Abstract is missing.
- How to Improve the Teaching of Computational Machine Learning Applied to Large-Scale Data Science: The Case of Public Universities in MexicoSergio Rogelio Tinoco-Martínez, Heberto Ferreira Medina, José Luis Cendejas Valdéz, Froylan Hernández-Rendón, Mariana Michell Flores-Monroy, Bruce Hiram Ginori-Rodríguez. 1-15 [doi]
- Fingerprinting ECUs to Implement Vehicular Security for Passenger Safety Using Machine Learning TechniquesSamuel Bellaire, Matthew Bayer, Azeem Hafeez, Rafi Ud Daula Refat, Hafiz Malik. 16-32 [doi]
- Knowledge Graph Enrichment of a Semantic Search System for Construction SafetyEmrah Inan, Paul Thompson 0002, Fenia Christopoulou, Tim Yates, Sophia Ananiadou. 33-52 [doi]
- Leboh: An Android Mobile Application for Waste Classification Using TensorFlow LiteTeny Handhayani, Janson Hendryli. 53-67 [doi]
- Mobile Application for After School Pickup Solution: Malaysia PerspectivesCheck Yee Law, Yong-Wee Sek, Choo-Chuan Tay, Wei Wei Goh. 68-78 [doi]
- Were Consumers Less Price Sensitive to Life Necessities During the COVID-19 Pandemic? An Empirical Study on Dutch ConsumersHao Chen, Alvin Lim. 79-100 [doi]
- Eigen Value Decomposition Utilizing Method for Data Hiding Based on Wavelet Multi-resolution AnalysisKohei Arai. 101-118 [doi]
- Long Short-Term Memory Neural Network for Temperature Prediction in Laser Powder Bed Additive ManufacturingAshkan Mansouri Yarahmadi, Michael Breuß, Carsten Hartmann. 119-132 [doi]
- Detection and Collection of Waste Using a Partially Submerged Aquatic RobotMalek Ayesh, Uvais Qidwai. 133-149 [doi]
- Detecting Complex Intrusion Attempts Using Hybrid Machine Learning TechniquesMustafa Abusalah, Nizar Shanaah, Sundos Jamal. 150-170 [doi]
- Gauging Biases in Various Deep Learning AI ModelsN. Tellez, J. Serra, Y. Kumar, J. J. Li, P. Morreale. 171-186 [doi]
- Improving Meta-imitation Learning with Focused Task EmbeddingYu Fong Lin, Chi-Kai Ho, Chung-Ta King. 187-199 [doi]
- Firearm Detection Using Deep LearningAkhila Kambhatla, Khaled R. Ahmed. 200-218 [doi]
- PID Parameter Tables for Time-Delayed Systems, Found with Learning Algorithms According to Minimum IAE, ITAE and ISE CriteriaRoland Büchi. 219-230 [doi]
- Principles of Solving the Symbol Grounding Problem in the Development of the General Artificial Cognitive AgentsRoman V. Dushkin, Vladimir Y. Stepankov. 231-245 [doi]
- Enabling Maritime Digitalization by Extreme-Scale Analytics, AI and Digital Twins: The Vesselai ArchitectureSpiros Mouzakitis, Christos Kontzinos, John Tsapelas, Ioanna Kanellou, Georgios Kormpakis, Panagiotis Kapsalis, Dimitris Askounis. 246-256 [doi]
- Computing with Words for Industrial ApplicationsAisultan Kali, Pakizar Shamoi, Yessenaly Zhangbyrbayev, Aiganym Zhandaulet. 257-271 [doi]
- Improving Public Services Accessibility Through Natural Language Processing: Challenges, Opportunities and ObstaclesIlaria Mariani, Maryam Karimi, Grazia Concilio, Giuseppe Rizzo 0002, Alberto Benincasa. 272-289 [doi]
- Neural Machine Translation for Aymara to SpanishHonorio Apaza Alanoca, Brisayda Aruhuanca Chahuares, Kewin Aroquipa Caceres, Josimar Edinson Chire Saire. 290-298 [doi]
