Abstract is missing.
- Trusted Security Model for IDS Using Deep LearningKhalid Al Makdi, Frederick T. Sheldon, Abdullah Abuhussein. 1-4 [doi]
- Reading Political Sentiment and Mood of the Electorate Through Twitter DataAbhirup Khanna, Ananya Bansal, Amit Agarwal 0002, Piyush Maheshwari. 1-4 [doi]
- An Application for Dementia Patient Monitoring with Sound Level Assessment ToolAbigail Copiaco, Christian H. Ritz, Stefano Fasciani, Nidhal Abdulaziz. 1-4 [doi]
- Artificial Intelligence Platform for Low-Cost RoboticsKiyan Afsari, Maha Saadeh. 1-4 [doi]
- A Study of Steganography Based on Error Correction Code and Secret Sharing SchemeKaito Onuma, Sumiko Miyata. 1-4 [doi]
- Low-Overhead Channel Estimation for Diffusive Molecular CommunicationAbdollah Masoud Darya, Saeed Abdallah. 1-4 [doi]
- A Microservices Architecture for ADS-B Data Security Using BlockchainHaitham Abu Damis, Dina Shehada, Claude Fachkha, Amjad Gawanmeh, Jamal N. Al-Karaki. 1-4 [doi]
- Functional Annotation and Identification of Putative Drug Target in VVYashbir Singh, S. Deepa, Wathiq Mansoor. 1-4 [doi]
- The Effect of Obstructive Sleep Apnea on the Cardiovascular VariabilityShahrokh Sani. 1-4 [doi]
- Performance Evaluation of a Lightweight IoT Authentication ProtocolDina Shehada, Amjad Gawanmeh, Claude Fachkha, Haitham Abu Damis. 1-4 [doi]
- Indoor Localization in Multi-Path Environment based on AoA with Particle FilterAysha Alteneiji, Ubaid Ahmad, Kin Poon, Nazar T. Ali, Nawaf I. Almoosa. 1-4 [doi]
- Fighting Deepfake by Residual Noise Using Convolutional Neural NetworksMarwa Chendeb El Rai, Hussain Al-Ahmad, Omar M. Gouda, Dina J. Jamal, Manar Abu Talib, Qassim Nasir. 1-4 [doi]
- Image Encryption Based on Chua Chaotic OscillatorFarah AlMutairi, Talal Bonny. 1-4 [doi]
- RAASID: A Multipurpose Crowd Sensing Smart System With Sentimental AnalysisMaha Al Hosani, Hamda Al Marzouqi, Shoug Al Junaibi, Amna Al Hmoudi, Jamal N. Al-Karaki, Amjad Gawanmeh. 1-4 [doi]
- A New Discrete-Time Model of Fractional-Order PLLReyad el-Khazali, Shaher Momani, Iqbal M. Batiha. 1-4 [doi]
- Vulnerability Assessment for IoT Nodes Using OpenBTS and Software Defined RadiosJosé de Jesús Rugeles Uribe, Edward Paul Guillen. 1-4 [doi]
- Design of a Secure Blockchain-Based Smart IoV ArchitectureDebashis Das, Sourav Banerjee, Wathiq Mansoor, Utpal Biswas, Pushpita Chatterjee, Uttam Ghosh. 1-4 [doi]
- EfficientNet for retinal blood vessel segmentationMili Rosline Mathews, Anzar S. M., R. Kalesh Krishnan, Alavikunhu Panthakkan. 1-4 [doi]
- Accurate Prediction of COVID-19 (+) Using AI Deep VGG16 ModelAlavikunhu Panthakkan, Anzar S. M., Saeed Al-Mansoori, Hussain Al-Ahmad. 1-4 [doi]
- Skin Cancer Classification Model Based on VGG 19 and Transfer LearningNour Aburaed, Alavikunhu Panthakkan, Mina Al-Saad, Saad Ali Amin, Wathiq Mansoor. 1-4 [doi]
- Impact of Channel Estimation Error on the Performance of Time-Domain Interleaved OFDM SystemsTasnim Nazzal, Husameldin Mukhtar. 1-4 [doi]
- Digital Forensics and Investigations of the Internet of Things: A Short SurveyShehanaz Amiroon, Claude Fachkha. 1-4 [doi]
- Automatic Detection of Sleep Apnea Using Sub-Band Features from EEG SignalsRitika Gupta, Tehreem Fatima Zaidi, Omar Farooq. 1-4 [doi]
- Digital Forensic Analysis of Files Using Deep LearningMohammed Al Neaimi, Hussam M. N. Al Hamadi, Chan Yeob Yeun, M. Jamal Zemerly. 1-4 [doi]
- A Comparative Study of Meningioma Tumors Segmentation Methods from MR ImagesMohanad Alkhodari, Omnia Hassanin, Salam Dhou. 1-4 [doi]
- A New Chaos-Based Cryptoystem for Voice EncryptionWafaa Al Nassan, Talal Bonny, Abdullatif Baba. 1-4 [doi]
- Introducing a Mobile App to Increase Cybersecurity Awareness in MENAHadeel Mohammed Jawad, Samir Tout. 1-4 [doi]