Abstract is missing.
- Increase Patients' Survivability During Emergency Care Using Blockchain-Based Digital Twin TechnologyShirin Hasavari, Yeong-Tae Song, Benjamin Lawner. 1-9 [doi]
- PowerGrader: Automating Code Assessment Based on PowerShell for Programming CoursesFei Zuo, Junghwan Rhee, Myung Ah Park, Gang Qian. 2-7 [doi]
- Balance-aware Cost-efficient Routing in the Payment Channel NetworkSuhan Jiang, Jie Wu 0001, Fei Zuo, Alessandro Mei. 8-15 [doi]
- TIPICAL - Type Inference for Python In Critical Accuracy LevelJonathan Elkobi, Bernd Gruner, Tim Sonnekalb, Clemens-Alexander Brust. 16-21 [doi]
- A Library-Based Approach for Writing Design AssertionsYoonsik Cheon, Ricardo Lozano, Rajasoundarya Senthil Prabhu. 22-27 [doi]
- A Dynamic Wireless Sensor Network Deployment Algorithm for Emergency CommunicationsKubra Gundogan, Nuri Alperen Kose, Khushi Gupta, Damilola Oladimeji, Fan Liang. 28-34 [doi]
- Split and Federated Learning with Mobility in Vehicular Edge ComputingSungwon Moon, Yujin Lim. 35-38 [doi]
- Analysis of Software Engineering Practices in General Software and Machine Learning StartupsBishal Lakha, Kalyan Bhetwal, Nasir U. Eisty. 39-46 [doi]
- Applications of Causality and Causal Inference in Software EngineeringPatrick Chadbourne, Nasir U. Eisty. 47-52 [doi]
- Towards Integrated Framework for Efficient Educational Software DevelopmentAlain Kabo Mbiada, Bassey Isong, Francis Lugayizi, Adnan M. Abu-Mahfouz. 53-60 [doi]
- A Test Suite Minimization Technique for Testing Numerical ProgramsPrashanta Saha, Clemente Izurieta, Upulee Kanewala. 61-68 [doi]
- Identifying Code Tampering Using A Bytecode Comparison Analysis ToolYoung Lee, Arlen P. McDonald, Jeong Yang. 69-76 [doi]
- Phishy? Detecting Phishing Emails Using ML and NLPMd. Fazle Rabbi, Arifa I. Champa, Minhaz F. Zibran. 77-83 [doi]
- Classification of Multilingual Medical Documents using Deep LearningWahiba Ben Abdessalem Karaa, Dridi Kawther. 84-89 [doi]
- LSTM-AE for Anomaly Detection on Multivariate Telemetry DataAnes Abdennebi, Alp Tuncay, Cemal Yilmaz, Anil Koyuncu, Oktay Gungor. 90-97 [doi]
- Fake News Detection Using Machine Learning TechniquesAchhiya Sultana, Mahmudul Islam, Mahady Hasan, Farruk Ahmed. 98-103 [doi]
- Multi-level Adaptive Execution Tracing for Efficient Performance AnalysisMohammed Adib Khan, Naser Ezzati Jivan. 104-109 [doi]
- Obsolescence in Operating Systems and MicroprocessorsDheeraj N. Naraharisetti, Ramesh K. Karne, Joel Weymouth, Alexander L. Wijesinha. 110-115 [doi]
- Programming Model for Information Sharing among IoT Devices: Software Engineering PerspectiveSamuel Sungmin Cho, Myoungkyu Song. 116-121 [doi]
- Named Data Networking (NDN) for Data Collection of Digital Twins-based IoT SystemsHengshuo Liang, Cheng Qian, Chao Lu 0002, Lauren Burgess, John Mulo, Wei Yu 0002. 122-127 [doi]
- A Blockchain-Based Verification Process for Smart CitiesRaad Haddad, Dhiah el Diehn I. Abou-Tair, Alá F. Khalifeh. 128-131 [doi]
- Digital Twins of Smart Campus: Performance Evaluation Using Machine Learning AnalysisAdamu Hussaini, Cheng Qian, Yifan Guo, Chao Lu 0002, Wei Yu 0002. 132-137 [doi]
- Towards an Adversarial Machine Learning Framework in Cyber-Physical SystemsJohn Mulo, Pu Tian, Adamu Hussaini, Hengshuo Liang, Wei Yu 0002. 138-143 [doi]
- Evaluating the Performance of Containerized Webservers against web servers on Virtual Machines using Bombardment and SiegeDaniel Ukene, Hayden Wimmer, Jongyeop Kim. 144-152 [doi]
- Realistic Predictors for Regression and Semantic SegmentationKrishna Chaitanya Gadepally, Sambandh Bhusan Dhal, Stavros Kalafatis, Kevin J. Nowka. 153-155 [doi]
- An Assurance Case Driven Development Paradigm for Autonomous Vehicles: An F1TENTH Racing Car Case StudyIoannis Nearchou, Lance Rafalko, Ryan Phillips, Matthew Anderson, Wuwei Shen, Steven Drager 0001. 156-161 [doi]
