani. 413-416  [doi]
- Analysis to Predict Cybercrime Using Information Technology in a Globalized EnvironmentSegundo Moisés Toapanta Toapanta, Luis Enrique Mafla Gallegos, Bryan Eduardo Cisnero Andrade, Maximo Geovani Tandazo Espinoza. 417-423  [doi]
- On Second-Order Detection of Webcam SpywareHaissam Badih, Benjamin Bond, Julian L. Rrushi. 424-431  [doi]
- UAE Cybersecurity Perception and Risk Assessments Compared to Other Developed NationsSayyed Maisikeli. 432-439  [doi]
- An Exploration of Disinformation as a Cybersecurity ThreatKevin Matthe Caramancion. 440-444  [doi]
- Analysis of Models of Security to Mitigate the Risks, Vulnerabilities and Threats in a Company of Services of TelecommunicationsSegundo Moisés Toapanta Toapanta, Luis Enrique Mafla Gallegos, María José Chévez Morán, Javier Gonzalo Ortiz Rojas. 445-450  [doi]
- Open Source PowerShell-Written Post Exploitation Frameworks Used by Cyber Espionage GroupsTjada Nelson, Houssain Kettani. 451-456  [doi]
- Dynamic Channel Allocation Scheme for Handover Calls in Cellular NetworksAmr Abdelaziz, Mahmoud Mandour, Ashraf D. Elbayoumy, Gamal M. Abdel-Hamid. 457-461  [doi]
- An Efficient Architecture for Network Information ManagementMaria Zafar, Seerat Iqbal Cheema. 462-468  [doi]
- Combating Jamming Attacks in Multi-channel IoT Networks Using Game TheoryMohsen Guizani, A. Gouissem, Khalid Abualsaud, Elias Yaacoub, Tamer Khattab. 469-474  [doi]
- CSE: A Content Spreading Efficiency Based Influential Nodes Selection Method in 5G Mobile Social NetworksMuluneh Mekonnen Tulu, Sultan Feisso, Ronghui Hou, Talha Younas. 475-479  [doi]
- Net Neutrality Around the Globe: A SurveyVan Nguyen, Derek Mohammed, Marwan Omar, Passard Dean. 480-488  [doi]
- Research on Mixed Planning Method of 5G and LTEQuan Yuan, Quanzhi Qian, Yong Mo, Hao Chen. 489-493  [doi]
- On the Impact of DNS Over HTTPS Paradigm on Cyber SystemsKimo Bumanglag, Houssain Kettani. 494-499  [doi]
- Robust Adaptive AutoRegressive Weighted Constant Modulus Algorithm for Blind Equalization in MIMO-OFDM SystemS. P. Girija, Rameshwar Rao. 500-506  [doi]
- Research and Design of a High Isolation 5G Antenna for Smart PhoneKuo Yang. 507-510  [doi]
- Horizontal Correlation Analysis of Elliptic Curve Diffie HellmanShiva Paramasivam Karthikeyan, Hayssam El-Razouk. 511-519  [doi]
- A New Homomorphic Message Authentication Code Scheme for Network CodingAhmed Kamal, Hisham Dahshan, Ashraf D. Elbayoumy. 520-524  [doi]
- Democratization of AI, Albeit Constrained IoT Devices & Tiny ML, for Creating a Sustainable Food FutureChandrasekar Shankar Vuppalapati, Anitha Ilapakurti, Sharat Kedari, Jaya Shankar Vuppalapati, Santosh Kedari, Raja Vuppalapati. 525-530  [doi]
- Low Cost IoT-Based System for Monitoring and Remote Controlling AviariesAdenilson Mumbelli, Robison Cris Brito, Vinicius Pegorini, Luis Felipe Priester. 531-535  [doi]
- A Brief Survey of the Main Internet-Based Approaches. An Outlook from the Internet of Things PerspectivePablo Pico-Valencia, Juan A. Holgado-Terriza, Xavier Quiñónez-Ku. 536-542  [doi]
- Environmentally Embedded Internet-of-Things for Secondary and Higher EducationJames Hsi-Jen Yeh, Craig Bartholio, Elyse Shackleton, Levi Costello, Matthew Perera, Kyle Yeh, Chelsea Yeh. 543-547  [doi]
- On the Design of Co-operating Blockchains for IoTGokhan Sagirlar, John D. Sheehan, Emanuele Ragnoli. 548-552  [doi]
- Smart Agriculture Based on IoT and Cloud ComputingSriveni Namani, Bilal Gonen. 553-556  [doi]