Abstract is missing.
- Composite anti Risk Trading Strategy Model for Gold and BitcoinHaochen You, Baojing Liu. 1-7 [doi]
- ChainKode: A CICD methodology for chaincode development in Hyperledger Fabric based on KubernetesYasiru Rathsara Witharanage, Santiago Figueroa-Lorenzo, Nasibeh Mohammadzadeh, Saioa Arrizabalaga. 8-17 [doi]
- Micro Leak Detection of Natural Gas for Residential Users Based on Gas FlowmetersAlex Da Yin, Weiping Ni, Fangcun Shu. 18-24 [doi]
- An Industrial Digital Financial Application Platform based on Privacy ComputingXiaobin Zhang, Peng Chen, Chongsong You, Bin Liu, Meilin Huang. 25-30 [doi]
- Research on a New Vulnerability Risk Detection Method Based on Bidirectional Constructed Hybrid Attribute GraphsBojian Chen, Lijin Wu, Jindong He, Shanshan Lei, Huimin Ye, Xinzhi Xie. 31-36 [doi]
- A Vigenere-6S-Substitution-2S-Transposition Encryption Algorithm for Invisible WatermarkingSugar Mae Tenedero Galeza, Ariel M. Sison, Ruji P. Medina. 37-42 [doi]
- Criminality Risk of Residential Area in Sukagalih Urban Village, Bandung CityAbyan Fakhri, Ridwan Sutriadi, Wilmar A. Salim. 43-48 [doi]
- Exploring GCN, GAT, and GIN Fusion for Illicit Transaction Classification in Cryptocurrency NetworksGaoxuan Li, Xinyu Tang. 49-53 [doi]
- Blinded RSA: A Proposed Solution for Factorization and Side-Channel AttacksDominador Montante Acasamoso, Ariel M. Sison, Ruji P. Medina. 54-61 [doi]
- Malware Traffic Analysis using Machine LearningJie Ji, Gabriela Mogos. 62-67 [doi]
- Accessibility and Components of Smart Governance FrameworkHemalata Vasudavan, Vazeerudeen Abdul Hameed. 68-72 [doi]
- Design, Development, and Large-Scale Usability Evaluation of BehaviourCoach 2.0: An Exergaming AppRoushdat Elaheebocus, Fiona Grant, Shehzad Jaunbuccus, Smita Rampat, Sandy Ramiah. 73-79 [doi]
- Leveraging Mobile Apps and Social Media for Post-Disaster Building Damage Assessment: A Scoping Review and Findings from MalaysiaFoong Sin Lam, Jer Vui Lee, Yeok Meng Ngeow, Chun-Chieh Yip, Poh-Hwa Ong, Wen Hoa Wang, Ye Xin Pang. 80-86 [doi]
- e-Commerce Mobile Systems Development with Enhanced Microservice Architecture DesignMohamed Saif Ali Khan Bin Mohamed Aowtab Khan, Xiaorong Li. 87-94 [doi]
- Autonomous Highway Path-Planning: Leveraging Localized Quintic Spline TrajectoriesWael A. Farag. 95-102 [doi]
- Deep Learning-Based Web Application as a Method of Capacitating Farmers as Farm ManagersExcel Philip Badere Guidang. 103-107 [doi]
- Explainable AI: Applications, Challenges, Current Solutions and Future Research DirectionsTalal Butt, Muhammad Iqbal. 108-113 [doi]
- Screening of Immune-relate Genes and Prognosis of Lung Adenocarcinoma based on Ensemble LearningLin Shuo Cui, Zheng Zhao, Fu Xiang Meng, Fa You Tian, Shuai Li. 114-119 [doi]
- FUO_ED: A Dataset for Evaluating the Performance of Large Language Models in Diagnosing Complex Cases of Fever of Unknown OriginYi Ren, Anke Li, Weibin Li 0002, Lei Shi, Junyao Ding, Jianchao Du, Tianyan Chen. 120-125 [doi]
- Integrating Large Language Models with Digital Avatars: A Case Study of the Educational DomainYueqian Du, Bohan Zhou, Yiming Wang, Jinghui Liu, Linqian Gong, Yuyan Zhu, Jianing Sun. 126-130 [doi]
- Optimizing Multinomial Naïve Bayes in Sentiment Analysis through Hybrid Ensemble TechniquesViktor Angelo Rampas Dimalanta, Arnel Fajardo. 131-136 [doi]
- Deep Autoencoder-based Framework for Robust Singer Identification in Music AnalysisSangeetha Rajesh, N. J. Nalini. 137-144 [doi]
- Perceptions of AI in Education: A New AI-Based Model Towards Innovative LearningAhmed Al-Hunaiyyan, Salah Al-Sharhan, Fawaz S. Al-Anzi, Shaikhah Alainati. 145-152 [doi]
- HDC Model with Extension LayersMatej Cibula, Radek Marik. 153-157 [doi]
- Discussion and Analysis on Verification Results of Multi-gas DetectorsZhenqi Yang, Yuyang Shang, Zicong Li, Xunfang Mo, Fan Wang, Haixin Lai, Baorui Sun, Junqi Huang. 158-164 [doi]
- Adaptive Equalization for 32 Gbps SerDes Receivers Using a Floating Decision Feedback Equalizer AlgorithmGuo Hao, Wen Yi, Liang Bin, Chen Jian Jun, Shen Fan, Fan Pan. 165-171 [doi]
- Comparison and Implementation of Key Exchanges to CUDA-Accelerated Arithmetic Circuit Homomorphic EncryptionYong Cong Tan, Wei Xin Tan, Harsh Singh Bajaj, Chern Nam Yap. 172-176 [doi]