- A Data Mining Approach to Construct Classification Model for Predicting Tourism Graduates EmployabilityAnna Sheila Crisostomo, Riah Encarnacion, Shakir Al Balushi. 162-168 [doi]
- Consideration of Semantics between Q&A Statements to Obtain Factor ScoreYuya Yokoyama. 169-175 [doi]
- Analyzing the Effects of CI/CD on Open Source Repositories in GitHub and GitLabJeffrey Fairbanks, Akshharaa Tharigonda, Nasir U. Eisty. 176-181 [doi]
- Evaluating Code Metrics in GitHub Repositories Related to Fake News and MisinformationJason Duran, Mostofa Najmus Sakib, Nasir U. Eisty, Francesca Spezzano. 182-188 [doi]
- Data-Driven Smart Manufacturing Technologies for Prop Shop SystemsZhicheng Xu, Weinan Gao, Zhicun Chen, Rami Haddad, Scot Hudson, Ezebuugo Nwaonumah, Frank Zahiri, Jeremy Johnson. 189-194 [doi]
- Towards Imbalanced Large Scale Multi-label Classification with Partially Annotated LabelsXin Zhang, Yuqi Song, Fei Zuo, Zheqing Zhou, Xiaofeng Wang. 195-200 [doi]
- Deep Learning Model to Improve the Stability of Damage Identification via Output-only SignalJongyeop Kim, Jinki Kim, Matthew Sands, SeongSoo Kim. 201-209 [doi]
- Anomaly Detection in Intrusion Detection System using Amazon SageMakerIan Trawinski, Hayden Wimmer, Jongyeop Kim. 210-217 [doi]
- A Comparative Study of Deep Learning Models for Hyper Parameter Classification on UNSW-NB15SeongSoo Kim, Lei Chen 0029, Jongyeop Kim, Yiming Ji, Rami J. Haddad. 218-228 [doi]
- Nighttime Vehicle Classification based on Thermal ImagesXianshan Qu, Nathan Huynh, Robert Mullen, John R. Rose. 229-234 [doi]
- A Systematic Literature Review on Test Case Prioritization and Regression Test SelectionZhengxinchao Xiao, Lei Xiao. 235-242 [doi]
- Detection of anomalies in the HDFS datasetMarwa Chnib, Wafa Gabsi. 243-250 [doi]
- Calibrating Cybersecurity Experiments: Evaluating Coverage Analysis for Fuzzing BenchmarksJim Alves-Foss, Aditi Pokharel, Ronisha Shigdel, Jia Song. 251-257 [doi]
- Determining the Most Significant Metadata Features to Indicate Defective Software CommitsRupam Kumar Dey, Anahita Khojandi, Kalyan Perumalla. 258-265 [doi]
- Documentation Practices in Agile Software Development: A Systematic Literature ReviewMd Athikul Islam, Rizbanul Hasan, Nasir U. Eisty. 266-273 [doi]
- Another Software for Designing Electric TransformersJangwu Jo, Junhyun Park, Ayoung Jang, Youngsu Cho, Byeongdo Kang. 274-275 [doi]
- Enhancing Students' Job Seeking Process Through A Digital Badging SystemHamdan Ziyad Alabsi, Majed Almotairi, Yahya Alqahtani, Mohammed Abdulkareem Alyami. 276-281 [doi]
- 3 B (Block Byte Bit) Cipher Algorithm for Secure Socket LayerYong-Pil Geum. 282-286 [doi]
- Are We Aware? An Empirical Study on the Privacy and Security Awareness of Smartphone SensorsArifa I. Champa, Md. Fazle Rabbi, Farjana Z. Eishita, Minhaz F. Zibran. 287-294 [doi]
- Misinformation Detection Using an Ensemble Method with Emphasis on Sentiment and Emotional AnalysesSanjaikanth E. Vadakkethil Somanathan Pillai, Wen-Chen Hu. 295-300 [doi]
- Analysis of Programming Performance Based on 2-grams of Keystrokes and Mouse OperationsKazuki Matsumoto, Kinari Nishiura, Mariko Sasakura, Akito Monden. 301-306 [doi]
- Reinforcement of Collaborative Work in the Metaverse Through Playful ActivitiesNicia Guillén Yparrea, Felipe Hernández-Rodríguez. 307-312 [doi]
- SDCG: Silhouette-based Deep Clustering with GNN for Improved Graph Node ClusteringHyesoo Shin, Eunjo Jang, Sojeong Kim, Ki Yong Lee. 313-318 [doi]
- TI-former: A Time-Interval Prediction Transformer for Timestamped SequencesHyewon Ryu, Sara Yu, Ki Yong Lee. 319-325 [doi]
- The Strategy of Digital Twin Convergence Service based on MetaversJieun Kang, SuBi Kim, Yongik Yoon 0001. 326-330 [doi]
