Abstract is missing.
- Feature Analysis for Aphasic or Abnormal Language Caused by InjuryMarisol Roldán-Palacios, Aurelio López-López. 1-16 [doi]
- Automatic Detection and Segmentation of Liver Tumors in Computed Tomography Images: Methods and LimitationsOdai S. Salman, Ran Klein. 17-35 [doi]
- HEMAYAH: A Proposed Mobile Application System for Tracking and Preventing COVID-19 Outbreaks in Saudi ArabiaReem Alwashmi, Nesreen Alharbi, Aliaa M. Alabdali, Arwa A. Mashat. 36-47 [doi]
- Data Security in Health Systems: Case of CameroonIgor Godefroy Kouam Kamdem, Marcellin Julius Antonio Nkenlifack. 48-57 [doi]
- Predicting Levels of Depression and Anxiety in People with Neurodegenerative Memory Complaints Presenting with Confounding SymptomsDalia Attas, Bahman Mirheidari, Daniel Blackburn, Annalena Venneri, Traci Walker, Kirsty Harkness, Markus Reuber, Chris Blackmore, Heidi Christensen. 58-69 [doi]
- Towards Collecting Big Data for Remote PhotoplethysmographyKonstantin Kalinin, Yuriy Mironenko, Mikhail Kopeliovich, Mikhail Petrushan. 70-86 [doi]
- Towards Digital Twins Driven Breast Cancer DetectionSafa Meraghni, Khaled Benaggoune, Zeina Al Masry, Labib Sadek Terrissa, Christine Devalland, Noureddine Zerhouni. 87-99 [doi]
- Towards the Localisation of Lesions in Diabetic RetinopathySamuel Ofosu Mensah, Bubacarr Bah, Willie Brink. 100-107 [doi]
- Framework for a DLT Based COVID-19 PassportSarang Chaudhari, Michael Clear, Philip Bradish, Hitesh Tewari. 108-123 [doi]
- Deep Learning Causal Attributions of Breast CancerDaqing Chen 0001, Laureta Hajderanj, Sarah Mallet, Pierre Camenen, Bo Li, Hao Ren, Erlong Zhao. 124-135 [doi]
- Effect of Adaptive Histogram Equalization of Orthopedic Radiograph Images on the Accuracy of Implant Delineation Using Active ContoursAlicja Smolikowska, Pawel Kaminski, Rafal Obuchowicz, Adam Piórkowski. 136-144 [doi]
- Identification Diseases Using Apriori Algorithm on DevOpsAya Mohamed Morsy, Mostafa Abdel Azim Mostafa. 145-160 [doi]
- IoT for Diabetics: A User PerspectiveSigne Marie Cleveland, Moutaz Haddara. 161-172 [doi]
- Case Study: UML Framework of Obesity Control Health Information SystemMajed Alkhusaili, Kalim Qureshi. 173-191 [doi]
- An IoT Based Epilepsy Monitoring ModelS. A. McHale, E. Pereira. 192-207 [doi]
- Biostatistics in Biomedicine and InformaticsEsther Pearson. 208-212 [doi]
- Neural Network Compression Framework for Fast Model InferenceAlexander Kozlov, Ivan Lazarevich, Vasily Shamporov, Nikolay Lyalyushkin, Yury Gorbachev. 213-232 [doi]
- Small-World Propensity in Developmental Dyslexia After Visual Training InterventionTihomir Taskov, Juliana Dushanova. 233-258 [doi]
- An Assessment of Extreme Learning Machine Model for Estimation of Flow Variables in Curved Irrigation ChannelsHossein Bonakdari, Azadeh Gholami, Bahram Gharabaghi, Isa Ebtehaj, Ali Akbar Akhtari. 259-269 [doi]
- Benchmarking of Fully Connected and Convolutional Neural Networks on Face Recognition: Case of Makeup and OcclusionsStanislav Selitskiy, Nikolaos Christou, Natalya Selitskaya. 270-285 [doi]
- Wavelet Neural Network Model with Time-Frequency Analysis for Accurate Share Prices PredictionYaqing Luo. 286-297 [doi]
- A Hybrid Method for Training Convolutional Neural NetworksVasco Lopes, Paulo A. P. Fazendeiro. 298-308 [doi]
- A Layered Framework for Dealing with Dilemmas in Artificial Intelligence SystemsJim Q. Chen. 309-326 [doi]
- Improving Student Engagement and Active Learning with Embedded Automated Self-assessment Quizzes: Case Study in Computer System Architecture DesignRyan M. Gibson, Gordon Morison. 327-339 [doi]
