Abstract is missing.
- Tweet recommendation using Clustered Bert and Word2vec ModelsSurbhi Kakar, Deepali Dhaka, Monica Mehrotra. [doi]
- Smart City Traffic Monitoring:YOLOv7 Transfer Learning Approach for Real-Time Vehicle DetectionZahra Esfandiari Baiat, Sebnem Baydere. 1-6 [doi]
- Residential College's Smart Restroom Monitoring SystemF. I. Azman, M. S. F. M. Fazdli, N. L. Saleh, A. S. M. Noor, A. M. Ali. 1-6 [doi]
- Using Machine Learning and SEM to Analyze Attitudes towards adopting Metaverse in Higher EducationSalman Hussain, Eman Almohsen, Tara Henari, Safwan Shatnawi, Anwaar Buzaboon, Mohammed Fardan, Khawla Albinali. 1-6 [doi]
- Protocol Stack-Aware Comparison of Centroid Localization Algorithms Based on Anchor Density Using CoojaIsmail Hakki Turan, Dogan Yildiz, Sercan Demirci. 1-6 [doi]
- Reducing Bootstrap Overhead within VANET Blockchain Applications through PruningEdgar Wallace Bowlin, Mohammad S. Khan, Biju Bajracharya. 1-6 [doi]
- Machine Learning with Bitcoin Heist RansomwareNurhaliza Hassan, Kanika Sood, Gabriel Suzuki. 1-6 [doi]
- Discrete wavelet transform-based denoising method for real electrocardiogramNacèra Meziane, Dalila Meziane, Merouane Bouzid. 1-5 [doi]
- Energy-Aware Task Scheduling for Digital Twin Edge Networks in 6GElif Bozkaya, Tugçe Bilen, Müge Erel-Özçevik, Yusuf Özçevik. 1-6 [doi]
- Generalized framework for protecting privacy in the smart grid environment and measuring the efficacy of privacy attacksMohammad Sahinur Hossen, Dongwan Shin. 1-8 [doi]
- Appliances Operation Modes Identification Using States ClusteringAbdelkareem Jaradat, Muhamed Alarbi, Hanan Lutfiyya, Anwar Haque. 1-6 [doi]
- Design and Implementation of Proactive Multi-Type Context-Aware Recommender System for Patients Suffering DiabetesAbdallatif S. Abu-Issa, S. Hajjaj, S. Al-Jamal, D. Barghotti, A. Awad, M. Hussein, Iyad Tumar, Abualsoud Hanani. 1-7 [doi]
- Deep Learning Applications in MIMO SystemsAli J. Almasadeh, Khawla A. Alnajjar, Mahmoud A. M. Albreem. 1-6 [doi]
- Demonstration of Multi-Layer IoT Platform with QoS SupportKemal Cagri Serdaroglu, Boonyarith Saovapakhiran, Zahra Esfandiari Baiat, Sebnem Baydere, Chalermpol Charnsripinyo, F. Mulyadi, Suat Özdemir. 1-4 [doi]
- A Machine Learning Framework & Development for Insider Cyber-crime Threats DetectionRasheed Yousef, Mahmoud Jazzar, Amna Eleyan, Tarek Bejaoui. 1-6 [doi]
- FPGA-based tunable Keccak coreAhmed Maache, Abdesattar Kalache. 1-6 [doi]
- Efficient coding of wideband ISF parameters : Application of variable rate SSVQ schemeMerouane Bouzid, Meziane Nacèra, Salah Eddine Cheraitia. 1-5 [doi]
- An Efficient Massive MIMO Detector Based on Deep Learning and Approximate Matrix Inversion MethodsAli Ahmad Suliman, Ahmad Bassim Humaidi, Mohammed Eid Eid, Mahmoud A. Albreem, Sam Ansari. 1-5 [doi]
- Improved k-NN Regression Model Using Random Forests for Air Pollution PredictionSiddharth Sharma, L. Rajya Lakshmi. 1-7 [doi]