- DCSS-LoRa: Pushing the Transmission Rate Limits in LoRa by Enhancing the Preamble with Dual ChirpJiamin Jiang, Hao Wang 0213, Guangquan Lai, Xiaotong Chen, Jian Zhang 0010, Lu Wang 0002. 177-186 [doi]
- A Study on Ultra-Wideband Negative Feedback Cryogenic Amplifier with High Sensitivity and Low NoiseShijie Qian, Yingzeng Yin. 187-192 [doi]
- A Nonlocal Denoising Framework Based on Tensor Low Rank Representation with Weighted Tensor Schatten p normCuicui Peng, Yunjie Zhang, Shuxin Zheng. 193-199 [doi]
- Design of Multi-User Constructive Interference Precoding based on Outdated Channel State InformationWang Min. 200-205 [doi]
- A Survey on Traffic Signal Control Problems with MARL MethodsYu Shi, Xiaoping Yuan, Junsen Zhang, Ruoyu Wen. 206-212 [doi]
- IoT Based Wastewater Temperature, pH And Turbidity Monitoring with Data Analytics and VisualisationLillian Yee Kiaw Wang, Joseph Chun Hoe Loo, Yi Xiong Wong, Ying Ying Lai. 213-218 [doi]
- SimulatorBridgerDfT: A Real-Data Simulator for IoT-Osmotic InteractionsReham Almutairi, Giacomo Bergami, Graham Morgan. 219-224 [doi]
- Improved Model for Stroke Prediction on Wearable Devices with CNN_LSTM_KANYao Lu, Thinagaran Perumal, Chengzhi Liu. 225-230 [doi]
- Design and Implementation of an IoT and ML-based Smart Waste Management SystemAhmed Abul Hussain, Fadia ElHamami, Lamya Al Qahtani, Munirah Aldossary, Ahmed Abul Hasanaath, Hiren K. Mewada. 231-240 [doi]
- Enhancing Network Security Through SDN-Controlled Honeypot Server Systems: A Paradigm Shift Towards Agile and Secure Network InfrastructureGodwin Soledad Monserate. 241-246 [doi]
- Consistent and Inconsistent Multi-view Clustering Based on Augmented ViewZhixin Yu, Yunjie Zhang, ZiCheng Zhao. 247-253 [doi]
- Real-Time Fire Evacuation System Integrated with Internet of Things and Mixed Reality TechnologyMing Hai Li, Ya Le Lan, Juan Lu, Xin He, Yi-Fan Yang. 254-261 [doi]
- PM4Robot: A Scriptable Parametric Modeling Interface for Conceptual Robot Design Using PM4VRWanwan Li. 262-266 [doi]
- A User Profile System for the Finance Platform of CommerceZhonghuang Hu, Yubo Qiu, Songnan Hu, Zijie Cheng, Shuai Qiu. 267-272 [doi]
- A visual based method for small target unmanned aerial vehicle recognitionDi Chen, Yuxiang Zou, Lin Zhao, Wei Liu, Xiwen Yu, Liyong Fang. 273-278 [doi]
- Comparison of machine learning models for the identification of disc herniationJuan Huapalla Garcia, Walter Baldeon Canchaya, Christian Ovalle. 279-284 [doi]
- Multi-view Subspace Clustering Based on Tensor Log-Determinant Minimization ApproachShuxin Zheng, Yunjie Zhang, Cuicui Peng. 285-290 [doi]
- A New 2-bit Model Quantization Method Based on Non-uniform QuantizationDongmin Li, Bowen Chen, Dongyang Zhang 0001. 291-298 [doi]
- A question-and-answer system based on artificial intelligenceGuo Jun, Guo Yan Ting, Zheng Yan Song. 299-305 [doi]
- Design and Implementation of a Recipe Voice Playback System Based on Crawler Technology in WeChat Mini ProgramFeiyang Chen, Junjie Ning, Yue Ma, Yingxin Zhang, Chao-Hsien Hsieh. 306-311 [doi]
- Intelligent Systems for Comprehensive Dog ManagementMenusha E. Katipearachchi, Omesh Sachethana, Ganguli N. A. Gunawardena, Duvindu C. Ruwanara, Jenny Krishara, Dharshana Kasthurirathna. 312-318 [doi]
- Study on the models of machine learning for better classificationYangfan Cui, Guangsong Yang, Yuanfa Liu, Guowei Lei, Wenqing Ni. 319-324 [doi]
- Advancing Industry 4.0 Control Systems with MOM-based Hybrid ArchitectureRupali Rastogi, Ajay Arya, Pushpinder Kaur Josan, Debasis Biswas. 325-332 [doi]
- Lightweight Serverless Application Management PlatformXiaoyu Zhang, Haoran Wang. 333-338 [doi]
- Shared Video Monitoring Service for Power Grid Surveillance by Leveraging Layer-by-Layer Aggregation NetworkXiaoyuan Jiang, Xihai Chen, Kun Wang, Jingrong Zheng, Zhao Zhang, Yifeng Wang. 339-344 [doi]
- Trusted Cloud Service Assurance for Banking Outsourcing: a Blockchain and Prisoner's Game Based ApproachLu Liu. 345-350 [doi]
- Optimized Video Steganography for Enhanced Parallel Processing on Multi-Core ProcessorsSally Almanasra. 351-356 [doi]