Abstract is missing.
- Optimised Round Robin with Virtual Runtime for CPU SchedulingJagriti Bhatia, Sanskriti Mathuria, Vandana M. Ladwani, Shobana Padmanabhan. 1-17 [doi]
- Faster Lock-Free Atomic Shared PointersJörg P. Schäfer. 18-38 [doi]
- 2e: A Compute Carbon Footprint Estimation Tool Based on Time Series DataChristian Plewnia, Horst Lichter. 39-55 [doi]
- Image Classification Method Based on Chaos Neural NetworkKohei Arai. 56-73 [doi]
- Human-Created and AI-Generated Text: What's Left to Uncover?Steven Salter, Phoey-Lee Teh, Richard Hebblewhite. 74-80 [doi]
- AraXLM: New XLM-RoBERTa Based Method for Plagiarism Detection in Arabic TextMona Alshehri, Natalia Beloff, Martin White. 81-96 [doi]
- Boosting Customer Retention in Pharmaceutical Retail: A Predictive Approach Based on Machine Learning ModelsAngel Espinoza-Vega, Henry N. Roa. 97-117 [doi]
- Introducing Prediction Concept into Data Envelopment Analysis Using Classifier in Economic ForecastGuangzao Huang, Zijiang Yang 0001, Grace Liu, Guoli Ji. 118-127 [doi]
- Investigating Machine Learning Techniques Used for the Detection of Class Noise in Data: A Systematic Literature ReviewCindy van den Berg, Sunet Eybers. 128-147 [doi]
- The Role of Chatbots in Data Analytics: An Evaluation of Functional AbilitiesPreeti Patel, Sowgol Shooshtarian. 148-168 [doi]
- An Analytical Investigation into the Impact of Product Color on the Price of Retail Products and Purchasing Decisions of ConsumersZaid M. Altukhi, Nasser F. Aljohani. 169-186 [doi]
- A Numerical Approach for the Fractional Laplacian via Deep Neural NetworksNicolás Valenzuela. 187-219 [doi]
- RBF-SC: A Fast Community Detection Technique Using Radial Basis FunctionsFang Hu, Jia Liu, Lina Wu, Xingang Fang, Mingfang Huang, Haotian Liu. 220-236 [doi]
- Improving Medication Prescription Strategies for Discordant Chronic Comorbidities Through Medical Data Bench-Marking and Recommender SystemsTom Ongwere, Nimbalkar Rutuja, Tam V. Nguyen 0002. 237-250 [doi]
- Sentiment Analysis for Predicting the Variation Trend of Stocks: A Case Study of Vanke Co., LtdQiuyi Jin, Jin Zheng. 251-270 [doi]
- Suicide Ideation Prediction Through Deep Learning: An Integration of CNN and Bidirectional LSTM with Word EmbeddingsChristianah T. Oyewale, Ayodeji O. J. Ibitoye, Joseph Damilola Akinyemi, Olufade F. W. Onifade. 271-283 [doi]
- A Multi-clustering Unbiased Relative Prediction Recommendation Scheme for Data with Hidden Multiple OverlapsAvivit Levy, Michal Chalamish, B. Riva Shalom, Guy Sharir, Opal Peltzman, Sivan Salzmann. 284-302 [doi]
- An Unsupervised Deep Learning Model for Aspect Retrieving Using Transformer EncoderAtanu Dey, Mamata Jenamani, Arijit De. 303-317 [doi]
- Personalized Student Performance Prediction Modeling for Student Digital TwinsSean C. Mondesire, Emmanuel Nsiye. 318-329 [doi]
- A Social Profile-Based Recommendation Architecture for E-Learning SystemsXola Ntlangula, Wai Sze Leung. 330-343 [doi]
- A Comparison of Student Engagement Across Three Teaching Modalities in an Introductory Statistics CourseSher B. Chhetri, Mario Toussaint, Nonhle C. Mdziniso, Rebecca A. Hillman. 344-357 [doi]
- Impact Factor Game Scoring Model for Positive Emotion Game DesignV. Sithira Vadivel. 358-364 [doi]
- Cyber Safety Awareness Through a Massive Open Online Course (MOOC): Community Engagement Knowledge TransferElmarie Kritzinger. 365-376 [doi]