- 'AI-Teacher' Assistant System: A Smart Attendance and Participation tracking system for studentsMouza Alzaabi, Mahra Almeheiri, Shuaa Alqubaisi, Ahmed Shuhaiber. 1-6 [doi]
- A Novel Graph-Based Energy Efficient Sensor Selection Scheme in Edge ComputingMohammad Soleimanikia, Omid Bushehrian, Davood Mahmoodi. 1-6 [doi]
- Towards an Infrastructure and Architecture of Nanotechnology in Agriculture for Abu DhabiSalama Alhameli, Amna Almazrouei, Amal Almenhali, Ahmed Shuhaiber. 1-7 [doi]
- Hardware-Based Error Correction Systems for Hamming Codes: a Review of the LiteratureKhawla A. Alnajjar, Abdallah Y. I Abushawish, Sam Ansari. 1-8 [doi]
- The Development of Smart E-Portfolio Generator System for University students: An SDLC ApproachAhmed Shuhaiber, Aysha Alkuwaiti, Mera Alremeithi, Hamda Almenhali. 1-8 [doi]
- Portable AI-powered spice recognition system using an eNose based on metal oxide gas sensorsMontaser N. A. Ramadan, Mohammad Alkhedher, Bekir Tevfik Akgün, Sina Alp. 1-6 [doi]
- A Platform for Monitoring Student Commuting in the Use of School Transport in Smart Cities - A Facial Recognition Based ApproachJessé Da Costa Rocha, Marcela Alves De Souza, Evelin Helena Silva Cardoso, Nandamudi Vijaykumar, Jasmine Priscyla Leite De Araújo, Carlos Renato Lisboa Francês. 1-6 [doi]
- Harnessing 5G Networks for Health Care: Challenges and Potential ApplicationsS. M. Abu Adnan Abir, Mohammed A. Abuibaid, Jun Steed Huang, Yang Hong. 1-6 [doi]
- The application and comparison of Deep Learning models for the prediction of chest cancer prognosisMahadi Hasan, Miraz Al-Mamun, Madhab Chandra Das, Md Maruf Hasan, Asm Mohaimenul Islam. 1-5 [doi]
- Intelligent Mission Critical Services over Beyond 5G Networks: Control Loop and Proactive Overload DetectionSotirios T. Spantideas, Anastasios E. Giannopoulos, Marta Amor Cambeiro, Óscar Trullols-Cruces, Eneko Atxutegi, Panagiotis Trakadas. 1-6 [doi]
- Prisma Analysis of Innovative Technologies on Advancement of Optimisation of Manufacturing IndustryNdala Mulongo, Mahtlatse Matlala, Khathutshelo Mushavhanamadi. 1-6 [doi]
- Extracting Insights from Big Source Code Repositories with Automatic Clustering of Projects by File Names and TypesYury Yakhno, Selin Metin. 1-6 [doi]
- Fading Channel Classification with Walsh-Hadamard Transform and Convolutional Neural NetworkGianmarco Baldini, Fausto Bonavitacola, Jean-Marc Chareau. 1-6 [doi]
- PESS: Progress Enhancing Student SupportNisha Thorakkattu Madathil, Winner Abula, Shooq Alaboolan, Maryam Almadhaani, Saed Alrabaee. 1-6 [doi]
- Data Offloading from LTE to Wi-FiMustafa Aljerbi, Ahmed S. Ashur, Nabil Naas. 1-5 [doi]
- Failures to Food, Energy, and Water Systems: Mapping and Simulating Components to Improve ResilienceAlex Modarresi, John Symons. 1-6 [doi]
- Location Aware Fog Computing Based Air Quality Monitoring SystemKemal Cagri Serdaroglu, Sebnem Baydere, Boonyarith Saovapakhiran, Chalermpol Charnsripinyo. 1-6 [doi]
