Abstract is missing.
- Human Wellness in the Cape Fear River Basin Based on CAFO DataTimothy Hamilton, Elif Sahin, Andrew Ayers, Alexander Cossifos, Gülüstan Dogan 0001, Eric Moore. 1-4 [doi]
- Comparison of Machine and Deep Learning Models for the Prediction of Land DegradationJoshua Edwards, Gülüstan Dogan 0001, Narcisa G. Pricope. 5-12 [doi]
- Educational Group Formation Problem Resolution Based on an Improved Swarm Particle Optimization Using Fuzzy KnowledgeBikhtiyar Hasan, Amine Boufaied. 13-21 [doi]
- Research on Supermarket Marketing Data Analysis Based on Business IntelligenceZhao Mei, Mingjie Li. 22-28 [doi]
- An Approach to Maintain the Balance between Exploitation and Exploration of the Evolutionary Process in Multi-objective AlgorithmsMinh Tran Binh, Long Nguyen, Dinh Nguyen Duc. 29-34 [doi]
- Rainfall Forecasting with Variational Autoencoders and LSTMsEron Neill, Gülüstan Dogan 0001. 35-40 [doi]
- Using Artificial Intelligence to Detect FallsJonathan Daniel Sturdivant, Nicholas Morris, Tiara Hendricks, Gülüstan Dogan 0001, Michel Heijnen. 41-44 [doi]
- Web Injection and Banking Trojan Malware -A Systematic Literature ReviewTjada Nelson, Cory Nance, Cherie Noteboom. 45-53 [doi]
- Time-series method for predicting human traffic flow: A case study of Cañar, EcuadorDanny Salto-Sumba, Juan Vazquez-Verdugo, J. D. Jara, J. P. Bermeo. 54-59 [doi]
- SE-RCN: An Economical Capsule NetworkSami Naqvi, Mohamed El-Sharkawy. 60-65 [doi]
- Human Tissue Cell Image Segmentation optimization Algorithm Based on Improved U-net NetworkJie Ying, Xin Jing, Chenyang Qin, Wei Huang. 66-71 [doi]
- Printed Circuit Board Defect Detection Based on Improved YOLOv5Tong Yang, Yuguo Liu, Changxin Jin, Kai Jiang, Qiang Duan, Chen Song, Qibin Chen, Xue Li, Junzheng Ge, Rui Li. 72-77 [doi]
- AG-UN-Net: U-shaped and N-shaped network with attention gate for liver segmentationQuchen Zou, Xinde Li, Chuanfei Hu. 78-83 [doi]
- A Combined Method for Face RecognitionLaura Mukhamadiyeva, Aiman Moldagulova. 84-88 [doi]
- Design Methodology for Single-Channel CNN-Based FER SystemsDorfell Parra, Carlos Camargo. 89-94 [doi]
- Intracranial Brain Hemorrhage Diagnosis and Classification: A Hybrid ApproachMd. Imdadul Haque Emon, Khondoker Nazia Iqbal, Istinub Azad, Amena Akter Aporna, Nibraj Safwan Amlan, Md Saiful Islam, Rafeed Rahman. 95-99 [doi]
- Lung Cancer Classification and Prediction of Disease Severity Score Using Deep LearningRajkumar Maharaju, Rama Valupadasu. 100-104 [doi]
- Named Entity Recognition for peer-review disambiguation in academic publishingMilos Cuculovic, Frédéric Fondement, Maxime Devanne, Jonathan Weber, Michel Hassenforder. 105-114 [doi]
- Long Text Classification Using Pre-trained Language Model for a Low-Resource LanguageHailemariam Mehari Yohannes, Toshiyuki Amagasa. 115-120 [doi]
- Detecting Fake News Using Machine Learning Based ApproachesTy Edwards, Ridwan Rashid Noel. 121-126 [doi]
- Discovering Coherent Topics from Urdu Text: A Comparative Study of Statistical Models, Clustering Techniques and Word EmbeddingMubashar Mustafa, Feng Zeng, Usama Manzoor, Lin Meng. 127-131 [doi]
- Monitoring of Parkinson's Disease Progression based on Speech SignalDaria Hemmerling, Magdalena Wójcik-Pedziwiatr, Pawel Jaciów, Bartosz Ziólko, Magdalena Igras-Cybulska. 132-137 [doi]
- On Detecting Crypto Ransomware Attacks: Can Simple Strategies be Effective?Phornsawan Roemsri, Supadchaya Puangpontip, Rattikorn Hewett. 138-143 [doi]
- Consideration for Creation of Training Samples for Targeted Malware Detection by Machine LearningRyuya Uda, Taeko Kotani. 144-149 [doi]
- Risk Assessment of Cloud Infrastructure and Services for Software Development StartupsArdian Isufi, Marika Apostolova. 150-155 [doi]
- Development of Build-MaaS Architecture, a Mobility-as-a-Service platform for the Construction SectorDjamel Khadraoui, Christophe Feltus. 156-161 [doi]
- A Solution to Channel Aging in 5G Massive MIMOTalha Younas, Muluneh Mekonnen, Ghulam Farid 0001, Hafiz Mudassir Munir, Osama Younas. 162-166 [doi]
- Deployment of Proposed EfficientNeXt on NXP i.MX 8M MiniAbhishek Deokar, Mohamed El-Sharkawy. 167-170 [doi]
- An Optimal Machine Learning Framework for the Enhancement of Intrusion Detection in Wireless Sensor Network Using Metaheuristic and RNS TechniqueIfedotun Roseline Idowu, Ayisat Wuraola Asaju-Gbolagade, Kazeem Alagbe Gbolagade. 171-176 [doi]
- Adaptive Handover Decision Algorithm for Load Balancing in 5G Heterogeneous NetworksEmre Gures, Ibraheem Shayea, Sawsan Ali Saad, Ayman A. El-Saleh. 177-181 [doi]
- mpiPython: Prospects for Node PerformanceJudah Nava, Hanku Lee. 182-187 [doi]
- Improved Consistency in Price Negotiation Dialogue System Using Parameterized Action Space with Generative Adversarial Imitation LearningMakoto Sato, Tomohiro Takagi. 188-197 [doi]
- A Content-Based Dataset Recommendation System for Biomedical DatasetsZitong Zhang, Ashraf Yaseen. 198-202 [doi]
- Representation Theorems Obtained by Mining across Web Sources for HintsMarco B. Caminati, Juliana Küster Filipe Bowles. 203-210 [doi]
- Blockchain-based Certificate Management with Multi-Party AuthenticationLei Xu 0016, Xue-song, Jipeng Hou, Liehuang Zhu. 211-219 [doi]
- Penetration assessment and ways to combat attack on Android devices through StormBreaker - a social engineering toolEric Blancaflor, Harold Kobe S. Billo, Bianca Ysabel P. Saunar, John Michael P. Dignadice, Philip T. Domondon. 220-225 [doi]
- Image-Based Indoor Localization Using Smartphone Cameras In Textureless EnvironmentPing Zheng, Danyang Qin, Jianan Bai, Lin Ma 0001. 226-231 [doi]
- Ethical implications of using artificial intelligence for multimodal biometric selection model evaluationMapula Elisa Maeko, Dustin van der Haar. 232-238 [doi]