Abstract is missing.
- CURETO: Skin Diseases Detection Using Image Processing And CNNR. K. M. S. K. Karunanayake, W. G. Malaka Dananjaya, M. S. Y. Peiris, B. R. I. S. Gunatileka, Shashika Lokuliyana, Anuththara Kuruppu. 1-6 [doi]
- Application of Transfer Learning for Fruits and Vegetable Quality AssessmentSherzod Turaev, Ali Abd Almisreb, Mohammed Ahmed Saleh. 7-12 [doi]
- Can Dynamic Social Events Impact Our Travel Patterns And Trends?Feda Qaswal, Imad Afyouni, Zaher Al Aghbari. 13-17 [doi]
- Query Expansion Framework Leveraging Clinical Diagnosis Information OntologySumbal Malik, Umar Shoaib, Hesham El-Sayed, Manzoor Ahmed Khan. 18-23 [doi]
- Smartphone Application for Diagnosing Maize Diseases in EgyptNevien Moawad, Abdelrahman Elsayed. 24-28 [doi]
- Framework for Protecting the Confidentiality of Outsourced Data on CloudTasneem Ali Ghunaim, Ibrahim Kamel, Zaher Al Aghbari. 29-34 [doi]
- Application of Differential Privacy Approach in Healthcare Data - A Case StudyMuhammad Talha Zia, Manzoor Ahmed Khan, Hesham El-Sayed. 35-39 [doi]
- A New High Capacity Video Steganography Scheme Using Differential Directional PixogramMohammed Baziyad, Tamer Rabie, Ibrahim Kamel. 40-44 [doi]
- A Review of Color Image Steganalysis in the Transform DomainNour Mohamed, Tamer Rabie, Ibrahim Kamel. 45-50 [doi]
- Towards Improving the Imperceptibility of Steganography Schemes: Adaptive Scaling ApproachHassan Vakani, Ibrahim Kamel, Tamer Rabie, Mohammed Baziyad. 51-56 [doi]
- Studying Data Privacy Management in Small and Medium-Sized IT CompaniesMarko Jäntti. 57-62 [doi]
- Mapping Gaming Elements with Gamification Categories: Immersion, Achievement, and Social in a MOOC SettingRohani Rohan, Debajyoti Pal, Suree Funilkul. 63-68 [doi]
- Acoustic Localization for Autonomous Unmanned SystemsMurali Manohar S. Kumar, Himanshu Yadav, Dawnee Soman, Ashish Kumar, Arun Kumar Reddy N. 69-74 [doi]
- MarvinEye - Autonomy in Constrained EnvironmentAditya Prasanna, Anagha M. Anil Kumar, Rahul Nagpal. 75-81 [doi]
- Classification and Scheduling of Information-Centric IoT Applications in Cloud- Fog Computing Architecture (CS_IcIoTA)K. Jairam Naik. 82-87 [doi]
- Information Quality Assessment for the Medical Wearable Devices: Validation StudyRawhi Alrae, Manar Wasif Abu Talib, Qassim Nasir. 88-95 [doi]
- A Manufacturer-Independent Digital Process Platform for Future Construction SitesThomas Otte, Hans Aoyang Zhou, Aymen Gannouni, Jonas Odenthal, Anas Abdelrazeq, Frank Hees. 96-101 [doi]
- Variational autoencoder as a generative tool to produce de-novo lead compounds for biological targetsVarun Ullanat. 102-107 [doi]
- Deep Learning Techniques for Automatic Modulation Classification: A Systematic Literature ReviewSara Ali Ghunaim, Qassim Nasir, Manar Wasif Abu Talib. 108-113 [doi]
- A survey on Arabic Image Captioning Systems Using Deep Learning ModelsAnfal Attai, Ashraf Elnagar. 114-119 [doi]
- Deep Learning Model for Financial Time Series PredictionOmnia Kelany, Sherin Aly, Mohamed A. Ismail. 120-125 [doi]
- Self-supervised Deep Learning for Flower Image SegmentationSudipan Saha, Nasrullah Sheikh, Biplab Banerjee, Sumedh Pendurkar. 126-130 [doi]