- SATA M.2 on Forensics: Trim Function Effect on Recovering Permanently Deleted FilesRuwa F. Abu Hweidi, Mahmoud Jazzar, Amna Eleyan, Tarek Bejaoui. 1-6 [doi]
- Graph Neural Network based Approach for Rumor Detection on Social NetworksDaniel Hosseini, Rong Jin. 1-6 [doi]
- Comparative Analysis of Machine Learning Methods for Multi-Year CVD PredictionAlfian Akbar Gozali. 1-6 [doi]
- Edge-based Battery Remaining Useful Life Estimation Using Deep LearningChristian Jay C. Adducul, John Rufino I. Macasaet, Nestor Michael C. Tiglao. 1-6 [doi]
- SPIDVerify: A Secure and Privacy-Preserving Decentralised Identity Verification FrameworkAbubakar-sadiq Shehu, António Pinto, Manuel Eduardo Correia. 1-7 [doi]
- Strategy for Community Empowerment Through an Integrated Waste BankMS Hasibuan, Firmansyah YA, Sri Lestari, M. Ariza Eka Yusendra, Lilla Rahmawati, Yayan Sopian-Dhedy Adi Nugroho. 1-4 [doi]
- Machine Learning-Based Topology Optimization in 3D PrintingAlmira Askhatova, Yerlik Gabdulla, Amanali Bekbolat, Essam Shehab, Md. Hazrat Ali. 1-6 [doi]
- BioEnvsense: A Usable Cybersecurity Framework for Critical InfrastructureFarnaz Farid. 1-5 [doi]
- On the Implementation of a Secure and Energetically Efficient NOC for Mobile NetworksLuis A. Mata, Sinan Wannous, David Duarte, Eva Maia, Pedro Vieira 0001, Isabel Praça. 1-8 [doi]
- A Transfer Learning Application on the Reliability of Psychological Drugs' CommentsTarik Üveys Sen, Gokhan Bakal. 1-6 [doi]
- Attack Detection in IoT-Based Healthcare Networks Using Hybrid Federated LearningMay Itani, Hanaa S. Basheer, Fouad Eddine. 1-7 [doi]
- Intellitell: A Web-based Storytelling Platform for Emotion Recognition with Machine LearningAaron Jay V. Argel, Madeleine M. Ragmac, Markus Elija Thomas E. Lindo, Nestor Michael C. Tiglao. 1-6 [doi]
- A High-Capacity 4-Port MIMO Antenna for 5G and 6G DevicesKarrar Shakir Muttair, Oras A. Shareef Al-Ani, Ahmed Mahmood Farhan, Mahmood Farhan Mosleh, Hazeem B. Taher, Ali Z. Ghazi Zahid, Abbas Ali Diwan, Raed Hameed Chyad Alfilh. 1-6 [doi]
- Opportunistic RL-based WiFi Access for Aerial Sensor Nodes in Smart City ApplicationsMehmet Ariman, Lal Verda Çakir, Mehmet Özdem, Berk Canberk. 1-5 [doi]
- Low Complexity Scheduling and Phase Shift Optimization in RIS-Aided mmWave Downlink TransmissionSertap Ünlü Cinalioglu, Tolga Girici. 1-6 [doi]
- A Proposal of IoT Application for Plant Monitoring System with AWS Cloud ServiceSamsul Huda, Yasuyuki Nogami, Takuma Akada, Maya Rahayu, Md. Biplob Hossain, Muhammad Bisri Musthafa, Le Hoang Anh, Yang Jie. 1-5 [doi]
- Collaborative DDoS Attack Defense for OTA Updates in CAVs using Hyperledger Fabric BlockchainSadia Yeasmin, Anwar Haque. 1-6 [doi]
- 'Robpha': A Robotic-Based Pharmacy for a Smart HospitalLamya Almansoori, Fatima Almusabi, Meera Alharbi, Ahmed Shuhaiber, Mohammad Tubishat. 1-6 [doi]
