


default search action
1st ACR 2023: Orlando, FL, USA
- Kevin Daimi, Abeer Alsadoon:
Proceedings of the 2023 International Conference on Advances in Computing Research, ACR 2023, Orlando, FL, USA, May 8-10, 2023. Lecture Notes in Networks and Systems 700, Springer 2023, ISBN 978-3-031-33742-0
Data Analytics Engineering
- Christie I. Ezeife, Mayank Semwal:
Community Opinion Network Maximization for Mining Top K Seed Social Network Users. 3-16 - Nabin Shrestha, Salma Hameedi, Rami S. Alkhawaldeh, Omar Hisham Rasheed Al-Sadoon:
Taxonomy for an Automated Sleep Stage Scoring. 17-29 - Nguyen Hoang Phuong, Ha Manh Toan, Dao Van Tu, Nguyen Khac-Dung
, Nguyen Van Thi, Ngo Le Lam, Anh Nguyen:
Convolutional Neural Networks Based Classification of Mammograms. 30-43 - Joyner Johnson, Adhithyan Rangarajan, Thomas Hunt, Payal Agarwal, Mahmoud Elbatouty, Karthikeyan Umapathy, Dan Richard, Leah Nash:
Finding Insights in Florida Voter Participation. 44-55 - Basem Suleiman, Ali Anaissi, Yuhuan Xiao, Waheeb Yaqub, Anuradha Samkham Raju, Widad Alyassine:
Supervised Learning-Based Indoor Positioning System Using WiFi Fingerprints. 56-71 - Ahmad Salah, Mahmoud Bekhit
, Asma Musabah Alkalbani
, Mohamed A. Mohamed, Nur Indah Lestari, Ahmed Fathalla
:
Comparing Ensemble Learning Techniques on Data Transmission Reduction for IoT Systems. 72-85 - Aaron Collins, Prarthana Pillai, Balakumar Balasingam, Arunita Jaekel:
Machine Learning Technique for Data Fusion and Cognitive Load Classification Using an Eye Tracker. 86-95 - Waleed Ibrahim, Binaya Subedi, Sabreena Zoha
, Abdussalam Ali, Emran Salahuddin:
Comparative Analysis: Recommendation Techniques in E-Commerce. 96-107 - Elaf A. Shukur, Auns Q. Al-Neami, Furat Y. Mohsen:
Design and Manufacturing of Cap System to Prevent Chemotherapy-Induced Alopecia. 108-119 - Imran Khan
, Maya ALghafri, Abdelhamid Abdessalem:
Entropy in Fuzzy k-Means Algorithm for Multi-view Data. 120-133 - Khem Poudel, Movin Uddin, Revanth Kommu, Sadiat Muhammed, Nahid Hasan, Sammi Hamdan:
HealthCare Text Analytics Using Recent ML Techniques. 134-142 - Abel Méndez-Porras, Sixto Enrique Campaña Bastidas, Andrés Alejandro Diaz Toro, Luis-Alexander Calvo-Valverde, Rolando Rigoberto Rosero:
Emotion Recognition Techniques with IoT and Deep Learning Technologies. 143-152
Computational Intelligence
- Ravi Giri, Dibakar Raj Pant, Jukka Heikkonen, Rajeev Kumar Kanth
:
Hybrid Capsule Network for Hyperspectral Image Unmixing and Classification. 155-168 - Ala Saleh D. Alluhaidan, Layan Alzaid, Daniyah Aldossari, Renad Alhumid, Joud Alkadi:
An Artificial Intelligence Peer-To-Peer Car Repair Platform. 169-177 - Stephen Hopkins, Ezhil Kalaimannan, Caroline John:
Passive Operating System Fingerprinting Analysis Using Artificial Intelligence Techniques. 178-191 - Malek Wahidi, Rodrigue Imad, Jihad Rishmany:
A Highly Efficient Computer Vision Approach for Tennis Ball Retrieval with Limited Computational Power. 192-203 - Vili Huhta-Koivisto, Katja Saarela, Jukka K. Nurminen
:
Work Disability Risk Prediction with Text Classification of Medical Reports. 204-213 - Nusrat Jahan, Zakia Sultana Shahid, Fahim Chowdhury, Sajjad Ahmed, Mohammad Zavid Parvez, Prabal Datta Barua, Subrata Chakraborty
:
A Comparison of LSTM and GRU for Bengali Speech-to-Text Transformation. 214-224 - Mais Nijim, Viswas Kanumuri, Waseem Alaqqad, Hisham Albataineh:
Advanced Traffic Management System for Smart Cities. 225-235 - Katja Saarela, Vili Huhta-Koivisto, Kai-Kristian Kemell
, Jukka K. Nurminen
:
Explainability of Machine Learning in Work Disability Risk Prediction. 236-245 - Md Tanzim Reza, Shakib Mahmud Dipto, Mohammad Zavid Parvez, Prabal Datta Barua, Subrata Chakraborty
:
A Power Efficient Solution to Determine Red Blood Cell Deformation Type Using Binarized DenseNet. 246-256 - Bikesh Maharjan, Ali Abas Albabawat, Razwan Mohmed Salah, Nada AlSallami, Syed Altaf, Oday Al-Jerew:
Augmented Reality for Cognitive Impairment and Dementia. 257-269 - Karishma Solanki, Danish Faraz Abbasi, Munir Hossain, Emran Salahuddin, Shaymaa Ismail Ali, Shahad Ahmed:
Enhancing the Tourism Experience Using Mobile Augmented Reality: Geo-Visualization Techniques. 270-280
Cybersecurity Engineering
- Manmeet Kaur, Farnaz Farid:
A Taxonomy of Secure Data Transmission Techniques: Preventing Sybil Attacks in Vehicular Ad Hoc Networks. 283-293 - Tamara N. AlMasri, Mu'awiya N. AlDalaien:
Detecting Spyware in Android Devices Using Random Forest. 294-315 - Razaq Jinad, A. B. M. Rezbaul Islam, Narasimha Shashidhar:
Statistical Approaches to File Fragment Analysis. 316-328 - Rao Naveed Bin Rais
, Osman Khalid, Jazib-e Nazar, Muhammad Usman Shahid Khan:
Analysis of Intrusion Detection Using Ensemble Stacking-Based Machine Learning Techniques in IoT Networks. 329-344 - Vivian Sultan, Arun Aryal, Crystal Wu, Hector Lopez:
Smart Grid Security: A Systematic Literature Review. 345-358 - Peter Padiet, Md. Rafiqul Islam
, M. Arif Khan
:
Analysis of Malicious Intruder Threats to Data Integrity. 359-368 - Mosladdin Mohammad Shueb, Xiangdong Che:
A Review of Cybersecurity Advancements in Unmanned Aerial Vehicle. 369-380 - Aaron Wilson, Swapnoneel Roy, Debajyoti Mukhopadhyay:
Open Voting Client Architecture and Op-Ed Voting for Secret Ballot Elections. 381-392
Mobile Cloud Computing
- Aristeidis Karras
, Christos N. Karras
, Anastasios Giannaros
, Dimitrios Tsolis
, Spyros Sioutas
:
Mobility-Aware Workload Distribution and Task Allocation for Mobile Edge Computing Networks. 395-407 - Anoop Abraham, Jeong Yang:
A Comparative Analysis of Performance and Usability on Serverless and Server-Based Google Cloud Services. 408-422 - Farhad Ahamed, Farnaz Farid, Ahmed Dawoud:
Taxonomy of Green Mobile Cloud Computing for Multimedia Applications. 423-432 - Amjad Gawanmeh, Sa'ed Abed
, Sara Abdul Aziz AlAwadh, Wathiq Mansoor, Shadi Atalla, Ahmad Alomari, Eric Yocam
:
Enhanced Not Recently Used Algorithm for Cache Memory Systems in Mobile Computing. 433-442 - Muhammad Johan Alibasa
, Basem Suleiman, Abubakar Bello, Ali Anaissi, Qijing Yan, Shulei Chen:
Cloud Resources Usage Prediction Using Deep Learning Models. 443-452 - Rawan Sanyour, Manal Abdullah, Salha Abdullah:
A Light-Weight Real-Time Anomaly Detection Framework for Edge Computing. 453-466
Networking and Communication
- Chahrazed Benrebbouh
, Lemia Louail
, Sarra Cherbal:
Distributed TDMA for IoT Using a Dynamic Slot Assignment. 469-480 - Mahmoud Bekhit
, Ahmed Fathalla
, Esraa Eldesouky, Ahmad Salah:
Multi-objective VNF Placement Optimization with NSGA-III. 481-493 - Kyle Stein, Arash Golibagh Mahyari, Eman El-Sheikh:
Vehicle Controller Area Network Inspection Using Recurrent Neural Networks. 494-499 - Farouq Aliyu, Tarek R. Sheltami, Marwan H. Abu-Amara, Mohamed Deriche, Ashraf S. Mahmoud:
Evaluation of Human Immune-Based IDPS Under DoS/DDoS Attacks. 500-510
Workshop: Diversified and IoT Applications of Cybersecurity
- Alexander Veach, Munther Abualkibash:
Detecting Phishing Websites Based on Machine Learning Techniques. 513-522 - Jonathan Walatkiewicz, Omar A. Darwish:
A Survey on Drone Cybersecurity and the Application of Machine Learning on Threat Emergence. 523-532 - Anas M. R. Alsobeh, Amani M. Shatnawi:
Integrating Data-Driven Security, Model Checking, and Self-adaptation for IoT Systems Using BIP Components: A Conceptual Proposal Model. 533-549 - Fathi Amsaad, P. L. Prasanna, T. Pravallika, G. Mamatha, B. Raviteja, M. Lakshmi, Nasser Alsaadi, Abdul Razaque, Yahya M. Tashtoush
:
Toward Secure and Efficient CNN Recognition with Different Activation and Optimization Functions. 550-568 - Vishnu Vardhan Baligodugula, Fathi Amsaad, Varshitha Vunnam Tadepalli, Vojjala Radhika, Yetukuri Sanjana, Sai Shiva, Supriya Meduri, Majdi Maabreh
, Naser Alsaadi, Omar A. Darwish, Abdul Razaque, Yahya M. Tashtoush:
A Comparative Study of Secure and Efficient Data Duplication Mechanisms for Cloud-Based IoT Applications. 569-586 - Samar Hendawi, Shadi AlZu'bi, Ala Mughaid, Nayef Alqahtani:
Ensuring Cybersecurity While Leveraging Social Media as a Data Source for Internet of Things Applications. 587-604 - AlsharifHasan Mohamad Aburbeian
, Huthaifa I. Ashqar
:
Credit Card Fraud Detection Using Enhanced Random Forest Classifier for Imbalanced Data. 605-616 - Ala Mughaid, Ali Alqahtani, Shadi AlZu'bi, Ibrahim Obeidat, Rabee Alqura'n, Mahmoud AlJamal, Raid AL-Marayah:
Utilizing Machine Learning Algorithms for Effectively Detection IoT DDoS Attacks. 617-629 - Izzat Alsmadi, Lucy Tsado, Camille Gibson:
Towards Cyber Readiness Assessment in Rural Areas. 630-639 - Ahmad Hamarshe, Huthaifa I. Ashqar
, Mohammad M. N. Hamarsheh
:
Detection of DDoS Attacks in Software Defined Networking Using Machine Learning Models. 640-651
Posters Abstracts
- Sarah Abuhaimed, Maha Al-Jasir, Hanan Al-Juaid, Ather Alhameidi:
Smart Product Recommendation System. 655 - Nouf AlFouzn, Arwa Almutairi, Sara Alwadyy, Shatha Almutairi, Noore Zahra:
Detection and Prediction of Epileptic Seizures Using Machine Learning Model. 656

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.