- Efficient Base-Centric/User-Centric Clustering Algorithms Based on Thresholding and SortingShahriar Shirvani Moghaddam, Kiaksar Shirvani Moghaddam. 131-136 [doi]
- Enhanced Coordinated Multi Point Scheduling in LTE-Advanced SystemsMohammed Imad Aal-Nouman, Noor Qusay A. AlShaikhli, Sarmad M. Hadi. 137-141 [doi]
- M-BEB: Enhanced and Fair Binary Exponential BackoffNadia Zerguine, Zibouda Aliouat, Mohammed Mostefai, Saad Harous. 142-147 [doi]
- Performance Improvement of Energy Detection in Cognitive Radio Under Noise UncertaintyMorteza Alijani, Anas Osman. 148-153 [doi]
- Dynamic Reference Information: Formalising Contextual Actionable Information for Contested EnvironmentsAngela Consoli, Andrew Walters. 154-159 [doi]
- Citizen Engagement in Smart Government: Content Analysis of Mohammed Bin Rashid TweetsAysha M. Al Sawafi, Mamoun A. Awad. 160-164 [doi]
- A Survey of Emergency Service Facilities Site Selection (ESFSS) AlgorithmsMariam Hassan AlThabahi, Manar Wasif Abu Talib, Sohail Abbas, Essa Basaeed. 165-171 [doi]
- Extended Speech Rhythm-Based Analysis of Saudi Dialects Using SAAVB CorpusRana F. Bin Ikrish, Yousef Ajami Alotaibi, Soha B. Sandouka. 172-177 [doi]
- Aspect-Based Sentiment Analysis of Arabic Tweets in the Education Sector Using a Hybrid Feature Selection MethodManar Alassaf, Ali Mustafa Qamar. 178-185 [doi]
- Empirical analysis of generalization through augmentation for classifying images of vernacular handwritten textsRajneesh Tiwari, Aritra Sen, Arindam Banerjee, Kaushik Dey. 186-191 [doi]
- A Blockchain Technology Approach for the Security and Trust in Trade FinanceNeha Jain, R. R. Sedamkar. 192-197 [doi]
- Intrusion Detection and Attack Classification Leveraging Machine Learning TechniqueShahtaj Shaukat, Arshid Ali, Amreen Batool, Fehaid Alqahtani, Jan Sher Khan, Arshad, Jawad Ahmad 0001. 198-202 [doi]
- Botnet Attack Detection using Machine LearningMustafa Alshamkhany, Wisam Alshamkhany, Mohamed Mansour, Mueez Khan, Salam Dhou, Fadi Aloul. 203-208 [doi]
- AdaDiffGrad: An Adaptive Batch Size Implementation Technique for DiffGrad Optimization MethodWajid Khan, Sara Ali, U. S. Khan Muhammad, Muhammad Jawad, Mazhar Ali, Raheel Nawaz. 209-214 [doi]
- Application of Containerized Microservice Approach to Airline Sentiment AnalysisSumbal Malik, Hesham El-Sayed, Manzoor Ahmed Khan, Henry Alexander. 215-220 [doi]
- Web-based multi-user concurrent job scheduling system on the shared computing resource objectsTetiana Habuza, Khaled Khalil, Nazar Zaki, Fady Alnajjar, Munkhjargal Gochoo. 221-226 [doi]
- Towards General Purpose Object Detection: Deep Dense Grid Based Object DetectionSolomon Negussie Tesema, El-Bay Bourennane. 227-232 [doi]
- Coverage Optimisation for Aerial Wireless NetworksShadi Eltanani, Ibrahim Ghafir. 233-238 [doi]
- IoT applications for monitoring companion animals: A systematic literature reviewRoberto Lima Junior. 239-246 [doi]
- API Security Risk Assessment Based on Dynamic ML ModelsBojan Nokovic, Nebojsa Djosic, Weiyue Owen Li. 247-252 [doi]
- 0EI2FA: Zero Effort Indoor Two Factor AuthenticationAli Abdullah S. AlQahtani, Hosam Alamleh, Jean Gourd, Hatwib Mugasa. 253-257 [doi]