- Optimizing Latency for Real-time Traffic and Road Safety Applications through MEC-based V2X SystemAnnu, Rajalakshmi Pachamuthu, Praveen Tammana. 1-8 [doi]
- ML-Based Service Type Priority Decision Method Using Ambient Information for 5GBUmut Altunan, Halenur Sazak, Ahmet Yazar. 1-5 [doi]
- Harnessing 5G Networks for Enhanced Precision Agriculture: Challenges and potential SolutionsMuhammad Anas Khan, Adeeb Khan, Mohammed A. Abuibaid, Jun Steed Huang. 1-6 [doi]
- Cybersecurity in Fitness Devices-A Systematic Literature ReviewTasneem Durid, Derar Eleyan, Amna Eleyan, Tarek Bejaoui, Mahmoud Jazzar. 1-6 [doi]
- A Web-Based Platform for Real-Time Speech Emotion Recognition using CNNDamir Kabdualiyev, Askar Madiyev, Adil Rakhaliyev, Balgynbek Dikhan, Kassymzhan Gizhduan, Hashim Ali. 1-6 [doi]
- A Smart Desk: A Smart Solution for Young StudentsAhmed Shuhaiber, Rund Hiyasat, Amjad Abuelsamen, Nasreen Ghanem, Mouza Alhammadi, Alreem Alghafri. 1-6 [doi]
- Blockchain for Ridesharing: A Systematic Literature ReviewKhadija Rammeh Houerbi, Dorra Machfar, Hella Kaffel Ben Ayed. 1-6 [doi]
- Resource-Constrained Device Characterization for Detecting Sleep Apnea Using Machine LearningSayani Mallick, Pranav Ruparel, Shubhangi K. Gawali, Neena Goveas. 1-7 [doi]
- Optimal configuration method of edge computing unit considering computing load balancing in fault location of power distribution gridPeng Wu, Wei Wang, Lanxin Qiu, Yue Yu, Jiming Yao. 1-8 [doi]
- Leveraging Generative AI Models for Synthetic Data Generation in Healthcare: Balancing Research and PrivacyAryan Jadon, Shashank Kumar. 1-4 [doi]
- C-V2X Link Decision with Machine LearningÖmer Sokmaz, Ahmet Yazar. 1-5 [doi]
- Indoor Navigation Assistance System for Visually Impaired with Semantic Segmentation using EdgeTPUVictor Tran, Kanika Sood, Kayhan Bakian, Aneesh Reddy Sannapu. 1-8 [doi]
- Dynamic MAC Scheduling in O-RAN using Federated Deep Reinforcement LearningHalil Arslan, Selim Yilmaz, Sevil Sen. 1-8 [doi]
- Arabic Geo-Social Event Detection using a Hybrid Learning ArchitectureImad Afyouni, Baraa Kakah, Maissan Bazazeh. 1-6 [doi]
- A Computational Drug Repositioning Effort using Patients' Reviews DatasetAli Akkaya, Gokhan Bakal. 1-6 [doi]
- Wideband MIMO Antenna in the Shape of a Hand GripHussein Mohammed Naser, Oras A. Shareef Al-Ani, Karrar Shakir Muttair, Mahmood Farhan Mosleh, Hazeem B. Taher. 1-6 [doi]
- Towards symbolic representation-based modeling of Temporal Knowledge GraphsSiraj Munir, Stefano Ferretti. 1-8 [doi]
- Li-IDS: An Approach Towards a Lightweight IDS for Resource-Constrained IoTMahawish Fatima, Osama Rehman, Ibrahim M. H. Rehman. 1-6 [doi]
- Identification and Classification of Retinal Diseases by Using Deep Learning ModelsNoor B. Khalaf, Hadeel K. Aljobouri, Mohammed S. Najim. 1-5 [doi]