- Cognitive Load of Ontology as a Means of Information Representation in the Educational ProcessMaryna Popova, Rina Novogrudska. 340-352 [doi]
- The Influence of Computer Games on High School Students (Adolescents)Dalibor Peic, Andrija Bernik. 353-368 [doi]
- Pedagogical Approaches in Computational Thinking-Integrated STEAM Learning Settings: A Literature ReviewAshok Kumar Veerasamy, Peter Larsson, Mikko-Ville Apiola, Daryl J. D'Souza, Mikko-Jussi Laakso. 369-389 [doi]
- Development of Anaglyph 3D Functionality for Cost-Effective Virtual Reality Anatomical EducationAlex J. Deakyne, Thomas Valenzuela, Paul A. Iaizzo. 390-398 [doi]
- Augmented Reality in Virtual Classroom for Higher Education During COVID-19 PandemicMonica Maiti, M. Priyaadharshini, B. Vinayaga Sundaram. 399-418 [doi]
- The Teaching and Learning of the Untyped Lambda Calculus Through Web-Based e-Learning ToolsLevis Zerpa. 419-436 [doi]
- Development and Design of a Library Information System Intended for Automation of Processes in Higher Education InstitutionAskar Boranbayev, Ruslan Baidyussenov, Mikhail Mazhitov. 437-445 [doi]
- Informally Teaching Black Youth STEM Concepts Virtually Using Artificial Intelligence and Machine LearningDarron Lamkin, Robin Ghosh, Tutaleni I. Asino, Tor A. Kwembe. 446-461 [doi]
- Accrediting Artificial Intelligence Programs from the Omani and the International ABET PerspectivesOsama A. Marzouk. 462-474 [doi]
- Embodied Learning: Capitalizing on Predictive ProcessingSusana Sanchez. 475-490 [doi]
- Exploring the Darkness of Gamification: You Want It Darker?Tobias Nyström. 491-506 [doi]
- The Future of Information and Communication Technology CoursesDalize van Heerden, Leila Goosen. 507-526 [doi]
- The Impact of Computer Games on Preschool Children's Cognitive SkillsDolores Kamenar Cokor, Andrija Bernik. 527-541 [doi]
- Using STEM to Improve Computer Programming TeachingManuel Rodrigues. 542-548 [doi]
- Tips for Using Open Educational Resources to Reduce Textbook Costs in Computing and IT CoursesRichard Halstead-Nussloch, Rebecca H. Rutherfoord. 549-559 [doi]
- Cross-Cultural Design of Simplified Facial ExpressionsMeina Tawaki, Keiko Yamamoto, Ichi Kanaya. 560-574 [doi]
- Misinformation and Its Stakeholders in Europe: A Web-Based AnalysisEmmanouil Koulas, Marios Anthopoulos, Sotiria Grammenou, Christos Kaimakamis, Konstantinos Kousaris, Fotini-Rafailia Panavou, Orestis Piskioulis, Syed Iftikhar Hussain Shah, Vassilios Peristeras. 575-594 [doi]
- Artificial Life: Investigations About a Universal Osmotic Paradigm (UOP)Bianca Tonino-Heiden, Bernhard Heiden, Volodymyr Alieksieiev. 595-605 [doi]
- Latency and Throughput Advantage of Leaf-Enforced Quality of Service in Software-Defined Networking for Large Traffic FlowsJosiah Eleazar T. Regencia, William Emmanuel S. Yu. 606-623 [doi]
- The Impact of Online Social Networking (Social Media) on Interpersonal Communication and RelationshipsMui Joo Tang, Eang Teng Chan. 624-640 [doi]
- Embedded Piezoelectric Array for Measuring Relative Distributed Forces on Snow SkisAndrés Rico, Carson Smuts, Jason Nawyn, Kent Larson. 641-648 [doi]
- Experimental Study of a Tethered Balloon Using 5G Antenna to Enhance Internet ConnectivitySamirah A. Alhusayni, Shuruq K. Alsuwat, Shahd H. Altalhi, Faris A. Almalki, Hawwaa S. Alzahrani. 649-663 [doi]
- Incremental Dendritic Cell Algorithm for Intrusion Detection in Cyber-Physical Production SystemsRui Pinto, Gil Gonçalves 0002, Jerker Delsing, Eduardo Tovar. 664-680 [doi]