- Immersive Environments at School: "Stop Cyberbullying by Proximity"Cristina Sánchez-Romero, Eva María Muñoz-Jiménez. 377-383 [doi]
- Simulation and Analysis of Cyber-Attack on Modbus Protocol for Smart Grids in Virtual EnvironmentShampa Banik, Rajesh Manicavasagam, Trapa Banik, Shudipta Banik. 384-401 [doi]
- Cybersecurity Governance in the Medical Ecosystem: An Orientation Guide with Specific Reference to the Merging of IT and OT DevicesSebastiaan H. von Solms, Jaco du Toit. 402-417 [doi]
- The Impact of Utilising the Amazon AWS Hybrid Deployment Model on Assuring a Secure Migration of a Commercial Web Application into the CloudKhalied Koorowlay, Rafid Al-Khannak. 418-431 [doi]
- Mitigating Cache Pollution Attack Using Deep Learning in Named Data Networking (NDN)Mohd Maizan Fishol Hamdi, Zhiyuan Chen, Milena Radenkovic 0001. 432-442 [doi]
- A Community Security Operations Centre (ComSOC) Model for SMMEs in Developing CountriesNombeko Ntingi, Jaco du Toit, Sebastiaan H. von Solms. 443-456 [doi]
- Optimizing Energy States in Mobile Embedded Systems: A SIPN-Based ApproachRobert Stojic, Daniel Peters, Florian Thiel. 457-477 [doi]
- Secure Content Protection Schemes for Industrial IoT with SRAM PUF-Based One-Time Use Cryptographic KeysSaloni Jain, Ashwija Reddy Korenda, Bertrand Cambou, Chris Lucero. 478-498 [doi]
- Feasibility Study with Actual Space Rockets Towards Information Theoretically Secure Radio CommunicationSumio Morioka, Satoshi Obana, Maki Yoshida. 499-508 [doi]
- FlexHi: A Flexible Hierarchical Threshold Signature SchemeMuhammed Ali Bingöl, Sermin Kocaman, Ali Dogan, Sibel Kurt Toplu. 509-529 [doi]
- Autoencoder-Based Solution for Intrusion Detection in Industrial Control SystemSilvio Russo, Claudio Zanasi, Isabella Marasco, Michele Colajanni. 530-543 [doi]
- Determining the Segmentation Type Impact on an ID Card Fraud Detection SystemDaniel P. Benalcazar, Pamela C. Zurita, Diego Pasmino, Rodrigo Lara. 544-555 [doi]
- Transforming Medical Waste Management Through IoT and Machine Learning: A Path Towards SustainabilityNahin Nasir, Mohammed Shahriar Hossain, Md. Saiful Islam, Md. Arifiul Islam, Md Manirul Islam. 556-575 [doi]
- IntentRec: An Advanced Recommender System Leveraging User-Item IntentAbhishrut Vaidya, Niladri Chatterjee. 576-595 [doi]
- Process for the Identification of Vehicle Functions for Cloud OffloadingMartin Sommer, Daniel Baumann, Tobias Rösch, Falk Dettinger, Eric Sax, Michael Weyrich. 596-608 [doi]
- Smart Workplace Past Covid-19: Perceived Challenges and Potential Smart Solutions for University Work EnvironmentRabail Tahir, John Krogstie. 609-624 [doi]
- Need for Cultural Sensitivity in the Design and Development of Technology to Aid in Dementia Care: A Review of LiteratureArshia Khan, Sakina Rao, Alfia Parvez. 625-636 [doi]
- Sentiment Analysis of Post-COVID-19 Work-From-Home Culture: A Literature ReviewJoseph Kwame Adjei, Hannah Alhassan Suhuyini. 637-652 [doi]
- Security Gaps in the Mobile Money System in Rwanda: Challenges, Risks and MitigationCatherine Njogu, Furaha Benedict, Susan Muthoni, Marie Noelle Kanyamuneza, Evalyne Lwoba, Everlyn Musembi, Yussuf Papy, Edwin Kairu. 653-664 [doi]
- Comparative Analysis of Flow and Cardano Blockchains: Navigating Adoption Challenges, Computing Techniques and Implications for the Blockchain LandscapeAyda Bransia, Bálint Molnár, Simon Thompson. 665-670 [doi]