- A Sentiment Analysis Approach for Identifying Users' Security and Privacy Perception of Metaverse In TwitterMousa Al-Kfairy, Ahmed Al-Adaileh, Mohammad Tubishat, Omar Alfandi, Maitha BinAmro, Ayham Alomari. 1-6 [doi]
- Sentiment Analysis of Using ChatGPT in EducationMohammad Tubishat, Feras N. Al-Obeidat, Ahmed Shuhaiber. 1-7 [doi]
- Software Defined Networking (SDN) for Campus Networks, WAN, and DatacenterOlubukola David, Paul Thornley, Maryam Bagheri 0004. 1-8 [doi]
- Distributed Personal OS Environments - exploring Cooperative Fog ComputingMathieu Boussard, Pierre Peloso, Vincent Verdot, Richard Douville, Nicolas Le Sauze. 1-4 [doi]
- A Low-cost IoT Mobile System for Air Quality Monitoring in Developing Countries, a Study Case in El SalvadorOmar Otoniel Flores-Cortez, Carlos Pocasangre Jimenez, Fernando Arévalo, Ricardo León López, David Peña Martínez, Oscar Perez Rafael. 1-8 [doi]
- Specific Emitter Identification with Principal Component Analysis (PCA) Dimensionality Reduction and Convolutional Neural NetworkGianmarco Baldini, Fausto Bonavitacola. 1-5 [doi]
- Aχon: IoT Attribute-based dynamic connector For Emergency ApplicationsMohamad Ghandour, Hamid Mcheick, Mohamed Dbouk. 1-8 [doi]
- Optimum Noise Mechanism for Probabilistic Differentially Private Queries in Discrete Finite SetsSachin Kadam, Anna Scaglione, Nikhil Ravi, Sean Peisert, Brent Lunghino, Aram Shumavon. 1-6 [doi]
- A comparative study of machine learning approaches for heart stroke predictionMadhab Chandra Das, Fatema Tabassum Liza, Partha Pratim Pandit, Fariha Tabassum, Miraz Al-Mamun, Sharmistha Bhattacharjee, Md Shakil Bin Kashem. 1-6 [doi]
- Q-Learning Algorithm Inspired Objective Function Optimization For IETF 6TiSCH NetworksTayfun Bekar, Sedat Görmüs, Burak Aydin, Hakan Aydin. 1-6 [doi]
- Impact of a Web Based Crowdfunding Application for Renewable Energy Projects in NigeriaAyokunle Awelewa, Ebubechi Ezenwanne, Kayode Ojo, Isaac Samuel, Popoola Olawale. 1-8 [doi]
- A Systematic Review of The Relationship Between Industry 4.0 Application and Performance ImprovementNdala Yves Mulongo, Khathutshelo Mushavhanamdi, Octavia Mpanza. 1-6 [doi]
- Exploiting Spatial Correlations: Group Key Generation for Secure IoT Device NetworksMohammed Omar, Ahmed Badawy, Khalid Abulsaud, Elias Yaacoub, Mohsen Guizani. 1-6 [doi]
- Deep Privacy based Face Anonymization for Smart CitiesMuhammad Umair Hassan, Magnus Stava, Ibrahim A. Hameed. 1-6 [doi]
- Load-Aware Resource Scheduling in Fog Computing Based Delay-Sensitive IoT NetworksL. Rajya Lakshmi. 1-7 [doi]
- Analysis of Machine Learning Algorithms for Cyber Attack Detection in SCADA Power SystemsMitchell Timken, Onat Güngör, Tajana Rosing, Baris Aksanli. 1-6 [doi]
- Analysis of the Demilitarized Zone Implementation in Java Madura Bali Electrical Systems to Increase the Level of IT/OT Cyber Security With the Dual DMZ Firewall Architecture MethodAgus Harya Maulana, I. G. P. Ari Suyasa, Erwan Kurniawan. 1-6 [doi]
