Abstract is missing.
- Using Game Theory to Prioritize Goals in Requirements EngineeringIsaac Munthali, Bennett Kankuzi. 1-5 [doi]
- Securing V2X-Enabled Unmanned Vehicles: A Comprehensive Taxonomy of Cyber Threats and CountermeasuresAmar Seeam, Visham Ramsurrun. 1-6 [doi]
- AI-based Malware Threat Prediction through CNN-SVM EnsembleMufaro Shoniwa, Karel Veerabudren, Mrinal Sharma. 1-6 [doi]
- A Carpooling System To Ease Traffic In MauritiusVidushi Lukhoo, Raj Kishen Moloo. 1-6 [doi]
- Drug Target Interaction prediction using Variational Quantum classifierDassen Sathan, Shakuntala Baichoo. 1-7 [doi]
- Training Tacotron 2 for Text-to-Speech Synthesis in Kreole Language: Methodology and Audio ProcessingKousraj Ujoodha, Baby Ashwin Gobin Rahimbux, Nuzhah Gooda Sahib. 1-6 [doi]
- Smart Fish Feeding in IoT-based Aquarium: A Comprehensive Approach Integrating Computer Vision, Machine Learning and Sensor TechnologyRyan Cassy, Girish Bekaroo. 1-6 [doi]
- Enhanced Liner Shipping Network Design using Ant Colony OptimisationNirmal Rampersand, Oomesh Gukhool. 1-6 [doi]
- Mauvote: A Novel Mobile Electronic Voting System Using BlockchainJunaid Bin Asad Edoo, Roopesh Kevin Sungkur, Jorge Marx Gómez, Hauke Precht, Skady Rudolph. 1-6 [doi]
- Engagement by Goals - A Digital Platform for Goal-Oriented VolunteeringJohannes Schönböck, Josef Altmann, Birgit Pröll, Wieland Schwinger, Elisabeth Kapsammer, Werner Retschitzegger, Nikolas Goblirsch-Urban, Marianne Lechner, Christoph Angster. 1-8 [doi]
- Effective Detection of Fileless Malware: A Review and Comparative Analysis of Detection TechniquesParlan Obeegadoo, Girish Bekaroo. 1-7 [doi]
- YOLO-Based Techniques for the Crown-of-Thorns Starfish Detection: A Comparative StudyRakshita Ramdharee, Zahra Mungloo-Dilmohamud. 1-5 [doi]
- Characteristics of an AI Tutor to Prepare Students in Technical Subjects for the new Society 5.0Laurie L. Butgereit, Amar Kumar Seeam. 1-6 [doi]
- Defending Against XML External Entity (XXE) Attacks: A Review and Comparative Analysis of Prevention MechanismsBhavesh Hulloowan, Girish Bekaroo. 1-6 [doi]
- Improving the Classification of Sentiments Towards Covid-19 Vaccines using Semantic Enrichment and EmojisKarabo Johannes Ntwaagae, Edwin Thuma, Gontlafetse Mosweunyane. 1-6 [doi]
- Using GPT-4 to Tutor Python Programming in Shona and Ndebele in ZimbabweLaurie L. Butgereit, Helper Zhou. 1-5 [doi]
- Transformative Botanical Visualization: Exploring the Application of Augmented Reality to Visualize FlowersHanshee Fowdar, Girish Bekaroo. 1-6 [doi]
- A Review of PFCP Cyber Attacks in 5G Standalone for Robotic Telesurgery ServicesNtshuxeko Makondo, Errol Baloyi, Hlabishi I. Kobo, Topside E. Mathonsi. 1-7 [doi]
- Promoting Physical Activity and Social Engagement in Older Adults through Immersive Exergaming: A Comprehensive ReviewShehzad Jaunbuccus, Roushdat Elaheebocus. 1-8 [doi]
- Leveraging ML to Detect Fraudulent Customs Declaration: A Case of Logistic Regression and LightGBM AlgorithmsInnocent Chilomo, Bennett Kankuzi. 1-6 [doi]
- Weed Detection in Smart Agriculture Application in the 5G Smart Country ProjectRami Chahin, Ali Akyol, Jorge Marx Gómez. 1-6 [doi]
- RXSS Protect: A Browser Extension for Detection of Reflected Cross-Site Scripting Attacks in Real-Time Using Machine LearningYaachna Rawoteea, Girish Bekaroo. 1-7 [doi]