2091

Technical e-Papers
Title Author URL
Exploration of the Impact of Cybersecurity Awareness on Small and Medium Enterprises (SMEs) in Wales Using Intelligent Software to Combat Cybercrime by nNisha Rawindaran,nAmbikesh Jayal andnEdmond Prakash
An Improved Binary Owl Feature Selection in the Context of Android Malware Detection by nHadeel Alazzam,nAryaf Al-Adwan,nOrieb Abualghanam,nEsra’a Alhenawi andnAbdulsalam Alsmady
An Augmented Reality CBIR System Based on Multimedia Knowledge Graph and Deep Learning Techniques in Cultural Heritage by nAntonio M. Rinaldi,nCristiano Russo andnCristian Tommasino
Improving ERPs Integration in Organization: An EOS-Based GreneOS Implementation by nJoseph Rahme,nBharat Masimukku,nNicolas Daclin andnGregory Zacharewicz
Meta-Heuristic Optimization Algorithm-Based Hierarchical Intrusion Detection System by nKamal A. ElDahshan,nAbdAllah A. AlHabshy andnBashar I. Hameed
Solving the Schrödinger Equation with Genetic Algorithms: A Practical Approach by nRafael Lahoz-Beltra
Correction: Mohammad et al. User Authentication and Authorization Framework in IoT Protocols. Computers 2022, 11, 147 by nAmmar Mohammad,nHasan Al-Refai andnAli Ahmad Alawneh
Understanding Bitcoin Price Prediction Trends under Various Hyperparameter Configurations by nJun-Ho Kim andnHanul Sung
Digital Twin in the Provision of Power Wheelchairs Context: Support for Technical Phases and Conceptual Model by nCarolina Lagartinho-Oliveira,nFilipe Moutinho andnLuís Gomes
Implementation of a C Library of Kalman Filters for Application on Embedded Systems by nChristina Schreppel,nAndreas Pfeiffer,nJulian Ruggaber andnJonathan Brembeck
Arbitrarily Parallelizable Code: A Model of Computation Evaluated on a Message-Passing Many-Core System by nSebastien Cook andnPaulo Garcia
A Short Survey on Deep Learning for Multimodal Integration: Applications, Future Perspectives and Challenges by nGiovanna Maria Dimitri
Robust Automatic Modulation Classification Using Convolutional Deep Neural Network Based on Scalogram Information by nAhmed Mohammed Abdulkarem,nFiras Abedi,nHayder M. A. Ghanimi,nSachin Kumar,nWaleed Khalid Al-Azzawi,nAli Hashim Abbas,nAli S. Abosinnee,nIhab Mahdi Almaameri andnAhmed Alkhayyat
Learning-Based Matched Representation System for Job Recommendation by nSuleiman Ali Alsaif,nMinyar Sassi Hidri,nHassan Ahmed Eleraky,nImen Ferjani andnRimah Amami
Features Engineering for Malware Family Classification Based API Call by nAmmar Yahya Daeef,nAli Al-Naji andnJavaan Chahl
From Mean Time to Failure to Mean Time to Attack/Compromise: Incorporating Reliability into Cybersecurity by nLeandros Maglaras
A Ranking Learning Model by K-Means Clustering Technique for Web Scraped Movie Data by nKamal Uddin Sarker,nMohammed Saqib,nRaza Hasan,nSalman Mahmood,nSaqib Hussain,nAli Abbas andnAziz Deraman
Students and Teachers’ Need for Sustainable Education: Lessons from the Pandemic by nManuel Caeiro-Rodríguez,nMario Manso-Vázquez,nTriinu Jesmin,nJaanus Terasmaa,nHariklia Tsalapata,nOlivier Heidmann,nJussi Okkonen,nEdward White,nCarlos Vaz de Carvalho andnIoana-Andreea Stefan
Composite Spatial Manipulation Framework for Redirected Walking by nNassr Alsaeedi andnAlbert Zündorf
Intelligent Robotic Welding Based on a Computer Vision Technology Approach by nNazar Kais AL-Karkhi,nWisam T. Abbood,nEnas A. Khalid,nAdnan Naji Jameel Al-Tamimi,nAli A. Kudhair andnOday Ibraheem Abdullah
{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}
>