- Performance Comparison Between Deep Learning-Based and Conventional Cryptographic DistinguishersEmanuele Bellini 0002, Matteo Rossi. 681-701 [doi]
- TFHE Parameter Setup for Effective and Error-Free Neural Network Prediction on Encrypted DataJakub Klemsa. 702-721 [doi]
- Security in Distributed Ledger Technology: An Analysis of Vulnerabilities and Attack VectorsEfthimios-Enias Gojka, Niclas Kannengießer, Benjamin Sturm, Jan Bartsch, Ali Sunyaev. 722-742 [doi]
- An Analysis of Twitter Security and Privacy Using Memory ForensicsAhmad Ghafarian, Darius Fiallo. 743-760 [doi]
- A Security Requirement Engineering Case Study: Challenges and Lessons LearnedSouhaïl El Ghazi El Houssaïni, Ilham Maskani, Jaouad Boutahar. 761-783 [doi]
- Towards Automated Surveillance: A Review of Intelligent Video SurveillanceRomas Vijeikis, Vidas Raudonis, Gintaras Dervinis. 784-803 [doi]
- Homicide Prediction Using Sequential Features from Graph Signal ProcessingJuan Moreno 0003, Sebastián Quintero, Alvaro Riascos, Luis Gustavo Nonato, Cristian Sánchez. 804-817 [doi]
- Effectiveness and Adoption of NIST Managerial Practices for Cyber Resilience in ItalyAlessandro Annarelli, Serena Clemente, Fabio Nonino, Giulia Palombi. 818-832 [doi]
- Steganographic Method to Data Hiding in RGB Images Using Pixels Redistribution Combining Fractal-Based Coding and DWTHector Caballero-Hernandez, Vianney Muñoz-Jiménez, Marco A. Ramos 0001. 833-850 [doi]
- Improving the Imperceptibility of Pixel Value Difference and LSB Substitution Based Steganography Using Modulo EncodingAhmad Whafa Azka Al Azkiyai, Ari Moesriami Barmawi, Bambang Ari Wahyudi. 851-867 [doi]
- Securing Mobile Systems GPS and Camera Functions Using TrustZone FrameworkAmmar S. Salman, Wenliang (Kevin) Du. 868-884 [doi]
- Application of Machine Learning in Cryptanalysis Concerning Algorithms from Symmetric CryptographyMilena Gjorgjievska Perusheska, Vesna Dimitrova, Aleksandra Popovska-Mitrovikj, Stefan Andonov. 885-903 [doi]
- A Response-Based Cryptography Engine in Distributed-MemoryChristopher Robert Philabaum, Christopher Coffey, Bertrand Cambou, Michael Gowanlock. 904-922 [doi]
- Elliptic Curves of Nearly Prime OrderDaniele Di Tullio, Manoj Gyawali. 923-932 [doi]
- Assessing Small Institutions' Cyber Security Awareness Using Human Aspects of Information Security Questionnaire (HAIS-Q)Glenn Papp, Petter Lovaas. 933-948 [doi]
- 2 RegularizationEvercita C. Eugenio, Fang Liu 0006. 949-966 [doi]
- Secondary Use Prevention in Large-Scale Data LakesShizra Sultan, Christian Damsgaard Jensen. 967-985 [doi]
- Cybercrime in the Context of COVID-19Mohamed Chawki. 986-1002 [doi]
- Beware of Unknown Areas to Notify Adversaries: Detecting Dynamic Binary Instrumentation Runtimes with Low-Level Memory ScanningFederico Palmaro, Luisa Franchina. 1003-1019 [doi]
- Tamper Sensitive Ternary ReRAM-Based PUFsBertrand Cambou, Ying-Chen Chen. 1020-1040 [doi]
- Locating the Perpetrator: Industry Perspectives of Cellebrite Education and Roles of GIS Data in Cybersecurity and Digital ForensicsDenise Dragos, Suzanna Schmeelk. 1041-1050 [doi]
- Authentication Mechanisms and Classification: A Literature SurveyIvaylo Chenchev, Adelina Aleksieva-Petrova, Milen Petrov. 1051-1070 [doi]
- ARCSECURE: Centralized Hub for Securing a Network of IoT DevicesKavinga Yapa Abeywardena, A. M. I. S. Abeykoon, A. M. S. P. B. Atapattu, H. N. Jayawardhane, C. N. Samarasekara. 1071-1082 [doi]
- Entropy Based Feature Pooling in Speech Command ClassificationChristoforos Nalmpantis, Lazaros Vrysis, Danai Vlachava, Lefteris Papageorgiou, Dimitris Vrakas. 1083-1091 [doi]