- Forensics Investigation on Social Media Apps and Web Apps Messaging in Android SmartphoneRuwa F. Abu Hweidi, Mahmoud Jazzar, Amna Eleyan, Tarek Bejaoui. 1-7 [doi]
- Few-shot Multi-domain Knowledge Rearming for Context-aware Defence against Advanced Persistent ThreatsGaolei Li, Yuanyuan Zhao, Wenqi Wei, Yuchen Liu. 1-8 [doi]
- Explainable AI-Based Malicious Traffic Detection and Monitoring System in Next-Gen IoT HealthcareEce Gürbüz, Özlem Turgut, Ibrahim Kök. 1-6 [doi]
- The Design of a Cough Disease Classification System Using Cube-TransformerYuh-Shyan Chen, Chih-Shun Hsu, Bo-Xuan Yang. 1-6 [doi]
- A Music Generation Scheme with Beat Weight LearningYuh-Shyan Chen, Chih-Shun Hsu, Fang-Yu Chang Chien. 1-6 [doi]
- An empirical study on utilizing online k-means clustering for intrusion detection purposesRemah Younisse, Qasem Abu Al-Haija. 1-5 [doi]
- Advanced Edge to Cloud system architecture for Smart Real-Time water quality monitoring using cutting-edge portable IoT biosensor devicesMarios Charalampides, Theodoros Bozios, Dimitris Tsoukalas, Sotirios Ntouskas, Stavros Chatzandroulis, Evangelos Skotadis, Evangelos Aslanidis, Themistoklis Sfetsas, Georgia Dimitropoulou, George Tsekenis, Georgios Samaras. 1-6 [doi]
- Integration of Industry 4.0 in the Metal Roofing Manufacturing IndustryNdala Yves Mulongo, Khathutshelo Mushavhanamadi, Avumile Fetsha. 1-7 [doi]
- An Elliptical Folded Dipole With Directive Radiation for UWB ApplicationsRomain Greard, Mohamed Himdi, Dominique Lemur, Gwenal Le Dem, Pierre Thaly, Cyrille Le Meins. 1-4 [doi]
- Wildfire Classification Using Infrared Unmanned Aerial Vehicle Data with Convolutional Neural NetworksRahmi Arda Aral, Cemil Zalluhoglu, Ebru Akçapinar Sezer. 1-6 [doi]
- A Novel Blockchain Based Decentralized Data Management Model for Swarm UAV SystemsGökberk Açikgöz, Feyza Yildirim Okay, Suat Özdemir. 1-6 [doi]
- Emerging Role of Artificial Intelligence in Addressing The Electricity CrisisNdala Yves Mulongo, Khathutshelo Mushavhanamadi. 1-4 [doi]
- FAME: Federated Decentralized Trusted Data Marketplace for Embedded FinanceArgyro Mavrogiorgou, Athanasios Kiourtis, Georgios Makridis, Dimitrios Kotios, Vasileios Koukos, Dimosthenis Kyriazis, John Soldatos 0001, Georgios Fatouros, Dimitrios Drakoulis, Pedro Maló, Martin Serrano, Mauro Isaja, Raquel Lazcano, Juan Manuel Vera, Fabiana Fournier, Lior Limonad, Konstantinos Perakis, Dimitrios Miltiadou, Pavlos Kranas, Alper Sen, Irene Zattarin, Ernesto Troiano. 1-6 [doi]
- Multi-hop Precaching scheme with Relaying in Intermittently Connected Vehicular NetworksGayeong Kim, Youngju Nam, Hyunseok Choi, Euisin Lee. 1-6 [doi]
- SARS CovidAID: Automatic detection of SARS CoV-19 cases from CT scan images with pretrained transfer learning model (VGG19, RESNet50 and DenseNet169) architectureAfia Farjana, Fatema Tabassum Liza, Miraz Al-Mamun, Madhab Chandra Das, Md Maruf Hasan. 1-6 [doi]