- Hand Gesture and Human-Drone InteractionBilawal Latif, Neil Buckley, Emanuele Lindo Secco. 299-308 [doi]
- Design and Develop Hardware Aware DNN for Faster InferenceS. Rajarajeswari, Annapurna P. Patil, Aditya Madhyastha, Akshat Jaitly, Himangshu Shekhar Jha, Sahil Rajesh Bhave, Mayukh Das, N. S. Pradeep. 309-318 [doi]
- Vision Transformers for Medical Images ClassificationsRebekah Leamons, Hong Cheng, Ahmad Al Shami. 319-325 [doi]
- A Survey of Smart Classroom: Concept, Technologies and Facial Emotions Recognition ApplicationRajae Amimi, Amina Radgui, Hassane Ibn El Haj. 326-338 [doi]
- The Digital Twin for Monitoring of Cargo Deliveries to the Arctic TerritoriesNikishova Maria Igorevna, Kuznetsov Mikhail Evgenievich. 339-347 [doi]
- Intelligent Bixby Recommender SystemsS. Rajarajeswari, Annapurna P. Patil, Manish Manohar, Mopuru Vinod Reddy, Laveesh Gupta, Muskan Gupta, Nikunj Das Kasat. 348-364 [doi]
- A Deep Reinforcement Learning Algorithm Using A New Graph Transformer Model for Routing ProblemsYang Wang, Zhibin Chen. 365-379 [doi]
- Building a Fuzzy Expert System for Assessing the Severity of PneumoniaRustam A. Burnashev, Adelya I. Enikeeva, Ismail F. Amer, Alfira Akhmedova, Marina Bolsunovskaya, Arslan Enikeev. 380-396 [doi]
- Evaluating Suitability of a Blockchain Platform for a Smart Education EnvironmentManal Alkhammash, Natalia Beloff, Martin White. 397-407 [doi]
- Towards End-to-End Chase in Urban Autonomous Driving Using Reinforcement LearningMichal Kolomanski, Mustafa Sakhai, Jakub Nowak, Maciej Wielgosz. 408-426 [doi]
- Methodology for Training Artificial Neural Networks for Islanding Detection of Photovoltaic Distributed GeneratorsLuiza Buscariolli, Ricardo Caneloi dos Santos, Ahda P. Grilo Pavani. 427-441 [doi]
- Using the Cramer-Gauss Method to Solve Systems of Linear Algebraic Equations with Tridiagonal and Five-Diagonal Coefficient MatricesAnarkul Urdaletova, Sergey Sklyar, Syrgak Kydyraliev, Elena Burova. 442-456 [doi]
- An Interoperable Cloud Platform for the Garment IndustryFrancisco Morais, Nuno Soares, Rui Ribeiro, Marcelo Alves, Pedro Rocha, Ana Lima, Ricardo J. Machado. 457-477 [doi]
- Optimal Scheduling of Processing Unit Using Convolutional Neural Network ArchitectureBhavin G. Chennur, Nishanth Shastry, S. Monish, Vibha V. Hegde, Pooja Agarwal, Arti Arya. 478-487 [doi]
- Facial Gesture Recognition for Drone ControlAloaye Itsueli, Nicholas Ferrara, Jonathan Kamba, Jeremie Kamba, Rocío Alba-Flores. 488-496 [doi]
- Job Recommendation Based on Extracted Skill EmbeddingsAtakan Kara, F. Serhan Danis, Günce Keziban Orman, Sultan N. Turhan, Ö. Anil Özlü. 497-507 [doi]
- Hard Samples Make Difference: An Improved Training Procedure for Video Action Recognition TasksAlexander Zarichkovyi, Inna V. Stetsenko. 508-519 [doi]
- Similarity-Based Résumé Matching via Triplet Loss with BERT ModelsÖ. Anil Özlü, Günce Keziban Orman, F. Serhan Danis, Sultan N. Turhan, K. Can Kara, T. Arda Yücel. 520-532 [doi]
- IOT Based Crowd Management ToolFai Aldosari, Sarah Alamri, Rahaf Alharbi, Ghaydaa Alghamdi. 533-539 [doi]
- The Growing Need for Metaverse RegulationLouis B. Rosenberg. 540-547 [doi]