- Cloud-based Digital Twins Storage in Emergency HealthcareErdan Wang, Pouria Tayebi, Yeong-Tae Song. 331-335 [doi]
- Performance of GAN-Based Denoising and Restoration Techniques for Adversarial Face ImagesTurhan Kimbrough, Pu Tian, Weixian Liao, Wei Yu 0002. 335-340 [doi]
- Experimental Evaluation of Adversarial Attacks Against Natural Language Machine Learning ModelsJonathan Li, Steven Pugh, Honghe Zhou, Lin Deng, Josh Dehlinger, Suranjan Chakraborty. 341-344 [doi]
- Commit Message Can Help: Security Patch Detection in Open Source Software via TransformerFei Zuo, Xin Zhang, Yuqi Song, Junghwan Rhee, Jicheng Fu. 345-351 [doi]
- ProvSec: Cybersecurity System Provenance Analysis Benchmark DatasetMadhukar Shrestha, Yonghyun Kim, Jeehyun Oh, Junghwan Rhee, Yung Ryn Choe, Fei Zuo, Myungah Park, Gang Qian. 352-357 [doi]
- A Statistical Method for API Usage Learning and API Misuse Violation FindingDeepak Panda, Piyush Basia, Kushal Nallavolu, Xin Zhong, Harvey P. Siy, Myoungkyu Song. 358-365 [doi]
- Orchestrating Apache NiFi/MiNiFi within a Spatial Data PipelineChase D. Carthen, Araam Zaremehrjardi, Vinh D. Le, Carlos Cardillo, Scotty Strachan, Alireza Tavakkoli, Frederick C. Harris Jr., Sergiu M. Dascalu. 366-371 [doi]
- Scientific Organization of Blood Donation Camp Through Lexicographic Optimization and Taxicab Path ComputationPartha Ghosh, Takaaki Goto, Leena Jana Ghosh, Soumya Sen. 372-376 [doi]
- Improve Accuracy of PC Skill Assessment Using PC Operation Log DataHaotian Yan, Takaaki Goto, Tadaaki Kirishima, Kensei Tsuchida. 377-382 [doi]
- Customer Segmentation Using Credit Card Data AnalysisSaikat Raj, Santanu Roy, Surajit Jana, Soumyadip Roy, Takaaki Goto, Soumya Sen. 383-388 [doi]
- Detection of a Novel Object-Detection-Based Cheat Tool for First-Person Shooter Games Using Machine LearningZhang Xiao, Takaaki Goto, Partha Ghosh, Tadaaki Kirishima, Kensei Tsuchida. 389-394 [doi]
- Novel Music Genre Classification System Using Transfer Learning on a Small DatasetYi Wang, Takaaki Goto, Tadaaki Kirishima, Kensei Tsuchida. 395-401 [doi]
- Mobile Augmented Reality System for Emergency ResponseSharad Sharma. 402-406 [doi]
- Design and Implementation of Scientific Research Achievement Transformation SystemJinbao Song, Jiahui Cai, Ran Li, Yanan Li. 407-412 [doi]
- Research and Application of Content-based Image Hash Retrieval AlgorithmXinqun Luo, Xingyu Tan. 413-416 [doi]
- Construction and Application of Knowledge Graph for Food TherapyQianzhong Chen, Xianghao Meng, Feng Lin, Dongsheng Shi, Yiying Lin, Dongmei Li, Hao Gu, Xiaoping Zhang. 417-422 [doi]
- Rule-Based Representation Learning for Traditional Chinese Medicine Knowledge GraphDongsheng Shi, Feng Lin, Yuxun Li, Qianzhong Chen, Yiying Lin, Wentao Zhu, Dongmei Li, Xiaoping Zhang. 423-427 [doi]
- Texture and Orientation-based Feature Extraction for Robust Facial Expression RecognitionSajid Ali Khan, Mohammed Bin Abdulrahman Alawairdhi, Mousa T. Al-Akhras. 428-433 [doi]
- Mobile User Analysis Considering Collaboration with Financial ServicesKen Nishimatsu, Akiya Inoue. 434-439 [doi]
- Operation Management Method of Software Defined Perimeter for Promoting Zero-Trust ModelShigeaki Tanimoto, Sogen Hori, Hiroyuki Sato, Atsushi Kanai. 440-445 [doi]
- Study on Emissions of Environmental Impact in Chemical IndustryYohei Hara, Hiroyuki Ono. 446-451 [doi]
- Multi-Objective Particle Swarm Optimization Approach for Population Classification in Emergency ManagementBethsy Guerrero, María Valle, Mauricio Restrepo, Jairo Alberto Cardona, César Viloria-Núñez, Christian G. Quintero M.. 452-459 [doi]
- Domain-specific Modeling Environment Construction Tool based on View Patterns: RapidDSMMasumi Kawakami, Fuyuki Ishikawa. 460-468 [doi]