- Weak Supervision Can Help Detecting Corruption in Public ProcurementBedri Kamil Onur Tas. 548-555 [doi]
- Applicability of Systems Engineering for Intelligent Transportation Systems: A Roadmap for Model-Based Approach to Manage Future Mobility NeedsHarsha Deshpande, Vasudha Srikumar. 556-571 [doi]
- Implementation of Two-Layered Dynamic PragmaticsÁdám Szeteli, Attila Friedszám, Anna Szeteli, Laura Kárpáti, Judit Hagymási, Judit Kleiber, Gábor Alberti. 572-589 [doi]
- Ambient Intelligence Security Checks: Identifying Integrity Vulnerabilities in Industry ScriptsSuzanna Schmeelk, Shannon Roth, Julia Rooney, Mughees Tariq, Khalil Wood, John Kamen, Denise Dragos. 590-599 [doi]
- Demystifying xAOSF/AOSR Framework in the Context of Digital Twin and Industry 4.0Fareed Ud Din, David J. Paul. 600-610 [doi]
- Mitigating IoT Enterprise Vulnerabilities Using Radio Frequency Security ArchitectureJohn Irungu, Anteneh Girma. 611-619 [doi]
- Tantrum-Track: Context and Ontological Representation Model for Recommendation and Tracking Services for People with AutismHamid Mcheick, Fatima Ezzeddine, Fatima Lakkis, Batoul Msheik, Mariam Ezzeddine. 620-635 [doi]
- Video Analysis of Solid Flame Combustion of the Ni-Al SystemIsaeva Oksana, Boronenko Yuri, Gulyaev Pavel. 636-645 [doi]
- Intrusion Detection System for Industrial NetworkWoo Young Park, Sang Hyun Kim, Duy-Son Vu, Chang Han Song, Hee Soo Jung, Hyeon Jo. 646-658 [doi]
- Proposing Theoretical Frameworks for Including Discreet Cues and Sleep Phases in Computational IntelligenceAishwarya Seth, Wanyi Guo. 659-674 [doi]
- DataWords: Getting Contrarian with Text, Structured Data and ExplanationsStephen I. Gallant, Mirza Nasir Hossain. 675-687 [doi]
- Extractive Text Summarization for Turkish: Implementation of TF-IDF and PageRank AlgorithmsEmre Akülker, Çigdem Turhan. 688-704 [doi]
- Recognition of Similar Habits Using Smartwatches and Supervised LearningMaren Hassemer, Edmond Cudjoe, Janina Dohn, Claudia Kredel, Yannika Lietz, Johannes Luderschmidt, Lisa Mohr, Sergio Staab. 705-723 [doi]
- Brand Recommendations for Cold-Start Problems Using Brand EmbeddingsDavid Azcona, Alan F. Smeaton. 724-733 [doi]
- Commentary on Biological Assets Cataloging and AI in the Global SouthIssah Abubakari Samori, Xavier-Lewis Palmer, Lucas Potter, Saltuk Karahan. 734-744 [doi]
- FI-SHAP: Explanation of Time Series Forecasting and Improvement of Feature Engineering Based on Boosting AlgorithmYuyi Zhang, Ovanes Petrosian, Jing Liu, Ruimin Ma, Kirill Krinkin. 745-758 [doi]
- Deep Learning and Support Vector Machine Algorithms Applied for Fault Detection in Electrical Power Transmission NetworkNouha Bouchiba, Azeddine Kaddouri. 759-777 [doi]
- Perception of the Situation: Social Stress and Well-Being IndicesAlexander A. Kharlamov, Maria Pilgun. 778-790 [doi]
- Smart Hardware Trojan Detection SystemIyad Alkhazendar, Mohammed Zubair, Uvais Qidwai. 791-806 [doi]
- A Study of Extracting Causal Relationships from TextPranav Dhananjay Gujarathi, Manohar Reddy, Neha Tayade, Sunandan Chakraborty. 807-828 [doi]
- Blending Case-Based Reasoning with Ontologies for Adapting Diet Menus and Physical ActivitiesAna Duarte, Orlando Belo. 829-843 [doi]